关于“Hardening Default GKE Cluster Configurations”的评价

关于“Hardening Default GKE Cluster Configurations”的评价

9649 条评价

Thosan G. · 已于 12 months前审核

Mykhailo S. · 已于 12 months前审核

Mykhailo S. · 已于 12 months前审核

Task 7 Error

bayu m. · 已于 12 months前审核

Fandi H. · 已于 12 months前审核

nice

bayu m. · 已于 12 months前审核

error in task#7

Hapid R. · 已于 12 months前审核

Fandi H. · 已于 12 months前审核

error trying to implement Task 7.....error: resource mapping not found for name: "restrictive-psp" namespace: "" from "STDIN": no matches for kind "PodSecurityPolicy" in version "policy/v1beta1" ensure CRDs are installed first

Randyansyah .. · 已于 12 months前审核

Bruno F. · 已于 12 months前审核

As others have said. Task 7 is error. Solution " gcloud container clusters create simplecluster --zone $MY_ZONE --cluster-version 1.21.14-gke.18100 --num-nodes 2 --metadata=disable-legacy-endpoints=false " do this in step Task 1

Muhammad Ilham Akbar S. · 已于 12 months前审核

Edwin T. · 已于 12 months前审核

Bruno F. · 已于 12 months前审核

service account v1 beta is deprecated and removed on kubernetes v1.25

Bas T. · 已于 12 months前审核

Bryan P. · 已于 12 months前审核

Reza K. · 已于 12 months前审核

Rafi A. · 已于 12 months前审核

Lab cannot be completed because step 7 is outdated.

Wolfgang G. · 已于 12 months前审核

Rafael F. · 已于 12 months前审核

finally finish.. huft

HAIDAR W. · 已于 12 months前审核

David A. · 已于 12 months前审核

Lab is using PodSecurityPolicies which are deprecated and even no longer available at all on the kubernetes version running in GCP currently. Not possible to complete with 100% rate.

Maximilian W. · 已于 12 months前审核

cant finish this labb bcs the instruction is deprecated!!!

HAIDAR W. · 已于 12 months前审核

THANK YOU FOR WASTING MY TIME!! PLEASE CHECK ALL THE DEPRECATED DEPENDENCY!!! cat <<EOF | kubectl apply -f - --- apiVersion: policy/v1beta1 kind: PodSecurityPolicy metadata: name: restrictive-psp annotations: seccomp.security.alpha.kubernetes.io/allowedProfileNames: 'docker/default' apparmor.security.beta.kubernetes.io/allowedProfileNames: 'runtime/default' seccomp.security.alpha.kubernetes.io/defaultProfileName: 'docker/default' apparmor.security.beta.kubernetes.io/defaultProfileName: 'runtime/default' spec: privileged: false # Required to prevent escalations to root. allowPrivilegeEscalation: false # This is redundant with non-root + disallow privilege escalation, # but we can provide it for defense in depth. requiredDropCapabilities: - ALL # Allow core volume types. volumes: - 'configMap' - 'emptyDir' - 'projected' - 'secret' - 'downwardAPI' # Assume that persistentVolumes set up by the cluster admin are safe to use. - 'persistentVolumeClaim' hostNetwork: false hostIPC: false hostPID: false runAsUser: # Require the container to run without root privileges. rule: 'MustRunAsNonRoot' seLinux: # This policy assumes the nodes are using AppArmor rather than SELinux. rule: 'RunAsAny' supplementalGroups: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 fsGroup: rule: 'MustRunAs' ranges: # Forbid adding the root group. - min: 1 max: 65535 EOF

Astawan Z. · 已于 12 months前审核

cant finish this labb bcs the instruction is deprecated!!!

HAIDAR W. · 已于 12 months前审核

我们无法确保发布的评价来自已购买或已使用产品的消费者。评价未经 Google 核实。