У нас вы можете посмотреть бесплатно Setup Azure Kubernetes Private Clusters with API Server Vnet Integration или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Many companies strive to extend their data centers to the cloud to take advantage of the cloud providers’ enormous resource capacities. For some this is a short-term expansion due to business peak seasons, for others, it is a permanent need. Regardless, they would want to maintain the privacy and security that their private clouds and data centers provide. This means they would like to avoid exposure to the public internet as much as possible. In this video, we will discuss hybrid and cross-premises cloud concepts and how Azure’s private networks provide network isolation on the Azure cloud. In this video, we will help a fictitious Acme Corporation set up a private Kubernetes AKS cluster in Azure without exposing the API server or Kubernetes services’ DNS name/IP addresses. We will introduce the “Azure Kubernetes Service cluster with API Server VNet Integration” and VPN gateways to achieve our task. We will also discuss some of Azure's fundamental concepts such as tenants, subscriptions, resource groups, and management groups. Lab's prerequisite: An Azure subscription. You can get a free 30-day trial license @ https://azure.microsoft.com Bicep VS extension tools @ https://learn.microsoft.com/en-us/azu... VPN Client Entra ID Auth: Configure a P2S VPN gateway for Microsoft Entra ID (Sections: “Prerequisites”, “Create Microsoft Entra tenant users”, and “Authorize the Azure VPN application” @ authenticationhttps://learn.microsoft.com/en-us/azu... OR: VPN Client Cert Auth: Configure server settings for P2S VPN Gateway connections - certificate authentication - Azure portal @ https://learn.microsoft.com/en-us/azu... Point-to-site VPN client configuration workflow: Certificate authentication – Windows @ https://learn.microsoft.com/en-us/azu... windows VPN Client app: Windows: @ https://apps.microsoft.com/detail/9np... Mac: @ https://apps.apple.com/us/app/azure-v... My other videos: ►Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE: • Workload Identity Part 2: How Cilium ... ►Workload Identity part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE Workload Identity Part 1: Introduction to SPIFFE and SPIRE - YouTube ► Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt • Encrypt Client Communication to Kuber... ►Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth) • Kubernetes Security, Part 4: Kubernet... ►Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth) • Kubernetes Security, Part 3: Kubernet... ►Kubernetes Security, Part 2: Managing POD Run Time Security • Kubernetes Security, Part 2: Managing... ► Istio Ambient Service Mesh • Istio Ambient Service Mesh ► Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC) in Detail • Kubernetes Security, Part 1: Kubernet... ► Cilium Service Mesh • Cilium Service Mesh ► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated) • Cilium Kubernetes CNI Provider: Part ... ► Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh • Cilium Kubernetes CNI Provider, Part ... ►Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble • Cilium Kubernetes CNI Provider, Part ... ► Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process • Cilium Kubernetes CNI Provider, Part ... ► What is VXLAN and How It is Used as an Overlay Network in Kubernetes? • What is VXLAN and How It is Used as a... ► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 2- Join Linux Machines to AD: • Managing Linux Logins, Users, and Mac... ► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 1- Setup AD: • Managing Linux Logins, Users, and Mac... ► Sharing Resources between Windows and Linux: • Sharing Resources between Windows and... ► Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive: • Kubernetes kube-proxy Modes: iptables... ►Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets: • Kubernetes: Configuration as Data: En... ►Configuring and Managing Storage in Kubernetes: • Configuring and Managing Storage (vol... ► Istio Service Mesh – Securing Kubernetes Workloads: • Istio Service Mesh – Securing Kuberne... ► Istio Service Mesh – Intro • Istio Service Mesh (sidecar-based)- I... ► Understanding Kubernetes Networking. Part 6: Calico Network Policies: • Understanding Kubernetes Networking. ... ► Understanding Kubernetes Networking. Part 5: Intro to Kubernetes Network Policies: • Understanding Kubernetes Networking. ... ► Understanding Kubernetes Networking. Part 4: Kubernetes Services: • Kubernetes services - (Understanding ... ► Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth: • Understanding Kubernetes Networking P...