Sealed Secrets: Safeguarding Your Kubernetes Secrets | Step By Step Tutorial | KodeKloud

Поділитися
Вставка
  • Опубліковано 26 лис 2024

КОМЕНТАРІ • 26

  • @KodeKloud
    @KodeKloud  7 днів тому

    🚀Explore Our Top Courses & Special Offers: kode.wiki/40SkWyU

  • @BR-lx7py
    @BR-lx7py 11 місяців тому +2

    Is something like this going to be part of core K8S? Seems like a fundamental feature that you shouldn't have to rely on a third party CRD for.

  • @arknfel9432
    @arknfel9432 11 днів тому

    U r awesome, thanks for the content

    • @KodeKloud
      @KodeKloud  7 днів тому

      Thank you for watching our videos, and making us a part of your growth. Your kind words, comments and support is what keeps us going every day! Hit the bell icon to never miss out on our content.

  • @sampath5242
    @sampath5242 Рік тому +4

    if someone get access to k8s cluster and decoding the secret?

    • @KodeKloud
      @KodeKloud  Рік тому +2

      If someone gains access to a Kubernetes cluster and can decode a secret, it's a serious security risk. Kubernetes secrets are base64-encoded but not encrypted, meaning anyone with access can decode them. A compromised secret could lead to unauthorized access or data breaches. Immediate action includes rotating the compromised secret and updating applications using it. Investigate the breach and implement security best practices such as access control, network policies, and regular monitoring. Consider secret management solutions or encryption tools to enhance security. Security in Kubernetes should be a top priority to minimize risks and respond effectively to breaches.

  • @pradippipaliya9675
    @pradippipaliya9675 3 місяці тому

    Can we directly encrypt kubernetes secret like using any encryption algorithm we encrypt the secret value and after that decrypt that value in pod and use it. So that anyone cannot access secret without private key. Does kubernetes or any other tool or methods will help to achieve this??

  • @rohanekar
    @rohanekar Рік тому

    Imperative and declarative way

    • @KodeKloud
      @KodeKloud  Рік тому

      Keep learning with us & stay connected .

  • @josvanoorschot6072
    @josvanoorschot6072 3 місяці тому

    Excellent Tutorial! :-)

  • @rahulmahulkar9325
    @rahulmahulkar9325 10 місяців тому

    Do you see any scenarios when sealed secret operator will not be in situation to decrypt encrypted password and create correct secrete in Kubernetes cluster? Is there any way to store certificates generated by operator somewhere outside the cluster? I guess, if we redeploy the operator it will create new certificate pair.

  • @TheSahanc
    @TheSahanc Рік тому +3

    good stuff.

  • @scottamolinari
    @scottamolinari 10 місяців тому

    How would sealed-secrets be used with Terraform?

  • @putnam120
    @putnam120 Рік тому +1

    What about credentials rotation? This is mentioned on the website but no details provided

    • @KodeKloud
      @KodeKloud  Рік тому

      Hey, please refer to github.com/bitnami-labs/sealed-secrets#secret-rotation

  • @jokeri2050
    @jokeri2050 11 місяців тому

    awesome

  • @chewteelim6020
    @chewteelim6020 Рік тому

    Is this solution applicable to Openshift too?

    • @KodeKloud
      @KodeKloud  Рік тому

      Yes. Sealed Secrets can be used with OpenShift to securely manage and store sensitive data, just as it can be used with a standard Kubernetes cluster. However, make sure to consider OpenShift's specific security features and requirements when implementing it in your OpenShift environment.

  • @moussaouiabdelmajid2657
    @moussaouiabdelmajid2657 7 місяців тому

    If one need to deploy the app in a different cluster, the operator public and private key will change, and the sealedsecret stored in git repo will be unusable

  • @aniketpurohit1875
    @aniketpurohit1875 Рік тому

    I had paid money but my subscription in un-action please fix the issue

    • @KodeKloud
      @KodeKloud  Рік тому

      We apologise for the issue, could you please email us the concern at support@kodekloud.com and we will investigate it.