Log In
0% completed
All Lessons
Free Lessons (4)
Kubernetes Primer
Kubernetes Background
Where Did Kubernetes Come From?
The Operating System of the Cloud
Quiz: Kubernetes Primer
Summary: Kubernetes Primer
Kubernetes Principles of Operation
Kubernetes From 40K Feet
Control Plane and Nodes: Control Plane
Control Plane and Nodes: Worker Nodes
Packaging Apps for Kubernetes
The Declarative Model and the Desired State
Pods
Deployments
Quiz: Kubernetes Principles
Summary: Kubernetes Principles
Getting Kubernetes
Local Kubernetes Cluster
Hosted Kubernetes Cluster
Working with kubectl
Summary: Getting Kubernetes
Working With Pods: Theory
Pod Theory
Pods and Scheduling
Pod Lifecycle
How Do We Deploy Pods
Multi-container Pods: Init Containers
Quiz: Theory of Working With Pods
Summary: Theory of Working With Pods
Working with Pods: Hands-On
Pod Manifest Files
Manifest Files: Empathy as Code
Introspecting Pods
kubectl exec: Running Commands in Pods
Check Pod Immutability
Multi-container Pod Example – Init Container
Multi-container Pod Example – Sidecar Container
Quiz: Working Hands-on With Pods
Summary: Working Hands-on With Pods
Virtual Clusters with Namespaces
Namespaces
Namespace Use Cases
Default Namespaces
Creating and Managing Namespaces
Deploying to Namespaces
Quiz: Virtual Clusters with Namespaces
Summary: Virtual Clusters with Namespaces
Kubernetes Deployments
Deployment Theory
ReplicaSets and Scaling
Rolling Updates With Deployments
How to Create a Deployment
Accessing Deployments
Accessing the Apps
Performing a Rolling Update
How to Perform a Rollback
Quiz: Kubernetes Deployments
Summary Kubernetes Deployments
Kubernetes Services: Theory
Introduction to Services
Labels and Loose Coupling
Services and Endpoints Objects
Accessing Apps From Inside the Cluster
Accessing Apps From Outside the Cluster
Quiz: Theory of Kubernetes Services
Summary: Theory of Kubernetes Services
Kubernetes Services: Hands-On
Create a Service - The Imperative Way
Create a Service - The Declarative Way
Introspecting Services and Endpoint Objects
Quiz: Hands-On With Kubernetes Services
Summary: Hands-On With Kubernetes Services
Ingress
Setting the Scene for Ingress
Ingress Architecture
Working with NGINX Controller
Configure Host-Based and Path-Based Routing
Inspecting Ingress Objects
Quiz: Ingress
Summary: Ingress
WebAssembly on Kubernetes
WebAssembly Primer
Wasm on Kubernetes
Build and Prepare the Wasm App
Build and Configure Kubernetes for Wasm
Deploy and Test the App
Quiz: WebAssembly on Kubernetes
Summary: WebAssembly on Kubernetes
Service Discovery Deep Dive
Understanding Service Discovery
The Service Registry
Service Registration
Service Discovery
Service Discovery and Namespaces
Troubleshooting Service Discovery
Quiz: Service Discovery
Summary: Service Discovery
Kubernetes Storage
The Big Picture
Storage Providers and Container Storage Interface
The Kubernetes Persistent Volume Subsystem
Storage Classes and Dynamic Provisioning
Provision Volume using an Existing StorageClass
Provision Volume by Creating a New StorageClass
Quiz: Kubernetes Storage
Summary: Kubernetes Storage
ConfigMaps
Introduction to ConfigMaps
ConfigMap Theory
Hands-On: Creating ConfigMaps Imperatively
Hands-On: Creating ConfigMaps Declaratively
Injecting ConfigMap and Secret Data Into Pods and Containers
Hands-on with Secrets
Quiz: ConfigMaps
Summary: ConfigMaps
StatefulSets
Introduction to StatefulSets
Ordered Creation and Deletion
Volumes and Handling Failures
Network and Headless Services
Hands-On With StatefulSets
Creating a Governing Headless Service
Deploy the StatefulSet
Testing Peer Discovery
Scaling StatefulSets
Test a Pod Failure
Quiz: StatefulSets
Summary: StatefulSets
API Security and RBAC
API Security Big Picture
Authentication
Authorization (RBAC)
Cluster-level users and permissions
Admission Control
Quiz: API Security and RBAC
Summary: API Security and RBAC
Kubernetes API
Introduction to Kubernetes API
API Analogy
The API Server
A Word on CRUD
The API
Inspecting the API
Alpha, Beta, and Stable
Quiz: Kubernetes API
Summary: Kubernetes API
Threat Modeling Kubernetes
Introduction to Threat Modeling
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of Privilege
Protecting Pods
Pod Security Admission
Quiz: Threat Modeling Kubernetes
Summary: Threat Modeling Kubernetes
Real-World Kubernetes Security
CI/CD Pipeline
Moving Images From Non-Production to Production
Workload Isolation
Identity and Access Management (IAM)
Auditing and Security Monitoring
Quiz: Real-World Kubernetes Security
Summary: Real-World Kubernetes Security
Conclusion
Glossary
Wrap Up
Learn Kubernetes: A Deep Dive
/
...
/
Summary: Getting Kubernetes
Summary: Getting Kubernetes
A quick recap of the concepts covered in this chapter.
We'll cover the following...
Recap
Recap
...