Sealed Secrets: Safeguarding Your Kubernetes Secrets | Step By Step Tutorial | KodeKloud

Поделиться
HTML-код
  • Опубликовано: 24 ноя 2024

Комментарии • 26

  • @KodeKloud
    @KodeKloud  5 дней назад

    🚀Explore Our Top Courses & Special Offers: kode.wiki/40SkWyU

  • @BR-lx7py
    @BR-lx7py 11 месяцев назад +2

    Is something like this going to be part of core K8S? Seems like a fundamental feature that you shouldn't have to rely on a third party CRD for.

  • @pradippipaliya9675
    @pradippipaliya9675 2 месяца назад

    Can we directly encrypt kubernetes secret like using any encryption algorithm we encrypt the secret value and after that decrypt that value in pod and use it. So that anyone cannot access secret without private key. Does kubernetes or any other tool or methods will help to achieve this??

  • @rahulmahulkar9325
    @rahulmahulkar9325 10 месяцев назад

    Do you see any scenarios when sealed secret operator will not be in situation to decrypt encrypted password and create correct secrete in Kubernetes cluster? Is there any way to store certificates generated by operator somewhere outside the cluster? I guess, if we redeploy the operator it will create new certificate pair.

  • @sampath5242
    @sampath5242 Год назад +4

    if someone get access to k8s cluster and decoding the secret?

    • @KodeKloud
      @KodeKloud  Год назад +2

      If someone gains access to a Kubernetes cluster and can decode a secret, it's a serious security risk. Kubernetes secrets are base64-encoded but not encrypted, meaning anyone with access can decode them. A compromised secret could lead to unauthorized access or data breaches. Immediate action includes rotating the compromised secret and updating applications using it. Investigate the breach and implement security best practices such as access control, network policies, and regular monitoring. Consider secret management solutions or encryption tools to enhance security. Security in Kubernetes should be a top priority to minimize risks and respond effectively to breaches.

  • @scottamolinari
    @scottamolinari 10 месяцев назад

    How would sealed-secrets be used with Terraform?

  • @arknfel9432
    @arknfel9432 9 дней назад

    U r awesome, thanks for the content

    • @KodeKloud
      @KodeKloud  5 дней назад

      Thank you for watching our videos, and making us a part of your growth. Your kind words, comments and support is what keeps us going every day! Hit the bell icon to never miss out on our content.

  • @putnam120
    @putnam120 Год назад +1

    What about credentials rotation? This is mentioned on the website but no details provided

    • @KodeKloud
      @KodeKloud  Год назад

      Hey, please refer to github.com/bitnami-labs/sealed-secrets#secret-rotation

  • @moussaouiabdelmajid2657
    @moussaouiabdelmajid2657 7 месяцев назад

    If one need to deploy the app in a different cluster, the operator public and private key will change, and the sealedsecret stored in git repo will be unusable

  • @rohanekar
    @rohanekar Год назад

    Imperative and declarative way

    • @KodeKloud
      @KodeKloud  Год назад

      Keep learning with us & stay connected .

  • @josvanoorschot6072
    @josvanoorschot6072 3 месяца назад

    Excellent Tutorial! :-)

  • @TheSahanc
    @TheSahanc Год назад +3

    good stuff.

  • @chewteelim6020
    @chewteelim6020 Год назад

    Is this solution applicable to Openshift too?

    • @KodeKloud
      @KodeKloud  Год назад

      Yes. Sealed Secrets can be used with OpenShift to securely manage and store sensitive data, just as it can be used with a standard Kubernetes cluster. However, make sure to consider OpenShift's specific security features and requirements when implementing it in your OpenShift environment.

  • @aniketpurohit1875
    @aniketpurohit1875 Год назад

    I had paid money but my subscription in un-action please fix the issue

    • @KodeKloud
      @KodeKloud  Год назад

      We apologise for the issue, could you please email us the concern at support@kodekloud.com and we will investigate it.

  • @jokeri2050
    @jokeri2050 10 месяцев назад

    awesome

    • @KodeKloud
      @KodeKloud  10 месяцев назад

      Thanks a lot!