Workload Identity in GKE to fetch data from Google Cloud Storage.

  Рет қаралды 5,434

OutOfDevOps

OutOfDevOps

Күн бұрын

Пікірлер: 26
@liamray2010
@liamray2010 10 ай бұрын
Thank you for the explanation! I was a bit scared of your hand in the end haha :)
@navinkumar6388
@navinkumar6388 10 ай бұрын
Thanks with Love from India 🇮🇳
@OutOfDevOps
@OutOfDevOps 10 ай бұрын
Thank you for the kind comment
@navinkumar6388
@navinkumar6388 10 ай бұрын
@@OutOfDevOps I am shifting from Java Spring Microsercice to DevOps About to face interviews and Just came across your GCP, Kubernetes and Docker. Hope with the help of your videos 📷 I can win a match
@alexanderpopov9801
@alexanderpopov9801 5 ай бұрын
Thank you, Anto, that was useful to me! ❤
@OutOfDevOps
@OutOfDevOps 4 ай бұрын
Glad it was helpful!
@lifewinsful
@lifewinsful Жыл бұрын
nice explanation
@OutOfDevOps
@OutOfDevOps Жыл бұрын
Thanks and welcome
@kavindudananjaya3290
@kavindudananjaya3290 2 ай бұрын
Thanks
@maalamhrez7361
@maalamhrez7361 Жыл бұрын
neat and clean, thank!
@OutOfDevOps
@OutOfDevOps Жыл бұрын
Thank you
@scratchbin
@scratchbin Жыл бұрын
Very clear. Thanks
@OutOfDevOps
@OutOfDevOps Жыл бұрын
You are very welcome 😎
@AndrewLee-k2m
@AndrewLee-k2m Жыл бұрын
great tutorial
@ggdio1
@ggdio1 Ай бұрын
Whats the advantage of using Workload Identity istead of traditional KMS and service accouts?
@OutOfDevOps
@OutOfDevOps Ай бұрын
Hi @ggdio1, what do you mean with “traditional KMS and service accounts”? Workload Identity allows you to seamlessly map K8S services accounts with GCP service accounts. It will use temporary credentials instead of (the discouraged) service account keys mounted as secrets (or even worse, over privileged sa assigned to nodes).
@ggdio1
@ggdio1 Ай бұрын
@@OutOfDevOps most of time when deploying apps we need service accounts for like accessing databases, services, etc. We shouldn't at all put the service account keys into docker images because it isn't secure at all, so the best practice is to encrypt it using KMS and inject the pod with the keys. What I'm asking is what's the advantages and security improvements of doing that process with workload identities instead of the process I just described. BTW lmk if I'm completely wrong about the KMS method lol
@OutOfDevOps
@OutOfDevOps Ай бұрын
@ggdio1 baking sa keys in container images hasn’t crossed my mind not even for a second. Even with kms encryption and pod injection, how do you make sure only that workload can decrypt and how do you proceed with the injection? The best practice is workload identity… With workload identity all that is done for you, in addition combined with RBAC in K8S you have full solution. You can map a K8S sa to a GCP sa, without creating custom solutions for injection and sharing access to the same KMS keys.
@ggdio1
@ggdio1 Ай бұрын
@@OutOfDevOps sounds great, now I get the concept, thanks a lot. I will consider using it on next projects!
@QuangPham-bc7lc
@QuangPham-bc7lc Жыл бұрын
i have create firewall but still can't access. And if we use workload identity, which SA will GKE use (SA of nodepool or SA of workload identity) to pull container image from image registry like GAR or GCR?
@rohitthakur1628
@rohitthakur1628 5 ай бұрын
If you haven't explicitly provided the workload identity SA name in the pod manifest then Default GKE node pool/machine's SA is used to the pull the images from GCR. That's my understanding. And if you provide the workload identity SA name then its permission is used for required interaction with other gcp resources.
@prajeetkumbhare8437
@prajeetkumbhare8437 5 ай бұрын
I have followed the same but I am unable to put to delete files from bucket
@rohitthakur1628
@rohitthakur1628 5 ай бұрын
For deleting objects in a bucket, you need a role with bucket write permission. Video showed the object viewer role only which can only fetch/read the bucket objects
@harkiratsingh5253
@harkiratsingh5253 4 ай бұрын
Hey thanks for the video.. I am doing the same thing where i need to fetch images for GCP artifact registry, however i am getting issue -> failed to pull and unpack image "us-central1-docker.pkg.dev/xxxxxxxxxxx/jenkins/jenkins-slave:v2": failed to resolve reference "us-central1-docker.pkg.dev/xxxxxxxx/jenkins/jenkins-slave:v2": failed to authorize: failed to fetch oauth token: unexpected status from GET request to ....403 Forbidden, what to do here
@luizhpriotto
@luizhpriotto 2 ай бұрын
You should set the role (roles/artifactregistry.writer) to the service account of computers node, not in the deployment..
How to use Github Actions with Google's Workload Identity Federation
11:33
BEST way to protect GCP resources - VPC Service Perimeter
17:02
OutOfDevOps
Рет қаралды 4,9 М.
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 26 МЛН
Что-что Мурсдей говорит? 💭 #симбочка #симба #мурсдей
00:19
Симбочка Пимпочка
Рет қаралды 4,7 МЛН
Simplified: Workload Identity (Google Kubernetes Engine)
9:28
Nodematic Tutorials
Рет қаралды 93
Secure access to GKE workloads with Workload Identity
6:34
Google Cloud Tech
Рет қаралды 17 М.
Google Cloud Certified Security Engineer - Workload Identity Federation
13:40
Cloudy Security with a chance of an attack
Рет қаралды 428
GitHub Workflow and Workload Identity Federation
7:24
OutOfDevOps
Рет қаралды 6 М.
Cloud Run user auth for internal apps
15:31
Google Cloud Tech
Рет қаралды 20 М.
Database Configurations with Google Cloud SQL
16:47
Google Cloud Tech
Рет қаралды 68 М.
AWS to GCP sans service account keys!! - Workload Identity Federation
14:56
99.9% IMPOSSIBLE
00:24
STORROR
Рет қаралды 26 МЛН