Course Introduction

This is an advanced Kubernetes course for devs, ops, or even architects, who have started working with Kubernetes, and want to dive deeper and learn advanced concepts around application packaging, capacity planning, resource management, security, operators, and the specific mechanisms associated with stateful application deployment like databases.

Requirements: To make the most of this course, you need to have a basic understanding of Kubernetes fundamentals. You need to know:

  • What is a Pod, a Deployment, a Service
  • How to deploy an app and expose it on a Kubernetes cluster
  • Basic notions of what are labels, selectors, YAML manifests
  • Basic shell commands (navigate directories, set environment variables…)
  • Using a text editor like vi, nano, or similar
  • Bundle Fee:

    $499

  • Skill Level:

    Advanced

  • Course Length:

    16+ Hrs

Course Curriculum

This course was recorded Live in May 2020 via Zoom.

01.

Packing Applications With Kustomize & Helm

  • 1.1 - Front Matter
  • 1.2 - Dockercoins, Our Sample Application
  • 1.3.1 - Kustomize
  • 1.3.2 - Kustomize
  • 1.4.1 - Helm
  • 1.4.2 - Helm
  • 1.5.1 - Homework: Creating Better Charts
  • 1.5.2 - Homework: Creating Better Charts
  • 1.6 - Extra content

02.

Capacity Management and Kubernetes Operators

  • 2.0 - Front Matter
  • 2.1.1 - Container capacity planning
  • 2.1.2 - Container capacity planning
  • 2.2 - Cluster Capacity Planning
  • 2.3.1 - Extending the Kubernetes API
  • 2.3.2 - Extending the Kubernetes API

03.

Security Focus

  • 3.0 - Front Matter
  • 3.1.1 - Network Policies Part 1
  • 3.1.2 - Network Policies Part 2
  • 3.1.3 Network Policies Part 3
  • 3.1.4 - Network Policies Part 4
  • 3.1.5 - Network Policies Part 5
  • 3.2.1 - Authentication & Authorization Part 1
  • 3.2.2 - Authentication & Authorization Part 2
  • 3.2.3 - Authentication & Authorization Part 3
  • 3.2.4 - Authentication & Authorization Part 4
  • 3.2.5 - Authentication & Authorization Part 5
  • 3.2.6 - Authentication & Authorization Part 6
  • 3.3.1 - Pod Security Policies Part 1
  • 3.3.2 - Pod Security Policies Part 2
  • 3.3.3 - Pod Security Policies Part 3
  • 3.3.4 - Pod Security Policies Part 4
  • 3.3.5 - Pod Security Policies Part 5
  • 3.3.6 - Pod Security Policies Part 6
  • 3.3.7 - Pod Security Policies Part 7
  • 3.4.1 - Managing User Access Part 1
  • 3.4.2 - Managing User Access Part 2
  • 3.4.3 - Managing User Access Part 3

04.

Application Configuration and Stateful Applications

  • 4.0 - Front Matter
  • 4.1.1 - Volumes
  • 4.1.2 - Volumes
  • 4.1.3 - Volumes
  • 4.1.4 - Volumes
  • 4.1.5 - Volumes
  • 4.1.6 - Volumes
  • 4.1.7 - Volumes
  • 4.2.1 - Managing configuration
  • 4.2.2 - Managing configuration
  • 4.2.3 - Managing configuration