-
This course replaces the trainings Kubernetes Foundations and Kubernetes Cluster Operations.
-
This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes.
-
Course Contents
-
- Course Introduction
- Containers
- Kubernetes Overview
- Beyond Kubernetes Basics
- Kubernetes Networking
- Stateful Applications in Kubernetes
- Additional Kubernetes Considerations
- Security
- Logging and Monitoring
- Cluster Operations
You will receive the original course documentation from VMware as an e-book.
-
Target Group
-
Anyone who is preparing to build and run Kubernetes clusters.
-
Knowledge Prerequisites
-
• Linux concepts and command line proficiency
• General networking proficiency
1 Course Introduction |
• Introductions and objectives |
2 Containers |
• What and Why containers |
• Building images |
• Running containers |
• Registry and image management |
3 Kubernetes Overview |
• Kubernetes project |
• Plugin interfaces |
• Building Kubernetes |
• Kubectl CLI |
4 Beyond Kubernetes Basics |
• Kubernetes objects |
• YAML |
• Pods, replicas, and deployments |
• Services |
• Deployment management |
• Rolling updates |
• Controlling deployments |
• Pod and container configurations |
5 Kubernetes Networking |
• Networking within a pod |
• Pod-to-Pod Networking |
• Services to Pods |
• ClusterIP, NodePort, and LoadBalancer |
• Ingress controllers |
• Service Discovery via DNS |
6 Stateful Applications in Kubernetes |
• Stateless versus Stateful |
• Volumes |
• Persistent volumes claims |
• StorageClasses |
• StatefulSets |
7 Additional Kubernetes Considerations |
• Dynamic configuration |
• ConfigMaps |
• Secrets |
• Jobs, CronJobs |
8 Security |
• Network policy |
• Applying a NetworkPolicy |
• SecurityContext |
• runAsUser/Group |
• Service accounts |
• Role-based access control |
9 Logging and Monitoring |
• Logging for various objects |
• Sidecar logging |
• Node logging |
• Audit logging |
• Monitoring architecture |
• Monitoring solutions |
• Octant |
• VMware vRealize® Operations Manager™ |
10 Cluster Operations |
• Onboarding new applications |
• Backups |
• Upgrading |
• Drain and cordon commands |
• Impact of an upgrade to running applications |
• Troubleshooting commands |
• VMware Tanzu™ portfolio overview |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.

-
This course replaces the trainings Kubernetes Foundations and Kubernetes Cluster Operations.
-
This four-day course is the first step in learning about Containers and Kubernetes Fundamentals and Cluster Operations. Through a series of lectures and lab exercises, the fundamental concepts of containers and Kubernetes are presented and put to practice by containerizing and deploying a two-tier application into Kubernetes.
-
Course Contents
-
- Course Introduction
- Containers
- Kubernetes Overview
- Beyond Kubernetes Basics
- Kubernetes Networking
- Stateful Applications in Kubernetes
- Additional Kubernetes Considerations
- Security
- Logging and Monitoring
- Cluster Operations
You will receive the original course documentation from VMware as an e-book.
-
Target Group
-
Anyone who is preparing to build and run Kubernetes clusters.
-
Knowledge Prerequisites
-
• Linux concepts and command line proficiency
• General networking proficiency
1 Course Introduction |
• Introductions and objectives |
2 Containers |
• What and Why containers |
• Building images |
• Running containers |
• Registry and image management |
3 Kubernetes Overview |
• Kubernetes project |
• Plugin interfaces |
• Building Kubernetes |
• Kubectl CLI |
4 Beyond Kubernetes Basics |
• Kubernetes objects |
• YAML |
• Pods, replicas, and deployments |
• Services |
• Deployment management |
• Rolling updates |
• Controlling deployments |
• Pod and container configurations |
5 Kubernetes Networking |
• Networking within a pod |
• Pod-to-Pod Networking |
• Services to Pods |
• ClusterIP, NodePort, and LoadBalancer |
• Ingress controllers |
• Service Discovery via DNS |
6 Stateful Applications in Kubernetes |
• Stateless versus Stateful |
• Volumes |
• Persistent volumes claims |
• StorageClasses |
• StatefulSets |
7 Additional Kubernetes Considerations |
• Dynamic configuration |
• ConfigMaps |
• Secrets |
• Jobs, CronJobs |
8 Security |
• Network policy |
• Applying a NetworkPolicy |
• SecurityContext |
• runAsUser/Group |
• Service accounts |
• Role-based access control |
9 Logging and Monitoring |
• Logging for various objects |
• Sidecar logging |
• Node logging |
• Audit logging |
• Monitoring architecture |
• Monitoring solutions |
• Octant |
• VMware vRealize® Operations Manager™ |
10 Cluster Operations |
• Onboarding new applications |
• Backups |
• Upgrading |
• Drain and cordon commands |
• Impact of an upgrade to running applications |
• Troubleshooting commands |
• VMware Tanzu™ portfolio overview |
-
Classroom training
- Do you prefer the classic training method? A course in one of our Training Centers, with a competent trainer and the direct exchange between all course participants? Then you should book one of our classroom training dates!
-
Hybrid training
- Hybrid training means that online participants can additionally attend a classroom course. The dynamics of a real seminar are maintained, and the online participants are able to benefit from that. Online participants of a hybrid course use a collaboration platform, such as WebEx Training Center or Saba Meeting. To do this, a PC with browser and Internet access is required, as well as a headset and ideally a Web cam. In the seminar room, we use specially developed and customized audio- and video-technologies. This makes sure that the communication between all persons involved works in a convenient and fault-free way.
-
Online training
- You wish to attend a course in online mode? We offer you online course dates for this course topic. To attend these seminars, you need to have a PC with Internet access (minimum data rate 1Mbps), a headset when working via VoIP and optionally a camera. For further information and technical recommendations, please refer to.
-
Tailor-made courses
-
You need a special course for your team? In addition to our standard offer, we will also support you in creating your customized courses, which precisely meet your individual demands. We will be glad to consult you and create an individual offer for you.
