Secret Store CSI Driver Tutorial | Kubernetes Secrets | AWS Secrets Manager | KodeKloud

Sdílet
Vložit
  • čas přidán 2. 06. 2024
  • Dive deep into the world of Kubernetes security with our comprehensive guide to Secret Store CSI Driver. Discover why this tool is essential for safeguarding sensitive information, learn how it compares to alternatives like ESO and Sealed Secrets, and master the process of setting it up for your Kubernetes cluster. With insightful demos showcasing the creation of secrets in AWS Secret Manager and the seamless integration of Secret Store CSI Driver, this video is your ultimate resource for enhancing security in your DevOps environment. Join us on this journey to strengthen your Kubernetes security posture and protect your valuable data.
    🆓Join KodeKloud Community for FREE: kode.wiki/KodeKloudCommunity_YT
    ⬇️Below are the topics we are going to discuss in this video:
    00:00 - Introduction
    00:48 - Why do we need Secret Store CSI Driver?
    03:03 - What is Secret Store CSI Driver?
    04:01- Secret Store CSI Driver vs ESO vs Sealed Secrets
    05:25 - How does Secret Store CSI Driver works?
    08:14 - Demo - Creating Secret in AWS Secret Manager
    09:30 - Demo - Setting up Secret Store CSI Driver for Kubernetes Cluster
    30:56 - Conclusion
    ✅Start your Kubernetes Career Now - bit.ly/KubernetesLearningPath
    Check out our learning paths at KodeKloud to get started:
    ▶️ Cloud Computing: kode.wiki/CloudLearningPath_YT
    ▶️ Kubernetes: bit.ly/KubernetesLearningPath
    ▶️AWS: kode.wiki/awslearningpath_yt
    ▶️Azure: kode.wiki/azurelearningpath_yt
    ▶️Google Cloud Platform: kode.wiki/GCPlearningpath_YT
    ▶️ Linux: bit.ly/LinuxLearningPath
    ▶️ DevOps Learning Path: bit.ly/DevOpsLearningPath-YT
    #Kubernetes #DevOps #SecretStoreCSIDriver #K8sSecurity #AWS #sealedsecrets #awssecrets #DevOpsTools #CyberSecurity #CloudComputing #kodekloud
    For more updates on courses and tips, follow us on:
    🌐 Website: kodekloud.com/
    🌐 LinkedIn: / kodekloud
    🌐 Twitter: / kodekloudhq
    🌐 Facebook: / kodekloudhq
    🌐 Instagram: / kodekloud
    🌐 Blog: kodekloud.com/blog/

Komentáře • 14

  • @ChiruMegs
    @ChiruMegs Před měsícem +1

    Looked at many videos to understand AWS Secrets, CSI drivers and Storage Class. This is the Best tutorial on this topic I had found till date.

  • @omega1962
    @omega1962 Před měsícem

    Excellent Excellent Excellent.....simply excellent....thanks a lot Sir.....

  • @subithalsubbaiah7004
    @subithalsubbaiah7004 Před měsícem +1

    @kodeKloud , I'm wondering, How is it safe when the password is saved in plain text inside the pod. Anyone with read access , who can read the k8s secret can also read the pod's volume. Correct me if I'm wrong.

  • @wenjieyang2226
    @wenjieyang2226 Před měsícem

    Nice video!!! Thanks Sanjeev

  • @nforlife
    @nforlife Před 2 měsíci

    What a great demo and some troubleshooting
    My fav is Hashicorp vault!

  • @arunshankar1987
    @arunshankar1987 Před 2 měsíci

    Helpful video. Saved my day

  • @fabrizzio_aranda
    @fabrizzio_aranda Před měsícem

    Great information, looks like with this implementation it won't be possible to use the secrets as env variables, instead I will need to indicate my app to fetch the secrets from a file, and monitor when the secret's value changes, correct?

  • @dsosys
    @dsosys Před 2 měsíci

    Great....

  • @ferhatcan5262
    @ferhatcan5262 Před 2 měsíci

    So helpfull

  • @user-vm2oh7oi5p
    @user-vm2oh7oi5p Před 2 měsíci

    Hi you'r video looks great
    can you please explain how can i use the value in the pod env section ?
    Thank you

    • @SoulJah876
      @SoulJah876 Před 2 měsíci

      Maybe it would be only possible set a secret from the mounted file as an env variable within pod's container(s).

    • @chrisbecke2793
      @chrisbecke2793 Před měsícem +1

      This is one of the reasons to sync as a kubernetes secret.

  • @ash3rr
    @ash3rr Před 18 dny

    who are you? you're not even a real person, it's like you created an AI instead of hiring someone to make this video.