Kubernetes Essentials

Course Description

In this course Kubernetes Essentials we will cover fundamentals of Kubernetes including Architecture, Storage, Computation & Networking.

Modern web applications require fast development & deployment. By using Containerization you can package applications in such a way that it enables applications to be developed and deployed in an easy and quick way. Kubernetes (http://kubernetes.io) is an open-source orchestration system for managing containerized applications across multiple hosts, providing basic mechanisms for the deployment, maintenance, and scaling of applications.

Prerequisites

  1. Understands Linux commands well
  2. Know basics of Container and how it works
  3. Basics of Docker commands

Course Duration: 2 hours approx

Labs: NA

Demo: Demo for relevant topics starting from section 3Quizzes: Check your understanding after each section

Syllabus

1. Introduction

  1. What is containerization
  2. What is Kubernetes
  3. What are the features of Kubernetes
  4. Do’s and Don’ts of Kubernetes

2. Kubernetes Architecture & Terminologies

  1. 10000 feet overview of Kubernetes architecture
  2. Control plane and data plane
  3. Nodes and pods
  4. etcd
  5. Kubelet and kube proxy
  6. Minikube introduction
  7. Installing Kubernetes
  8. Setting Up a Single Node Kubernetes Cluster Using Minikube
  9. Accessing Minikube

3. Up and Running First Application

  1. Deploy your first app
  2. Scale it (replica set)
  3. Add volume
  4. Creating deployment using manifest
  5. Understanding namespaces

4. Kubernetes volumes and storage

  1. Volume management
  2. Storage classes
  3. Persistent Volume and Persistent Volume Claims
  4. Resource reservation

5. Kubernetes Networking 

  1. East-west and north-south traffic flow
  2. Cluster IP
  3. Node port
  4. Load balancer
  5. Ingress
  6. Kubernetes service fundamentals

6. Kubernetes Administration

  1. Kubernetes dashboard
  2. Managing resources
  3. Configmaps and secrets

7. Making it production ready

8. Security consideration

  1. Kubernetes attack surface (Threat Landscape)
  2. Authentication
  3. Authorization
  4. Admission control

9. Troubleshooting

  1. Troubleshooting volume issues
  2. Troubleshooting pods
  3. Troubleshooting nodes
  4. Understanding kubeadm

10. Summary

  1. Wrap-up summary
  2. What’s Next

For any queries, please comment below or contact us

Sharing is Caring

Leave a Reply

Your email address will not be published. Required fields are marked *

Scroll to Top