Project Description

OVERVIEW:-

Two billion containers a week means that for every second of every minute of every hour of every day, Google is firing up on average some 3,300 containers. It’s probably started over 40,000 since you began reading this. Datacenter now a days using containers (CAAS) to deploy there microservice applications, due to the light weight features of container, which help organisation to deploy, manage and update the application life cycle management easily. Using Containers Data Centres can achive HA, Load Balancing features on top of VM, Cloud / BareMatel.

Description:

CCA: Certified Container Administrator (CCA) is a certification exam provided by Linux Academy Australia (LAA). It is based on containerization technology. It is one of a kind exam that is technology based rather than product based. This course will cover container management tools like docker, podman, and buildah. 

CKA: This course prepares you for the Certified Kubernetes Administrator (CKA) exam by the Cloud Native Computing Foundation. You will learn how all of the components of a Kubernetes cluster work together, how to monitor all components of a cluster, and how to build your Kubernetes cluster from scratch. We will also cover networking, deploying applications, scheduling pods, logging, and a whole lot of practice in the command line. 

Exam Included:

Prerequisite:

Must be RHCSA Certified or have equivalent Linux knowledge.

Container Management and Orchestration

Docker
  • Concept of the container.
  • Docker Architecture.
  • Docker installation on a Linux machine.
  • Create, manage, and remove containers from Docker.
  • Pull, manage, and remove OCI images from Docker.
  • Deploying Multi-tier applications on Docker.
  • Exposing the application inside a container to the outside world.
  • Describe the Docker network.
  • How to create an OCI image using Dockerfile.
  • Use of volumes with Docker for persistent volume.
  • Attaching a volume to the container in Docker.
  • Saving an OCI image as a tarball.
  • Docker Compose.
  • Public and private registries in Docker.
  • Create a private registry in Docker.
  • Adding OCI images to the private registry
Podman
  • What is Podman.
  • What is daemon-less service.
  • Difference between docker vs Podman vs Buildah.
  • Podman Architecture.
  • Podman installation on a Linux machine.
  • Create, manage, and remove containers from Podman.
  • Create, manage, and remove images from Podman.
  • Running a container inside a pod.
  • Running a container using a normal user.
  • Deploying Multi-tier applications on Podman.
  • Exposing the application inside a container to the outside world.
  • Podman Network.
  • How to create OCI image using Dockerfile or Containerfile.
  • The use of volumes with Podman for persistent volume.
  • Attaching a volume to the container in Podman.
  • Saving an OCI image as a tarball.
  • Extract the OCI image from a tarball.
Buildah
  • What is OCI.
  • Buildah installation on a Linux machine.
  • Container Concept in Buildah.
  • Creating an OCI image using Dockerfile / Container file.
  • Building an image from Scratch using Buildah.
  • Creating a private registry.
  • Adding OCI images to the private registry.
  • Use cases of Buildah.
Containerd
  • What is Containerd.
  • Containerd installation on a Linux machine.
  • Managing images using containerd.
  • Create, manage, and remove containers from containerd.
  • Use cases of Containerd.
Core Concepts
  • ETCD
  • Kube-API Server
  • Controller Manager
  • Scheduler
  • Kubelet
  • Kube proxy
  • PODs
  • ReplicaSets
  • Deployments
  • Services, Service Cluster IP
Scheduling Pods
  • Manual Scheduling
  • Labels and Selectors
  • Resource Requirements and Limits
  • DeamonSets
  • Static Pods
  • Multiple Scheduler
Logging and Monitoring
  • Monitor Cluster Components
  • Managing Application Logs
Application Lifecycle Management
  • Rolling Updates and Rollbacks
  • Configure Applications
  • Commands and Arguments
  • Configure Environmental variables n applications
  • Configuring ConfigMaps in Applications
  • Scale Applications
  • Multi-container PODs
  • Multi-container PODs Design Patterns
  • InitContainers
  • Self Healing Applications
Cluster Maintenance
  • OS Upgrades
  • Kubernetes Software versions
  • Cluster Upgrade Process
  • Backup and Restore Methods
Security and Authentication
  • Kubernetes Security Primitives
  • Authentication
  • TLS
  • Certificates API
  • Kubeconfig
  • Persistent key/value store
  • API Groups
  • Role-Based Access Controls
  • Cluster Roles and Role Bindings
  • Image Security
  • Network Policy
Storage and Volumes
  • Volumes
  • Persistent Volumes
  • Persistent Volume Claims
  • Application Configuration
DNS Networking, CoreDNS, and CNI
  • Switching and Routing
  • DNS
  • CoreDNS
  • Network Namespaces
  • Docker Networking
  • CNI
  • Cluster Networking
  • CNI in Kubernetes
  • CNI in weave
  • IP Address Management – weave
  • Service Networking
  • DNS in Kubernetes
  • CoreDNS in Kubernetes
  • Ingress
Troubleshooting: Application Failures, Control Panel Failures, and Network Failures
  • Application failure
  • Control Panel Failure
  • Worker Node Failure
  • Networking Failure

Training Partners

They laugh at me because I am different, I laugh at them because they are all the same

95 percent Of students say they are better prepared to maximize the value of Red Hat products after training

The person with the certification is
the one that is going to get hired.
– Robert Blanchard, Director of Support Services
Aspen Skiing Services Co.

We Are Ready To Build Your Career ARE YOU ?

FIND A COURSE

mation_direction=”left” hide_on_mobile=”small-visibility,medium-visibility,large-visibility” center_content=”no” last=”true” min_height=”” hover_type=”none” link=”” first=”true”]