7877  Reviews star_rate star_rate star_rate star_rate star_half

Kubernetes Administration and CKA Certification

This Kubernetes Administration training course teaches attendees how to build, administer, and secure a Kubernetes cluster and prepares them for the Certified Kubernetes Administration (CKA) exam. In...

Read More
$2,995 USD
Course Code WA3339
Duration 5 days
Available Formats Classroom

This Kubernetes Administration training course teaches attendees how to build, administer, and secure a Kubernetes cluster and prepares them for the Certified Kubernetes Administration (CKA) exam. In addition to the standard course for this offering, Web Age also includes certification-focused study aids to assist in preparing for and passing the exam.

Skills Gained

  • Create a Kubernetes cluster, including installing the necessary components, configuring the cluster, and adding nodes
  • Deploy applications to Kubernetes by creating pods, services, and storage
  • Manage Kubernetes resources with scaling, autoscaling, and updating applications
  • Secure Kubernetes by configuring authentication, authorization, and admission control.
  • Troubleshoot Kubernetes by monitoring logs, diagnosing application failures, and troubleshooting network access
  • Receive Certification Value Adds, including:
  • Double Shot Exam Voucher
  • Exam Prep with Killer.sh
  • 90-day Practice Sandbox
  • Interactive bi-weekly Q&A
  • Private Community Slack Channel
  • Monthly Newsletter on K8s

Prerequisites

Students should understand Linux administration skills, be comfortable using the command line, and be able to edit files using a command-line text editor. In addition, they should have experience with containers, and networking.

Course Details

Outline

Kubernetes Concepts

  • Kubernetes Basics
  • Container Orchestration
  • Kubernetes Architecture
  • Kubernetes Concepts
  • Cluster and Namespace
  • Control Plane
  • Nodes
  • Pods
  • Storage
  • Services
  • Objects
  • Object Specifications
  • Labels & Selectors
  • Tools (kubeadm, kubectl)
  • Essential K8S commands
  • Essential Linux commands

Installation and Configuration

  • Installing kubeadm
  • Obtaining Nodes
  • Installing Kubelet
  • Installing kubectl
  • Initializing the control plane
  • Setup kubeconfig file
  • Joining nodes to the cluster
  • Verifying the cluster

Cluster Administration

  • Cluster Components
  • Installation and Setup
  • Security
  • Resource management
  • Scheduling
  • Monitoring
  • Logging
  • Scaling
  • Autoscaling
  • High Availability
  • Upgrading the cluster version
  • Backup and restore the etcd store

Workloads

  • Application Images
  • Deploying Pods
  • Deploying Workloads
  • Self-healing applications
  • Deployments
  • Deployment States
  • Replica Sets
  • Daemon Sets
  • Scaling a workload
  • Autoscaling a workload
  • Deleting workloads
  • Updating a workload image
  • Update strategies
  • Rolling updates
  • Rolling back an update

Scheduling

  • Pod Scheduling
  • Resource usage basics
  • Setting Resource Limits
  • Resource Requests
  • Resource Quotas
  • Optimizing Resource Usage
  • Node Affinity
  • Pod Affinity
  • Taints
  • Tolerations

Services

  • Available Service Types
  • ClusterIP Service
  • NodePort Service
  • LoadBalancer Service
  • Creating services
  • Accessing workloads through services

Networking

  • K8s Networking Overview
  • Ingress Controller
  • Ingress Resources
  • Resource Discovery
  • CoreDNS
  • Configuring CoreDNS
  • Port forwarding

Storage

  • Storage Classes
  • EmptyDir
  • HostPath
  • Persistent volumes
  • Persistent volume claims
  • NFS share volumes
  • Cloud storage volumes
  • Access Modes
  • Reclaim Policies
  • Configuring persistent storage for workloads
  • Secrets
  • Config Maps

Security

  • Securing the API
  • Securing ETCD
  • Securing Worker nodes
  • Securing images
  • Authentication
  • Authorization
  • Admission Controller
  • Securing cluster access
  • Kubectl config
  • RBAC Role Based Access Control
  • Pod policies
  • Network Policies

Troubleshooting

  • Logs and log access
  • Standard output and error logs
  • Workload monitoring
  • Application failure
  • Network access troubleshooting
  • Troubleshooting cluster components