Introduction to securing cluster access

11 172
19
Следующее
Популярные
2 дня – 1 6084:52
Looker Conversational Analytics
46 дней – 9550:58
Dataflow for IoT galactic research
Опубликовано 4 декабря 2021, 5:00
In this episode of GKE Essentials, Anthony Bushong covers some best practices for securing access to your GKE cluster. From the principle of least privilege to defining cluster access, watch to learn how you can leverage the GKE API and Kubernetes Control Plane to secure access and ensure that users only have the access they need, and nothing more!

Chapters:
0:00 - Intro
0:19 - Cluster Access Overview
1:06 - Securing Access to a Cluster
4:23 - Authorized Networks
5:10 - Recap

Hardening your cluster's security → goo.gle/3og3K2I
Understanding IAM custom roles → goo.gle/31kDRWV
Configuring role-based access control → goo.gle/32O570d
Adding authorized networks for control plane access → goo.gle/3pn6A5p

Check out more GKE Essentials → goo.gle/GKEEssentials
Subscribe to Google Cloud Tech → goo.gle/GoogleCloudTech

#GKEEssentials

product: Cloud - Containers - Google Kubernetes Engine (GKE); fullname: Anthony Bushong
Случайные видео
16.08.22 – 4 2090:44
Code Jam 2022 is a wrap!
28.03.22 – 746 4190:25
The Million Dollar Unboxing! #SHORTS
автотехномузыкадетское