Securing Cluster Networking with Network Policies - Ahmet Balkan, Google

Поділитися
Вставка
  • Опубліковано 13 вер 2024

КОМЕНТАРІ • 24

  • @7aydarah
    @7aydarah Рік тому

    Perfect explination with hand drawn schema.

  • @veramentegina
    @veramentegina 6 років тому +4

    Great talk. Network Policies are definitely being underutilized. Thanks for clarifying all that.

  • @msohan01
    @msohan01 5 років тому

    Great explanation and overview of Network Policies

  • @cptechno
    @cptechno 6 років тому +9

    It's a useful tool indeed, but I profoundly disagree with logic that's being used in writing rules. Empty should mean Empty. An empty bracket ( [ ] ) should mean NO node! If ALL nodes want to be specified than a symbol like '*' (wildcard) should be used. The set could be read as [ * ]. That's the way it has always been and I don't see any reasons why we should stray from that true and tested historic symbolic protocol. Allowing the reverse of logic, where empty bracket means 'all nodes' can be the source of costly errors in big projects.

    • @matthartstonge
      @matthartstonge 6 років тому +3

      Had a quick think about this, I compare it to NoSQL(mongo) and RESTful APIs, where if you specify nothing to filter by, you get all the things!

  • @phannguyen1556
    @phannguyen1556 5 років тому +1

    Wonderful talk about Network Policies!!! It's very useful, Ahmet. Cheers!

    • @khalidgraysen4848
      @khalidgraysen4848 3 роки тому

      i dont mean to be offtopic but does someone know of a method to get back into an Instagram account??
      I somehow forgot the account password. I would appreciate any assistance you can offer me.

    • @cristianobrayden8712
      @cristianobrayden8712 3 роки тому

      @Khalid Graysen instablaster ;)

    • @khalidgraysen4848
      @khalidgraysen4848 3 роки тому

      @Cristiano Brayden i really appreciate your reply. I got to the site on google and im waiting for the hacking stuff atm.
      Takes quite some time so I will reply here later when my account password hopefully is recovered.

    • @khalidgraysen4848
      @khalidgraysen4848 3 роки тому

      @Cristiano Brayden it worked and I now got access to my account again. I'm so happy:D
      Thanks so much, you saved my ass !

    • @cristianobrayden8712
      @cristianobrayden8712 3 роки тому

      @Khalid Graysen Happy to help :)

  • @dineshkumarsaravanan5893
    @dineshkumarsaravanan5893 6 років тому +1

    tq so much ahmet its very useful

  • @kansalmukul1
    @kansalmukul1 3 роки тому

    Truly amazing....

  • @tejsinghranaofficial
    @tejsinghranaofficial 4 роки тому

    Nicely Explained!!

  • @arunpln
    @arunpln 4 роки тому

    Very useful.

  • @yahyabilge9765
    @yahyabilge9765 4 роки тому +2

    Some little confusion about cdir vs cidr :) But gorgeous explanation and presentation

  • @pythonsriracha4944
    @pythonsriracha4944 3 роки тому

    at 8:47 , don't you mean all ports are closed by default? or am I missing something?

  • @dsinghr
    @dsinghr 4 роки тому

    Isn't RBAC does the same thing? It allows specific microservices to talk to specific microservices. Similar to what NetworkPolicies does..

    • @Aliennnaa
      @Aliennnaa 3 роки тому +2

      network policies usually works on layer 4 or 3 of osi ,where is rbac are at the endpoint talking to the api server to get authorization so layer 7

  • @AbdoTawdy
    @AbdoTawdy Рік тому

    27:38 he is saying that he would ask this question to a "community " called "signal works" , dose anyone know exactly this community name , thanks

    • @thebsv
      @thebsv 10 місяців тому

      #sig-network channel on kubernetes in Slack

  • @TiexinGuo
    @TiexinGuo 4 роки тому +2

    I wouldn’t listen to a guy talking about network who reads CIDR as CDIR multiple times.

    • @zamboz01
      @zamboz01 3 роки тому +2

      Yeaa like he is doing it on purpose not because there are hundreds of people in front of him. He miss spoke a few times but it is normal in that setting. But you will never know.