Before plunging into how Kubernetes works, this course introduces you to the world of container orchestration and describes the recent changes in application development. You'll understand problems that Kubernetes solves and get to grips with using Kubernetes resources to deploy applications. In addition to this, you'll learn to apply the security model of Kubernetes clusters.
Kubernetes Design Patterns and Extensions describes how services running in Kubernetes can leverage the platform's security features. Once you've grasped all this, you'll explore how to troubleshoot Kubernetes clusters and debug Kubernetes applications. You also discover how to analyze the networking model and its alternatives in Kubernetes and apply best practices with design patterns.
By the end of this course, you'll have studied all about using the power of Kubernetes for managing your containers.
About the Authors
Onur Yilmaz is a software engineer in a multinational enterprise software company. He is a Certified Kubernetes Administrator (CKA) and works on Kubernetes and cloud management systems. He has been developing software systems since he was 11 years old. He is a keen supporter of cutting-edge technologies, such as Docker, Kubernetes, and cloud-native applications. He has one master's and two bachelor's degrees in engineering and is pursuing a doctorate degree.
Stefan Krist has over 15 years of experience in various field on Information and Technology. He has a degree in Computer Networking from University of Germany. He is specialized in Linux and DevOps Automation. He also has hosted IT conferences and has given many speeches in Linux User groups and various meetups. Previously he has worked with Packt and developed a course on DevOps with Docker.