bookbestseller Posted March 8 Report Share Posted March 8 Certified Kubernetes Administrator (CKA), 4th EditionISBN: 9780135375129 | .MP4, AVC, 1280x720, 30 fps | English, AAC, 2 Ch | 4h 47m | 1.22 GBInstructor: Sander van VugtThe Sneak Peek program provides early access to Pearson video products and is exclusively available to subscribers. Content for titles in this program is made available throughout the development cycle, so products may not be complete, edited, or finalized, including video post-production editing.IntroductionCertified Kubernetes Administrator (CKA): IntroductionModule 1: Cluster Architecture, Installation, and ConfigurationModule IntroductionLesson 1: Understanding Kubernetes ArchitectureLearning objectives1.1 Vanilla Kubernetes and the Ecosystem1.2 Running Kubernetes in Cloud or on Premises1.3 Kubernetes Distributions1.4 Kubernetes Node RolesLesson 2: Creating a Kubernetes Cluster with kubeadmLearning objectives2.1 Understanding Cluster Node Requirements2.2 Provisioning an Infrastructure for Hosting Kubernetes2.3 Installation Procedure Overview2.5 Installing CRI and Tools2.6 Using kubeadm init2.7 Configuring the Kubernetes Client2.8 Setting up Node Networking2.9 Adding Nodes to the ClusterLesson 2 Lab: Building a Kubernetes ClusterLesson 2 Lab Solution: Building a Kubernetes ClusterLesson 3: Managing Kubernetes ClustersLearning objectives3.1 Analyzing Cluster Nodes3.2 Using crictl to Manage Node Containers3.3 Running Static Pods3.4 Managing Node State3.5 Managing Node ServicesLesson 3 Lab: Running Static PodsLesson 3 Lab Solution: Running Static PodsLesson 4: Performing Node Maintenance TasksLearning objectives4.1 Using Metrics Server to Monitor Node and Pod Performance4.2 Backing up the Etcd4.3 Restoring the Etcd4.4 Performing Cluster Node Upgrades4.5 Performing Cluster Worker Upgrades4.6 Understanding Cluster High Availability Options4.7 Setting up a Highly Available Kubernetes ClusterLesson 4 Lab: Etcd Backup and RestoreLesson 4 Lab Solution: Etcd Backup and RestoreLesson 5: Managing Security SettingsLearning objectives5.1 Understanding API Access5.2 Managing Security Context5.3 Users, ServiceAccounts, and API Access5.4 Understanding Role Based Access Control (RBAC)5.5 Setting up RBAC for ServiceAccounts5.6 ClusterRoles and ClusterRoleBindings5.7 Setting up RBAC for UsersLesson 5 Lab: Managing SecurityLesson 5 Lab Solution: Managing SecurityModule 2: Workloads and SchedulingModule IntroductionLesson 6: Deploying Kubernetes ApplicationsLearning objectives6.1 Using Deployments6.2 Running Agents with DaemonSets6.4 The Case for Running Individual Pods6.5 Managing Pod Initialization6.6 Scaling Applications6.8 Using Sidecar Containers for Application LoggingLesson 6 Lab: Running a DaemonSetLesson 6 Lab Solution: Running a DaemonSetLesson 7: Using Templating ToolsLearning objectives7.1 Running Applications from YAML Files7.2 The Helm Package Manager7.4 Managing Applications with Helm7.5 Using KustomizeLesson 7 Lab: Managing Applications with HelmLesson 7 Lab Solution: Managing Applications with HelmLesson 8: Managing SchedulingLearning objectives8.1 Exploring the Scheduling Process8.2 Setting Node Preferences8.3 Managing Affinity and anti-Affinity Rules8.4 Managing Taints and Tolerations8.5 Configuring Resource Limits and Requests8.6 Setting Namespace Quota8.7 Configuring LimitRange8.8 Configuring Pod PrioritiesLesson 8 Lab: Configuring TaintsLesson 8 Lab Solution: Configuring Taintshttps://www.oreilly.com/library/view/certified-kubernetes-administrator/9780135375129/RapidGatorhttps://rg.to/file/e480065494248eb312a8dba32935fc85/el3e2.7z.htmlTakeFilehttps://takefile.link/3o6tl6n9hlkh/el3e2.7z.htmlFileaxahttps://fileaxa.com/vjkx4czuyizx/el3e2.7zFikperhttps://fikper.com/BxKUSyer1x/el3e2.7z.html Link to comment Share on other sites More sharing options...
Recommended Posts
Please sign in to comment
You will be able to leave a comment after signing in
Sign In Now