Overview

This online instructor led training course provides the knowledge and skills to utilize Kubernetes, a product used to operate containerized applications at scale in the data-center. In this course students will learn key topics including the Kubernetes API, Cluster architecture, scheduling pods, daemon sets, pod and service networking, persisent volumes, security primitives, troubleshooting, and more.

Course Instructor: Jeff Grunewald

Course Outline

01. Course Introduction

  • What is Kubernetes
  • What problems does it solve?
  • Key features
  • Terminology to know

02. Core Concepts

  • Kubernetes API
  • Cluster architecture
  • Services
  • Other network primitives

03. Installation, Configuration, & Validation

  • Cluster design
  • Masters
  • Nodes
  • Cluster communications
  • HA for Kubernetes clusters
  • Acquiring the binaries
  • Infrastructure
  • Testing the cluster
  • Analyzing results
  • kubeadm
  • Container runtimes

04. Scheduling

  • Schedule Pods
  • Daemon Sets
  • Resource limitation

05. Networking

  • Networking configuration for cluster nodes
  • Pod networking
  • Service networking
  • Network load balancing
  • Ingress rules
  • DNS
  • CNI
  • 06. Storage
  • Persistent Volumes
  • Creating Volumes
  • Access modes
  • Persistent volume claims
  • Storage objects
  • Application with persistent storage
  • CSI

07. Security

  • Authentication and authorization
  • Security primitives
  • Network policies
  • TLS certificate management
  • Secure images
  • Security contexts
  • Key value store

08. Logging and Monitoring

  • Cluster components
  • Applications
  • Logs
  • Cluster
  • Applications

09. Extending the API

  • CRD
  • Examples: Crontab
  • Operator Framework
  • Examples: Strimzi, Prometheus

10. Troubleshooting

  • Application
  • Control plane
  • Worker node
  • Networking

Skills Learned

After completing this online training course, students will be able to:

  • What Kubernetes is and what its used for
  • Key Kubernetes concepts, including the Kubernetes API, cluster architecture, and more
  • How to install, configure, and validate Kubernetes clusters
  • Scheduling pods
  • Daemon sets
  • Resource limitation
  • Pod and service networking
  • Persistent and creating volumes
  • Security primitives
  • Authentication and authorization
  • Logging and monitoring applications and cluster components
  • Troubleshooting applications, the control plane, the worker node, and the network