Good coverage. I have two questions 1- when you say you can borrow IPs of other subnet, how is that borrowed ip from other subnet be given access to resources which were accessible to borrowing subnet in network policy 2- how do we control what kubelet and kubeproxy agents can do, how to apply network policy on those agents that they shoun not be able to access DB, considering those are not developed by me
Can you posible to create one video to create a Mysql microservice in Kubernetes and access this SQL using SQL workbench, or any solution I need to look?.
great content just like all your video. Question on Ingress & Egress Network policy - How it can be set at cluster level so that admin can only modify not individual app team for their PODs hosted from different namespaces
can you talk about 1. having private cluster, 2. How to use kubectl from local desktop to control the cloud k8s, 3. How to build a tool that is hosted as webapi to run kubectl or kubernetes client sdk and how to access the k8s using kubeconfig or any alternate is there to access the k8s from webapi.
Unfortunately currently it's not supported to run both together. I am hoping for an enhancement in future since they both serve unique and different purposes.
14:47 has this role been assigned to my pod thanks to a K8s RoleBinding (and thus is this the same thing as "K8s roles for RBAC"?), or is this just a label? In other words, are K8s roles only used for the access to the Kube API (eg API request to get the value of a K8s secret, list pods, etc), or are they also used as criteria for K8s Network Policies (like it seems to be the case in 14:47 ) ?
Cloud computing is future for deployment of system and OS. Reliable and easy to use.
Thanks you Raj. Understanding CNI is a key fundamental!
Indeed, thanks for watching
I wish this channel should get millions of subs
Ty Manas for the kind words. Best of luck in your career journey!
Clear , well presented . Thanks for this content I was having problems understanding this topic(s) and this is very useful.
Glad it was helpful!
Thanks for simple explaination
Thank you Raj! This is very helpful. Very well explained.
Glad it was helpful!
Fantastic Shahada.. you make things so easy to follow
Very well explained.. Thank you
thank you Raj. good explanations.
You're most welcome
The best explanation ever !
Thank U so much.
Thank you I was trying to know what is this CNI. This Video made it :)
Glad to hear it!
Great video Raj!
🙏Your videos are truly amazing. I really feel very lucky to come across your videos🙏
Great explanation as all the time. Thank a lot Raj..
This is what I was looking for 😊
Good content. Need more such concept related and those demo videos
Good coverage. I have two questions
1- when you say you can borrow IPs of other subnet, how is that borrowed ip from other subnet be given access to resources which were accessible to borrowing subnet in network policy
2- how do we control what kubelet and kubeproxy agents can do, how to apply network policy on those agents that they shoun not be able to access DB, considering those are not developed by me
Thank you Sir...Very great video on Network, can you share few more....
Thanks Dinesh, will do more on Networking in future for sure
Can you posible to create one video to create a Mysql microservice in Kubernetes and access this SQL using SQL workbench, or any solution I need to look?.
Pod security group - if you can cover in detailed
great content just like all your video. Question on Ingress & Egress Network policy - How it can be set at cluster level so that admin can only modify not individual app team for their PODs hosted from different namespaces
Currently it can't be cluster level, can only be applied to pod level. however you can use OPA to enforce that each pod has network policy
can you talk about 1. having private cluster, 2. How to use kubectl from local desktop to control the cloud k8s, 3. How to build a tool that is hosted as webapi to run kubectl or kubernetes client sdk and how to access the k8s using kubeconfig or any alternate is there to access the k8s from webapi.
Very good video Than you Sir..
Sir can you make video on how real time kubernetics environment look like what is the project flow how the services application deployment are worked.
Well explained. Thanks!
Glad it was helpful!
Can you make a video about Multus and its importance compared to other meta plugins,please
Good 👍
Videos are amazing .......
Thanks Natallia, I am glad you found my videos useful.
Very nice video one question here can we use both calico and pod security group together in eks
Unfortunately currently it's not supported to run both together. I am hoping for an enhancement in future since they both serve unique and different purposes.
@@cloudwithraj Thank you for quick response
Thanks!
TY Mitchell for the generous tip. I am glad this video was helpful 👊
14:47 has this role been assigned to my pod thanks to a K8s RoleBinding (and thus is this the same thing as "K8s roles for RBAC"?), or is this just a label?
In other words, are K8s roles only used for the access to the Kube API (eg API request to get the value of a K8s secret, list pods, etc), or are they also used as criteria for K8s Network Policies (like it seems to be the case in 14:47 ) ?
Hi Rajdeep da, your college junior again. Could you please make a video on Operators (say for DB hosting PODs/stateful PODs) ?
CHeck this out Manab - ua-cam.com/video/lHC7xpFack8/v-deo.html
Great, love it
Thank you
Welcome!
How to get each pod have get unique ip
Hmm? Each pod already gets a unique IP
Where to get which one sharing
@@k.r.mohanreddyk.r2350 kubectl describe pods will give you the Pod IP.
I know describe the pod ip but my doubt automatically allocated ip right, which one sharing like kernel or any other one
Bro can u please tell ur udemy course name
www.udemy.com/course/rocking-kubernetes-with-amazon-eks-fargate-and-devops/?couponCode=JUN21BP2
Thomas Jessica Lewis Kenneth Young Shirley
To be frank your voice is not clear