Kubernetes Security - Pod Security Policies (PodSecurityPolicy) - 11

preview_player
Показать описание
Kubernetes Security - Pod Security Policies (PodSecurityPolicy) -11

Chapers
00:00 About the topic & Recap
01:16 Kubernetes API Call
02:44 How Admission Controllers will work
03:37 Built in Admission Controllers
04:31 PodSecurityPolicy for What
07:48 Pod Security Standards
11:21 Enable Disable PodSecurityPolicy
11:53 Sample PSP
17:46 PSP Implementation
19:57 PSP Demo with ClusterRole, ClusterRoleBinding & ServiceAccount

Like, Comment & Subscribe Learn with GVR

#cks #kubenetes #kubernetessecurity #k8s #learnwithgvr
Рекомендации по теме
Комментарии
Автор

i jst wanna say ur videos r awesome i have learn alot imprtnt imprtnt things in kubernetes which i dont know before thnk u very much for this brother keep going n do more

shamstabrez
Автор

Really awesome explonation Bro....keep going

dasilavanya
Автор

Venkat, These videos are extremely helpful to understand the concepts throughly. I am planning to attempt CKS exam right after my HashiCorp Vault. I know this is super tough exam, planning for full 1 month preparation and sit for exam end of March. Is it possible to share the slides ?

aireddy
Автор

Explain in this manner
1. What happens if we don't use pod security policy
2.how to implement PSP

brahmadarapaneni
Автор

Thanks. Nice Video. I just want to ask if I want to diable PSP, Do I have to always remove it on the Api Server? Some documentations say you can do pre namespace disablement.

olumidealabi
Автор

Kubernetes pod security policy is removed from CKS exam curriculum. Instead PodSecurity Standard and Pod Security admission.

jsujaykumar
Автор

great video, would ask one thing what if we want to have on some pods to have privileged true like I am on premises and I have nginx pod controllers and also using PSP, can I some how flag that pods to be ignored in PSP?

keratishvili
Автор

Also, could i know what terminal software you use? is it iterm2, or warp?

vitusyu
Автор

Hello sir

If we apply psp policy to deny root privileges, will it stop already running pod with root privilege,
Which was running before psp enable
Please reply

varunr
Автор

One question: is it possible to apply a psp to the default service account? since i think it may be more important for a pod is run under the default sa if no specific service account is specified.

vitusyu
Автор

is this still applicable? According to latest changes this PSP has been replaced / updated with Pod Security Admissions.

vinayayinapurapu
Автор

I didn't get that how can we disable the psp in existing cluster


Now am having an warning msg for deprecated api in gke cluster


So first i wanted to disable the psp and if you have recorded video for migration from psp to PSAC please help me with that.

ravibagul-ui
Автор

Great video Sir.
I have small question regarding PDB.
As PDB will be removed v1.25, do we have any alternative way of PDB to use ? Please reply me...

sanikommusivareddy