Thank you for the explanation! I was a bit scared of your hand in the end haha :)
@navinkumar638810 ай бұрын
Thanks with Love from India 🇮🇳
@OutOfDevOps10 ай бұрын
Thank you for the kind comment
@navinkumar638810 ай бұрын
@@OutOfDevOps I am shifting from Java Spring Microsercice to DevOps About to face interviews and Just came across your GCP, Kubernetes and Docker. Hope with the help of your videos 📷 I can win a match
@alexanderpopov98015 ай бұрын
Thank you, Anto, that was useful to me! ❤
@OutOfDevOps4 ай бұрын
Glad it was helpful!
@lifewinsful Жыл бұрын
nice explanation
@OutOfDevOps Жыл бұрын
Thanks and welcome
@kavindudananjaya32902 ай бұрын
Thanks
@maalamhrez7361 Жыл бұрын
neat and clean, thank!
@OutOfDevOps Жыл бұрын
Thank you
@scratchbin Жыл бұрын
Very clear. Thanks
@OutOfDevOps Жыл бұрын
You are very welcome 😎
@AndrewLee-k2m Жыл бұрын
great tutorial
@ggdio1Ай бұрын
Whats the advantage of using Workload Identity istead of traditional KMS and service accouts?
@OutOfDevOpsАй бұрын
Hi @ggdio1, what do you mean with “traditional KMS and service accounts”? Workload Identity allows you to seamlessly map K8S services accounts with GCP service accounts. It will use temporary credentials instead of (the discouraged) service account keys mounted as secrets (or even worse, over privileged sa assigned to nodes).
@ggdio1Ай бұрын
@@OutOfDevOps most of time when deploying apps we need service accounts for like accessing databases, services, etc. We shouldn't at all put the service account keys into docker images because it isn't secure at all, so the best practice is to encrypt it using KMS and inject the pod with the keys. What I'm asking is what's the advantages and security improvements of doing that process with workload identities instead of the process I just described. BTW lmk if I'm completely wrong about the KMS method lol
@OutOfDevOpsАй бұрын
@ggdio1 baking sa keys in container images hasn’t crossed my mind not even for a second. Even with kms encryption and pod injection, how do you make sure only that workload can decrypt and how do you proceed with the injection? The best practice is workload identity… With workload identity all that is done for you, in addition combined with RBAC in K8S you have full solution. You can map a K8S sa to a GCP sa, without creating custom solutions for injection and sharing access to the same KMS keys.
@ggdio1Ай бұрын
@@OutOfDevOps sounds great, now I get the concept, thanks a lot. I will consider using it on next projects!
@QuangPham-bc7lc Жыл бұрын
i have create firewall but still can't access. And if we use workload identity, which SA will GKE use (SA of nodepool or SA of workload identity) to pull container image from image registry like GAR or GCR?
@rohitthakur16285 ай бұрын
If you haven't explicitly provided the workload identity SA name in the pod manifest then Default GKE node pool/machine's SA is used to the pull the images from GCR. That's my understanding. And if you provide the workload identity SA name then its permission is used for required interaction with other gcp resources.
@prajeetkumbhare84375 ай бұрын
I have followed the same but I am unable to put to delete files from bucket
@rohitthakur16285 ай бұрын
For deleting objects in a bucket, you need a role with bucket write permission. Video showed the object viewer role only which can only fetch/read the bucket objects
@harkiratsingh52534 ай бұрын
Hey thanks for the video.. I am doing the same thing where i need to fetch images for GCP artifact registry, however i am getting issue -> failed to pull and unpack image "us-central1-docker.pkg.dev/xxxxxxxxxxx/jenkins/jenkins-slave:v2": failed to resolve reference "us-central1-docker.pkg.dev/xxxxxxxx/jenkins/jenkins-slave:v2": failed to authorize: failed to fetch oauth token: unexpected status from GET request to ....403 Forbidden, what to do here
@luizhpriotto2 ай бұрын
You should set the role (roles/artifactregistry.writer) to the service account of computers node, not in the deployment..