Introduction to Kubernetes Training
Course 3658
2 DAY COURSE
Course Outline
Kubernetes (k8s) is an open-source system for automating deployment, scaling, and containerization of applications. Kubernetes provides a cloud-agnostic container orchestration system and is supported by most major cloud providers.
In this 2-day hands-on Kubernetes course, you will learn to deploy containerized applications on Kubernetes, and scale those applications to handle dynamic traffic. You also learn how to continuously deploy new application versions in a Kubernetes cluster to provide application updates with no downtime. This course ends with a section on Kubernetes security and the Kubernetes ecosystem of tools including Helm and Rancher.
This hands-on course is designed for anyone wanting to learn how to deploy containerized workloads on Kubernetes.
Introduction to Kubernetes Training Benefits
- Containerize applications to implement microservices architectures
- Create EKS clusters
- Install and configure kubectl
- Deploy containers to a Kubernetes cluster
- Perform rolling updates and blue/green deployments of application versions
- Autoscale the number of running pods
Kubernetes Training Course Outline
Introduction
- Introduce Containers and their benefits
- Create Microservices architectures using Containers
- Apply best practices for managing containers and build files
- Understand the Docker architecture
Get Started with Kubernetes
- Introduce the Kubernetes terminology
- Launch a Kubernetes cluster
- Create highly available pod replica sets with deployments
- Expose pods with services
Deploy and Scale Workloads
- Leverage labels to host different services on the same cluster
- Automatically scale pods to handle user demand
- Perform rolling updates to eliminate downtime during application updates
- Minimize risks of new rollouts with blue-green deployments
- Test new deployments with canary releases
Monitor Kubernetes Deployments
- Control container and pod resources: CPU and Memory
- Detect when pods are ready to receive traffic
- Monitor pods to verify they are alive
- Access storage volumes from containers
Introduction to Kubernetes Security
- Tips on improving the security of Kubernetes clusters
- Organize pods into namespaces
- Manage user roles and permissions
- Restricting network traffic with network policies
The Kubernetes Ecosystem
- Integrate of Kubernetes, Docker, cluster and Cloud management
- Organize Kubernetes resources using Helm
- Manage Kubernetes using Rancher
- Introduce other tools such as Istio, Kafka, Redis, and KNative
Private Team Training
Interested in this course for your team? Please complete and submit the form below and we will contact you to discuss your needs and budget.
- choosing a selection results in a full page refresh