SECURE KUBERNETES LIKE A PRO | HOW DEVSECOPS ENGINEERS SECURE Kubernetes ?

Sdílet
Vložit
  • čas přidán 5. 07. 2024
  • Support my work
    www.buymeacoffee.com/abhishekprd Security is a journey.
    Security is a very very important aspect of DevSecOps. One should definitely know how to secure their Kubernetes clusters. If not, the clusters will be compromised and sensitive information will be leaked and application can be hacked. Are you an aspiring DevSecOps engineer ? Do you want to learn how to secure your Kubernetes clusters like a Pro ? Watch the video till the end.
    Instagram: / abhishekveeramalla_off...
    Video Notes in GitHub
    github.com/iam-veeramalla/Kub...
    FREE DEVOPS COURSE
    • DEVOPS ZERO TO HERO CO...
    Telegram channel
    telegram.me/abhishekveeramalla
    About me:
    -----------------
    LinkedIn: / abhishek-veeramalla-77...
    GitHub: github.com/iam-veeramalla
    Medium: / abhishekveeramalla-av
    CZcams: / @abhishekveeramalla .
    .
    Disclaimer: Unauthorized copying, reproduction, or distribution of this video content, in whole or in part, is strictly prohibited. Any attempt to upload, share, or use this content for commercial or non-commercial purposes without explicit permission from the owner will be subject to legal action. All rights reserved.
  • Zábava

Komentáře • 98

  • @samikshasharma3544
    @samikshasharma3544 Před 5 měsíci +1

    Thanks!

  • @anjaliranot897
    @anjaliranot897 Před 10 měsíci

    you have so muck knowlegde and patience to explain all concept so nicely

  • @jackayuk424
    @jackayuk424 Před měsícem

    The best one best this space thanks a million sir ❤

  • @VikramSharvansh
    @VikramSharvansh Před 11 měsíci +1

    Great efforts abhishek👏👏
    Each & every video of u making the devops/Kubernetes learning journey simple & interesting.
    Thanks once again.

  • @pjj7466
    @pjj7466 Před 2 měsíci

    Fantastic session bro.

  • @SivakumarA-lx5dj
    @SivakumarA-lx5dj Před 11 měsíci +2

    @Abhishek, Thanks a lot for your video on most awaited topic

  • @kaverichowdary6637
    @kaverichowdary6637 Před 11 měsíci +6

    East are West abhishek anna is best 😊

  • @akhilc8211
    @akhilc8211 Před 11 měsíci +1

    thank you anna my day finishes with your videos......

  • @nikhilmeshram4376
    @nikhilmeshram4376 Před 11 měsíci +1

    beautiful explanation sir....... thank you so much....👌👌👌👌👌

  • @evansdanso2374
    @evansdanso2374 Před 11 měsíci +2

    Abhishek, you're great!!! I have taken full DevOps classes but never understood a lot until I started following you! I came into Devops with a little IT background as a data analyst.
    Thank a lot!!!
    Can you do a short video to explain various web applications( Nginx, apache tomcat, etc) and how often DevOps Engineer encounter them..and other applications that DevOps Engineers most often deploy. Please 🙏...

  • @ganeshgoudru8444
    @ganeshgoudru8444 Před 11 měsíci

    Hi Abhishek, is it possible to make hands on in this video? Bcz usually in EKS we won’t be maintaining control plane right so how to implement security for eks clusters?

  • @nishanthhg6437
    @nishanthhg6437 Před 11 měsíci +1

    Thank you for all the contents

  • @gouravchhabra6142
    @gouravchhabra6142 Před 11 měsíci +5

    Would like to add few security aspects which I have been using so hope others can also take them into consideration:
    1. Applying k8s policies using KYVERNO to restrict security policies in k8s resources.
    2. Using Manifest/Helm scanners tools like CHECKOV or DATREE to avoid any misconfigurations or vulnerabilities in them.
    3. Using cluster scanners or RBAC Visulizers like KUBESCAPE.
    4. Using Docker image signing and attestation tool like COSIGN.
    5. Following CIS benchmarks for K8s or Cloud on which k8s hosted.
    6. Securing Ingress using TLS.
    7. Secrets Encryption using sealed secrets or external secret operator.
    8. Using Distroless images for building containers.

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  Před 11 měsíci +1

      1st point is covered in latest video
      Will do others soon. Thanks for sharing Gourav

  • @princeraghu3807
    @princeraghu3807 Před 11 měsíci +2

    Its very quality & valuable content brother😊

  • @haroon.niamat
    @haroon.niamat Před 11 měsíci +2

    Informative..!!👍

  • @VaibhavSupe
    @VaibhavSupe Před 11 měsíci +1

    Hello Abhishek. Thank you so much….really hat’s off you for such an amazing content with easily understandable language & your dedication🤩🤩🤩
    If possible please make more such videos on Security / DevSecOps related topics.
    Thanks a lot 🤩🤩🤩

  • @rohita9689
    @rohita9689 Před 11 měsíci +3

    Papa you are giving such gifts that i can't even explain.. Thank you ❤

  • @sonalimohapatra880
    @sonalimohapatra880 Před 11 měsíci +1

    Yeah Abhishek bro is the best ❤❤

  • @techairenglish1357
    @techairenglish1357 Před 11 měsíci

    If I am using AKS, then is the API server is already secured since master node is managed by Azure or it is not required?

  • @lakshmanababu4279
    @lakshmanababu4279 Před 2 měsíci +1

    Thanks

  • @senthilkumar5129
    @senthilkumar5129 Před 11 měsíci +1

    Thank you

  • @shalubajpai4225
    @shalubajpai4225 Před 11 měsíci +1

    Great videos Abhishek!
    Can you plz make videos on how to handle volume in kubernetes?

  • @phaneerameswarareddychilum7189
    @phaneerameswarareddychilum7189 Před 11 měsíci +2

    Abhisek your content is great and the way you teach is really superb. only one correction, I guess the image scan command is docker snyk not docker synk if I am correct. please correct me if I am wrong

  • @twizzoe
    @twizzoe Před 11 měsíci +2

    @Abhishek, thanks for this detailed lecture. I need clarification on securing the API-SERVER. If we are using Amazon EKS, I thought since Amazon handles the control plane where the API-SERVER is located, it handles the security of every component involved. With this video, I am assuming we still need to take an extra step to secure it

  • @ketanmorey1953
    @ketanmorey1953 Před 11 měsíci +1

    Abhishek bhai❤

  • @kundalakshmidevi4449
    @kundalakshmidevi4449 Před 6 měsíci +1

    very nice explanation abhi sir but i have a doubt here you have mentioned docker scan in github repo but in video you said docker sync .
    Is it docker scan or docker sync??????

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  Před 6 měsíci

      synk is a tool that performs scanning on docker images. docker scan internally uses synk.

  • @ifirefox1
    @ifirefox1 Před 4 měsíci +1

    Hi Abhishek, thank you so much for content, i am more focussed towards devsecops, should i finish your zero to hero kubernetes coarse before i start this video?

  • @tarunmeher5464
    @tarunmeher5464 Před 11 měsíci

    Hey Abhishek.. Can you give us a trick or any plan that we can remember all these aws service, kubernetes topic so that it will be easy for the interview,, because there are so many topic on devops and not every one have sharp minded.. so hope you understand and give us a solution for this.. Thank you❤

  • @saswatpriyabrat
    @saswatpriyabrat Před 11 měsíci +1

    This is an excellent Video with a bundles of Knowledge....Thanks for this awesome Video ❤

  • @twizzoe
    @twizzoe Před 11 měsíci +1

    I would like to inquire if Vault can be used for encryption of the ETCD

  • @tanayabanerjee2380
    @tanayabanerjee2380 Před 6 měsíci +1

    Hi,,, Please make the demo part on Rbac , Network policy and rest of the topics ...it will be very helpful 🙏🙏

  • @ganeshgoudru8444
    @ganeshgoudru8444 Před 11 měsíci +1

    Hi Abhishek thanks for the video...one doubt the command is snyk or synk?

  • @kodjoviamedimele3066
    @kodjoviamedimele3066 Před 11 měsíci +1

    Hi sir. First of all thank you for the quality of your contents. I have an issue when implementing the cicd with Argo. I import the repo and when it comes to the Jenkins file I am lost. Wondering if you can go over how you configure it ?

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  Před 11 měsíci

      Please watch the ultimate cicd pipeline viceo

    • @kodjoviamedimele3066
      @kodjoviamedimele3066 Před 11 měsíci

      @@AbhishekVeeramalla I was doing it with the video but I didn’t see the part where you went through the Jenkins file configuration. I tried to figure out but with no success. I will try again today.

    • @jaganarumugam8527
      @jaganarumugam8527 Před 11 měsíci

      Which part you faced issue..

  • @yuvichh
    @yuvichh Před 11 měsíci +1

    31:00, is it Docker scout or Synk. I mean sync is another project and I can see the Docker Scout!

  • @rohithreddy6853
    @rohithreddy6853 Před 11 měsíci +1

    Thnx anna
    If possible please do a video on how to make ATS resume for freshers on AWS with DevOps please anna

  • @khagolakalyan
    @khagolakalyan Před 11 měsíci +2

    Nice Video...Can you Please explain the link between Google optimize and A/B testing with Kubernetes cluster and One more Keycloak.link.woth oidc..What's the link between these two..I m getting confused..

  • @ThecookBoy
    @ThecookBoy Před 11 měsíci +1

    Hai Abhishek. Verramalla can we expect this in the practical video it might be helpful for a better understanding

  • @averagebadmin10player
    @averagebadmin10player Před 10 měsíci

    Cluster monitoring can't be done by Prometheus or grafana ?

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  Před 10 měsíci

      For example ?

    • @averagebadmin10player
      @averagebadmin10player Před 10 měsíci

      @@AbhishekVeeramalla 6th point of this video you told Sysdig works like a deamon set if some hacker is attacking in that way can't be done by prometheus and grafana ?

  • @sth5287
    @sth5287 Před 11 měsíci +1

    Hi abhishek, i love your content.. Can you please make a series on azure devops ??? Please.... Please...

  • @lakshmisucharitha3529
    @lakshmisucharitha3529 Před 7 měsíci

    where is the practical sesion video for all these 7 security steps ? Can any one ping here the link

  • @napoleanbonaparte9225
    @napoleanbonaparte9225 Před 11 měsíci +1

    Pod container security kuda adutunaaru anna

  • @nishanthhg6437
    @nishanthhg6437 Před 11 měsíci +1

    First view sir

  • @ashuofficial28
    @ashuofficial28 Před 11 měsíci +1

    Ingress graphana prompetus those all use in Aks na not in use those all in eks.

  • @DanielSmith-hd9iq
    @DanielSmith-hd9iq Před 9 měsíci

    do you mean docker snyk here?

  • @krishnakumarkumar5710
    @krishnakumarkumar5710 Před 10 měsíci +2

    Good content for free is dream in this selfish world. But some worriers like Abhishek prove it wrong...

  • @kishorkhilare6375
    @kishorkhilare6375 Před 11 měsíci +2

    Sir,
    Can you explain in hindi also

  • @udaykumar-tb5kn
    @udaykumar-tb5kn Před 9 měsíci

    Bro. This security of kubernetes playliat or devops hero zero playlist confused with which playlist and what order should be flowed pls tell

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  Před 9 měsíci +1

      This video is not part of devops zero to hero. Please check again.
      This is only part of kubernetes playlist and if u want to learn kubernetes advanced u need to
      Learn this

    • @udaykumar-tb5kn
      @udaykumar-tb5kn Před 9 měsíci

      @@AbhishekVeeramalla understood bro thanks lot for detailed explanation

  • @delengr1026
    @delengr1026 Před 11 měsíci +1

    Thanks