KUBERNETES ADMINISTRATION WITH HELM Training in Lynchburg

Enroll in or hire us to teach our KUBERNETES ADMINISTRATION WITH HELM class in Lynchburg, Virginia by calling us @303.377.6176. Like all HSG classes, KUBERNETES ADMINISTRATION WITH HELM may be offered either onsite or via instructor led virtual training. Consider looking at our public training schedule to see if it is scheduled: Public Training Classes
Provided there are enough attendees, KUBERNETES ADMINISTRATION WITH HELM may be taught at one of our local training facilities.
We offer private customized training for groups of 3 or more attendees.

Course Description

 
Kubernetes is an open-source system for automating deployment, scaling, and management of containerized applications. This course introduces participants to the basic concepts and architecture of Kubernetes, its initial install & setup, Kubernetes Pods, Deployments and Services, Persistent Storage, Networking, Automating Deployment, Scaling & Management Of Containerized Applications, the Kubernetes Helm Package Manager, and finally, it's logging and monitoring facilities. This course doesnâ??t only prepare delegates for the daily administration of Docker & Kubernetes systems but also for the official Certified Kubernetes Administrator (CKA) exam of the Cloud Native Computing Foundation (CNCF).
Course Length: 4 Days
Course Tuition: $2490 (US)

Prerequisites

Proficiency with the Linux CLI. A broad understanding of Linux system administration. Basic knowledge of Linux containers, e.g. Docker.

Course Outline

 
  1. INTRODUCTION
    1. Cloud computing in general
    2. Cloud types
    3. Cloud native computing
    4. Application containers
    5. Containers on Linux
    6. Container runtime
    7. Container orchestration
    8. Kubernetes
    9. Kubernetes concepts, objects categories, and architecture
    10. Kubernetes master and node
    LAB 1
  2. INSTALLING KUBERNETES
    1. Picking the right solution
    2. One node Kubernetes install
    3. Kubernetes universal installer
    4. Install using kubeadm on CentOS
    5. Kubernetes Networking
    LAB 2
  3. ACCESSING KUBERNETES
    1. Accessing the Kubernetes cluster
    2. Controlling access to the API
    3. Authorization
    4. Role Based Access Control
    5. Roles and ClusterRoles
    6. Role bindings
    LAB 3
  4. KUBERNETES WORKLOADS
    1. The pod
    2. Restart Policy examples
    3. InitContainers
    4. Our first Pod
    5. Operations on pods
    6. Replication Controller
    7. Working with Replication Controller
    8. Deployments
    9. Working with Deployments
    10. Jobs, CronJobs
    11. Jobs example
    12. CronJobs example
    13. DaemonSets
    LAB 4
  5. SCHEDULING AND NODE MANAGEMENT
    1. The Kubernetes Scheduler
    2. Assigning Pods to Nodes
    3. Assigning Pods to Nodes – node affinities
    4. Assigning Pods to Nodes – Pod affinities
    5. Taints and tolerations
    6. Managing nodes
    LAB 5
  6. ACCESSING THE APPLICATIONS
    1. Services
    2. Service types
    3. Working with Services
    4. Ingress
    5. Ingress definition
    6. Network Policies
    7. Network Policy example
    LAB 6
  7. PERSISTENT STORAGE IN KUBERNETES
    1. Volumes
    2. Volume types
    3. Persistent Volumes
    4. Secrets
    5. Using Secrets as environmental variables
    6. Using Secrets as volumes
    7. ConfigMaps
    LAB 7
  8. LOGGING, MONITORING AND TROUBLESHOOTING
    1. Logging architecture
    2. Monitoring
    3. Troubleshooting
  9. INTRODUCTION TO HELM PACKAGE MANAGER
    1. Its Purpose
    2. Main Helm Concepts
    3. Helm Components
    4. Helm Implementation
  10. INSTALLING HELM AND TILLER
    1. Installing Helm client
    2. Installing Tiller, the Server Side of Helm
    3. Upgrading Tiller
    4. Deleting or Reinstalling Tiller
  11. USING HELM
    1. Helm Search: Finding Charts
    2. Helm Install: Installing A Package
    3. Helm Upgrade and Helm Rollback: Upgrading A Release, And Recovering on Failure
    4. Helm Delete: Deleting a Release
    5. Helm Repo: Working with Repositories
    6. Creating Your Own Charts
    7. Tiller, Namespaces and RBAC
  12. HELM CHARTS
    1. Intro to Charts
    2. Chart Lifecycle Hooks
    3. Charts Tips and Tricks
    4. Charts Repository Guides
    5. Syncing your Chart Repo
    6. Signing Charts
    7. Chart Tests
  13. CHART TEMPLATES
    1. Getting started
    2. Built-in Objects
    3. Values Files
    4. Template Functions and Pipelines
    5. Flow Control
    6. Variables
    7. Named Templates
    8. Accessing Files Inside Templates
    9. Creating a NOTES.txt file
    10. Sub charts and Global Values
    11. Debugging Templates
  14. HELM PLUGINS
    1. Overview
    2. Installing a Plugin
    3. Building Plugins
    4. Downloader Plugins
    5. Environment Variables
  15. HELM SECURITY
    1. Role-based Access Control (RBAC) Intro
    2. Tiller and Role-Based Access Control
    3. Helm and Role-Based Access Control
    4. Using SSL Between Helm and Tiller: Overview/li>
    5. Generating Certificate Authorities and Certificates
    6. Creating a Custom Tiller Installation
    7. Configuring the Helm Client
    8. Best Practices for Securing Helm and Tiller

Course Directory [training on all levels]

Upcoming Classes
Gain insight and ideas from students with different perspectives and experiences.

Linux Unix Uses & Stats

Linux Unix is Used For:
Desktop Mainframe Computers Mobile Devices Embedded Devices
Difficulty
Popularity
Year Created
1991/1971
Pros
Performance:
Linux supports many efficient tools and operates them seamlessly. Because it's architecture is lightweight it runs faster than both Windows 8.1 and 10. 
 
Security:
Because Linux is an open-source software,  anyone can contribute code to help enhance the users’ experience i.e., adding features, fixing bugs, reducing security risks, and more.
 
 
Software Development:
The terminal in Linux is a *wild card*. You can do almost anything with it. This includes software installation, application and server configurations, file system management, and etc.
 
Large-scale:
Open-source projects benefit from having an attentive community. As a result, Linux is more secure than Windows. Instead of installing anti viruses to clean malware, you just have to stick to the recommended repositories. 
 
Efficient: 
Developers have the convenience of running servers, training machine learning models, accessing remote machines, and compiling and running scripts from the same terminal window. 
 
Free: 
Linux is free (you can put it on as many systems as you like) and you can change it to suit your needs.
Cons
Learning Curve: 
Linux is not for everyone, there is a learning curve in switching to Ubuntu. To actually learn Linux efficiently would take a user one to several years.
 
No Tech Support:
Unlike Windows, there isn’t a dedicated tech support, so getting help for things is up to you. 
 
Designer Compatabilty:
Linux is not as user friendly as Windows or as ‘straight out of the box design’ As an example for design choices, Adobe hasn’t released any of its products to Linux users. So it’s impossible to run them directly. The Ubuntu alternative is a free software called GIMP. 
 
Gaming Capabilities: 
Most games aren’t available in Linux. But that’s not to say you can’t make it happen, it's just not as easy.   
Linux Unix Job Market
Average Salary
$85k-$105k
Job Count
n/a
Top Job Locations

New York City
Boston
San Francisco 

Complimentary Skills to have along with Linux Unix
The following are types of jobs that may require Linux skills.  The top 15 job titles on Dice.com that mention Linux in their postings are:
- DevOps Engineer
- Software Engineer
- Java Developer
- Systems Engineer
- Systems Administrator
- Senior Software Engineer
- Network Engineer
- Python Developer
- Linux Systems Administrator
- Software Developer
- System Administrator
- Linux Administrator
- Linux Engineer
- Senior Java Developer
- C++ Developer

Interesting Reads Take a class with us and receive a book of your choosing for 50% off MSRP.