У нас вы можете посмотреть бесплатно Kubernetes Day 12 | Secrets, ConfigMaps & Enterprise-Grade Secret Management или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
Here’s the formatted version in the same style as your Terraform Providers example: ✅ *What are Kubernetes Environment Variables?* – Understand how pods use environment variables to connect to services and manage configuration. ✅ *Types of Environment Variables in Kubernetes* – Learn the four main approaches: 1️⃣ Plain Key (direct YAML values) – simple but insecure. 2️⃣ ConfigMap – externalized non-sensitive configuration. 3️⃣ Secret – base64-encoded sensitive values. 4️⃣ Azure Key Vault + CSI Driver – production-grade secret management. ✅ *Hands-On Demos* – Step-by-step creation and usage of environment variables with `kubectl`, ConfigMaps, Secrets, and Azure Key Vault integration in AKS. ✅ *Security Best Practices* – Why you should avoid hardcoded values and always use encrypted secret management solutions like Azure Key Vault, HashiCorp Vault, or AWS KMS in production. 🚀 Video Chapters 🚀 Understanding Kubernetes Environment Variables ➥ 0:00 – Introduction Why environment variables are needed in Kubernetes. Example: Connecting a pod (`pod-one`) to a database requires credentials (username/password). Types of Environment Variables 1. Plain Key (Direct Values in Pod Definition) ➥ 0:53 – Demo: Plain Key Implementation Approach: Key-value pairs defined directly in the pod’s YAML under `env`. Pros: Simple for small-scale use. Cons: Hardcoded secrets (unsafe for production). Demo Steps: Created `plain-env.yaml` with `env` section listing credentials. Applied YAML: `kubectl create -f plain-env.yaml`. Verified: `kubectl exec -it pod -- env` showed plaintext values. 2. ConfigMap (External Key-Value Store) ➥ 5:59 – Demo: ConfigMap Implementation Approach: Decouples configuration from pod definition. Step 1: Create ConfigMap (`kubectl create cm name --from-literal=key=value`). Step 2: Reference ConfigMap in pod YAML via `envFrom.configMapRef`. Pros: Scalable for multiple key-value pairs; avoids hardcoding. Demo Steps: Created ConfigMap `con` with database credentials. Deployed pod (`cm.yaml`) referencing the ConfigMap. Verified: Executed `env` inside the pod to show injected values. 3. Secret (Secure Storage) ➥ 10:55 – Demo: Secret Implementation Approach: Similar to ConfigMap but for sensitive data (encoded, not encrypted). Step 1: Create Secret (`kubectl create secret generic name --from-literal=key=value`). Step 2: Reference Secret in pod YAML via `envFrom.secretRef`. Pros: Values are base64-encoded (not plaintext). Limitations: Encoding ≠ encryption; still vulnerable if decoded. Demo Steps: Created Secret `sec` with credentials. Deployed pod (`secret.yaml`) referencing the Secret. Verified: `kubectl describe secret sec` showed encoded values; `env` in pod revealed decoded values. Advanced: Azure Key Vault Integration (Secure Secret Management) ➥ 15:29 – Real-World Solution Problem: Secrets in ConfigMaps/Secrets are encoded but not encrypted. Solution: Use Azure Key Vault with AKS CSI driver. Implementation Steps: 1. Create Key Vault: Store secrets (e.g., `MySQL-password`) in Azure Key Vault. 2. Enable CSI Driver in AKS: Allows pods to fetch secrets from Key Vault. 3. Assign Managed Identity (MI): Grant AKS MI access to Key Vault. 4. Create `SecretProviderClass`: Defines Key Vault details (tenant ID, secret names). 5. Deploy Pod: Mount secrets as volumes or environment variables. Demo Steps: Created Key Vault `demo-keyvault` and stored `MySQL-password`. Enabled CSI driver in AKS cluster. Configured `SecretProviderClass` YAML linking to Key Vault. Deployed pod with volume mount (`/mnt/secrets-store`). Verified: `kubectl exec -it pod -- cat /mnt/secrets-store/secret` displayed the secret value. Key Takeaways Plain Key: Quick but insecure. ConfigMap: Non-sensitive configuration. Secret: Encoded sensitive data (limited security). Key Vault + CSI Driver: Production-grade security (encrypted secrets). ➥ 34:48 – Conclusion Always use tools like Azure Key Vault, HashiCorp Vault, or AWS KMS for secrets in production. ✅ 𝗔𝗹𝗹 𝘁𝗵𝗲 𝗰𝗼𝘂𝗿𝘀𝗲 𝗼𝘂𝘁𝗹𝗶𝗻𝗲 𝗵𝗮𝘀 𝗯𝗲𝗲𝗻 𝘂𝗽𝗹𝗼𝗮𝗱𝗲𝗱 𝘁𝗼 𝗺𝘆 𝗚𝗶𝘁𝗵𝘂𝗯 𝗿𝗲𝗽𝗼𝘀𝗶𝘁𝗼𝗿𝘆: https://github.com/akashkumar975/Terr... Connect me Here:👇👇 ⛳ LinkedIn ▶ / akash-kumar-480b3858 ⛳ Udemy_course ▶ https://www.udemy.com/course/terrafor... ⛳ Topmate ▶ https://topmate.io/akashkumar975