Bookmarks

Bookmarks Bar

CKA

** kubectl Autocomplete
JSONPath Support
Kubernetes Release Notes
kubectl Cheat Sheet - Kubernetes
kubectl Usage Conventions

Installation

Overview of kubectl - Kubernetes
Installing kubeadm
Creating a cluster with kubeadm
kubeadm upgrade
Upgrading Master Nodes
Install and Set Up kubectl
kubectl config set-cluster
Encrypting Secret Data at Rest
TLS bootstrapping - Kubernetes
Network Addons
PKI Certificates and Requirements

Cluster Upgrades

Safely Drain a Node
Certificate Management with kubeadm
Upgrading kubeadm clusters
Upgrading Worker Nodes

Networking

** Installing a Network Add-On
Required Ports
Install Weave Net
Install Weave
Customizing DNS Service
DNS for Services and Pods
Debugging DNS Resolution

Ingress

** Ingress Example
Ingress
Ingress Controllers
Ingress | Minimal

LoadBalancer

Create an External Load Balancer - Kubernetes

NetworkPolicy

** Network Policy Resource
** NetworkPolicy resource | Full
** Brief Example in Use
Network Policies
Declare Network Policy
Configure Default Memory Requests and Limits for a Namespace
to and from selectors
Default deny all ingress traffic
Default allow all ingress traffic
Default deny all egress traffic
Default allow all egress traffic
Default deny all ingress and all egress traffic

Components

kubelet - Kubernetes

etcd

Backup etcd
Restore etcd
Operating etcd clusters for Kubernetes

Workloads

* DaemonSet
* StatefulSets
Create Static Pods
Labels and Selectors

Jobs

** CronJob Template
** Jobs Template
** Jobs - Parallel/Completions
** Jobs - Deadline/Backoff
Jobs - Run to Completion - Kubernetes
Jobs - Parallelism

Pods

** Pod templates
** Define Variables for a Container
** Commands and Arguments
** Resource Requests/Limits Example
** Configure a Pod to Use a ConfigMap
** envFrom Secret
** Init Containers Example
** Configure Service Accounts (scroll for example)
Configure Pod Initialization
NodeSelector- Assigning Pods to Nodes - Kubernetes
Configure Liveness and Readiness Probes - Kubernetes
Static Pods - Kubernetes
Horizontal Pod Autoscaler Walkthrough - Kubernetes
Create HPA
Pod Affinity
Termination message Pod Failure - Kubernetes
Taints and Tolerations
Managing Compute Resources for Containers
Init Containers

Multi-Container

Using a sidecar container with the logging agent
Communicate Between Containers in the Same Pod Using a Shared Volume
The Distributed System ToolKit: Patterns for Composite Containers - Kubernetes

Assigning Pods to Nodes - Kubernetes

Nodes

Taints and Tolerations - Kubernetes
Node Affinity/Anti-affinity
Resource Quotas

Deployments

** Creating a Deployment
Run a Stateless Application Using a Deployment
ReplicaSet
Deployments -Strategy
Deployments | Upgrade/Rollback

ConfigMaps

** Configure a Pod
** Create ConfigMap
ConfigMaps

Services

** Defining A Service
Services - Kubernetes
Exposing an External IP Address to Access an Application in a Cluster - Kubernetes
Use Port Forwarding to Access Applications in a Cluster - Kubernetes
Debug Services

Secrets

** Secrets Mount
** Secrets as Files
** Secrets as Env Vars
Environment variables -- Secrets
Distribute Credentials Securely

SecurityContext

** Configure a Security Context
Pod Security Policies
Pod Security Standards

DaemonSets

** DaemonSet
Perform a Rollback
Perform a Rolling Update
API Example

Persistent Volumes

** Persistent Volumes
** Persistent Volumes claims
** Create PVC - Simple
** Create PVC - hostPath
** Example Pod
** configMap
Storage Classes - Kubernetes
Volumes - Kubernetes
Limit Storage Consumption - Kubernetes
Deploying WordPress and MySQL with Persistent Volumes
emptyDir
Expanding Persistent Volumes Claims
Reclaiming Persistent Volumes
Storage Class Provisioners

Scheduling

* Taints and Tolerations
* Assigning Pods to Nodes
* Node Affinity
Managing Resources for Containers
* Create static Pods
Configure Multiple Schedulers
* Multiple Schedulers | Leader Election
* Specify Scheduler for Pod

Security

Authentication Strategies
Configure Access to Multiple Clusters | kubeconfig
Kubectl config
Using Node Authorization
Using RBAC Authorization
Using ABAC Authorization
Webhook Mode
Image Pull Secrets
Secrets | Docker
Security Context | Capabilities
11 Ways (Not) to Get Hacked
SA Pull Secrets
Pull an Image from a Private Registry

Certificates

Manage TLS Certificates
Create CertificateSigningRequest
Certificate Signing Requests
Certificates - ca-config, ca-csr
Certificate Signing Request Resource
Certificate Signing Requests | Normal User
Certificate Rotation - Kubernetes

RBAC

Authorization Overview
** Create Role
** Create ClusterRole
** Create RoleBinding
** Create ClusterRoleBinding
** Checking API Access (can-i)
** Role and ClusterRole
** RoleBinding and ClusterRoleBinding

Troubleshooting

Debug Pods and ReplicationControllers
Debug Pods
Debug ReplicationControllers
Debug Services
Determine the Reason for Pod Failure
Troubleshooting kubeadm
Troubleshoot Clusters
A general overview of cluster failure modes
Monitoring, Logging, and Debugging
Command line tools reference