Duration

5 days for the initial training, plus additional prep time and office hours with your trainer to prepare for the CKA exam.

*Discover all the value adds you receive when you join our Certified Kubernetes Administrator (CKA) program.

Overview

This Kubernetes Administration training course teaches attendees how to build, administer, and secure a Kubernetes cluster and prepares them for the Certified Kubernetes Administration (CKA) exam. In addition to the standard course for this offering, Web Age also includes certification-focused study aids to assist in preparing for and passing the exam.

Prerequisites

Students should understand Linux administration skills, be comfortable using the command line, and be able to edit files using a command-line text editor. In addition, they should have experience with containers, and networking.

Objectives

  • Create a Kubernetes cluster, including installing the necessary components, configuring the cluster, and adding nodes
  • Deploy applications to Kubernetes by creating pods, services, and storage
  • Manage Kubernetes resources with scaling, autoscaling, and updating applications
  • Secure Kubernetes by configuring authentication, authorization, and admission control.
  • Troubleshoot Kubernetes by monitoring logs, diagnosing application failures, and troubleshooting network access
  • Receive Certification Value Adds, including:
    • Double Shot Exam Voucher
    • Exam Prep with Killer.sh
    • 90-day Practice Sandbox
    • Interactive bi-weekly Q&A
    • Private Community Slack Channel
    • Monthly Newsletter on K8s
    • Get more details here

Outline for Kubernetes Administration and CKA Certification Training

  • Introduction
  • Kubernetes Concepts
    • Kubernetes Basics
    • Container Orchestration
    • Kubernetes Architecture
    • Kubernetes Concepts
    • Cluster and Namespace
    • Control Plane
    • Nodes
    • Pods
    • Storage
    • Services
    • Objects
    • Object Specifications
    • Labels & Selectors
    • Tools (kubeadm, kubectl)
    • Essential K8S commands
    • Essential Linux commands
  • Installation and Configuration
    • Installing kubeadm
    • Obtaining Nodes
    • Installing Kubelet
    • Installing kubectl
    • Initializing the control plane
    • Setup kubeconfig file
    • Joining nodes to the cluster
    • Verifying the cluster
  • Cluster Administration
    • Cluster Components
    • Installation and Setup
    • Security
    • Resource management
    • Scheduling
    • Monitoring
    • Logging
    • Scaling
    • Autoscaling
    • High Availability
    • Upgrading the cluster version
    • Backup and restore the etcd store
  • Workloads
    • Application Images
    • Deploying Pods
    • Deploying Workloads
    • Self-healing applications
    • Deployments
    • Deployment States
    • Replica Sets
    • Daemon Sets
    • Scaling a workload
    • Autoscaling a workload
    • Deleting workloads
    • Updating a workload image
    • Update strategies
    • Rolling updates
    • Rolling back an update
  • Scheduling
    • Pod Scheduling
    • Resource usage basics
    • Setting Resource Limits
    • Resource Requests
    • Resource Quotas
    • Optimizing Resource Usage
    • Node Affinity
    • Pod Affinity
    • Taints
    • Tolerations
  • Services
    • Available Service Types
    • ClusterIP Service
    • NodePort Service
    • LoadBalancer Service
    • Creating services
    • Accessing workloads through services
  • Networking
    • K8s Networking Overview
    • Ingress Controller
    • Ingress Resources
    • Resource Discovery
    • CoreDNS
    • Configuring CoreDNS
    • Port forwarding
  • Storage
    • Storage Classes
    • EmptyDir
    • HostPath
    • Persistent volumes
    • Persistent volume claims
    • NFS share volumes
    • Cloud storage volumes
    • Access Modes
    • Reclaim Policies
    • Configuring persistent storage for workloads
    • Secrets
    • Config Maps
  • Security
    • Securing the API
    • Securing ETCD
    • Securing Worker nodes
    • Securing images
    • Authentication
    • Authorization
    • Admission Controller
    • Securing cluster access
    • Kubectl config
    • RBAC Role Based Access Control
    • Pod policies
    • Network Policies
  • Troubleshooting
    • Logs and log access
    • Standard output and error logs
    • Workload monitoring
    • Application failure
    • Network access troubleshooting
    • Troubleshooting cluster components
  • Conclusion