Overview
This online instructor led training course provides the knowledge and skills to utilize Kubernetes, a product used to operate containerized applications at scale in the data-center. In this course students will learn key topics including the Kubernetes API, Cluster architecture, scheduling pods, daemon sets, pod and service networking, persisent volumes, security primitives, troubleshooting, and more.
Course Instructor: Jeff Grunewald
Course Outline
01. Course Introduction
- What is Kubernetes
- What problems does it solve?
- Key features
- Terminology to know
02. Core Concepts
- Kubernetes API
- Cluster architecture
- Services
- Other network primitives
03. Installation, Configuration, & Validation
- Cluster design
- Masters
- Nodes
- Cluster communications
- HA for Kubernetes clusters
- Acquiring the binaries
- Infrastructure
- Testing the cluster
- Analyzing results
- kubeadm
- Container runtimes
04. Scheduling
- Schedule Pods
- Daemon Sets
- Resource limitation
05. Networking
- Networking configuration for cluster nodes
- Pod networking
- Service networking
- Network load balancing
- Ingress rules
- DNS
- CNI
- 06. Storage
- Persistent Volumes
- Creating Volumes
- Access modes
- Persistent volume claims
- Storage objects
- Application with persistent storage
- CSI
07. Security
- Authentication and authorization
- Security primitives
- Network policies
- TLS certificate management
- Secure images
- Security contexts
- Key value store
08. Logging and Monitoring
- Cluster components
- Applications
- Logs
- Cluster
- Applications
09. Extending the API
- CRD
- Examples: Crontab
- Operator Framework
- Examples: Strimzi, Prometheus
10. Troubleshooting
- Application
- Control plane
- Worker node
- Networking
Skills Learned
After completing this online training course, students will be able to:
- What Kubernetes is and what its used for
- Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
- How to install, configure, and validate Kubernetes clusters
- Scheduling pods
- Daemon sets
- Resource limitation
- Pod and service networking
- Persistent and creating volumes
- Security primitives
- Authentication and authorization
- Logging and monitoring applications and cluster components
- Troubleshooting applications, the control plane, the worker node, and the network