Schweitzer Fachinformationen
Wenn es um professionelles Wissen geht, ist Schweitzer Fachinformationen wegweisend. Kunden aus Recht und Beratung sowie Unternehmen, öffentliche Verwaltungen und Bibliotheken erhalten komplette Lösungen zum Beschaffen, Verwalten und Nutzen von digitalen und gedruckten Medien.
The Kubernetes landscape is constantly evolving, making it crucial to stay updated on the latest best practices and technologies. Using a structured approach and practical applications, this comprehensive study companion is designed to help individuals prepare for the Certified Kubernetes Administrator (CKA) exam.
You'll start by reviewing a range of essential topics that serve as prerequisites for certification, such as what Kubernetes is, its architecture, and key components like the Control Plane, ApiServer, and ETCD. The book then addresses workloads and scheduling, providing insights into pods, deployments, and various resource management techniques. Additionally, you'll explore storage management in Kubernetes, detailing persistent volumes, access modes, and storage classes. Networking topics, including pod connectivity, CoreDNS, and network policies are covered as well.
Throughout the book, troubleshooting techniques are emphasized, focusing on monitoring cluster components and application performance. Most importantly, the book offers guidance on exam preparation, including patterns, prerequisites, and last-minute tips, along with sample questions to aid your study process. Whether you're new to Kubernetes or actively studying for the CKA certification, this book will serve as your essential resource.
What You Will Learn
Who This Book Is For
College students, recent graduates, IT professionals in the Cloud/DevOps domain, individuals transitioning into Cloud/DevOps roles, Kubernetes administrators, and DevOps engineers.
Piyush Sachdeva is a Technical Solutions Developer at Google in Canada and has over 12 years of experience as an IT professional specializing in Cloud and DevOps. He is a 4th-year AWS Community Builder, a 2024 HashiCorp Ambassador, and the founder of The CloudOps Community. Piyush also runs the YouTube channel "Tech Tutorials With Piyush" and holds 18+ Cloud and DevOps certifications.
PART I: Kubernetes Fundamentals.- Chapter 1: Introduction to Kubernetes.- Chapter 2: Kubernetes Architecture.- Chapter 3: Kubernetes Installation.- PART II: Workloads and Scheduling.- Chapter 4: Pods in Kubernetes.- Chapter 5: ReplicaSets, Replication Controller, and Deployments.- Chapter 6: Services in Kubernetes.- Chapter 7: NameSpaces.- Chapter 8: Daemonset, Cronjob, and job.- Chapter 9: Static Pods and Scheduling.- Chapter 10: Autoscaling in Kubernetes.- Chapter 11: Manifest Management tools.- Chapter 12: Authorization and Authentication.- Chapter 13: Network Policies.- PART III: Storage.- Chapter 14: Kubernetes Installation using KubeAdm.- Chapter 15: Storage in Kubernetes.- PART IV: Services and Networking.- Chapter 16: Kubernetes Networking.- Chapter 17: Operators and Custom Resources.- PART V: Cluster Architecture, Installation, and Configuration.- Chapter 18: Cluster Maintenance.- Chapter 19: Kubernetes version upgrade using kubeadm.- PART VI: Troubleshooting.- Chapter 20: Monitoring, Logging, and Alerting.- Chapter 21: Troubleshooting Application Failure.- Chapter 22: Troubleshooting Control Plane Failure.- Chapter 23: JSONPath.- Appendix: Tips and Tricks.- Sample Questions.
Dateiformat: PDFKopierschutz: Wasserzeichen-DRM (Digital Rights Management)
Systemvoraussetzungen:
Das Dateiformat PDF zeigt auf jeder Hardware eine Buchseite stets identisch an. Daher ist eine PDF auch für ein komplexes Layout geeignet, wie es bei Lehr- und Fachbüchern verwendet wird (Bilder, Tabellen, Spalten, Fußnoten). Bei kleinen Displays von E-Readern oder Smartphones sind PDF leider eher nervig, weil zu viel Scrollen notwendig ist. Mit Wasserzeichen-DRM wird hier ein „weicher” Kopierschutz verwendet. Daher ist technisch zwar alles möglich – sogar eine unzulässige Weitergabe. Aber an sichtbaren und unsichtbaren Stellen wird der Käufer des E-Books als Wasserzeichen hinterlegt, sodass im Falle eines Missbrauchs die Spur zurückverfolgt werden kann.
Weitere Informationen finden Sie in unserer E-Book Hilfe.