No video

Protect Your Kubernetes Secrets: Securing with Azure Key Vault

  Рет қаралды 15,377

Zoom Speaks Tech

Zoom Speaks Tech

Күн бұрын

Пікірлер: 42
@SomeInfoSecDude
@SomeInfoSecDude 2 жыл бұрын
Finally the problem is clearly explained. This is what the others videos just skip through, expecting everyone to be a developer with experience on al this. Great video.
@GodisGreater01
@GodisGreater01 2 жыл бұрын
So I worked on this for a very long time and figured out if you just check the section under advanced - Enable secret store CSI driver. You can do this when creating the Kubernetes service or after under the cluster configuration tab. I do not get an error when trying to connect to the secret when mounting the volume.
@helshabini
@helshabini 2 жыл бұрын
Thank you Chris, at the time of recording the video this was not available I think. Thank you so much for sharing your finding.
@mgpollachi1
@mgpollachi1 2 жыл бұрын
Thank you... you saved me from 2 days of frustration on this exact same problem..
@cartierin
@cartierin 3 жыл бұрын
Great video!! I would love to see another video with Nginx ingress and tls with key vault
@VCSekharParepalli
@VCSekharParepalli Жыл бұрын
Awesome wording, scripts, content and pace.
@ZoomSpeaksTech
@ZoomSpeaksTech Жыл бұрын
Much appreciated!
@faisalabdi6350
@faisalabdi6350 Жыл бұрын
جزاك الله خيرا يا اخي الكريم. لا توقف علشان نستفيد من خبرتك.
@nikhilsinghal1315
@nikhilsinghal1315 3 жыл бұрын
Nice video! This video actually explains why and what we are doing instead of just random instructions like other videos. BTW, We are still saving the service principle client id and password in Kubernetes secret which defeats the purpose of this complete video. Can we do this with managed identities?
@ZoomSpeaksTech
@ZoomSpeaksTech 3 жыл бұрын
Hi Nikhil, yes for sure Managed Identities is the best alternative. This guide goes through the process for using User Assigned Managed Identities, which I think is a better way than using the System Assigned one: docs.microsoft.com/en-us/azure/key-vault/general/key-vault-integrate-kubernetes#create-your-own-secretproviderclass-object
@number-27
@number-27 2 жыл бұрын
Exactly the crash course I was looking for!
@karthikvijay4824
@karthikvijay4824 3 жыл бұрын
Very well made video, thanks.
@ZoomSpeaksTech
@ZoomSpeaksTech 3 жыл бұрын
Glad you liked it. More coming up soon.
@krishnadaskp21
@krishnadaskp21 2 жыл бұрын
Excellent video. Cleared the concept for me
@mehmetcolgecen9533
@mehmetcolgecen9533 Жыл бұрын
it is a good one, really enjoyed the explanations, keep going!!!
@HelpingHands3838
@HelpingHands3838 2 жыл бұрын
Simply greate ... Good job
@rin22john
@rin22john 3 жыл бұрын
Very nice video. Thank you for sharing it with us.
@ahmedtheba3808
@ahmedtheba3808 2 жыл бұрын
In all of the various options we still end up with a credential on disk/mount in clear or Base 64 encoded form. There is no protection of the secret if the container is breached. All that we have done is cleaned up the code and pipelines from being littered with secrets.
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
That’s true. And there is no way around it except if you take the time/effort to write code in your application to try and grab its own secrets from Key Vault using its managed identity.
@kadabaraghu
@kadabaraghu 2 жыл бұрын
i am using the serviceproviderclass as per the directions , its creating the secertproviderclass but its not creating the secret , when i query for kubectl get secrets i dont dind them there , could you please let me know what could be wrong or is there any additional step i need to follow , int his example you create the secrets in prior should we do the same ???
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
No, the secret should be created for you. If it is not then there is probably a permission issue somewhere. Check the logs of the secrets provider containers and it might point you somewhere.
@kalirajannatarajan1114
@kalirajannatarajan1114 3 жыл бұрын
Good Video. Thanks
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
Glad it helped
@rengaprakashsoundararajan9001
@rengaprakashsoundararajan9001 2 жыл бұрын
thanks a lot
@sharatbhaskar527
@sharatbhaskar527 3 жыл бұрын
when i run this command export SERVICE_PRINCIPAL_CLIENT_ID="$(az ad sp show --id secrets-store-test --query 'appId' -otsv)" it says service principal does not exist. please suggest
@ZoomSpeaksTech
@ZoomSpeaksTech 3 жыл бұрын
Hi Sharat, this is probably because of a typo in your command. There should be a space between -o and tsv param. Make sure that if you run the az ad sp command that it does produce the proper expected output.
@alisyed9240
@alisyed9240 2 жыл бұрын
If the secret volumes are still mounted inside the container. Does it mean that password would still be in clear text and we can simply read the password file?
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
Yes indeed, if you want an additional layer of security then you can encrypt it and decrypt it using your app.
@alisyed9240
@alisyed9240 2 жыл бұрын
@@ZoomSpeaksTech would other solutions like hashicorp vault do the same thing like mount secret volumes with password in plain text or they will at least automatically encrypt it?
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
They work exactly the same. If this bothers you, the other option is to write code to extract secrets from a secure vault like Azure Key Vault in your app.
@skannan74
@skannan74 2 жыл бұрын
Thanks for the video. When i run the yaml, i can see the mnt created but fails to create secret. Here is the error i get "Warning Failed 8s (x3 over 20s) kubelet Error: secret "nginx-secret" not found".
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
That just means the secret was not created by driver. Make sure you’ve specified the correct settings/permissions in the driver YAML.
@skannan74
@skannan74 2 жыл бұрын
@@ZoomSpeaksTech i followed the examples provided in this video and did exactly same. Can you please throw some light on what are the things i need to check for "correct settings/permissions"..? And thanks for your very fast response.
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
@@skannan74 i would look at the SecretProviderClass configuration and make sure that the key vault secret I am trying to read actually exists and that the csi driver has the necessary account to do so: docs.microsoft.com/en-us/azure/aks/csi-secrets-store-driver#sync-mounted-content-with-a-kubernetes-secret I would also double check that entire document I sent. My video is now a little dated, and it might be useful to use this doc as an updated reference.
@ramallways6321
@ramallways6321 Жыл бұрын
Then its created an secrets in k8s cluster, then it's mean there is no encrypt here, because k8s secret just encode and decode using base64. Now there is no point to use this one, I'm guess.
@yasirm
@yasirm 2 жыл бұрын
Can you share your repo?
@ZoomSpeaksTech
@ZoomSpeaksTech 2 жыл бұрын
Sure, here you go: github.com/helshabini/kubernetes-akv
@yasirm
@yasirm 2 жыл бұрын
@@ZoomSpeaksTech Thank you
@mkeii
@mkeii Жыл бұрын
gosh kubernetes can be so verbose sometimes. this is neat, but everytime i have a new secret, i have to update: 1. the deployment, 2. the secretproviderclass parameters.objects, 3. the secretproviderclass secretobjects 😓
@ZoomSpeaksTech
@ZoomSpeaksTech Жыл бұрын
I agree. You can automate everything, but at some point it would be overkill to build something that serves no specific function other than to overcome verbosity. Which is why sometimes I prefer my apps to grab their own secrets whenever possible and absolve kubernetes of having to manage that. Keyvault integration can be easily done on most languages from the app code itself. The app merely needs a managed identity to be able to grab it.
Integrate Azure Key Vault with Azure Kubernetes Service(AKS)
13:28
Shailender Choudhary
Рет қаралды 20 М.
Eliminate Kubernetes Secrets With Secrets Store CSI Driver (SSCSID)
14:53
Or is Harriet Quinn good? #cosplay#joker #Harriet Quinn
00:20
佐助与鸣人
Рет қаралды 46 МЛН
What will he say ? 😱 #smarthome #cleaning #homecleaning #gadgets
01:00
Matching Picture Challenge with Alfredo Larin's family! 👍
00:37
BigSchool
Рет қаралды 52 МЛН
Azure Kubernetes Service (AKS) High Availability
1:04:59
John Savill's Technical Training
Рет қаралды 21 М.
Storing Secrets in GIT | GitOps | Kubernetes
27:17
That DevOps Guy
Рет қаралды 17 М.
Azure Blob Fuse in AKS with Managed Identity
20:00
Houssem Dellai
Рет қаралды 3,7 М.
Secrets Store CSI Driver: Bringing external secrets in house
30:46
CNCF [Cloud Native Computing Foundation]
Рет қаралды 8 М.
Azure Key Vault Tutorial | Secure secrets, keys and certificates easily
18:43
Adam Marczak - Azure for Everyone
Рет қаралды 177 М.
Or is Harriet Quinn good? #cosplay#joker #Harriet Quinn
00:20
佐助与鸣人
Рет қаралды 46 МЛН