OVERVIEW:-
Two billion containers a week means that for every second of every minute of every hour of every day, Google is firing up on average some 3,300 containers. It’s probably started over 40,000 since you began reading this. Datacenter now a days using containers (CAAS) to deploy there microservice applications, due to the light weight features of container, which help organisation to deploy, manage and update the application life cycle management easily. Using Containers Data Centres can achive HA, Load Balancing features on top of VM, Cloud / BareMatel.
Description:
CCA: Certified Container Administrator (CCA) is a certification exam provided by Linux Academy Australia (LAA). It is based on containerization technology. It is one of a kind exam that is technology based rather than product based. This course will cover container management tools like docker, podman, and buildah.
CKA: This course prepares you for the Certified Kubernetes Administrator (CKA) exam by the Cloud Native Computing Foundation. You will learn how all of the components of a Kubernetes cluster work together, how to monitor all components of a cluster, and how to build your Kubernetes cluster from scratch. We will also cover networking, deploying applications, scheduling pods, logging, and a whole lot of practice in the command line.
Exam Included:
-
LX102 by Linux Academy Australia is included in the fees.
- CKA exam needs to be purchased later.
Prerequisite:
Must be RHCSA Certified or have equivalent Linux knowledge.
Container Management and Orchestration
- Concept of the container.
- Docker Architecture.
- Docker installation on a Linux machine.
- Create, manage, and remove containers from Docker.
- Pull, manage, and remove OCI images from Docker.
- Deploying Multi-tier applications on Docker.
- Exposing the application inside a container to the outside world.
- Describe the Docker network.
- How to create an OCI image using Dockerfile.
- Use of volumes with Docker for persistent volume.
- Attaching a volume to the container in Docker.
- Saving an OCI image as a tarball.
- Docker Compose.
- Public and private registries in Docker.
- Create a private registry in Docker.
- Adding OCI images to the private registry
- What is Podman.
- What is daemon-less service.
- Difference between docker vs Podman vs Buildah.
- Podman Architecture.
- Podman installation on a Linux machine.
- Create, manage, and remove containers from Podman.
- Create, manage, and remove images from Podman.
- Running a container inside a pod.
- Running a container using a normal user.
- Deploying Multi-tier applications on Podman.
- Exposing the application inside a container to the outside world.
- Podman Network.
- How to create OCI image using Dockerfile or Containerfile.
- The use of volumes with Podman for persistent volume.
- Attaching a volume to the container in Podman.
- Saving an OCI image as a tarball.
- Extract the OCI image from a tarball.
- What is OCI.
- Buildah installation on a Linux machine.
- Container Concept in Buildah.
- Creating an OCI image using Dockerfile / Container file.
- Building an image from Scratch using Buildah.
- Creating a private registry.
- Adding OCI images to the private registry.
- Use cases of Buildah.
- What is Containerd.
- Containerd installation on a Linux machine.
- Managing images using containerd.
- Create, manage, and remove containers from containerd.
- Use cases of Containerd.
- ETCD
- Kube-API Server
- Controller Manager
- Scheduler
- Kubelet
- Kube proxy
- PODs
- ReplicaSets
- Deployments
- Services, Service Cluster IP
- Manual Scheduling
- Labels and Selectors
- Resource Requirements and Limits
- DeamonSets
- Static Pods
- Multiple Scheduler
- Monitor Cluster Components
- Managing Application Logs
- Rolling Updates and Rollbacks
- Configure Applications
- Commands and Arguments
- Configure Environmental variables n applications
- Configuring ConfigMaps in Applications
- Scale Applications
- Multi-container PODs
- Multi-container PODs Design Patterns
- InitContainers
- Self Healing Applications
- OS Upgrades
- Kubernetes Software versions
- Cluster Upgrade Process
- Backup and Restore Methods
- Kubernetes Security Primitives
- Authentication
- TLS
- Certificates API
- Kubeconfig
- Persistent key/value store
- API Groups
- Role-Based Access Controls
- Cluster Roles and Role Bindings
- Image Security
- Network Policy
- Volumes
- Persistent Volumes
- Persistent Volume Claims
- Application Configuration
- Switching and Routing
- DNS
- CoreDNS
- Network Namespaces
- Docker Networking
- CNI
- Cluster Networking
- CNI in Kubernetes
- CNI in weave
- IP Address Management – weave
- Service Networking
- DNS in Kubernetes
- CoreDNS in Kubernetes
- Ingress
- Application failure
- Control Panel Failure
- Worker Node Failure
- Networking Failure
Training Partners
95 percent Of students say they are better prepared to maximize the value of Red Hat products after training
They laugh at me because I am different, I laugh at them because they are all the same
The person with the certification is
the one that is going to get hired.
– Robert Blanchard, Director of Support Services
Aspen Skiing Services Co.
mation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” min_height=”” hover_type=”none” link=”” first=”true”]