Introduction to Kubernetes Training

Course Outline

Kubernetes (k8s) is an open-source system for automating deployment, scaling, and containerization of applications. Kubernetes provides a cloud-agnostic container orchestration system and is supported by most major cloud providers.

In this 2-day hands-on Kubernetes course, you will learn to deploy containerized applications on Kubernetes, and scale those applications to handle dynamic traffic. You also learn how to continuously deploy new application versions in a Kubernetes cluster to provide application updates with no downtime. This course ends with a section on Kubernetes security and the Kubernetes ecosystem of tools including Helm and Rancher.

This hands-on course is designed for anyone wanting to learn how to deploy containerized workloads on Kubernetes.

Introduction to Kubernetes Training Benefits

  • Containerize applications to implement microservices architectures
  • Create EKS clusters
  • Install and configure kubectl
  • Deploy containers to a Kubernetes cluster
  • Perform rolling updates and blue/green deployments of application versions
  • Autoscale the number of running pods

Kubernetes Training Course Outline

Introduction

  • Introduce Containers and their benefits
  • Create Microservices architectures using Containers
  • Apply best practices for managing containers and build files
  • Understand the Docker architecture

Get Started with Kubernetes

  • Introduce the Kubernetes terminology
  • Launch a Kubernetes cluster
  • Create highly available pod replica sets with deployments
  • Expose pods with services

Deploy and Scale Workloads

  • Leverage labels to host different services on the same cluster
  • Automatically scale pods to handle user demand
  • Perform rolling updates to eliminate downtime during application updates
  • Minimize risks of new rollouts with blue-green deployments
  • Test new deployments with canary releases

Monitor Kubernetes Deployments

  • Control container and pod resources: CPU and Memory
  • Detect when pods are ready to receive traffic
  • Monitor pods to verify they are alive
  • Access storage volumes from containers

Introduction to Kubernetes Security

  • Tips on improving the security of Kubernetes clusters
  • Organize pods into namespaces
  • Manage user roles and permissions
  • Restricting network traffic with network policies

The Kubernetes Ecosystem

  • Integrate of Kubernetes, Docker, cluster and Cloud management
  • Organize Kubernetes resources using Helm
  • Manage Kubernetes using Rancher
  • Introduce other tools such as Istio, Kafka, Redis, and KNative
Course Dates - North America
Course Dates - Europe
Attendance Method
Additional Details (optional)