Kubernetes Best Practice

Duration: 2 Days

Course Overview

Linux containers are changing the way companies think about service development and deployment. Containers play a vital role in the modern data-center, Kubernetes is the leading open-source system for automating deployment, scaling and management of containerized applications.
The course introduces participants to the concepts and architecture of Kubernetes, access control, Kubernetes Pods and Workloads, Scheduling and node management, Accessing the applications, Persistent storage in Kubernetes and finally its Logging, Monitoring and Troubleshooting facilities.
Structure: 50% theory 50% hands on lab exercises

How can I attend my course?

On-line from
your chosen location

At our dedicated
training facility

On-site at
your premises

Target Audience

System administrators, developers and DevOps who want to understand Kubernetes in enterprise and cloud environments.

Course Content

Module 1: Accessing Kubernetes

• Accessing the kubernetes cluster
• Controlling access to the API
• Authorization
• Role Based Access Control
• Roles and ClusterRoles
• Role bindings
• Admission control
• Kubernetes Lab: Accessing API

Module 2: Kubernetes Workloads

• The pod
• Our first Pod
• Operations on pods
• Pod Status and Lifecycle Pod Status and Lifecycle (cont)
• Pod probe examples
• RestartPolicy examples
• InitContainers Pod resource management
• Pod security context
• Patterns for Composite Containers
• ReplicationController and ReplicaSet
• Working with ReplicationController, ReplicaSet
• Deployments
• Working with Deployments
• Kubernetes Lab: Workloads

Module 3: Scheduling and node management

• The Kubernetes Scheduler
• Pod priorities and preemption
• Assigning Pods to Nodes
• Assigning Pods to Nodes – node affinities
• Assigning Pods to Nodes – node affinities
• Assigning Pods to Nodes – Pod affinities
• Assigning Pods to Nodes – pod affinities Taints and tolerations
• Managing nodes
• Kubernetes Lab: Scheduling

Module 4: Accessing the applications

• Services
• Service types
• Working with Services
• Working with Services
• Ingress
• Ingress definition
• Working with Ingress Network Policies
• Network Policy example
• Kubernetes Lab: Accessing Applications

Module 5: Persistent storage in kubernetes

• Volumes Volume example Volume types
• Persistent Volumes
• Persistent Volume example
• Persistent Volume example (cont)
• Persistent Volume example (cont) Dynamic PVC provisioning
• Secrets Using Secrets as environmental variables
• Using Secrets as volumes ConfigMaps
• Kubernetes Lab: Persistent Storage

Module 6: Kubernetes Special Workloads

• StatefulSets – Limitations
• StatefulSet example
• StatefulSet example with PVC
• Jobs, CronJobs
• Jobs example
• CronJobs example
• DaemonSets
• Kubernetes Lab: Special workloads

Module 7: Logging, monitoring and troubleshooting

• Logging architecture Monitoring
• Troubleshooting
• Kubernetes Lab: Logging and Monitoring
• ETCD backup and Restore.

COURSE PREREQUISITES

Proficiency with the Linux CLI. A broad understanding of Linux system administration.

You will receive a full set of course notes
and all supporting materials for your course.

Hard Copy Delivered to your premises or Downloaded to a chosen device.

To book this course please call 
+44 (0) 1444 410296 or email Info@kplknowledge.co.uk