Learn Kubernetes: From 0 to 100

We have been helping organizations learn and deploy Kubernetes for a few years now. Over that time we have generated a lot content and we recently pulled it all together into an easy to consume e-book series

Understanding Kubernetes: What, Why, and When to Adopt

If you asked the typical developer or IT engineer to make a list of the most transformative technologies to emerge over the past decade, Kubernetes would almost certainly feature prominently on it. By making it practical to deploy containerized applications at scale, Kubernetes not only allows organizations to take fuller advantage of containers and the cloud, but also to build more flexible and scalable software delivery processes.

After reading this eBook, one of a series, you will understand:

  • Where Kubernetes fits within the modern IT landscape
  • Kubernetes and the Cloud-native transformation
  • Kubernetes architecture, core concepts, and Kubernetes deployment options
  • Top use cases for Kubernetes
  • And more

Action Plan for Architecting Kubernetes Deployments

Architecting a Kubernetes deployment is no mean feat – even for experienced IT architects. The main reason is that, compared to most other types of IT platforms, Kubernetes is simply more complex.

After reading this eBook, one of a series, you will understand:

  • The chief architectural concepts in Kubernetes
  • How to distinguish the pros and cons of running Kubernetes on premises, in the cloud or on bare metal
  • How the key parts of the Kubernetes platform architecture-such as services, service meshes and runtimes fit together and interact with one another

Kubernetes Operations: Everything You Need to Know

If planning a Kubernetes installation is a challenge, operating Kubernetes once it is up and running is more difficult still. That is due in no small part to the fact that Kubernetes is not just one tool, but a collection of a dozen-odd components that provide functionality ranging from application deployments and upgrades, to logging and monitoring, to persistent data storage.

After reading this eBook, one of a series, you will understand:

  • All stages of the key areas of functionality that teams typically must cover when operating Kubernetes
  • Overview of the tools
  • Best practices that Kubernetes administrators should follow when working with the various aspects of Kubernetes

Best Practices for Scaling Kubernetes

Kubernetes is designed to be a highly scalable system, out-of-the-box. It does an excellent job of automatically scaling workloads, allocating resources, balancing application demand and so on.

This does not mean, however, that Kubernetes is a set-it-and-forget-it platform. There are a variety of extra steps that admin teams should take to make sure that Kubernetes performs optimally, especially at scale.

After reading this eBook, one of a series, you will understand:

  • How to manage cluster and application performance at scale
  • How to manage networking challenges in large scale Kubernetes environments
  • How to manage Kubernetes configurations and how to monitor Kubernetes environments at scale

Navigating Kubernetes Security

Security is perhaps the most complex dimension of Kubernetes – which is saying a lot, because Kubernetes as a whole is quite complex.

Security in Kubernetes is complex not only because there are so many types of threats to consider and layers to secure, but also because Kubernetes has an especially complicated security model. Kubernetes includes some built-in security features, but they address only certain categories of risk. As a result, Kubernetes administrators must deploy additional tools to manage some of the potential vulnerabilities in a Kubernetes environment, such as those associated with container images and registries.

After reading this eBook, one of a series, you will understand:

  • Kubernetes Security: What (and What Not) to expect out-of-the-box
  • Kubernetes secrets management
  • How to use let’s Encrypt with Route 53 to secure Kubernetes
  • Kubernetes container registry and image scanning