Hardening Default GKE Cluster Configurations Ulasan

Hardening Default GKE Cluster Configurations Ulasan

9649 ulasan

Thosan G. · Diulas 12 bulan lalu

Mykhailo S. · Diulas 12 bulan lalu

Mykhailo S. · Diulas 12 bulan lalu

Task 7 Error

bayu m. · Diulas 12 bulan lalu

Fandi H. · Diulas 12 bulan lalu

nice

bayu m. · Diulas 12 bulan lalu

error in task#7

Hapid R. · Diulas 12 bulan lalu

Fandi H. · Diulas 12 bulan lalu

error trying to implement Task 7.....error: resource mapping not found for name: "restrictive-psp" namespace: "" from "STDIN": no matches for kind "PodSecurityPolicy" in version "policy/v1beta1" ensure CRDs are installed first

Randyansyah .. · Diulas 12 bulan lalu

Bruno F. · Diulas 12 bulan lalu

As others have said. Task 7 is error. Solution " gcloud container clusters create simplecluster --zone $MY_ZONE --cluster-version 1.21.14-gke.18100 --num-nodes 2 --metadata=disable-legacy-endpoints=false " do this in step Task 1

Muhammad Ilham Akbar S. · Diulas 12 bulan lalu

Edwin T. · Diulas 12 bulan lalu

Bruno F. · Diulas 12 bulan lalu

service account v1 beta is deprecated and removed on kubernetes v1.25

Bas T. · Diulas 12 bulan lalu

Bryan P. · Diulas 12 bulan lalu

Reza K. · Diulas 12 bulan lalu

Rafi A. · Diulas 12 bulan lalu

Lab cannot be completed because step 7 is outdated.

Wolfgang G. · Diulas 12 bulan lalu

Rafael F. · Diulas 12 bulan lalu

finally finish.. huft

HAIDAR W. · Diulas 12 bulan lalu

David A. · Diulas 12 bulan lalu

Lab is using PodSecurityPolicies which are deprecated and even no longer available at all on the kubernetes version running in GCP currently. Not possible to complete with 100% rate.

Maximilian W. · Diulas 12 bulan lalu

cant finish this labb bcs the instruction is deprecated!!!

HAIDAR W. · Diulas 12 bulan lalu

THANK YOU FOR WASTING MY TIME!! PLEASE CHECK ALL THE DEPRECATED DEPENDENCY!!! cat <<EOF | kubectl apply -f - --- apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: restrictive-psp annotations: seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default' apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default' seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' spec: privileged: false # Required to prevent escalations to root. allowPrivilegeEscalation: false # This is redundant with non-root + disallow privilege escalation, # but we can provide it for defense in depth. requiredDropCapabilities: - ALL # Allow core volume types. volumes: - 'configMap' - 'emptyDir' - 'projected' - 'secret' - 'downwardAPI' # Assume that persistentVolumes set up by the cluster admin are safe to use. - 'persistentVolumeClaim' hostNetwork: false hostIPC: false hostPID: false runAsUser: # Require the container to run without root privileges. rule: 'MustRunAsNonRoot' seLinux: # This policy assumes the nodes are using AppArmor rather than SELinux. rule: 'RunAsAny' supplementalGroups: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 fsGroup: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 EOF

Astawan Z. · Diulas 12 bulan lalu

cant finish this labb bcs the instruction is deprecated!!!

HAIDAR W. · Diulas 12 bulan lalu

Kami tidak dapat memastikan bahwa ulasan yang dipublikasikan berasal dari konsumen yang telah membeli atau menggunakan produk terkait. Ulasan tidak diverifikasi oleh Google.