The Kubernetes Book

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Every page, and every example, updated to the latest versions of Kubernetes and the latest trends in the cloud-native ecosystem. Containers have revolutionized the way build, share and run applications. But like all good things, they come with their own set of challenges. This is where Kubernetes enters the scene. Kubernetes helps you deploy and manage containerized applications at scale. It abstracts the underlying infrastructure so that you don't need to care whether you're deploying your applications to Amazon Web Services, Microsoft Azure, or your own on-premises datacenter. With Kubernetes, you can develop your applications on your laptop, deploy to your chosen cloud platform, migrate to a different cloud platform, and even migrate to your private cloud at your on-premises datacenter. The Kubernetes Book starts from the beginning and covers everything you need to know to be proficient with Kubernetes. It even includes two chapters dedicated to threat-modeling Kubernetes and real-world security. You'll learn: - Kubernetes architecture - How to build Kubernetes - How to deploy and manage applications on Kubernetes - How to secure Kubernetes - The meaning of terms such as; cloud-native, microservices, desired state, containerized, and more... Finally, Kubernetes and cloud technologies are developing fast! That's why this book will be updated at least once per year, meaning it's always up-to-date with the latest versions of Kubernetes and the latest trends in the cloud-native ecosystem.

Author(s): Nigel Poulton
Edition: Sept 2020
Year: 2020

Language: English
Pages: 182

Table of Contents
0: About the book
Paperback editions
Audio book
eBook and Kindle editions
Feedback
Why should anyone read this book or care about Kubernetes?
Should I buy the book if I've already watched your video training courses?
Updates to the book
The book's GitHub repo
Versions of the book
1: Kubernetes primer
Kubernetes background
Where did Kubernetes come from
The operating system of the cloud
Chapter summary
2: Kubernetes principles of operation
Kubernetes from 40K feet
Masters and nodes
Kubernetes DNS
Packaging apps for Kubernetes
The declarative model and desired state
Pods
Deployments
Services and network stable networking
Chapter summary
3: Installing Kubernetes
Kubernetes playgrounds
Hosted Kubernetes
DIY Kubernetes clusters
Installing Kubernetes
Play with Kubernetes
Docker Desktop
Google Kubernetes Engine (GKE)
Other installation methods
kubectl
Chapter summary
4: Working with Pods
Pod theory
Hands-on with Pods
Chapter Summary
5: Kubernetes Deployments
Deployment theory
How to create a Deployment
Performing a rolling update
How to perform a rollback
Chapter summary
6: Kubernetes Services
Setting the scene
Theory
Hands-on with Services
Real world example
Chapter Summary
7: Service discovery
Quick background
Service registration
Service discovery
Service discovery and Namespaces
Troubleshooting service discovery
Summary
8: Kubernetes storage
The big picture
Storage Providers
The Container Storage Interface (CSI)
The Kubernetes persistent volume subsystem
Storage Classes and Dynamic Provisioning
Demo
Chapter Summary
9: ConfigMaps
The big picture
ConfigMap theory
Hands-on with ConfigMaps
Chapter Summary
10: StatefulSets
The theory of StatefulSets
Hands-on with StatefulSets
Chapter Summary
11: Threat modeling Kubernetes
Threat model
Spoofing
Tampering
Repudiation
Information Disclosure
Denial of Service
Elevation of privilege
Pod Security Policies
Towards more secure Kubernetes
Chapter summary
12: Real-world Kubernetes security
CI/CD pipeline
Infrastructure and networking
Identity and access management (IAM)
Auditing and security monitoring
Real world example
Chapter summary
Glossary
What next
Practice makes perfect
More books
Video training
Events and meetups
Feedback