Course Outline

Introduction

  • Linux Foundation Overview
  • Training Programs for Government
  • Certifications for Government Professionals
  • Digital Badges and Credentials
  • Laboratory Exercises, Solutions, and Resources for Government
  • E-Learning Course: LFS258 for Government
  • Distribution Details for Government Use
  • Practical Labs for Government Training

Basics of Kubernetes

  • Definition and Purpose of Kubernetes
  • Cluster Structure and Components
  • Adoption Trends in the Public Sector
  • Project Governance and Cloud Native Computing Foundation (CNCF)
  • Laboratory Exercises for Government

Installation and Configuration

  • Getting Started with Kubernetes for Government
  • Using Minikube for Development Environments
  • kubeadm for Production Clusters
  • Additional Installation Tools for Government Use
  • Laboratory Exercises for Government

Kubernetes Architecture

  • Overview of Kubernetes Architecture for Government
  • Networking and Connectivity Solutions
  • Integration with Other Cluster Systems for Government
  • Laboratory Exercises for Government

APIs and Access

  • API Access Management for Government
  • Annotations and Metadata for Government Use
  • Working with Simple Pods in a Government Context
  • kubectl Command Line Tool for Government Operations
  • Swagger and OpenAPI Standards for Government
  • Laboratory Exercises for Government

API Objects

  • Overview of API Objects for Government
  • The v1 Group in Kubernetes APIs for Government
  • API Resources and Management for Government
  • Role-Based Access Control (RBAC) APIs for Government
  • Laboratory Exercises for Government

Managing State With Deployments

  • Deployment Overview for Government
  • Managing Deployment States in a Government Context
  • Deployments and Replica Sets for Government Operations
  • DaemonSets for Government Use
  • Labels and Tagging Strategies for Government
  • Laboratory Exercises for Government

Volumes and Data

  • Volumes Overview for Government
  • Managing Volumes in a Government Environment
  • Persistent Volumes for Government Use
  • Rook Storage Solutions for Government
  • Passing Data to Pods in a Government Context
  • ConfigMaps for Government Operations
  • Laboratory Exercises for Government

Services

  • Overview of Services for Government
  • Accessing and Managing Services in a Government Environment
  • DNS Configuration for Government Use
  • Laboratory Exercises for Government

Ingress

  • Overview of Ingress for Government
  • Ingress Controller Setup for Government
  • Ingress Rules and Configuration for Government Use
  • Service Mesh for Enhanced Security in Government Environments
  • Laboratory Exercises for Government

Scheduling

  • Overview of Scheduling for Government
  • Scheduler Settings and Configuration for Government Use
  • Policies and Best Practices for Government Scheduling
  • Affinity Rules for Government Operations
  • Taints and Tolerations in a Government Context
  • Laboratory Exercises for Government

Logging and Troubleshooting

  • Overview of Logging and Troubleshooting for Government
  • Troubleshooting Flow for Government Use
  • Basic Start Sequence for Government Operations
  • Monitoring and Performance Metrics for Government
  • Plugins and Extensions for Enhanced Monitoring in Government
  • Logging Strategies for Government Environments
  • Troubleshooting Resources for Government Professionals
  • Laboratory Exercises for Government

Custom Resource Definition

  • Overview of Custom Resource Definitions for Government
  • Creating and Managing Custom Resource Definitions in a Government Context
  • Aggregated APIs for Enhanced Functionality in Government
  • Laboratory Exercises for Government

Helm

  • Overview of Helm for Government Use
  • Helm Package Manager for Kubernetes in a Government Context
  • Using Helm to Simplify Deployment and Management in Government
  • Laboratory Exercises for Government

Security

  • Overview of Security Best Practices for Government
  • Accessing the Kubernetes API in a Secure Government Environment
  • Authentication and Authorization Strategies for Government Use
  • Admission Controller for Enhanced Security in Government
  • Pod Policies for Government Operations
  • Network Policies for Secure Communication in Government
  • Laboratory Exercises for Government

High Availability

  • Overview of High Availability Solutions for Government
  • Stacked Database Configurations for Government Use
  • External Database Integration for Enhanced Reliability in Government
  • Laboratory Exercises for Government

CKA Exam Domain Review

Requirements

Participants should possess Linux administration skills and be comfortable using the command line. They must also be capable of editing files with a command-line text editor. **Audience:** This course is designed for individuals who wish to manage a containerized application infrastructure, including current IT administrators and those seeking to launch a career in cloud technology. **Experience Level:** Intermediate The content is tailored to support professional development and enhance technical capabilities for government and public sector workflows.
 28 Hours

Number of participants


Price per participant

Testimonials (2)

Upcoming Courses

Related Categories