Day-20 | Azure Key Vault Integration with AKS | Kubernetes Secret Store CSI Driver with Azure Vault

Поділитися
Вставка
  • Опубліковано 29 лис 2024

КОМЕНТАРІ • 74

  • @wiz__obi
    @wiz__obi 8 місяців тому +2

    completed the demo successfully... Thanks to you Abhi, i perfectly understand the OIDC Federation, managed identity and CSI concept.

  • @hidass2006
    @hidass2006 8 місяців тому +4

    @AbhishekVeeramalla To understand the topics you have taken the multiple approach to explain the details instead of repeating same things for your subcribers or whose is egar to learn it....❤❤❤

  • @234bellamkonda
    @234bellamkonda 7 місяців тому +1

    Implemented everything as is, everything worked great!! Thank you

  • @letspasstime
    @letspasstime 6 місяців тому

    Really great video. Keep making such detailed videos. Thanks Abhishek.

  • @AutoRanger6397
    @AutoRanger6397 8 місяців тому +1

    Yes Monitoring is most asked in interviews

  • @wiz__obi
    @wiz__obi 8 місяців тому +1

    Thanks for this demo Abhi

  • @sureshg7124
    @sureshg7124 7 місяців тому +1

    Clear explanation - But need practise on my end

  • @DheemanDas
    @DheemanDas 9 місяців тому +1

    One-man army:).. hopefully, one day I'll possess one-fourth of your knowledge

  • @nrt33321
    @nrt33321 27 днів тому

    Hi Abhishek, perfectly understand. If we uses csi driver to fetch secrets, do we really need to restart pod if secret renews?

  • @soumyadipchatterjee2267
    @soumyadipchatterjee2267 8 місяців тому

    This is absolutely top notch explanation from you Abhishek bhai 💗.😀. Can you please assist me how we can write the Docker service connection parameter post adding the key pair value in Azure secrets vault .

  • @Mr.Troubleshooter-fq1op
    @Mr.Troubleshooter-fq1op 9 місяців тому +1

    I completed all the steps and verified them in the console but at the final stage, the pod remained in the "container creating" state due to an RBAC issue. Due to time constraints, I was unable to troubleshoot this issue fully. but yes I gained a clear understanding of Azure Key Vault and how pods access external vault using managed identity through the CSI driver and the vault vendor provider running on k8s cluster as daemon sets.

  • @dummymail6029
    @dummymail6029 7 місяців тому

    great video and thanks alot abhishek

  • @thejaswarup
    @thejaswarup 3 місяці тому

    Thanks, how do people use the mounted secrets as environment variables for any app inside pod. Recommended way.

  • @uggamk
    @uggamk 9 місяців тому +1

    thanks for the video bro. small doubt, you are using managed identity to have access between resources. but how can we use managed identity if they are in different subscriptions..does managed identity work in between resources in different subscriptions

  • @arpitjindal9036
    @arpitjindal9036 3 місяці тому

    Hello @Abhishek. Can we create the system managed identity and associate it with virtual machine scale set and create a secret storage provider class and mount that secret to the pod . Can we do this way ! If yes, Which is more feasible way.
    I request you to please through some light on this topic as well and request you to pelase create a video where if you can explain what are the different way to integrate AKS with any Azure Services and what is suitable in what scneario as this would definitely help lot of people to understnd when to use system mg identity, when to use user assigned mg identity and when to use Service Principal.
    If you can clear out this in any video then this would be of great use to everyone and the community as well.

  • @elvinafukah6672
    @elvinafukah6672 9 місяців тому +1

    Much appreciated sir❤❤❤

  • @divyanshisingh5233
    @divyanshisingh5233 2 місяці тому

    after running the list cmd. I'm unable to see two files with key1 and secret1 name the output is showing no such directory found

  • @vadhervijay
    @vadhervijay 4 місяці тому

    How can we assign ssl certificate stored key valut to either port or AG ingress controller so applications can be securely accessed over internet?

  • @pritishkumarnayak9116
    @pritishkumarnayak9116 3 дні тому

    Please explain SPN concepts

  • @venkateshNoudy
    @venkateshNoudy 9 місяців тому +1

    Thanks a lot for this video...🤩

  • @manjithshaik6221
    @manjithshaik6221 9 місяців тому +1

    Can we expect a video on aks workload identity implementation in this series ??

  • @shrishailpatil8619
    @shrishailpatil8619 9 місяців тому +2

    Thank you Anna❤

  • @maikolpelaez1229
    @maikolpelaez1229 7 місяців тому

    hello in the documentation git adjustament this line export KEYVAULT_SCOPE=$(az keyvault show --name $KEYVAULT_NAME -g $RESOURCE_GROUP --query id -o tsv) , this error is for -g $RESOURCE_GROUP no mapping.

  • @SPavanRaj
    @SPavanRaj 9 місяців тому +1

    Hi Abhishek,
    Please can you help us in the last part when creating the pod its going into container creating state. i have checked the permissions its given as how you gave.
    I see other person in the chat also faced the same issue
    PLEASE ABHISHEK!
    Thanks.
    Pavan

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  9 місяців тому

      You should create key1 and secret1 in key vault. You might have not created them.
      You can describe the pod to see what is the error, it should be the error mostly.

    • @SPavanRaj
      @SPavanRaj 9 місяців тому

      @@AbhishekVeeramalla I have created with different name for key and secret updated those names in the Storage Provider Class
      When I do describe pods it says
      Caller is not authorized to perform action on resource.
      But I have double checked and given permissions as you gave

  • @nageswararao3525
    @nageswararao3525 9 місяців тому +1

    Hashicorp Vault Integration Tutorial... We need

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  9 місяців тому

      Its already available. Check the terraform playlist

    • @nageswararao3525
      @nageswararao3525 9 місяців тому

      I mean Integration with various tools like Jenkins, Docker, Kubernetes, Helm.

    • @nageswararao3525
      @nageswararao3525 9 місяців тому

      Thanks for u reply.. Ur effort and making videos on GitDevSecOps just... AMAZING

  • @Sixwins
    @Sixwins 9 місяців тому

    Thank you so much for sharing this video. I have a question. Using the secretproviderclass, how can secret be injected for ingress to consume. Imagine my wildcard certificate and key is present In a path in Hashicorp vault. I tried to do this but since Ingres doesn’t mount volume it didn’t work. How can I achieve this? Thank you

  • @nanduchannel
    @nanduchannel 9 місяців тому +1

    hi abhi, 41:18 for this, you might be --assignee first come then --role will later as per error message instructions, I am not sure may be it's work

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  9 місяців тому

      May be yeah, I did not troubleshoot much as I was recording.

    • @siapatil3419
      @siapatil3419 13 днів тому

      No .. there was extra space at end @abhishek

  • @md.shamsuzzaman4156
    @md.shamsuzzaman4156 2 місяці тому

    Thanks

  • @The_boogie_tales
    @The_boogie_tales 7 місяців тому +1

    Where are you executing those commands?? Is it CMD? Or other terminal im kinda confused please help

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  7 місяців тому

      Please start with day 1 of devops zero to hero course. Btw I am using the mac in built terminal

    • @The_boogie_tales
      @The_boogie_tales 7 місяців тому

      In windows what can we use then? ​@@AbhishekVeeramalla

    • @Vinn.V
      @Vinn.V 7 місяців тому

      @@The_boogie_tales you can use powershell, makesure azurecli is installed

  • @skmonjurulhaque6011
    @skmonjurulhaque6011 9 місяців тому +1

    Will it be the same step for integration azure AKS with azure app config using key vault reference?

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  9 місяців тому

      You can follow the managed identity steps in the video

    • @skmonjurulhaque6011
      @skmonjurulhaque6011 8 місяців тому

      Thanks. @@AbhishekVeeramalla . I was able to do it.

  • @vishalthokade2207
    @vishalthokade2207 Місяць тому

    when i ran the cmd: "az aks create --name keyvault-demo-cluster -g keyvault-demo --node-count 1 --enable-addons azure-keyvault-secrets-provider --enable-oidc-issuer --enable-workload-identity"; getting error:incorrect padding when creating aks cluster....anyone help ?

  • @ThecookBoy
    @ThecookBoy 9 місяців тому +1

    Like AWS secret manager to Eks integration can you make that video anna

  • @reneshmlal2809
    @reneshmlal2809 6 місяців тому

    Thank You ❤

  • @bhavatharinigowda2411
    @bhavatharinigowda2411 9 місяців тому +1

    Thank you so much

  • @SreenivasNussum
    @SreenivasNussum 9 місяців тому +1

    Explain about azure admin job in real time scenario.

  • @aneef01
    @aneef01 8 місяців тому

    Where the playlist can u provide link please

  • @jhhggghhhhhhhvvf
    @jhhggghhhhhhhvvf 4 місяці тому

    is this tutorial complete for azure bcs I want to star please reply 🙏

  • @chipTuanDuc
    @chipTuanDuc 9 місяців тому +1

    Thanks sir 🥇🥇🥇🥇🥇🥇

  • @jitendramalan4068
    @jitendramalan4068 9 місяців тому +1

  • @phamcongtoan1399
    @phamcongtoan1399 9 місяців тому

    Please guide me through the order of watching your video listings .

    • @AbhishekVeeramalla
      @AbhishekVeeramalla  9 місяців тому

      DevOps Zero to hero
      AWS / Azure Zero to Hero
      Terraform Zero to Hero
      Python for DevOps

    • @phamcongtoan1399
      @phamcongtoan1399 9 місяців тому

      @@AbhishekVeeramalla thanks

  • @ShaikAbdulRahman-q8d
    @ShaikAbdulRahman-q8d 9 місяців тому

    Hi annaya mito matladi anna Ela contact avvali

  • @TheGrowthDiarie
    @TheGrowthDiarie 7 місяців тому

    keyvault name needs to be unique , we cannot use your keyvalut name