Русские видео

Сейчас в тренде

Иностранные видео




Если кнопки скачивания не загрузились НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием, пожалуйста напишите в поддержку по адресу внизу страницы.
Спасибо за использование сервиса savevideohd.ru



Introduction to securing cluster access

In this episode of GKE Essentials, Anthony Bushong covers some best practices for securing access to your GKE cluster. From the principle of least privilege to defining cluster access, watch to learn how you can leverage the GKE API and Kubernetes Control Plane to secure access and ensure that users only have the access they need, and nothing more! Chapters: 0:00 - Intro 0:19 - Cluster Access Overview 1:06 - Securing Access to a Cluster 4:23 - Authorized Networks 5:10 - Recap Hardening your cluster's security → https://goo.gle/3og3K2I Understanding IAM custom roles → https://goo.gle/31kDRWV Configuring role-based access control → https://goo.gle/32O570d Adding authorized networks for control plane access → https://goo.gle/3pn6A5p Check out more GKE Essentials → https://goo.gle/GKEEssentials Subscribe to Google Cloud Tech → https://goo.gle/GoogleCloudTech #GKEEssentials product: Cloud - Containers - Google Kubernetes Engine (GKE); fullname: Anthony Bushong

Comments