Price: 4 USD | Size: 1.70 GB | Duration : 11.44+ Hours |
BRAND: Expert TRAINING | ENGLISH | INSTANT DOWNLOAD
HOW TO DOWNLOAD THIS COURSE?
You can Instant Download a PDF file After successful payment, This PDF File Contains Course Download links. You can Download This Course immediately from that Links.
Core Kubernetes Training
Content
001_Chapter 1_Why Kubernetes exists
002_Chapter 1_Containers and images
003_Chapter 1_Kubernetes features
004_Chapter 1_Kubernetes components and architecture
005_Chapter 2_Why the Pod
006_Chapter 2_What is a Pod
007_Chapter 2_The Node API object
008_Chapter 2_Creating a web application with kubectl
009_Chapter 2_Infrastructure controllers
010_Chapter 2_Scaling, highly available applications, and the control plane
011_Chapter 3_Let’s build a Pod
012_Chapter 3_What is a Linux primitive
013_Chapter 3_Files are composable
014_Chapter 3_Using Linux primitives in Kubernetes
015_Chapter 3_Exploring the Pod’s Linux dependencies
016_Chapter 3_Building a Pod from scratch
017_Chapter 3_Securing our process with unshare
018_Chapter 3_Using our Pod in the real world
019_Chapter 3_Using the kube-dns Pod
020_Chapter 4_Using cgroups for processes in our Pods
021_Chapter 4_Processes and threads in Linux
022_Chapter 4_Implementing cgroups for a normal Pod
023_Chapter 4_Diving into how the kubelet manages resources
024_Chapter 4_Hack Editing HugePages with init containers
025_Chapter 4_Monitoring the Linux kernel with Prometheus, cAdvisor, and the API server
026_Chapter 4_Creating a local Prometheus monitoring service
027_Chapter 5_CNIs and providing the Pod with a network
028_Chapter 5_Implementing the service side of the Kubernetes SDN The kube-proxy
029_Chapter 5_What about NodePorts
030_Chapter 5_Diving into two CNI networking plugins Calico and Antrea
031_Chapter 5_Installing the Calico CNI provider
032_Chapter 5_Kubernetes networking with OVS and Antrea
033_Chapter 6_Troubleshooting large-scale network errors
034_Chapter 6_Inspecting CNI routing on different providers with the arp and ip commands
035_Chapter 6_Routes
036_Chapter 6_The kube-proxy and iptables
037_Chapter 6_Ingress controllers
038_Chapter 7_Pod storage and the CSI
039_Chapter 7_Three types of storage requirements for Kubernetes
040_Chapter 7_The container storage interface (CSI)
041_Chapter 7_A quick look at a few running CSI drivers
042_Chapter 8_Storage implementation and modeling
043_Chapter 8_PersistentVolumes
044_Chapter 8_Dynamic provisioning benefits from CSI but is orthogonal
045_Chapter 8_Kubernetes use cases for storage
046_Chapter 8_hostPath for system control andor data access
047_Chapter 8_Cassandra An example of real-world Kubernetes application storage
048_Chapter 9_Running Pods How the kubelet works
049_Chapter 9_The core kubelet
050_Chapter 9_Starting the kubelet binary
051_Chapter 9_The Container Runtime Interface (CRI)
052_Chapter 10_DNS in Kubernetes
053_Chapter 10_Why StatefulSets instead of Deployments
054_Chapter 10_The resolv.conf file
055_Chapter 11_The core of the control plane
056_Chapter 11_Scheduler details
057_Chapter 11_The controller manager
058_Chapter 12_etcd and the control plane
059_Chapter 12_Knowing when to tune etcd
060_Chapter 12_etcd as a data store
061_Chapter 12_Looking at the interface for Kubernetes to etcd
062_Chapter 12_The CAP theorem
063_Chapter 12_Performance and fault tolerance of etcd at a global scale
064_Chapter 13_Container and Pod security
065_Chapter 13_Container security
066_Chapter 13_Pod security
067_Chapter 13_Pod Security Policies (PSPs)
068_Chapter 14_Nodes and Kubernetes security
069_Chapter 14_Isolated container runtimes
070_Chapter 14_API server security
071_Chapter 14_Authn, Authz, and Secrets
072_Chapter 14_Network security
073_Chapter 14_Multi-tenancy
074_Chapter 15_Installing applications
075_Chapter 15_Installing the Carvel toolkit
076_Chapter 15_Part 3 Managing and deploying Guestbook as a single application
077_Chapter 15_Revisiting the Kubernetes Operator
top of page
Related Courses
SKU: RA165
$4.00Price
bottom of page