ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

Workload Identity Part 1: Introduction to SPIFFE and SPIRE

Автор: The Learning Channel

Загружено: 2023-09-14

Просмотров: 4835

Описание: A workload is a single piece of software, deployed with a particular configuration for a single purpose; it may comprise multiple running instances of software, all of which perform the same task. A workload identity is a way for a workload to prove who it is and prove its authenticity to other workloads. Historically IP addresses were the standard way to identify workloads, however, in the modern and dynamic world of microservices and cloud architecture, IPs are no longer a practical method of identifying workloads. Additionally, managing a large number of workload identities across heterogeneous environments in a secure and timely manner is highly challenging. The Secure Production Identity Framework for Everyone (SPIFFE), is a set of open-source standards for creating workload identities that resolve the aforementioned challenges. SPIRE is a production-ready implementation of the SPIFFE APIs that performs node and workload attestation in order to securely issue workload identities. In this video, we will go over SPIFFE and SPIRE architecture.

Scripts: https://github.com/gary-RR/myYouTube_...

Timecodes
0:00 -Intro (Workload and Workload Identity).
4:02 -Introduction to Secure Production Identity Framework for Everyone (SPIFFE).
5:39 -SPIFFE Components.
9:28 -SPIFFE Runtime Environment(SPIRE) Architecture.
11:14 -SPIRE Server.
17:00 -SPIRE Agent.
18:57 -Complete SPIFFE/SPIRE Lifecycle Walkthrough and Visualization (Kubernetes environment focused).
31:52 -Demos.

My Other Videos:
► Encrypt Client Communication to Kubernetes Services Leveraging Cert-Manage and Let’s Encrypt
   • Encrypt Client Communication to Kubernetes...  
►Kubernetes Security, Part 4: Kubernetes Authentication (Part B: Open ID Connect Auth)
   • Kubernetes Security, Part 4: Kubernetes Au...  
►Kubernetes Security, Part 3: Kubernetes Auth (Part A: Overview and X509 Client Certificate auth)
   • Kubernetes Security, Part 3: Kubernetes Au...  
►Kubernetes Security, Part 2: Managing POD Run Time Security
   • Kubernetes Security, Part 2: Managing POD ...  
► Istio Ambient Service Mesh
   • Istio Ambient Service Mesh  
► Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC) in Detail
   • Kubernetes Security, Part 1: Kubernetes Se...  
► Cilium Service Mesh
   • Cilium Service Mesh  
► Cilium Kubernetes CNI Provider: Part 4, IP Routing Modes (Direct and Encapsulated)
   • Cilium Kubernetes CNI Provider: Part 4, IP...  
► Cilium Kubernetes CNI Provider, Part 3: Cluster Mesh
   • Cilium Kubernetes CNI Provider, Part 3: Cl...  
►Cilium Kubernetes CNI Provider, Part 2: Security Policies and Observability Leveraging Hubble
   • Cilium Kubernetes CNI Provider, Part 2: Se...  
► Cilium Kubernetes CNI Provider, Part 1: Overview of eBPF and Cilium and the Installation Process    • Cilium Kubernetes CNI Provider, Part 1: Ov...  
► What is VXLAN and How It is Used as an Overlay Network in Kubernetes?
   • What is VXLAN and How It is Used as an Ove...  
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 2- Join Linux Machines to AD:
   • Managing Linux Logins, Users, and Machines...  
► Managing Linux Log-ins, Users, and Machines in Active Directory (AD): Part 1- Setup AD:
   • Managing Linux Logins, Users, and Machines...  
► Sharing Resources between Windows and Linux:
   • Sharing Resources between Windows and Linux  
► Kubernetes kube-proxy Modes: iptables and ipvs, Deep Dive:
   • Kubernetes kube-proxy Modes: iptables and ...  
►Kubernetes: Configuration as Data: Environment Variables, ConfigMaps, and Secrets:
   • Kubernetes: Configuration as Data: Environ...  
►Configuring and Managing Storage in Kubernetes:
   • Configuring and Managing Storage (volumes)...  
► Istio Service Mesh – Securing Kubernetes Workloads:
   • Istio Service Mesh – Securing Kubernetes W...  
► Istio Service Mesh – Intro
   • Istio Service Mesh (sidecar-based)- Intro  
► Understanding Kubernetes Networking. Part 6: Calico Network Policies:
   • Understanding Kubernetes Networking. Part ...  
► Understanding Kubernetes Networking. Part 5: Intro to Kubernetes Network Policies:
   • Understanding Kubernetes Networking. Part ...  
► Understanding Kubernetes Networking. Part 4: Kubernetes Services:
   • Kubernetes services - (Understanding Kuber...  
► Understanding Kubernetes Networking Part 3: Calico Kubernetes CNI Provider in depth:
   • Understanding Kubernetes Networking Part 3...  
► Understanding Kubernetes Networking. Part 2: POD Network, CNI, and Flannel CNI: Plug-in:
   • Understanding Kubernetes Networking. Part ...  
►Understanding Kubernetes Networking. Part 1: Container Networking:
   • Видео  
► Setup a Linux-Windows (Calico based) Hybrid Kubernetes Cluster to Host .NET Containers:
   • Setup a Linux-Windows (Calico based) Hybri...  
► A Docker and Kubernetes tutorial for beginners:
A Docker and Kubernetes tutorial for beginners. - YouTube
► Setup a "Docker-less" Multi-node Kubernetes Cluster on Ubuntu Server:
   • Setup a "Docker-less" Multi-node Kubernete...  
►Step by Step Instructions on Setting up Multi-Node Kubernetes Cluster on CentOS
   • Step by Step Instructions on Setting up a ...  
►Setup and Configure CentOS Linux Server on A Windows 10 Hypervisor
   • Setup and Configure CentOS Linux Server on...  

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
Workload Identity Part 1: Introduction to SPIFFE and SPIRE

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE

Workload Identity Part 2: How Cilium Implements Its Mutual Auth Leveraging SPIFFE and SPIRE

A Cilium Introduction: Back to Bee-Sics - Nico Vibert & Dan Finneran, Isovalent

A Cilium Introduction: Back to Bee-Sics - Nico Vibert & Dan Finneran, Isovalent

Cilium Service Mesh

Cilium Service Mesh

Что такое Rest API (http)? Soap? GraphQL? Websockets? RPC (gRPC, tRPC). Клиент - сервер. Вся теория

Что такое Rest API (http)? Soap? GraphQL? Websockets? RPC (gRPC, tRPC). Клиент - сервер. Вся теория

Опыт внедрения mTLS с использованием spiffe/spire в service mesh в Авито

Опыт внедрения mTLS с использованием spiffe/spire в service mesh в Авито

Kubernetes — Простым Языком на Понятном Примере

Kubernetes — Простым Языком на Понятном Примере

Tutorial: Getting Started with eBPF - Liz Rice, Isovalent

Tutorial: Getting Started with eBPF - Liz Rice, Isovalent

JetKVM - девайс для удаленного управления вашими ПК

JetKVM - девайс для удаленного управления вашими ПК

Solving ‘secret zero’, why you should care about SPIFFE!

Solving ‘secret zero’, why you should care about SPIFFE!

An Introduction to SPIRE, SPIFFE & How They’re Used in Istio

An Introduction to SPIRE, SPIFFE & How They’re Used in Istio

ПОЛНЫЙ РАЗБОР URL: Пагинация, версионирование API, фильтрация, сортировка и другие возможности

ПОЛНЫЙ РАЗБОР URL: Пагинация, версионирование API, фильтрация, сортировка и другие возможности

Electronic Chill Music for Work | Future Garage Productivity Mix for Study & Coding

Electronic Chill Music for Work | Future Garage Productivity Mix for Study & Coding

Лучший Гайд по Kafka для Начинающих За 1 Час

Лучший Гайд по Kafka для Начинающих За 1 Час

Kubernetes Networking 101 - Randy Abernethy, RX-M LLC

Kubernetes Networking 101 - Randy Abernethy, RX-M LLC

Keynote: Introduction to SPIFFE by Kelsey Hightower

Keynote: Introduction to SPIFFE by Kelsey Hightower

Five Things You Didn’t Know You Could Do with SPIFFE and SPIRE - Andrew Jessup & Andrés Vega

Five Things You Didn’t Know You Could Do with SPIFFE and SPIRE - Andrew Jessup & Andrés Vega

SPIFFE and SPIRE: Architecture Deep Dive - Andrew Harding, VMware + Evan Gilman, Scytale

SPIFFE and SPIRE: Architecture Deep Dive - Andrew Harding, VMware + Evan Gilman, Scytale

КАК УСТРОЕН TCP/IP?

КАК УСТРОЕН TCP/IP?

Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC)

Kubernetes Security, Part 1: Kubernetes Security Overview and Role Based Access Control (RBAC)

Kubernetes Security - Implement pod to pod encryption by use of mTLS with Service Mesh - 16

Kubernetes Security - Implement pod to pod encryption by use of mTLS with Service Mesh - 16

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]