Kubernetes Fundamentals and Cluster Operations Training
This Kubernetes course is the first step in learning about container cluster operations. Attendees are introduced to containers and Kubernetes and learn how to deploy a two-tier application into Kubernetes.
Duration
Prerequisites
- Linux concepts and command line proficiency
- General networking proficiency
Target Audience
Skills Gained
- Build, test, and publish Docker container images
- Become familiar with YAML files that define Kubernetes objects
- Understand Kubernetes core user-facing concepts, including pods, services, and deployments
- Use kubectl, the Kubernetes CLI, and become familiar with its commands and options
- Understand the architecture of Kubernetes (Control plane and its components, worker nodes, and kubelet)
- Learn how to troubleshoot issues with deployments on Kubernetes
- Apply resource requests, limits, and probes to deployments
- Manage dynamic application configuration using ConfigMaps and Secrets
- Deploy other workloads, including DaemonSets, Jobs, and CronJobs
- Learn about user-facing security using SecurityContext, RBAC, and NetworkPolicies
- Introduction
- Introductions and objectives
- Containers
- What and Why containers
- Building images
- Running containers
- Registry and image management
- Kubernetes Overview
- Kubernetes project
- Plugin interfaces
- Building Kubernetes
- Kubectl CLI
- Beyond Kubernetes Basics
- Kubernetes objects
- YAML
- Pods, replicas, and deployments
- Services
- Deployment management
- Rolling updates
- Controlling deployments
- Pod and container configurations
- Kubernetes Networking
- Networking within a pod
- Pod-to-Pod Networking
- Services to Pods
- ClusterIP, NodePort, and LoadBalancer
- Ingress controllers
- Service Discovery via DNS
- Stateful Applications in Kubernetes
- Stateless versus Stateful
- Volumes
- Persistent volumes claims
- StorageClasses
- StatefulSets
- Additional Kubernetes Considerations
- Dynamic configuration
- ConfigMaps
- Secrets
- Jobs, CronJobs
- Security
- Network policy
- Applying a NetworkPolicy
- SecurityContext
- runAsUser/Group
- Service accounts
- Role-based access control
- Logging and Monitoring
- Logging for various objects
- Sidecar logging
- Node logging
- Audit logging
- Monitoring architecture
- Monitoring solutions
- Octant
- VMware vRealize® Operations Manager™
- Cluster Operations
- Onboarding new applications
- Backups
- Upgrading
- Drain and cordon commands
- Impact of an upgrade to running applications
- Troubleshooting commands
- VMware Tanzu™ portfolio overview
Partner Registration
The course you are registering for is being delivered by our sister company - ExitCertified. All logistics related to course delivery will be managed by the ExitCertified team. If you have a dedicated Web Age representative, please feel to reach out to them with any questions/concerns you may have.
You'll now be redirected to https://www.exitcertified.com to complete the enrollment process.
Partner Registration
The course you are registering for is being delivered by our sister company - ExitCertified. All logistics related to course delivery will be managed by the ExitCertified team. If you have a dedicated Web Age representative, please feel to reach out to them with any questions/concerns you may have.
You'll now be redirected to https://www.exitcertified.com to complete the enrollment process.