Get in Touch

Course Outline

Schedule for Days 1-2

Introduction

I. Container Architecture

Comparing Containers and Virtual Machines

Anatomy of Containers

Container Management Systems

OCI and CRI Standards

II. Container Orchestration

Limitations of Container Management Systems

Kubernetes Architecture

Overview

Control Plane Nodes

Etcd

Kube-apiserver

Kubelet

Kube-proxy

Controller Manager

Kube-scheduler

Designing and Installing a Kubernetes Cluster

Laboratory Exercises

Deploying a Multi-Node Kubernetes Cluster

III. Kubernetes Command-Line Utilities

Imperative versus Declarative Approaches

Kubectl

Krew

Kube ns

kube ctx

Laboratory Exercises

Getting Started with Kubernetes

Essential Kubectl Commands

Essential Tools for Daily Work

IV. Core Kubernetes Concepts

Namespaces

Pods and Multi-Container Pods

Labels and Selectors

Replication Controllers and ReplicaSets

Deployments (Managing Rolling Updates and Rollbacks)

ConfigMaps and Secrets

Liveness and Readiness Probes

Laboratory Exercises

Exploring Core Kubernetes Concepts

Executing Rolling Updates and Rollbacks

Utilizing Labels and Selectors

Managing ConfigMaps and Secrets

Configuring Liveness and Readiness

V. Kubernetes Networking

Cluster-Level Networking

Pod-Level Networking

Service Networking

CoreDNS within Kubernetes

Ingress Controllers

Laboratory Exercises

Networking Configurations

Services

Ingress Setup

Schedule for Days 3-4

VI. Resource Scheduling

Manual Scheduling Techniques

Taints and Tolerations

Node Labels and Selectors

Node Affinity Rules

Static Pods

DaemonSets

Laboratory Exercises

Implementing Manual Scheduling

Applying Taints and Tolerations

Using Node Labels and Selectors

Defining Node Affinity

Managing Static Pods

Deploying DaemonSets

Working with Jobs and CronJobs

VII. Kubernetes and Data Storage

Persistent Volumes (PVs)

Persistent Volume Claims (PVCs)

Dynamic Provisioning via StorageClass

Laboratory Exercises

Static Provisioning Procedures

Dynamic Provisioning Procedures

VIII. Kubernetes Security

Role-Based Access Control (RBAC)

Service Accounts

Security Contexts

Resource Quotas

Network Policies

Laboratory Exercises

Configuring RBAC and Cluster Roles

Managing Service Accounts

Implementing Security Contexts

Enforcing Network Policies

IX. Logging and Monitoring

Helm Package Manager

Operators

Monitoring Cluster Components

Establishing the GAP Stack: Grafana, Alertmanager, and Prometheus

Laboratory Exercises

Using Helm

Setting Up the GAP Stack

Course Conclusion

Requirements

  • A working knowledge of cloud computing principles
  • Familiarity with the Linux command line interface

Target Audience

  • DevOps engineers
  • Software developers
 28 Hours

Number of participants


Price per participant

Testimonials (5)

Upcoming Courses

Related Categories