Course Introduction
This is an advanced Kubernetes course for devs, ops, or even architects, who have started working with Kubernetes, and want to dive deeper and learn advanced concepts around application packaging, capacity planning, resource management, security, operators, and the specific mechanisms associated with stateful application deployment like databases.
Requirements: To make the most of this course, you need to have a basic understanding of Kubernetes fundamentals. You need to know:
- What is a Pod, a Deployment, a Service
- How to deploy an app and expose it on a Kubernetes cluster
- Basic notions of what are labels, selectors, YAML manifests
- Basic shell commands (navigate directories, set environment variables…)
- Using a text editor like vi, nano, or similar
-
Bundle Fee:
$499
-
Skill Level:
Advanced
-
Course Length:
16+ Hrs
Course Curriculum
This course was recorded Live in May 2020 via Zoom.
01.
Packing Applications With Kustomize & Helm
- 1.1 - Front Matter
- 1.2 - Dockercoins, Our Sample Application
- 1.3.1 - Kustomize
- 1.3.2 - Kustomize
- 1.4.1 - Helm
- 1.4.2 - Helm
- 1.5.1 - Homework: Creating Better Charts
- 1.5.2 - Homework: Creating Better Charts
- 1.6 - Extra content
02.
Capacity Management and Kubernetes Operators
- 2.0 - Front Matter
- 2.1.1 - Container capacity planning
- 2.1.2 - Container capacity planning
- 2.2 - Cluster Capacity Planning
- 2.3.1 - Extending the Kubernetes API
- 2.3.2 - Extending the Kubernetes API
03.
Security Focus
- 3.0 - Front Matter
- 3.1.1 - Network Policies Part 1
- 3.1.2 - Network Policies Part 2
- 3.1.3 Network Policies Part 3
- 3.1.4 - Network Policies Part 4
- 3.1.5 - Network Policies Part 5
- 3.2.1 - Authentication & Authorization Part 1
- 3.2.2 - Authentication & Authorization Part 2
- 3.2.3 - Authentication & Authorization Part 3
- 3.2.4 - Authentication & Authorization Part 4
- 3.2.5 - Authentication & Authorization Part 5
- 3.2.6 - Authentication & Authorization Part 6
- 3.3.1 - Pod Security Policies Part 1
- 3.3.2 - Pod Security Policies Part 2
- 3.3.3 - Pod Security Policies Part 3
- 3.3.4 - Pod Security Policies Part 4
- 3.3.5 - Pod Security Policies Part 5
- 3.3.6 - Pod Security Policies Part 6
- 3.3.7 - Pod Security Policies Part 7
- 3.4.1 - Managing User Access Part 1
- 3.4.2 - Managing User Access Part 2
- 3.4.3 - Managing User Access Part 3
04.
Application Configuration and Stateful Applications
- 4.0 - Front Matter
- 4.1.1 - Volumes
- 4.1.2 - Volumes
- 4.1.3 - Volumes
- 4.1.4 - Volumes
- 4.1.5 - Volumes
- 4.1.6 - Volumes
- 4.1.7 - Volumes
- 4.2.1 - Managing configuration
- 4.2.2 - Managing configuration
- 4.2.3 - Managing configuration