completed the demo successfully... Thanks to you Abhi, i perfectly understand the OIDC Federation, managed identity and CSI concept.
@AbhishekVeeramalla6 ай бұрын
😍
@hidass20066 ай бұрын
@AbhishekVeeramalla To understand the topics you have taken the multiple approach to explain the details instead of repeating same things for your subcribers or whose is egar to learn it....❤❤❤
@AbhishekVeeramalla6 ай бұрын
Thanks
@234bellamkonda5 ай бұрын
Implemented everything as is, everything worked great!! Thank you
@AbhishekVeeramalla5 ай бұрын
You're welcome!
@letspasstime5 ай бұрын
Really great video. Keep making such detailed videos. Thanks Abhishek.
@wiz__obi7 ай бұрын
Thanks for this demo Abhi
@AbhishekVeeramalla7 ай бұрын
My pleasure 😊
@soumyadipchatterjee22676 ай бұрын
This is absolutely top notch explanation from you Abhishek bhai 💗.😀. Can you please assist me how we can write the Docker service connection parameter post adding the key pair value in Azure secrets vault .
@uggamk7 ай бұрын
thanks for the video bro. small doubt, you are using managed identity to have access between resources. but how can we use managed identity if they are in different subscriptions..does managed identity work in between resources in different subscriptions
@AutoRanger63977 ай бұрын
Yes Monitoring is most asked in interviews
@sureshg71245 ай бұрын
Clear explanation - But need practise on my end
@AbhishekVeeramalla5 ай бұрын
Thanks
@arpitjindal9036Ай бұрын
Hello @Abhishek. Can we create the system managed identity and associate it with virtual machine scale set and create a secret storage provider class and mount that secret to the pod . Can we do this way ! If yes, Which is more feasible way. I request you to please through some light on this topic as well and request you to pelase create a video where if you can explain what are the different way to integrate AKS with any Azure Services and what is suitable in what scneario as this would definitely help lot of people to understnd when to use system mg identity, when to use user assigned mg identity and when to use Service Principal. If you can clear out this in any video then this would be of great use to everyone and the community as well.
@Mr.Troubleshooter-fq1op7 ай бұрын
I completed all the steps and verified them in the console but at the final stage, the pod remained in the "container creating" state due to an RBAC issue. Due to time constraints, I was unable to troubleshoot this issue fully. but yes I gained a clear understanding of Azure Key Vault and how pods access external vault using managed identity through the CSI driver and the vault vendor provider running on k8s cluster as daemon sets.
@AbhishekVeeramalla7 ай бұрын
😍😍😍
@dummymail60295 ай бұрын
great video and thanks alot abhishek
@thejaswarup2 ай бұрын
Thanks, how do people use the mounted secrets as environment variables for any app inside pod. Recommended way.
@manjithshaik62217 ай бұрын
Can we expect a video on aks workload identity implementation in this series ??
@AbhishekVeeramalla7 ай бұрын
We implemented workload identity in this video
@DheemanDas7 ай бұрын
One-man army:).. hopefully, one day I'll possess one-fourth of your knowledge
@AbhishekVeeramalla7 ай бұрын
😍
@jhhggghhhhhhhvvf3 ай бұрын
is this tutorial complete for azure bcs I want to star please reply 🙏
@Sixwins7 ай бұрын
Thank you so much for sharing this video. I have a question. Using the secretproviderclass, how can secret be injected for ingress to consume. Imagine my wildcard certificate and key is present In a path in Hashicorp vault. I tried to do this but since Ingres doesn’t mount volume it didn’t work. How can I achieve this? Thank you
@divyanshisingh523326 күн бұрын
after running the list cmd. I'm unable to see two files with key1 and secret1 name the output is showing no such directory found
@md.shamsuzzaman415624 күн бұрын
Thanks
@nanduchannel7 ай бұрын
hi abhi, 41:18 for this, you might be --assignee first come then --role will later as per error message instructions, I am not sure may be it's work
@AbhishekVeeramalla7 ай бұрын
May be yeah, I did not troubleshoot much as I was recording.
@vadhervijay3 ай бұрын
How can we assign ssl certificate stored key valut to either port or AG ingress controller so applications can be securely accessed over internet?
@elvinafukah66727 ай бұрын
Much appreciated sir❤❤❤
@AbhishekVeeramalla7 ай бұрын
My pleasure
@venkateshNoudy7 ай бұрын
Thanks a lot for this video...🤩
@AbhishekVeeramalla7 ай бұрын
Most welcome 😊
@The_boogie_tales6 ай бұрын
Where are you executing those commands?? Is it CMD? Or other terminal im kinda confused please help
@AbhishekVeeramalla6 ай бұрын
Please start with day 1 of devops zero to hero course. Btw I am using the mac in built terminal
@The_boogie_tales6 ай бұрын
In windows what can we use then? @@AbhishekVeeramalla
@Vinn.V6 ай бұрын
@@The_boogie_tales you can use powershell, makesure azurecli is installed
@SPavanRaj7 ай бұрын
Hi Abhishek, Please can you help us in the last part when creating the pod its going into container creating state. i have checked the permissions its given as how you gave. I see other person in the chat also faced the same issue PLEASE ABHISHEK! Thanks. Pavan
@AbhishekVeeramalla7 ай бұрын
You should create key1 and secret1 in key vault. You might have not created them. You can describe the pod to see what is the error, it should be the error mostly.
@SPavanRaj7 ай бұрын
@@AbhishekVeeramalla I have created with different name for key and secret updated those names in the Storage Provider Class When I do describe pods it says Caller is not authorized to perform action on resource. But I have double checked and given permissions as you gave
@maikolpelaez12295 ай бұрын
hello in the documentation git adjustament this line export KEYVAULT_SCOPE=$(az keyvault show --name $KEYVAULT_NAME -g $RESOURCE_GROUP --query id -o tsv) , this error is for -g $RESOURCE_GROUP no mapping.
@shrishailpatil86197 ай бұрын
Thank you Anna❤
@AbhishekVeeramalla7 ай бұрын
Thanks
@ThecookBoy7 ай бұрын
Like AWS secret manager to Eks integration can you make that video anna
@AbhishekVeeramalla7 ай бұрын
Sure
@skmonjurulhaque60117 ай бұрын
Will it be the same step for integration azure AKS with azure app config using key vault reference?
@AbhishekVeeramalla7 ай бұрын
You can follow the managed identity steps in the video
@skmonjurulhaque60117 ай бұрын
Thanks. @@AbhishekVeeramalla . I was able to do it.
@aneef017 ай бұрын
Where the playlist can u provide link please
@reneshmlal28095 ай бұрын
Thank You ❤
@nageswararao35257 ай бұрын
Hashicorp Vault Integration Tutorial... We need
@AbhishekVeeramalla7 ай бұрын
Its already available. Check the terraform playlist
@nageswararao35257 ай бұрын
I mean Integration with various tools like Jenkins, Docker, Kubernetes, Helm.
@nageswararao35257 ай бұрын
Thanks for u reply.. Ur effort and making videos on GitDevSecOps just... AMAZING
@bhavatharinigowda24117 ай бұрын
Thank you so much
@AbhishekVeeramalla7 ай бұрын
You're most welcome
@SreenivasNussum7 ай бұрын
Explain about azure admin job in real time scenario.
@AbhishekVeeramalla7 ай бұрын
Sure
@phamcongtoan13997 ай бұрын
Please guide me through the order of watching your video listings .
@AbhishekVeeramalla7 ай бұрын
DevOps Zero to hero AWS / Azure Zero to Hero Terraform Zero to Hero Python for DevOps
@phamcongtoan13997 ай бұрын
@@AbhishekVeeramalla thanks
@chipTuanDuc7 ай бұрын
Thanks sir 🥇🥇🥇🥇🥇🥇
@AbhishekVeeramalla7 ай бұрын
😍😍😍
@ShaikAbdulRahman-q8d7 ай бұрын
Hi annaya mito matladi anna Ela contact avvali
@jitendramalan40687 ай бұрын
❤
@AbhishekVeeramalla7 ай бұрын
Thanks
@TheGrowthDiarie5 ай бұрын
keyvault name needs to be unique , we cannot use your keyvalut name