Deploy and orchestrate applications on Kubernetes.
Kubernetes is the de-facto standard for application container orchestration. Kubernetes ensures that a specific constellation of containers is running and functional at all times. In addition to containers, Kubernetes also manages resource consumption, persistent storage, network services, permissions, and various other aspects of applications and clusters.
Configuring applications on Kubernetes requires knowledge of various resource types that Kubernetes uses to describe the desired configuration. In this course, participants learn how to use the most important Kubernetes resources and how to set up a simple Kubernetes cluster through numerous practical exercises.
This course is delivered in cooperation with the xamira networks GmbH.
Who should attend
The training is aimed at developers and administrators as well as architects and decision-makers with a high level of technical interest. The participants must be familiar with the use of application containers under Docker or Podman.
Knowledge of how containers work and the ability to interact with individual containers on the command line, as well as is the creation of container images from Dockerfiles / Containerfiles in required. We teach these skills in ourtraining. In addition, the course requires the use of the Linux command line and an editor.
Participants learn how to deploy applications on Kubernetes and administer simple Kubernetes clusters. This includes creating Kubernetes manifests and knowledge about the most important resource types. With this knowledge, participants will be able to roll out applications on Kubernetes, update them, secure them, and make them accessible from inside and outside the cluster.
Introduction to Kubernetes
- Kubernetes architecture
- Cluster setup with kubeadm
- Labels and annotations
- Configuration tools and configuration contexts
- Role based access control
- Create, modify, and manage Pods
- Resource configuration
- Startup, readiness and lifeness probes
- Volumes in Pods
- PersistentVolumes and PersistentVolumeClaims
- ConfigMaps and Secrets
Access to services
- Limits and quotas
Introduction to Helm
- Installation of existing applications
- Creating simple custom Helm Charts