Secret Store CSI Driver Tutorial | Kubernetes Secrets | AWS Secrets Manager | KodeKloud

Поділитися
Вставка
  • Опубліковано 12 чер 2024
  • Dive deep into the world of Kubernetes security with our comprehensive guide to Secret Store CSI Driver. Discover why this tool is essential for safeguarding sensitive information, learn how it compares to alternatives like ESO and Sealed Secrets, and master the process of setting it up for your Kubernetes cluster. With insightful demos showcasing the creation of secrets in AWS Secret Manager and the seamless integration of Secret Store CSI Driver, this video is your ultimate resource for enhancing security in your DevOps environment. Join us on this journey to strengthen your Kubernetes security posture and protect your valuable data.
    🆓Join KodeKloud Community for FREE: kode.wiki/KodeKloudCommunity_YT
    ⬇️Below are the topics we are going to discuss in this video:
    00:00 - Introduction
    00:48 - Why do we need Secret Store CSI Driver?
    03:03 - What is Secret Store CSI Driver?
    04:01- Secret Store CSI Driver vs ESO vs Sealed Secrets
    05:25 - How does Secret Store CSI Driver works?
    08:14 - Demo - Creating Secret in AWS Secret Manager
    09:30 - Demo - Setting up Secret Store CSI Driver for Kubernetes Cluster
    30:56 - Conclusion
    ✅Start your Kubernetes Career Now - bit.ly/KubernetesLearningPath
    Check out our learning paths at KodeKloud to get started:
    ▶️ Cloud Computing: kode.wiki/CloudLearningPath_YT
    ▶️ Kubernetes: bit.ly/KubernetesLearningPath
    ▶️AWS: kode.wiki/awslearningpath_yt
    ▶️Azure: kode.wiki/azurelearningpath_yt
    ▶️Google Cloud Platform: kode.wiki/GCPlearningpath_YT
    ▶️ Linux: bit.ly/LinuxLearningPath
    ▶️ DevOps Learning Path: bit.ly/DevOpsLearningPath-YT
    #Kubernetes #DevOps #SecretStoreCSIDriver #K8sSecurity #AWS #sealedsecrets #awssecrets #DevOpsTools #CyberSecurity #CloudComputing #kodekloud
    For more updates on courses and tips, follow us on:
    🌐 Website: kodekloud.com/
    🌐 LinkedIn: / kodekloud
    🌐 Twitter: / kodekloudhq
    🌐 Facebook: / kodekloudhq
    🌐 Instagram: / kodekloud
    🌐 Blog: kodekloud.com/blog/

КОМЕНТАРІ • 15

  • @ChiruMegs
    @ChiruMegs 2 місяці тому +2

    Looked at many videos to understand AWS Secrets, CSI drivers and Storage Class. This is the Best tutorial on this topic I had found till date.

  • @omega1962
    @omega1962 Місяць тому +1

    Excellent Excellent Excellent.....simply excellent....thanks a lot Sir.....

  • @nforlife
    @nforlife 2 місяці тому

    What a great demo and some troubleshooting
    My fav is Hashicorp vault!

  • @arunshankar1987
    @arunshankar1987 2 місяці тому

    Helpful video. Saved my day

  • @wenjieyang2226
    @wenjieyang2226 Місяць тому

    Nice video!!! Thanks Sanjeev

  • @dsosys
    @dsosys 2 місяці тому

    Great....

  • @ferhatcan5262
    @ferhatcan5262 2 місяці тому

    So helpfull

  • @fabrizzio_aranda
    @fabrizzio_aranda Місяць тому

    Great information, looks like with this implementation it won't be possible to use the secrets as env variables, instead I will need to indicate my app to fetch the secrets from a file, and monitor when the secret's value changes, correct?

  • @subithalsubbaiah7004
    @subithalsubbaiah7004 Місяць тому +2

    @kodeKloud , I'm wondering, How is it safe when the password is saved in plain text inside the pod. Anyone with read access , who can read the k8s secret can also read the pod's volume. Correct me if I'm wrong.

    • @ofirfr4804
      @ofirfr4804 7 днів тому

      The pod has to have the credentials / authorization in order to connect to other services, a DB for an instance.
      So, if you have access to the pod which connects to a DB, you have access to the DB, with the same privileges given to the pod.

  • @user-vm2oh7oi5p
    @user-vm2oh7oi5p 2 місяці тому

    Hi you'r video looks great
    can you please explain how can i use the value in the pod env section ?
    Thank you

    • @SoulJah876
      @SoulJah876 2 місяці тому

      Maybe it would be only possible set a secret from the mounted file as an env variable within pod's container(s).

    • @chrisbecke2793
      @chrisbecke2793 Місяць тому +1

      This is one of the reasons to sync as a kubernetes secret.

  • @ash3rr
    @ash3rr 28 днів тому +1

    who are you? you're not even a real person, it's like you created an AI instead of hiring someone to make this video.