filmov
tv
Packaging (containerise and RBAC) your K8S operator as a developer | Writing K8S Operator - Part 6
Показать описание
In this video we looked into how we can containerise our application that we have been writing and setup RBAC so that it can be deployed on the Kubernetes cluster.
GitHub:
Kluster Playlist:
Web:
00:00 Introduction
00:26 Agenda
00:42 What were we writing
01:08 What has been done already
01:38 What are we gonna do today
02:06 Containerise the application
04:06 Building config using InClusterConfig()
06:50 Build/push the image
08:52 Deployment manifest
12:20 Handling RBAC for kluster
23:36 Brief discussion about spec/status split
24:49 Continuing RBAC resources
28:39 Testing the things again
28:49 Errored, issues in Kluster resource
30:47 Testing again, errored RBAC again
34:10 Testing things again
36:10 Validating version slug
36:54 Like and Subscribe
GitHub:
Kluster Playlist:
Web:
00:00 Introduction
00:26 Agenda
00:42 What were we writing
01:08 What has been done already
01:38 What are we gonna do today
02:06 Containerise the application
04:06 Building config using InClusterConfig()
06:50 Build/push the image
08:52 Deployment manifest
12:20 Handling RBAC for kluster
23:36 Brief discussion about spec/status split
24:49 Continuing RBAC resources
28:39 Testing the things again
28:49 Errored, issues in Kluster resource
30:47 Testing again, errored RBAC again
34:10 Testing things again
36:10 Validating version slug
36:54 Like and Subscribe
Packaging (containerise and RBAC) your K8S operator as a developer | Writing K8S Operator - Part 6
Kubernetes Security Best Practices you need to know | THE Guide for securing your K8s cluster!
Kubernetes Security Best Practices 2021 (From Container Specialist)
Understanding Kubernetes RBAC | Access control basics explained
Understanding Logging: Containers & Microservices
Your (container) secret's safe with me - Liz Rice (Aqua Security)
5 tools to SECURE your CONTAINER workflows with Azure
Kubernetes Security Best Practices - Ian Lewis, Google
#Kubernetes Interview Scenario - 25 | Your container is consuming more resources than expected.
Harbor Private Container Registry for Docker and Kubernetes
Kubernetes Security - Security Contexts | How to use them to make your Containers and Pods secure
Container Registry
Webinar: The abc’s of Kubernetes security
Container Security • Liz Rice & Eoin Woods • GOTO 2020
Your Secret's Safe with Me. Securing Container Secrets with Vault
Tutorial: Introduction to Using the Container Storage Interface (CSI) Primitives - Michael Mattsson
Resource Access Control IAM Roles and Permissions
Sign Your Container Images with Cosign, GitHub Actions and GitHub Container Registry (How To)
What Are Microservices Really All About? (And When Not To Use It)
Docker image scanning in AWS ECR - finding vulnerabilities
What ARE Containers? (and Docker ...)
Portainerd Series 2 Episode 4 How to secure your container environment
How to Secure Your Container Environment Using Portainer
AZ-104 Exam EP 07: Azure Role-Bases Access Control
Комментарии