This online instructor led training course provides the knowledge and skills to utilize Kubernetes, a product used to operate containerized applications at scale in the data-center. In this course students will learn key topics including the Kubernetes API, Cluster architecture, scheduling pods, daemon sets, pod and service networking, persisent volumes, security primitives, troubleshooting, and more.
Overview
Skills Learned
After completing this online training course, students will be able to:
What Kubernetes is and what its used for
Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
How to install, configure, and validate Kubernetes clusters
Scheduling pods
Daemon sets
Resource limitation
Pod and service networking
Persistent and creating volumes
Security primitives
Authentication and authorization
Logging and monitoring applications and cluster components
Troubleshooting applications, the control plane, the worker node, and the network
This course is intended for professionals who deploy containerized applications, Site Reliability Engineers (SREs), DevOps Engineers, Operations Engineers, and Full Stack Developers.
None, but we recommend that students have some Linux system administration experience.
01. Course Introduction
- What is Kubernetes
- What problems does it solve?
- Key features
- Terminology to know
02. Core Concepts
- Kubernetes API
- Cluster architecture
- Services
- Other network primitives
03. Installation, Configuration, & Validation
- Cluster design
- Masters
- Nodes
- Cluster communications
- HA for Kubernetes clusters
- Acquiring the binaries
- Infrastructure
- Testing the cluster
- Analyzing results
- kubeadm
- Container runtimes
04. Scheduling
- Schedule Pods
- Daemon Sets
- Resource limitation
05. Networking
- Networking configuration for cluster nodes
- Pod networking
- Service networking
- Network load balancing
- Ingress rules
- DNS
- CNI
06. Storage
- Persistent Volumes
- Creating Volumes
- Access modes
- Persistent volume claims
- Storage objects
- Application with persistent storage
- CSI
07. Security
- Authentication and authorization
- Security primitives
- Network policies
- TLS certificate management
- Secure images
- Security contexts
- Key value store
08. Logging and Monitoring
- Cluster components
- Applications
- Logs
- Cluster
- Applications
09. Extending the API
- CRD
- Examples: Crontab
- Operator Framework
- Examples: Strimzi, Prometheus
10. Troubleshooting
- Application
- Control plane
- Worker node
- Networking
SKILLS LEARNED
Skills Learned
After completing this online training course, students will be able to:
What Kubernetes is and what its used for
Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
How to install, configure, and validate Kubernetes clusters
Scheduling pods
Daemon sets
Resource limitation
Pod and service networking
Persistent and creating volumes
Security primitives
Authentication and authorization
Logging and monitoring applications and cluster components
Troubleshooting applications, the control plane, the worker node, and the network
WHO SHOULD ATTEND
This course is intended for professionals who deploy containerized applications, Site Reliability Engineers (SREs), DevOps Engineers, Operations Engineers, and Full Stack Developers.
PREREQUISITES
None, but we recommend that students have some Linux system administration experience.
COURSE OUTLINE
01. Course Introduction
- What is Kubernetes
- What problems does it solve?
- Key features
- Terminology to know
02. Core Concepts
- Kubernetes API
- Cluster architecture
- Services
- Other network primitives
03. Installation, Configuration, & Validation
- Cluster design
- Masters
- Nodes
- Cluster communications
- HA for Kubernetes clusters
- Acquiring the binaries
- Infrastructure
- Testing the cluster
- Analyzing results
- kubeadm
- Container runtimes
04. Scheduling
- Schedule Pods
- Daemon Sets
- Resource limitation
05. Networking
- Networking configuration for cluster nodes
- Pod networking
- Service networking
- Network load balancing
- Ingress rules
- DNS
- CNI
06. Storage
- Persistent Volumes
- Creating Volumes
- Access modes
- Persistent volume claims
- Storage objects
- Application with persistent storage
- CSI
07. Security
- Authentication and authorization
- Security primitives
- Network policies
- TLS certificate management
- Secure images
- Security contexts
- Key value store
08. Logging and Monitoring
- Cluster components
- Applications
- Logs
- Cluster
- Applications
09. Extending the API
- CRD
- Examples: Crontab
- Operator Framework
- Examples: Strimzi, Prometheus
10. Troubleshooting
- Application
- Control plane
- Worker node
- Networking