Sir please do the additional topics added for cks kubernetes - newchanges from sep12
@rajeshraj-bx2zb3 күн бұрын
Sir please do the additional topics added for cks kubernetes - newchanges from sep12 .
@learnwithgvr3 күн бұрын
thanks for suggestion. sure will do.
@rajeshrajesh-zn8vm5 күн бұрын
Please do cks new topics which are going to be added from sep12 for upcoming cks exam.
@learnwithgvr5 күн бұрын
thanks for your input. sure will do soon
@MaryC333339 күн бұрын
Excellent video, thanks for the info!
@learnwithgvr9 күн бұрын
Thank you
@RaviPrakash-ix9dd21 күн бұрын
sir you give best explanation, thank you for uploading 🙏 please uploading interview questions for aws
@learnwithgvr21 күн бұрын
Thank you Ravi Prakash. sure will try to creat videos on AWS interview questions
@debidattagouda937423 күн бұрын
u are a great teacher.
@learnwithgvr23 күн бұрын
Thank you
@vaishakh-aws25 күн бұрын
Excellent explanation with all your expertise, Dear GVR. I'm sure this content of yours will stay at the top among all for many more years. Thank you for making it easy to understand.
@learnwithgvr25 күн бұрын
My pleasure, keep learning
@romanigorevich502128 күн бұрын
Thanks for your video; it's useful. One piece of advice: It looks like you have a good microphone but no pop filter, or it's positioned incorrectly. There are intense plosive sounds. When you try to fix it, your sound will be much better than now!
@learnwithgvr28 күн бұрын
thanks for suggestion, cheers
@user-hd6uc7kn1eАй бұрын
IS THIS THE COMPLETE TRAINING PLAYLIST ON KUBERNETES SECURITY ?
@learnwithgvr29 күн бұрын
yes pls check my playlists in the channel
@jeanthomas9753Ай бұрын
It would be great to see gcp example
@learnwithgvrАй бұрын
same for GCP aswell, tftest.hcl, tfmock.hcl files and run will remain same irrespective of AWS/GCP/Azure simplest way i would suggest is...search github for any GCP code and add tests to it
@sureshscribnarАй бұрын
greate videos. Thanks for the content. I like the way your terminal shows color? How did you configure it this way? Is it any plugin or any other terminal?
@learnwithgvrАй бұрын
Thanks bro for the feedback. It's iTerm2 terminal for Mac. Applied autosuggestion, syntax highlight and kubecolor on top it for kubectl colours
@BananaCountryOfficial2 ай бұрын
You should do an additional video to explain what has changed for the CKS. This content is amazing!
@learnwithgvr2 ай бұрын
Great suggestion!, will do soon, thank you
@charlesuneze49202 ай бұрын
Nice video. What's the name of your mic?
@learnwithgvr2 ай бұрын
Thanks, it's Audio-Technica ATR2100x-USB Cardioid Dynamic USB XLR Microphone
@charlesuneze49202 ай бұрын
@@learnwithgvr Thank you
@jalandharbehera992 ай бұрын
❤❤
@learnwithgvr29 күн бұрын
thank you
@sebastianilopezgma2 ай бұрын
Thxs! good video!
@learnwithgvr29 күн бұрын
thank you
@henikamoun38262 ай бұрын
hello thank u but can u tell me why with the new user it only show the default namespace not all of them somoene can help ?
@learnwithgvr29 күн бұрын
if do not specify it will consider defult namespace. if you want any specific namespace you can update your kubeconfig desired context namespace
@santoshs34412 ай бұрын
excellent explanation
@learnwithgvr29 күн бұрын
thanks a lot
@vijaynarayanan28362 ай бұрын
Nice video and informative. Please reduce filler words. Repetitively using basically word. Sometimes it’s kind of annoying
@learnwithgvr2 ай бұрын
Thanks for the feedback, it was first video and listen 1.5x speed for better reach
@efhjlmu3 ай бұрын
very good demo.
@learnwithgvr3 ай бұрын
Thank you for feedback
@georgesmith91783 ай бұрын
Thank you for the video and for answering the multi-region question below. Thumbs-up!. A few suggestions: 1. Point the viewers to the fact when auto unseal is configured Vault generates "Recovery" keys, and NOT "Unseal" keys 2. Explain how the auto unseal works - at startup Vault will connect to the device or service implementing the seal and ask it to decrypt the root key Vault read from storage.
@learnwithgvr3 ай бұрын
Thank you George
@durbabanik33723 ай бұрын
amazing explanation
@learnwithgvr3 ай бұрын
Thank you
@maheshwarareddy86293 ай бұрын
Hi sir, you are doing videos in very details and insights, so we are kindly request please continue..........
@learnwithgvr3 ай бұрын
Thank you Maheshwar...sure will continue the videos. Any new topics you are looking please message here
@OumaymaJERBI-xi5yn3 ай бұрын
Very good presentation thank you 😊 should we give the application (Jenkins) the roleID and the secretID to authentificate or the generated token ?
@learnwithgvr3 ай бұрын
Yes can, logic is jere RoleId and Secret Id dual authentication, generate token
@shamstabrez29863 ай бұрын
i have learnt many things from u man i jst wnna request u plz do a devsecops series where you cover each and everytool of devsecops like kubebench kubelint and also do a calico administration series
@learnwithgvr3 ай бұрын
Thanks for suggestion and feedback. Sure will try to make these videos
@shamstabrez29863 ай бұрын
@@learnwithgvr you must be ur teaching skill is awesome
@shamtupe17213 ай бұрын
One of the best video of kms on youtube
@learnwithgvr3 ай бұрын
Thanks a lot. Any suggestions/requests for making aws services videos
@RahulR-zx6jz4 ай бұрын
Superb and straight forward with complete details.Thnaks for the effort
@learnwithgvr4 ай бұрын
Thanks a lot Rahul. keep learning
@anilkommalapati62484 ай бұрын
Amazing tutorial on K8Certs. Really superb. First 40 minutes are really outstanding but from there I felt little complicate. May be too much depth of k8. Thank you very much for your great efforts. 🤗
@learnwithgvr4 ай бұрын
Thanks Bro ..keep learning
@anilkommalapati62484 ай бұрын
Simply Superb
@learnwithgvr4 ай бұрын
Thanks bro
@saswatpriyabrat4 ай бұрын
very crystal clear explanation of CRD...Great work
@learnwithgvr4 ай бұрын
Thanks bro
@seanwalker25554 ай бұрын
great video.
@learnwithgvr4 ай бұрын
Thank you, keep learning
@shamikguharay31774 ай бұрын
This is GOLD!
@learnwithgvr4 ай бұрын
thank you for the feedback. keep learning
@pawannayyar96804 ай бұрын
..really good presentation ,,,if someone wants to know PAM in 23 mins ..will wait for upcoming presentations ....
@learnwithgvr4 ай бұрын
thank you
@jsujaykumar4 ай бұрын
Kubernetes pod security policy is removed from CKS exam curriculum. Instead PodSecurity Standard and Pod Security admission.
@learnwithgvr4 ай бұрын
thats correct, i have made detailed video on PSA kzfaq.info/get/bejne/gL99atCEuM7KoGQ.htmlsi=244KY5vBDSSp3l2o
@sharon0606885 ай бұрын
Nice, Thanks for the detailed explanation.
@learnwithgvr5 ай бұрын
Thank you, keep leaning
@Gigglesguru20215 ай бұрын
Hi brother i need some information on how can we setup opa policy for externalname services that fails if a service is created of type externalname with port name that doesn't follow the istio convention
@barelelbaz85445 ай бұрын
How can we avoid all the manual work for kuberenetes auth configuration, role etc... As DevOps engineers we prefer Infa as code
@apkcheating51755 ай бұрын
Any idea? Maybe an init job that configures the kubernetes auth in vault side?
@learnwithgvr5 ай бұрын
Leverage GitOps approach
@mohamedel-zedy21965 ай бұрын
Great! where is custom controller video?
@learnwithgvr5 ай бұрын
Thanks you and Yet to do
@rubyashby83035 ай бұрын
Very good presentation…. Thanks you so much!
@learnwithgvr4 ай бұрын
Thank you bro, keep learning
@gokhanyildirim41625 ай бұрын
Excellent Policy explanation
@learnwithgvr5 ай бұрын
Thanks for feedback and Keep Learning
@shantipahari5 ай бұрын
i like your whole series of CKS but 16:53 it is defined not denied
@learnwithgvr5 ай бұрын
Thanks for the feedback shanti. Keep learning
@vigneshsarangan31365 ай бұрын
Very nice
@learnwithgvr5 ай бұрын
Thanks
@TheBestDanceMoves5 ай бұрын
Alright thank you. I have a problem. Let me detail my problem. Consider that we have two users/developers, John and James. Now, I have a kubernetes cluster with two pods inside, pod1 and pod2. I want John to access pod1 only and not pod2. similarly, I want James to access pod2 and not pod1. The same scenario occurs if I want them to access nodes. I hope it is clear. I look forward to your reply, thank you
@learnwithgvr5 ай бұрын
One possible way to restrict pod access in kubernetes is to use Network policies. Network policies allow you to control the traffic flow between pods based on labels and selectors. For example, you can create a network policy that only allows pods with a certain label to communicate with each other, and deny all other traffic. Hope this helps apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: access-pod1 spec: podSelector: matchLabels: app: pod1 # select pod1 ingress: - from: - podSelector: matchLabels: user: John # allow pods with user: John label --- apiVersion: networking.k8s.io/v1 kind: NetworkPolicy metadata: name: access-pod2 spec: podSelector: matchLabels: app: pod2 # select pod2 ingress: - from: - podSelector: matchLabels: user: James # allow pods with user: James label
@suniljamadar15665 ай бұрын
superbly explained...
@learnwithgvr5 ай бұрын
Thanks you for feedback, keep learning
@tanjilbd6 ай бұрын
You are an amazing content creator. 🎉😊
@learnwithgvr6 ай бұрын
Thanks a lot and keep learning
@priscachidimma18966 ай бұрын
Thank you 🙏 GVR. You cover the not so common concept and topics in Kubernetes. This is really helpful..