Kubernetes - Encrypting Secrets in etcd. Kubernetes Security - Network Nuts

Поділитися
Вставка
  • Опубліковано 8 січ 2025
  • Learn how to encrypt secrets in etcd. Secrets by default are decoded and are saved in plain text inside etcd database. Learn how to encrypt secrets inside etcd. Certified Kubernetes Security Specialist. Kubernetes security video.

КОМЕНТАРІ • 12

  • @silverlancerful
    @silverlancerful 2 роки тому +2

    Glad to see you as in person, you are the motivation for tech- learning people like me.

  • @himanshimehta9746
    @himanshimehta9746 Рік тому +2

    Thanks for the explaination Sir ..🎉

  • @spoketube
    @spoketube 2 роки тому +1

    Thank you for describing the steps before performing them. Very helpful. Keep up the great work.

  • @farhadkazemipour4247
    @farhadkazemipour4247 2 роки тому

    Thank you sir for your awesome video, you teach like your teacher in school, with fault prediction and patient 🙏

  • @arsadali7754
    @arsadali7754 3 роки тому +1

    Good to see you long time

  • @edrichlewis2427
    @edrichlewis2427 8 місяців тому

    we have created a key for encryption, where do we have o store that key and incase we have to rotate the key what are the best practices

  • @mayanksinghal2432
    @mayanksinghal2432 Рік тому

    What happens if we put multiple keys in the provider. Which key will be used for encryption and which key will be used for decryption?

  • @sdubey20789
    @sdubey20789 3 роки тому +1

    Great It's security issue

  • @mohammedassadi1052
    @mohammedassadi1052 2 роки тому +2

    Excellent sir. but still if a hacker access my k8 cluster, then he/she can still get my secret by simply running kubectl get command right? So Could you please tell me what is the advantage of doing encryption at rest

    • @mohammedassadi1052
      @mohammedassadi1052 2 роки тому

      @Abdullah Jandali unfortunately I didn’t get solution :(

    • @calpaycetin
      @calpaycetin 2 роки тому

      @@abdullahjandali583 I don't know a real answer to this but at least you can keep the secret and etcd in separate hosts, so that an attacker would need to break into 2 different hosts before causing harm.

    • @johndurrett3573
      @johndurrett3573 Рік тому

      I'm looking for same. Its good to encrypt etcd data and this provides clear walktru to do it; however pods pulling and storing those secrets locally to make their communication calls internally and external from k8 cluster...they are still storing those secrets in plain text for their own use locally.