Day 25/40 - Kubernetes Service Account - RBAC Continued

Поділитися
Вставка
  • Опубліковано 8 січ 2025

КОМЕНТАРІ •

  • @bhanubisht8
    @bhanubisht8 11 днів тому +1

    Completed the video...!!!!!

  • @itsupportbyharshit6285
    @itsupportbyharshit6285 8 днів тому

    Happy New Year

  • @wittybishop
    @wittybishop 25 днів тому

    Thanks piyush it was really insightful!

  • @pavankumarakula2268
    @pavankumarakula2268 5 місяців тому +1

    Thanks for a neat and crisp explanation on Service Accounts

  • @abc-edm
    @abc-edm 2 місяці тому +1

    Thank you Piyush, that is very helpful!

  • @floehden
    @floehden 5 місяців тому +1

    Thank you for this Video on service accounts, so we have a way on automating certain tasks but also to see, that they can have only certain permissions

  • @harshgupta5113
    @harshgupta5113 Місяць тому +1

    Awesome, learned a lot.

  • @winningspirit7241
    @winningspirit7241 4 місяці тому

    thanks for sharing the full course for free. appreciate it.

  • @AbdulMateen-bm3kv
    @AbdulMateen-bm3kv 4 місяці тому

    Thanks for sharing!

  • @RandomLinez
    @RandomLinez Місяць тому

    Thank you Piyush

  • @GrigTech
    @GrigTech 3 місяці тому +1

    Thank You Piush, i am reaching here.

  • @bhanubisht8
    @bhanubisht8 11 днів тому +1

    Comment for target...!!!!!

  • @harishnetula6446
    @harishnetula6446 4 місяці тому +1

    thanks piyusssh

  • @dr.hemantchauhan2613
    @dr.hemantchauhan2613 5 місяців тому

    Shukriya

  • @user-ve1gj3pm5g
    @user-ve1gj3pm5g 5 місяців тому

    So when setting up workload id in aks, the service account uses has to be in the same namespace as the pod that you’re using that service account with?
    Is this also the same for secrets provider class?

  • @GopiVivekManne
    @GopiVivekManne 5 місяців тому +1

    Simple yet very clear explanation. Thanks Piyush!!
    In real-time, Do we use the default Service Account token or explicit Secret for a long lived token?

    • @TechTutorialswithPiyush
      @TechTutorialswithPiyush  5 місяців тому

      Service accounts are better than using secrets as the secrets are stored in encoded format not encrypted. or you use cloud features such as workload identity (GKE) or any secret management service such as key vault , hashicorp vault, sealed secrets etc

  • @dv5809
    @dv5809 14 днів тому

    I tried to get pods with curl, SA and token. It didn't work, returned: 403 Forbidden, what I found out:
    16:24 this won't work with ServiceAccount and Token API access, when binding role to SA, you need to use serviceaccount instead of user, in this case:
    k create rolebinding rb --role build-role --serviceaccount default:build-sa
    17:00 then this also won't work for SA, it should be:
    k auth can-i get pods --as system:serviceaccount:default:build-sa

  • @Codewithanil56
    @Codewithanil56 5 місяців тому +2

    Sir I am coming from seeing the Abhishek sir CDN video..

  • @AlitafSd
    @AlitafSd 5 місяців тому

    hey bro
    It's very crisp and clear explanation. But i have one question is that, in real time production environment does docker and jenkins is installed on the same server or different?
    Thanks

    • @TechTutorialswithPiyush
      @TechTutorialswithPiyush  5 місяців тому +1

      Thank you brother 🙏
      Usually Jenkins works in a master slave architecture wherein Jenkins master provision multiple build servers to run the builds and these servers uses base image with docker installed.

  • @pradipakshar
    @pradipakshar Місяць тому +1

    Piysuh. I appreciate your effort but with all due respect this video should be revisited.
    The serviceAccount should be the one you created "build-sa" and not "default" at 18:13
    I think the reason why "get pods" worked when you impersonated build-sa is simple : even though you created a service account as "build-sa", while rolebinding you bound the role with an "user" as build-sa and not "serviceAccount" as build-sa 16:44

    • @TechTutorialswithPiyush
      @TechTutorialswithPiyush  Місяць тому

      That is really a good catch! Thank you for sharing it, yes build-sa is a user and not a service account. The pod was created using the default service account hence, it is showing those details. Thank you for sharing this.