Como aumentar a segurança das configurações padrão do cluster do GKE avaliações

Como aumentar a segurança das configurações padrão do cluster do GKE avaliações

9625 avaliações

Dimas P. · Revisado há 11 months

Thosan G. · Revisado há 11 months

Mykhailo S. · Revisado há 11 months

Mykhailo S. · Revisado há 11 months

Task 7 Error

bayu m. · Revisado há 11 months

Fandi H. · Revisado há 11 months

nice

bayu m. · Revisado há 11 months

error in task#7

Hapid R. · Revisado há 11 months

Fandi H. · Revisado há 11 months

error trying to implement Task 7.....error: resource mapping not found for name: "restrictive-psp" namespace: "" from "STDIN": no matches for kind "PodSecurityPolicy" in version "policy/v1beta1" ensure CRDs are installed first

Randyansyah .. · Revisado há 11 months

Bruno F. · Revisado há 11 months

As others have said. Task 7 is error. Solution " gcloud container clusters create simplecluster --zone $MY_ZONE --cluster-version 1.21.14-gke.18100 --num-nodes 2 --metadata=disable-legacy-endpoints=false " do this in step Task 1

Muhammad Ilham Akbar S. · Revisado há 11 months

Edwin T. · Revisado há 11 months

Bruno F. · Revisado há 11 months

service account v1 beta is deprecated and removed on kubernetes v1.25

Bas T. · Revisado há 11 months

Bryan P. · Revisado há 11 months

Reza K. · Revisado há 11 months

Rafi A. · Revisado há 11 months

Lab cannot be completed because step 7 is outdated.

Wolfgang G. · Revisado há 11 months

Rafael F. · Revisado há 11 months

finally finish.. huft

HAIDAR W. · Revisado há 11 months

David A. · Revisado há 11 months

Lab is using PodSecurityPolicies which are deprecated and even no longer available at all on the kubernetes version running in GCP currently. Not possible to complete with 100% rate.

Maximilian W. · Revisado há 11 months

cant finish this labb bcs the instruction is deprecated!!!

HAIDAR W. · Revisado há 11 months

THANK YOU FOR WASTING MY TIME!! PLEASE CHECK ALL THE DEPRECATED DEPENDENCY!!! cat <<EOF | kubectl apply -f - --- apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: restrictive-psp annotations: seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default' apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default' seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' spec: privileged: false # Required to prevent escalations to root. allowPrivilegeEscalation: false # This is redundant with non-root + disallow privilege escalation, # but we can provide it for defense in depth. requiredDropCapabilities: - ALL # Allow core volume types. volumes: - 'configMap' - 'emptyDir' - 'projected' - 'secret' - 'downwardAPI' # Assume that persistentVolumes set up by the cluster admin are safe to use. - 'persistentVolumeClaim' hostNetwork: false hostIPC: false hostPID: false runAsUser: # Require the container to run without root privileges. rule: 'MustRunAsNonRoot' seLinux: # This policy assumes the nodes are using AppArmor rather than SELinux. rule: 'RunAsAny' supplementalGroups: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 fsGroup: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 EOF

Astawan Z. · Revisado há 11 months

Não garantimos que as avaliações publicadas sejam de consumidores que compraram ou usaram os produtos. As avaliações não são verificadas pelo Google.