When does class start/end?
Classes begin promptly at 9:00 am, and typically end at 5:00 pm.
This Karpenter with EKS course introduces Karpenter, an open-source Kubernetes cluster autoscaler. Participants learn how Karpenter works, compare it to other cluster autoscaling mechanisms, and...
Read MoreThis Karpenter with EKS course introduces Karpenter, an open-source Kubernetes cluster autoscaler. Participants learn how Karpenter works, compare it to other cluster autoscaling mechanisms, and deploy and configure it to optimize Kubernetes workloads.
All participants must have taken our Introduction to Docker and Kubernetes course or have equivalent knowledge.
All Karpenter with EKS training attendees receive comprehensive courseware.
Attendees will not need to install any software on their computers for this class. The class will be conducted in a remote environment that Accelebrate will provide; students will only need a local computer with a web browser and a stable Internet connection. Any recent version of Microsoft Edge, Mozilla Firefox, or Google Chrome will work well.
<ul><li>Introduction</li><li>What is Karpenter? <ul><li>Key features</li><li>Node provisioning</li><li>Cost optimization and efficient resource usage</li></ul></li><li>How Karpenter Works <ul><li>Scheduling and provisioning workflows</li><li>Integration with Kubernetes and cloud providers</li></ul></li><li>Comparison with Cluster Autoscaler</li><li>Prerequisites for Karpenter <ul><li>Kubernetes version requirements</li><li>Supported cloud environments (AWS focus)</li></ul></li><li>Creating and Managing Provisioners <ul><li>Spot instance configurations</li><li>Scheduling constraints</li></ul></li><li>Scaling Applications with Karpenter <ul><li>Deploying sample applications to trigger scaling</li><li>Understanding logs and scaling behavior</li></ul></li><li>Monitoring and Logging with Karpenter <ul><li>Metrics and monitoring tools integration</li></ul></li><li>Troubleshooting <ul><li>Addressing node scheduling issues</li></ul></li><li>Threat Model <ul><li>Threats and mitigations</li></ul></li><li>Conclusion</li></ul>