Secret Store CSI Driver Tutorial | Kubernetes Secrets | AWS Secrets Manager | KodeKloud
Vložit
- čas přidán 2. 06. 2024
- Dive deep into the world of Kubernetes security with our comprehensive guide to Secret Store CSI Driver. Discover why this tool is essential for safeguarding sensitive information, learn how it compares to alternatives like ESO and Sealed Secrets, and master the process of setting it up for your Kubernetes cluster. With insightful demos showcasing the creation of secrets in AWS Secret Manager and the seamless integration of Secret Store CSI Driver, this video is your ultimate resource for enhancing security in your DevOps environment. Join us on this journey to strengthen your Kubernetes security posture and protect your valuable data.
🆓Join KodeKloud Community for FREE: kode.wiki/KodeKloudCommunity_YT
⬇️Below are the topics we are going to discuss in this video:
00:00 - Introduction
00:48 - Why do we need Secret Store CSI Driver?
03:03 - What is Secret Store CSI Driver?
04:01- Secret Store CSI Driver vs ESO vs Sealed Secrets
05:25 - How does Secret Store CSI Driver works?
08:14 - Demo - Creating Secret in AWS Secret Manager
09:30 - Demo - Setting up Secret Store CSI Driver for Kubernetes Cluster
30:56 - Conclusion
✅Start your Kubernetes Career Now - bit.ly/KubernetesLearningPath
Check out our learning paths at KodeKloud to get started:
▶️ Cloud Computing: kode.wiki/CloudLearningPath_YT
▶️ Kubernetes: bit.ly/KubernetesLearningPath
▶️AWS: kode.wiki/awslearningpath_yt
▶️Azure: kode.wiki/azurelearningpath_yt
▶️Google Cloud Platform: kode.wiki/GCPlearningpath_YT
▶️ Linux: bit.ly/LinuxLearningPath
▶️ DevOps Learning Path: bit.ly/DevOpsLearningPath-YT
#Kubernetes #DevOps #SecretStoreCSIDriver #K8sSecurity #AWS #sealedsecrets #awssecrets #DevOpsTools #CyberSecurity #CloudComputing #kodekloud
For more updates on courses and tips, follow us on:
🌐 Website: kodekloud.com/
🌐 LinkedIn: / kodekloud
🌐 Twitter: / kodekloudhq
🌐 Facebook: / kodekloudhq
🌐 Instagram: / kodekloud
🌐 Blog: kodekloud.com/blog/
Looked at many videos to understand AWS Secrets, CSI drivers and Storage Class. This is the Best tutorial on this topic I had found till date.
Excellent Excellent Excellent.....simply excellent....thanks a lot Sir.....
@kodeKloud , I'm wondering, How is it safe when the password is saved in plain text inside the pod. Anyone with read access , who can read the k8s secret can also read the pod's volume. Correct me if I'm wrong.
Nice video!!! Thanks Sanjeev
What a great demo and some troubleshooting
My fav is Hashicorp vault!
Helpful video. Saved my day
Great information, looks like with this implementation it won't be possible to use the secrets as env variables, instead I will need to indicate my app to fetch the secrets from a file, and monitor when the secret's value changes, correct?
Great....
So helpfull
Thank you!
Hi you'r video looks great
can you please explain how can i use the value in the pod env section ?
Thank you
Maybe it would be only possible set a secret from the mounted file as an env variable within pod's container(s).
This is one of the reasons to sync as a kubernetes secret.
who are you? you're not even a real person, it's like you created an AI instead of hiring someone to make this video.