Architecting with Google Kubernetes Engine: Production
- 4.7
Course Summary
Learn how to deploy and secure Kubernetes containers in production with this comprehensive course. Gain practical experience through hands-on labs and projects.Key Learning Points
- Understand Kubernetes architecture and components
- Learn best practices for container security in production
- Deploy and manage Kubernetes clusters in production environments
Related Topics for further study
Learning Outcomes
- Deploy and manage Kubernetes clusters in production environments
- Implement best practices for container security
- Understand Kubernetes architecture and components
Prerequisites or good to have knowledge before taking this course
- Basic knowledge of Linux command line
- Familiarity with cloud infrastructure and virtualization concepts
Course Difficulty Level
IntermediateCourse Format
- Online
- Self-paced
- Hands-on labs
- Projects
Similar Courses
- Kubernetes Fundamentals
- Docker and Kubernetes: The Big Picture
Related Education Paths
- Google Cloud Platform Fundamentals: Core Infrastructure
- AWS Certified DevOps Engineer – Professional
- Microsoft Certified: Azure DevOps Engineer Expert
Notable People in This Field
- Kelsey Hightower
- Bridget Kromhout
Related Books
Description
In this course, "Architecting with Google Kubernetes Engine: Production," you'll learn about Kubernetes and Google Kubernetes Engine (GKE) security; logging and monitoring; and using Google Cloud managed storage and database services from within GKE.
Knowledge
- Define Identity and Access Management roles for GKE, as well as Kubernetes pods security policies
- Understand how logging is implemented and Kubernetes, and how GKE extends that basic functionality using Google Cloud's operations suite
- Use Google Cloud Managed Storage Services with GKE
- Use CI/CD with GKE
Outline
- Course Introduction
- Course introduction
- Getting Started with Google Cloud Platform and Qwiklabs
- Welcome and Getting Started Guide!
- How to Send Feedback
- Access Control and Security in Kubernetes and Google Kubernetes Engine (GKE)
- Introduction
- Authentication and authorization
- Cloud IAM
- Types of IAM roles
- Kubernetes RBAC
- Attaching roles
- Kubernetes Control Plane Security
- Pod Security
- Applying pod security policies
- Lab Intro
- Lab Intro
- Summary
- Documentation on protecting cluster metadata
- Authentication and authorization
- Cloud IAM
- Kubernetes RBAC
- Kubernetes control plane security
- Pod Security
- Access Control and Security in Kubernetes and GKE
- Google Kubernetes Engine (GKE) Logging and Monitoring
- Introduction
- Google Cloud's Operations Suite
- Logging basics
- Logging with Kubernetes
- Monitoring
- Lab Intro
- Probes
- Lab Intro
- Summary
- Google Cloud's Operations Suite
- Logging
- Monitoring
- GKE Logging and Monitoring
- Using Google Cloud Managed Storage Services with Google Kubernetes Engine (GKE)
- Introduction
- Using Google Cloud Services
- Using APIs
- Using Cloud Storage
- Using Google Cloud Databases
- Bigtable
- Firestore
- Cloud SQL
- Cloud Spanner
- Bigquery
- Lab Intro
- Decision Tree
- Summary
- Google Cloud Services
- Cloud Storage
- Google Cloud Databases
- Using Google Cloud Managed Storage Services with GKE
- Using CI/CD with Google Kubernetes Engine (GKE)
- Introduction
- CI/CD Pipeline Overview
- CI/CD Spectrum
- Examples of CI/CD Tools
- Lab Intro
- Lab Solution
- Example Pipelines
- Example CI/CD architectures
- Summary
- Production Course Resources
- Additional Resources
Summary of User Reviews
This course on Deploying Secure Kubernetes Containers in Production has received positive reviews overall. Users have found the course content to be practical and applicable to real-world scenarios.Key Aspect Users Liked About This Course
The course provides hands-on experience with deploying secure containers in a production environment.Pros from User Reviews
- Practical and applicable content
- Hands-on experience with real-world scenarios
- Expert instructors with in-depth knowledge
- Great course for beginners and intermediate learners
Cons from User Reviews
- Course material can be dense and difficult to follow
- Some users find the course to be too basic
- Not enough emphasis on security best practices
- Course can be time-consuming for those with busy schedules