Linux containers are changing the way companies think about service development and deployment. Containers play a vital role in the modern data-center, and Docker is leading the way. This course covers all the core features of Docker including: container creation and management, interacting with Docker hub, using Dockerfile to create and manage custom images, advanced Docker networking (how to safely expose container services to the world, and link containers).
Interested in attending? Have a suggestion about running this event near you?
Register your interest now
Description
- CORE CONCEPTS
- CKA Objectives Covered
- Kubernetes Architecture
- Cluster Communication
- Objects
- Object Properties
- Labels & Selectors
- Annotations
- Object Management
- Object Management (cont.)
- Image Fundamentals
- Container Fundamentals
- Pod Fundamentals
- Working with Pods
- Writing YAML Files
LAB TASKS
- Container and Pod Fundamentals
- Single Node Install
- Pod Fundamentals
- INSTALLATION
- CKA Objectives Covered
- Installation pre-requisites
- Installation (single node)
- Installation (production)
- Client Tool Optimizations
- Installing HA Control Plane (DEMO)
LAB TASKS
- (DEMO) Kubernetes HA Masters Install
- Kubernetes Install
- Joining Worker Nodes
- APPLICATION LIFECYCLE MANAGEMENT
- CKA Objectives Covered
- Pod Lifecycle
- Container Lifecycle
- Init Containers
- Container: command and args
- Container: Defining Environment
- ReplicaSet
- Deployments
- Working with Deployments
- Deployment Rollouts
LAB TASKS
- Pod Lifecycle
- Init Containers
- Deployments
- NETWORKING
- CKA Objectives Covered
- Network Overview
- Service Discovery & CoreDNS
- Container Network Interface (CNI)
- Services
- Ingress Objects
LAB TASKS
- (DEMO) Ingress Controller
- Port-Forwarding
- Services
- Ingress
- STORAGE
- CKA Objectives Covered
- Storage
- Volume Types
- Volume Types
- Static Volumes (DEMO)
- ConfigMaps
- ConfigMaps
- Secrets
LAB TASKS
- (DEMO) Static Volumes
- (DEMO) ConfigMaps & Secrets
- Static Volume Provisioning
- ConfigMaps and Secrets
- SECURITY
- Controlling Access to the Kubernetes API
- Kubectl Configuration
- Role–Based Access Control
- Service Accounts
- Admission Controllers
- PodSecurityPolicy Admission Controller
- Default Admission Controllers
- SCHEDULING
- CKA Objectives Covered
- Controlling and Tracking Resources
- Scheduler Operation
- DaemonSet
- Node Affinity & Anti-affinity
- Pod Affinity & Anti-affinity
- Taints & Tolerations
LAB TASKS
- (DEMO) Affinity and Taints
- Pod Resources and Scheduling
- Static Scheduling and Daemonsets
- Pod and Node Affinities
Prerequisites
Proficiency with the Linux CLI. A broad understanding of Linux system administration.