The Kubernetes Book [Sept 2020 ed.]

Every page, and every example, updated to the latest versions of Kubernetes and the latest trends in the cloud-native ec

2,437 362 5MB

English Pages 182 Year 2020

Report DMCA / Copyright

DOWNLOAD FILE

The Kubernetes Book [Sept 2020 ed.]

Table of contents :
Table of Contents
0: About the book
Paperback editions
Audio book
eBook and Kindle editions
Feedback
Why should anyone read this book or care about Kubernetes?
Should I buy the book if I've already watched your video training courses?
Updates to the book
The book's GitHub repo
Versions of the book
1: Kubernetes primer
Kubernetes background
Where did Kubernetes come from
The operating system of the cloud
Chapter summary
2: Kubernetes principles of operation
Kubernetes from 40K feet
Masters and nodes
Kubernetes DNS
Packaging apps for Kubernetes
The declarative model and desired state
Pods
Deployments
Services and network stable networking
Chapter summary
3: Installing Kubernetes
Kubernetes playgrounds
Hosted Kubernetes
DIY Kubernetes clusters
Installing Kubernetes
Play with Kubernetes
Docker Desktop
Google Kubernetes Engine (GKE)
Other installation methods
kubectl
Chapter summary
4: Working with Pods
Pod theory
Hands-on with Pods
Chapter Summary
5: Kubernetes Deployments
Deployment theory
How to create a Deployment
Performing a rolling update
How to perform a rollback
Chapter summary
6: Kubernetes Services
Setting the scene
Theory
Hands-on with Services
Real world example
Chapter Summary
7: Service discovery
Quick background
Service registration
Service discovery
Service discovery and Namespaces
Troubleshooting service discovery
Summary
8: Kubernetes storage
The big picture
Storage Providers
The Container Storage Interface (CSI)
The Kubernetes persistent volume subsystem
Storage Classes and Dynamic Provisioning
Demo
Chapter Summary
9: ConfigMaps
The big picture
ConfigMap theory
Hands-on with ConfigMaps
Chapter Summary
10: StatefulSets
The theory of StatefulSets
Hands-on with StatefulSets
Chapter Summary
11: Threat modeling Kubernetes
Threat model
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of privilege
Pod Security Policies
Towards more secure Kubernetes
Chapter summary
12: Real-world Kubernetes security
CI/CD pipeline
Infrastructure and networking
Identity and access management (IAM)
Auditing and security monitoring
Real world example
Chapter summary
Glossary
What next
Practice makes perfect
More books
Video training
Events and meetups
Feedback

Polecaj historie