Please help us with your valuable feedback - forms.gle/E9r3xvTxnLPKz9Hw9
@harshdwivedi52874 ай бұрын
Aapke concepts bohot crisp and clear hai, maine youtube me Kubernetes kaa isse achee lecture kahi nahi dekha. Hats off to your hard work🫡
@worldsofgalaxy11 ай бұрын
Superb i recommend everyone she is great teacher of kubernetes awesome explanation mam 👍👍
@DevOpsPro10 ай бұрын
Thank you for the kind words and recommendation! I appreciate your support
@mashalkhan769917 күн бұрын
Very good. Allah pak khush rakhey
@KRISHNAKUMAR-yj3dx4 ай бұрын
Wow!!! Best explanation!!!!!
@awssoorinje747 Жыл бұрын
Thank you for your excellent teaching skills and the valuable visuals that greatly enhance the learning experience. Looking forward to future topics like Kubernetes network CNI, kube-dns, and an end-to-end project.
@nareshv7797 Жыл бұрын
This series is making everyone easy for k8s ... thanks for updating new concept
@DevOpsPro Жыл бұрын
Glad to hear that
@mohammedsuhailbasha48605 ай бұрын
Nice. Please make and upload more videos on kubernetes networking part.
@girishfury2630 Жыл бұрын
please bring more videos like this because these videos are the main game
@DevOpsPro Жыл бұрын
Thank you for your feedback and support! More videos like this are on the way! 🎉
@Tanzeerahamed047 Жыл бұрын
The best way of explanation I have seen....awesome
@DevOpsPro Жыл бұрын
Appreciate your kind words! 🙏
@KRISHNAKUMAR-yj3dx4 ай бұрын
Awesome explaination!!!!!
@sagarahire-ys3uj Жыл бұрын
doing gr8 job..u deserve more subs...u handled such complex topic with ease..nicely done
@DevOpsPro Жыл бұрын
Thank you so much! Your support means a lot. I'm glad you found the channel helpful. 😊
@shambhunathsahani6505 Жыл бұрын
the animation used very useful to understand conecpts
@DevOpsPro Жыл бұрын
Thanks
@rutikdhumal65203 ай бұрын
could you pls make video on istio and grpc , it would be great help for us . the way you explaining topics with crispy and animated way its really help for understanding
@KRISHNAKUMAR-yj3dx4 ай бұрын
Please keep making such videos!!!!!!!!
@abrarsyed7177 Жыл бұрын
Very informative content
@satishp3519 ай бұрын
best k8 playlist . please frequently post the videos. next helmchart and real time scenarios.
@DevOpsPro8 ай бұрын
Noted
@devopswala7989 ай бұрын
superb animation, best explanation keep it up.
@DevOpsPro8 ай бұрын
Thanks
@iamthecloudbuddy Жыл бұрын
immensely way to explain. SUPERB👍
@DevOpsPro Жыл бұрын
Thank you so much 😀
@harshvardhansinghjadon6927 Жыл бұрын
Such a nice leacture, really thankfull!! Please create an tutorial on HPA, metrics servers and monitoring.
@DevOpsPro Жыл бұрын
Sure, will create!
@SandeepSaini-mt3yl Жыл бұрын
Very very important Thanku so much!!
@DevOpsPro Жыл бұрын
Thanks Sandeep
@mdsaifuddin7272 Жыл бұрын
Mam please istio service mesh bhi ek video banado na
@DevOpsPro Жыл бұрын
Will consider your suggestion for future content. Stay tuned!
@mdsaifuddin7272 Жыл бұрын
@@DevOpsPro thank you for replying... truly ur way of teaching and the topics u have covered are just awesome
@lyriking_1 Жыл бұрын
Is UserId 1000 created initially? how it is created and also group id im confused with those ids please explain
@SarthakSourav-e8s5 ай бұрын
Very will explained 👌
@anoopkathait07225 ай бұрын
thanks for this video mam
@waseemwasi6520 Жыл бұрын
Maim m from pakistan exlent ap ny explain kya h but i hv a question userID or other ID,s jo ap ny mention ki hain ya user create hony chahya pehly sy or ya ID apny suppose kr k dali h??
@DevOpsPro Жыл бұрын
Thank you for your positive feedback! In the video, I mentioned the userID and other IDs as examples for demonstrating the implementation of security context in Kubernetes. These IDs can be customized based on your specific requirements. They don't necessarily have to be pre-existing user IDs, but you can choose appropriate values for them. The purpose is to showcase how security context can be applied at the pod and container levels to ensure secure deployments of your applications. I hope this clarifies your question. If you have any further inquiries, feel free to ask!
@krishnamurty2501 Жыл бұрын
Great
@poojaselvaraj79596 ай бұрын
Please can you explain what is oAuth and oidc ?
@PushpenduPaul-k3l Жыл бұрын
excellent tutorials....Thank you so much. Please make similar in detail videos for terraform, Ansible, Helm charts, Github Actions Ci/CD, Jenkins Ci/CD :)
@DevOpsPro Жыл бұрын
Very soon and Thank you so much for your kind words.
@SanjayYadav-xj6nr Жыл бұрын
Mam helm par video banye
@amitkumarmeshram3252 Жыл бұрын
Hello Can we say everything in Kubernetes is a POD. I was asked this question in an interview, Not sure how to answer this.
@DevOpsPro Жыл бұрын
In Kubernetes, not everything is a POD. While PODs are like the basic building blocks, there are also other important things like Services, Deployments, and ConfigMaps. These help manage different parts of your apps running in containers. Each of these does a specific job in making sure your apps run well together.
@vinaykaushikinvisble Жыл бұрын
ye hacker ko access kaise mil sakta h, you mean ki us cluster ka master node ssh pe hacker ne access kar lia or wo kubectl command run kar skta tha?
@sudheersen82274 ай бұрын
please upload more video about kubernetes
@shambhunathsahani6505 Жыл бұрын
Very useful information.please add troubleshooting steps
@DevOpsPro Жыл бұрын
Sure, Noted
@HappiestMindSet Жыл бұрын
Very Good
@DevOpsPro Жыл бұрын
Thanks
@Kk-rl7nv Жыл бұрын
Hi Riya, Can you please let me know when we add another ip in eth0 inside a container then can we access the same container via 2nd ip ie at that moment we have 2 IPs for same container. Can we add security context in case of deployment?
@DevOpsPro Жыл бұрын
When you add another IP address to the eth0 network interface inside a container, you can indeed access the container using both IP addresses. Each IP address will be associated with the container's network interface, allowing incoming connections on both IPs. Regarding your second question, yes, security context can also be applied in the case of deployments. I hope this clarifies your doubts.
@Kk-rl7nv Жыл бұрын
I have 2 more doubts when the POD died and recreate then is there any way to configure 2 IPs which can communicate with related service. 2: is it possible security context can apply on cluster level if yes then can you make a video where we can practically see how to protect the cluster from intruders.
@DevOpsPro Жыл бұрын
1. When a Pod dies and is recreated, the IP address associated with it may change. Kubernetes assigns IP addresses dynamically to Pods, so there's no direct way to configure specific IP addresses for a Pod to communicate with related services after recreation. However, you can use services in Kubernetes, such as ClusterIP or NodePort, which provide stable endpoints for communication with Pods. 2. Security context can be applied at both the Pod and container level. However, applying security context at the cluster level is not possible.
@biswajitmohapatra2172 Жыл бұрын
Please make a detailed video on k8s networking
@amitverma7545 Жыл бұрын
Mam kubernetes autoscaling concept missing hn is series mai plz add
@DevOpsPro Жыл бұрын
Sure, will consider adding Kubernetes autoscaling in future content. Thanks for the suggestion! 🙏
@GauravSharma-os6ds Жыл бұрын
Hey Riya, Was this the last video of kuberntes. Any other topics are remaining ?
@DevOpsPro Жыл бұрын
We've covered almost all topics except troubleshooting. We're now focusing on creating videos on different tools. If you have any specific topics in mind, let us know!
@meemaansa Жыл бұрын
Can you please make a video on k8s operators and CRD
@Nikhilg27 Жыл бұрын
Can you make videos on istio with kubernetes
@DevOpsPro Жыл бұрын
Sure, I'll consider it for future content. Thanks for the suggestion!
@Nikhilg27 Жыл бұрын
Also is this series completed ?
@Cloudnp94589 ай бұрын
Security context: runasuser, runasgroup, fsgroup, capabilities: - to add linux capabilities: add or drop: like Linux_ADMIN Can be at pod level or container level
@DevOpsPro8 ай бұрын
All mentioned can apply at both levels except capabilities, capabilities setting can only be applied at the container level, not at the pod level.
@WM-fz5si Жыл бұрын
Hi it's an informative video. Also please can you make video on multiple ingress controllers for multiple application on multiple namespace. That will be helpful 👍
@DevOpsPro Жыл бұрын
Sure I will
@WM-fz5si Жыл бұрын
@@DevOpsPro Yes looking for it asap.Thank you!
@WM-fz5si Жыл бұрын
Hey hi, When can we expect the above mentioned related topic video?
@samikshasharma3544 Жыл бұрын
@@DevOpsProwaiting for the requested video
@harshvardhansinghjadon6927 Жыл бұрын
I am also waiting for above mentioned topic videos.
@awssoorinje747 Жыл бұрын
Ma'am, Could you please provide some clarity on how RBAC authorization and Security Contexts differ in their functions within a Kubernetes cluster? Any examples or use-cases would be greatly appreciated to help enhance my understanding.
@DevOpsPro Жыл бұрын
RBAC authorization in Kubernetes controls access to cluster resources based on user roles and permissions, while Security Contexts define security settings at the pod or container level, such as user IDs, group IDs, and privileges. An example use-case could be granting a user read-only access (RBAC) while ensuring their containers run with non-root privileges (Security Context).
@rohitgaikwad2848 Жыл бұрын
@DevOpsPro please make video on kubernetes cluster autoscaling
@DevOpsPro10 ай бұрын
Thanks for your request! I'll definitely create a video on Kubernetes cluster autoscaling. Stay tuned for the upcoming tutorial!
@Nikhilg277 ай бұрын
Could you please make video on istio and complete process how we are using it end to end in kubernetes, still waiting for this
@DevOpsPro7 ай бұрын
Thanks for your suggestion! I'll definitely consider creating videos on Istio. Stay tuned for updates!
@Cloudnp94589 ай бұрын
Security context give container only those capabilities access , required only to run the application tasks. That's how you increase it's security. Pod security context will inherit to all containers of multi container pod. container level security is higher priority. It will be preferred.
@rohita9689 Жыл бұрын
mam please ek video banado kubeadm say aws ec2 instances par cluster setup krna. Please step by step guide bnado I mean kha kha say cheeza search kara and eksa setup kara sabkuch. Master and worker nodes kesa bnaya etc
@rahulsoni.20 Жыл бұрын
Great Content , Mam is this series complete, is it enough to crack cka exam
@DevOpsPro Жыл бұрын
Thank you! This series covers almost all the topics required for the CKA exam, providing a solid foundation. However, I recommend supplementing it with additional practice and hands-on experience to maximise your chances of success in the exam.
@cyber-ops Жыл бұрын
ma'am more security realted videos please
@iSalmaniac_ Жыл бұрын
Your Videos Were very helpful , but you didn't covered various topics such as Hpa and all. it would be very helpful if you make videos on same.
@DevOpsPro Жыл бұрын
Thank you for the feedback! Will consider covering HPA in future videos.
@Ifran_Qureshi Жыл бұрын
Hi Riya, I have just cleared CKA with 74% in my frst attempt itself
@DevOpsPro Жыл бұрын
Congratulations on clearing the CKA, Achieving a 74% score in your first attempt is commendable. Well done on your hard work and dedication. Keep up the excellent work, and may you continue to achieve great success in your future endeavours!
@Cloudnp94589 ай бұрын
Me - 96%😅
@Learner-hg4hj Жыл бұрын
Thanks madam
@_man.on.strings__ Жыл бұрын
HPA m video bnao 🦋🫂🥰
@mavkrishna523611 ай бұрын
Hi Please make istio vedio
@DevOpsPro10 ай бұрын
Absolutely! Thanks for your suggestion! I'll definitely consider creating videos on Istio.