Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition
![Język publikacji: angielski Język publikacji: angielski](https://static01.helion.com.pl/global/flagi/1.png)
- Autor:
- Benjamin Muschko
![Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition Benjamin Muschko - okładka ebooka](https://static01.helion.com.pl/global/okladki/326x466/e_3xj5.png)
![Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition Benjamin Muschko - tył okładki ebooka](https://static01.helion.com.pl/global/okladki-tyl/326x466/e_3xj5.png)
- Ocena:
- Bądź pierwszym, który oceni tę książkę
- Stron:
- 366
- Dostępne formaty:
-
ePubMobi
Opis ebooka: Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition
Developers with the ability to operate, troubleshoot, and monitor applications in Kubernetes are in high demand today. To meet this need, the Cloud Native Computing Foundation created a certification exam to establish a developer's credibility and value in the job market for work in a Kubernetes environment.
The Certified Kubernetes Application Developer (CKAD) exam format is different from the typical multiple-choice format of other certifications. Instead, the CKAD is performance-based and requires deep knowledge under immense time pressure.
Updated to reflect revisions to the official curriculum made in September 2022, this revised study guide takes you through all the topics you need to fully prepare for the exam. Author Benjamin Muschko also shares his personal experience and tips.
- Learn when and how to apply Kubernetes's concepts to manage an application
- Understand the objectives, abilities, tips, and tricks needed to pass the CKAD exam
- Explore the ins and outs of the kubectl command-line tool
- Solve real-world Kubernetes problems in a hands-on command-line environment
- Navigate and solve questions during the CKAD exam
- New topics include: Deployment strategies, the Helm package manager, resources that extend Kubernetes (CRD), building container images, and more
Wybrane bestsellery
-
Vulnerabilities in software and IT infrastructure pose a major threat to organizations. In response, the Cloud Native Computing Foundation (CNCF) developed the Certified Kubernetes Security Specialist (CKS) certification to verify an administrator's proficiency to protect Kubernetes clusters and ...
Certified Kubernetes Security Specialist (CKS) Study Guide Certified Kubernetes Security Specialist (CKS) Study Guide
(169.14 zł najniższa cena z 30 dni)177.65 zł
209.00 zł(-15%) -
The ability to administer and monitor a Kubernetes cluster is in high demand today. To meet this need, the Cloud Native Computing Foundation developed a certification exam to establish an administrator's credibility and value in the job market to confidently work in a Kubernetes environment.The C...
Certified Kubernetes Administrator (CKA) Study Guide Certified Kubernetes Administrator (CKA) Study Guide
(186.15 zł najniższa cena z 30 dni)186.15 zł
219.00 zł(-15%) -
To piąte, gruntownie zaktualizowane wydanie podręcznika, który doceni każdy student informatyki i inżynier oprogramowania. Książka obejmuje szeroki zakres zagadnień, od podstawowych pojęć po zaawansowaną problematykę związaną z najnowszymi trendami w systemach operacyjnych. Wyczerpująco omawia pr...(107.40 zł najniższa cena z 30 dni)
125.30 zł
179.00 zł(-30%) -
To drugie, zaktualizowane wydanie przewodnika po systemie Prometheus. Znajdziesz w nim wyczerpujące wprowadzenie do tego oprogramowania, a także wskazówki dotyczące monitorowania aplikacji i infrastruktury, tworzenia wykresów, przekazywania ostrzeżeń, bezpośredniej instrumentacji kodu i pobierani...
Prometheus w pełnej gotowości. Jak monitorować pracę infrastruktury i wydajność działania aplikacji. Wydanie II Prometheus w pełnej gotowości. Jak monitorować pracę infrastruktury i wydajność działania aplikacji. Wydanie II
(53.40 zł najniższa cena z 30 dni)62.30 zł
89.00 zł(-30%) -
This book will help you master Kubernetes anti-patterns, enabling you to recognize and overcome common pitfalls, optimize deployments, and excel in today's dynamic tech landscape with confidence.
Kubernetes Anti-Patterns. Overcome common pitfalls to achieve optimal deployments and a flawless Kubernetes ecosystem Kubernetes Anti-Patterns. Overcome common pitfalls to achieve optimal deployments and a flawless Kubernetes ecosystem
(100.08 zł najniższa cena z 30 dni) -
Chcesz opanować sztukę efektywnego monitorowania systemów? Ta książka to klucz do głębokiego zrozumienia i skutecznego wykorzystania jednego z najbardziej zaawansowanych narzędzi do monitorowania - Prometheus. Znajdziesz w niej same konkrety: - Ekspercka wiedza - praktyczne wskazówki i technik...
Prometheus - pełne wdrożenie. Monitoruj, reaguj, optymalizuj Prometheus - pełne wdrożenie. Monitoruj, reaguj, optymalizuj
-
Odkryj moc Dockera i przekształć swój sposób pracy z aplikacjami i infrastrukturą! Ta książka to Twój bilet do świata, gdzie wdrożenia stają się szybsze, a aplikacje bardziej przenośne i bezpieczne. Oto, jak Docker może rewolucjonizować Twój workflow: Izolacja aplikacji: Każda aplikacja dział...
Docker w 1 dzień. Docker od podstaw, po projektowanie i praktyczne zastosowania Docker w 1 dzień. Docker od podstaw, po projektowanie i praktyczne zastosowania
-
NGINX is one of the most widely used web servers available today, in part because of itscapabilities as a load balancer and reverse proxy server for HTTP and other network protocols. This revised cookbook provides easy-to-follow examples of real-world problems in application delivery. Practical r...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
Kubernetes is the de facto standard for container orchestration and distributed applications management across a microservices framework. With this practical cookbook, you'll learn hands-on Kubernetes recipes for automating the deployment, scaling, and operations of application containers across ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%)
Ebooka "Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition" przeczytasz na:
-
czytnikach Inkbook, Kindle, Pocketbook, Onyx Boox i innych
-
systemach Windows, MacOS i innych
-
systemach Windows, Android, iOS, HarmonyOS
-
na dowolnych urządzeniach i aplikacjach obsługujących formaty: PDF, EPub, Mobi
Masz pytania? Zajrzyj do zakładki Pomoc »
Audiobooka "Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition" posłuchasz:
-
w aplikacji Ebookpoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych
-
na dowolnych urządzeniach i aplikacjach obsługujących format MP3 (pliki spakowane w ZIP)
Masz pytania? Zajrzyj do zakładki Pomoc »
Kurs Video "Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition" zobaczysz:
-
w aplikacjach Ebookpoint i Videopoint na Android, iOS, HarmonyOs
-
na systemach Windows, MacOS i innych z dostępem do najnowszej wersji Twojej przeglądarki internetowej
Szczegóły ebooka
- ISBN Ebooka:
- 978-10-981-5282-6, 9781098152826
- Data wydania ebooka:
-
2024-05-22
Data wydania ebooka często jest dniem wprowadzenia tytułu do sprzedaży i może nie być równoznaczna z datą wydania książki papierowej. Dodatkowe informacje możesz znaleźć w darmowym fragmencie. Jeśli masz wątpliwości skontaktuj się z nami sklep@ebookpoint.pl.
- Język publikacji:
- angielski
- Rozmiar pliku ePub:
- 4.8MB
- Rozmiar pliku Mobi:
- 8.9MB
Spis treści ebooka
- Foreword
- Preface
- Who This Book Is For
- What You Will Learn
- Whats New in the Second Edition
- Conventions Used in This Book
- Using Code Examples
- OReilly Online Learning
- How to Contact Us
- Acknowledgments
- I. Introduction
- 1. Exam Details and Resources
- Kubernetes Certification Learning Path
- Kubernetes and Cloud Native Associate (KCNA)
- Kubernetes and Cloud Native Security Associate (KCSA)
- Certified Kubernetes Application Developer (CKAD)
- Certified Kubernetes Administrator (CKA)
- Certified Kubernetes Security Specialist (CKS)
- Kubernetes Certification Learning Path
- Exam Objectives
- Curriculum
- Application Design and Build
- Application Deployment
- Application Observability and Maintenance
- Application Environment, Configuration, and Security
- Services and Networking
- Involved Kubernetes Primitives
- Documentation
- Exam Environment and Tips
- Candidate Skills
- Time Management
- Command-Line Tips and Tricks
- Setting a Context and Namespace
- Using the Alias for kubectl
- Using kubectl Command Auto-Completion
- Internalize Resource Short Names
- Practicing and Practice Exams
- Summary
- 2. Kubernetes in a Nutshell
- What Is Kubernetes?
- Features
- High-Level Architecture
- Control Plane Node Components
- Common Node Components
- Advantages
- Summary
- 3. Interacting with Kubernetes
- API Primitives and Objects
- Using kubectl
- Managing Objects
- Imperative Object Management
- Creating objects
- Updating objects
- Deleting objects
- Imperative Object Management
- Declarative Object Management
- Creating objects
- Updating objects
- Deleting objects
- Hybrid Approach
- Which Approach to Use?
- Summary
- II. Application Design and Build
- 4. Containers
- Container Terminology
- Containerizing a Java-Based Application
- Writing a Dockerfile
- Building the Container Image
- Listing Container Images
- Running the Container
- Listing Containers
- Interacting with the Container
- Publishing the Container Image
- Saving and Loading a Container Image
- Going Further
- Summary
- Exam Essentials
- Sample Exercises
- 5. Pods and Namespaces
- Working with Pods
- Creating Pods
- Listing Pods
- Pod Life Cycle Phases
- Rendering Pod Details
- Accessing Logs of a Pod
- Executing a Command in Container
- Creating a Temporary Pod
- Using a Pods IP Address for Network Communication
- Configuring Pods
- Declaring environment variables
- Defining a command with arguments
- Deleting a Pod
- Working with Pods
- Working with Namespaces
- Listing Namespaces
- Creating and Using a Namespace
- Setting a Namespace Preference
- Deleting a Namespace
- Summary
- Exam Essentials
- Sample Exercises
- 6. Jobs and CronJobs
- Working with Jobs
- Creating and Inspecting Jobs
- Job Operation Types
- Restart Behavior
- Restarting the container on failure
- Starting a new Pod on failure
- Working with Jobs
- Working with CronJobs
- Creating and Inspecting CronJobs
- Configuring Retained Job History
- Summary
- Exam Essentials
- Sample Exercises
- 7. Volumes
- Working with Storage
- Volume Types
- Ephemeral Volumes
- Creating and mounting an ephemeral Volume
- Interacting with the Volume
- Persistent Volumes
- Static versus dynamic provisioning
- Creating PersistentVolumes
- Configuration options for a PersistentVolume
- Volume mode
- Access mode
- Reclaim policy
- Creating PersistentVolumeClaims
- Mounting PersistentVolumeClaims in a Pod
- Working with Storage
- Storage Classes
- Creating storage classes
- Using storage classes
- Summary
- Exam Essentials
- Sample Exercises
- 8. Multi-Container Pods
- Working with Multiple Containers in a Pod
- Init Containers
- The Sidecar Pattern
- The Adapter Pattern
- The Ambassador Pattern
- Working with Multiple Containers in a Pod
- Summary
- Exam Essentials
- Sample Exercises
- 9. Labels and Annotations
- Working with Labels
- Declaring Labels
- Inspecting Labels
- Modifying Labels for a Live Object
- Using Label Selectors
- Label selection from the command line
- Label selection in a manifest
- Recommended Labels
- Working with Labels
- Working with Annotations
- Declaring Annotations
- Inspecting Annotations
- Modifying Annotations for a Live Object
- Reserved Annotations
- Summary
- Exam Essentials
- Sample Exercises
- III. Application Deployment
- 10. Deployments
- Working with Deployments
- Creating Deployments
- Listing Deployments and Their Pods
- Rendering Deployment Details
- Deleting a Deployment
- Working with Deployments
- Performing Rolling Updates and Rollbacks
- Updating a Deployments Pod Template
- Rolling Out a New Revision
- Adding a Change Cause for a Revision
- Rolling Back to a Previous Revision
- Scaling Workloads
- Manually Scaling a Deployment
- Autoscaling a Deployment
- Creating Horizontal Pod Autoscalers
- Listing Horizontal Pod Autoscalers
- Rendering Horizontal Pod Autoscaler Details
- Defining Multiple Scaling Metrics
- Summary
- Exam Essentials
- Sample Exercises
- 11. Deployment Strategies
- Rolling Deployment Strategy
- Implementation
- Use Cases and Trade-Offs
- Rolling Deployment Strategy
- Fixed Deployment Strategy
- Implementation
- Use Cases and Trade-Offs
- Blue-Green Deployment Strategy
- Implementation
- Use Cases and Trade-Offs
- Canary Deployment Strategy
- Implementation
- Use Cases and Trade-Offs
- Summary
- Exam Essentials
- Sample Exercises
- 12. Helm
- Managing an Existing Chart
- Identifying a Chart
- Adding a Chart Repository
- Searching for a Chart in a Repository
- Installing a Chart
- Listing Installed Charts
- Upgrading an Installed Chart
- Uninstalling a Chart
- Managing an Existing Chart
- Summary
- Exam Essentials
- Sample Exercises
- IV. Application Observability and Maintenance
- 13. API Deprecations
- Understanding the Deprecation Policy
- Listing Available API Versions
- Handling Deprecation Warnings
- Handling a Removed or Replaced API
- Summary
- Exam Essentials
- Sample Exercises
- 14. Container Probes
- Working with Probes
- Probe Types
- Health Verification Methods
- Health Check Attributes
- Working with Probes
- The Readiness Probe
- The Liveness Probe
- The Startup Probe
- Summary
- Exam Essentials
- Sample Exercises
- 15. Troubleshooting Pods and Containers
- Troubleshooting Pods
- Retrieving High-Level Information
- Inspecting Events
- Using Port Forwarding
- Troubleshooting Pods
- Troubleshooting Containers
- Inspecting Logs
- Opening an Interactive Shell
- Interacting with a Distroless Container
- Inspecting Resource Metrics
- Summary
- Exam Essentials
- Sample Exercises
- V. Application Environment, Configuration, and Security
- 16. CustomResourceDefinitions (CRDs)
- Working with CRDs
- Example CRD
- Implementing a CRD Schema
- Instantiating an Object for the CRD
- Discovering CRDs
- Implementing a Controller
- Working with CRDs
- Summary
- Exam Essentials
- Sample Exercises
- 17. Authentication, Authorization,
and Admission Control
- Processing a Request
- Authentication with kubectl
- The Kubeconfig
- Managing Kubeconfig Using kubectl
- Authorization with Role-Based Access Control
- RBAC Overview
- Understanding RBAC API Primitives
- Default User-Facing Roles
- Creating Roles
- Listing Roles
- Rendering Role Details
- Creating RoleBindings
- Listing RoleBindings
- Rendering RoleBinding Details
- Seeing the RBAC Rules in Effect
- Namespace-Wide and Cluster-Wide RBAC
- Working with Service Accounts
- The Default Service Account
- Creating a Service Account
- Setting Permissions for a Service Account
- Binding the service account to a Pod
- Verifying the default permissions
- Creating the Role
- Creating the RoleBinding
- Verifying the granted permissions
- Admission Control
- Summary
- Exam Essentials
- Sample Exercises
- 18. Resource Requirements, Limits, and Quotas
- Working with Resource Requirements
- Defining Container Resource Requests
- Defining Container Resource Limits
- Defining Container Resource Requests and Limits
- Working with Resource Requirements
- Working with Resource Quotas
- Creating ResourceQuotas
- Rendering ResourceQuota Details
- Exploring a ResourceQuotas Runtime Behavior
- Working with Limit Ranges
- Creating LimitRanges
- Rendering LimitRange Details
- Exploring a LimitRanges Runtime Behavior
- Setting default resource requirements
- Enforcing resource requirements
- Summary
- Exam Essentials
- Sample Exercises
- 19. ConfigMaps and Secrets
- Working with ConfigMaps
- Creating a ConfigMap
- Consuming a ConfigMap as Environment Variables
- Mounting a ConfigMap as a Volume
- Working with ConfigMaps
- Working with Secrets
- Creating a Secret
- Defining Secret data with plain-text values
- Specialized Secret types
- Creating a Secret
- Consuming a Secret as Environment Variables
- Remapping environment variable keys
- Mounting a Secret as a Volume
- Summary
- Exam Essentials
- Sample Exercises
- 20. Security Contexts
- Working with Security Contexts
- Defining a Security Context on the Pod Level
- Defining a Security Context on the Container Level
- Defining a Security Context on the Pod and Container Level
- Working with Security Contexts
- Summary
- Exam Essentials
- Sample Exercises
- VI. Services and Networking
- 21. Services
- Working with Services
- Service Types
- Service type inheritance
- When to use which Service type?
- Service Types
- Port Mapping
- Creating Services
- Listing Services
- Rendering Service Details
- Working with Services
- The ClusterIP Service Type
- Creating and Inspecting the Service
- Accessing the Service
- Discovering the Service by DNS lookup
- Discovering the Service by environment variables
- The NodePort Service Type
- Creating and Inspecting the Service
- Accessing the Service
- The LoadBalancer Service Type
- Creating and Inspecting the Service
- Accessing the Service
- Summary
- Exam Essentials
- Sample Exercises
- 22. Ingresses
- Working with Ingresses
- Installing an Ingress Controller
- Deploying Multiple Ingress Controllers
- Configuring Ingress Rules
- Creating Ingresses
- Defining Path Types
- Listing Ingresses
- Rendering Ingress Details
- Accessing an Ingress
- Working with Ingresses
- Summary
- Exam Essentials
- Sample Exercises
- 23. Network Policies
- Working with Network Policies
- Installing an Network Policy Controller
- Creating a Network Policy
- Listing Network Policies
- Rendering Network Policy Details
- Applying Default Network Policies
- Restricting Access to Specific Ports
- Working with Network Policies
- Summary
- Exam Essentials
- Sample Exercises
- A. Answers to Review Questions
- Chapter 4, Containers
- Chapter 5, Pods and Namespaces
- Chapter 6, Jobs and CronJobs
- Chapter 7, Volumes
- Chapter 8, Multi-Container Pods
- Chapter 9, Labels and Annotations
- Chapter 10, Deployments
- Chapter 11, Deployment Strategies
- Chapter 12, Helm
- Chapter 13, API Deprecations
- Chapter 14, Container Probes
- Chapter 15, Troubleshooting Pods and Containers
- Chapter 16, Custom Resource Definitions (CRDs)
- Chapter 17, Authentication, Authorization, and Admission Control
- Chapter 18, Resource Requirements, Limits, and Quotas
- Chapter 19, ConfigMaps and Secrets
- Chapter 20, Security Contexts
- Chapter 21, Services
- Chapter 22, Ingresses
- Chapter 23, Network Policies
- B. Exam Review Guide
- Application Design and Build
- Application Deployment
- Application Observability and Maintenance
- Application Environment, Configuration, and Security
- Services and Networking
O'Reilly Media - inne książki
-
Python is an excellent way to get started in programming, and this clear, concise guide walks you through Python a step at a time—beginning with basic programming concepts before moving on to functions, data structures, and object-oriented design. This revised third edition reflects the gro...(143.65 zł najniższa cena z 30 dni)
160.65 zł
189.00 zł(-15%) -
The surging predictive analytics market is expected to grow from $10.5 billion today to $28 billion by 2026. With the rise in automation across industries, the increase in data-driven decision-making, and the proliferation of IoT devices, predictive analytics has become an operational necessity i...(194.65 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
How do some organizations maintain 24-7 internet-scale operations? How can organizations integrate security while continuously deploying new features? How do organizations increase security within their DevOps processes?This practical guide helps you answer those questions and more. Author Steve ...(160.65 zł najniższa cena z 30 dni)
177.65 zł
209.00 zł(-15%) -
Many organizations today analyze and share large, sensitive datasets about individuals. Whether these datasets cover healthcare details, financial records, or exam scores, it's become more difficult for organizations to protect an individual's information through deidentification, anonymization, ...(228.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
Large language models (LLMs) and diffusion models such as ChatGPT and Stable Diffusion have unprecedented potential. Because they have been trained on all the public text and images on the internet, they can make useful contributions to a wide variety of tasks. And with the barrier to entry great...(228.65 zł najniższa cena z 30 dni)
254.15 zł
299.00 zł(-15%) -
Filled with tips, tricks, and techniques, this easy-to-use book is the perfect resource for intermediate to advanced users of Excel. You'll find complete recipes for more than a dozen topics covering formulas, PivotTables, charts, Power Query, and more. Each recipe poses a particular problem and ...(203.15 zł najniższa cena z 30 dni)
211.65 zł
249.00 zł(-15%) -
Traditional data architecture patterns are severely limited. To use these patterns, you have to ETL data into each tool—a cost-prohibitive process for making warehouse features available to all of your data. The lack of flexibility with these patterns requires you to lock into a set of prio...(211.65 zł najniższa cena z 30 dni)
220.15 zł
259.00 zł(-15%) -
In today's data-driven world, understanding statistical models is crucial for effective analysis and decision making. Whether you're a beginner or an experienced user, this book equips you with the foundational knowledge to grasp and implement statistical models within Tableau. Gain the confidenc...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
If you haven't modernized your data cleaning and reporting processes in Microsoft Excel, you're missing out on big productivity gains. And if you're looking to conduct rigorous data analysis, more can be done in Excel than you think. This practical book serves as an introduction to the modern Exc...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%) -
TypeScript is a typed superset of JavaScript with the potential to solve many of the headaches for which JavaScript is famous. But TypeScript has a learning curve of its own, and understanding how to use it effectively takes time and practice. Using the format popularized by Effective C++ and Eff...(186.15 zł najniższa cena z 30 dni)
186.15 zł
219.00 zł(-15%)
Dzieki opcji "Druk na żądanie" do sprzedaży wracają tytuły Grupy Helion, które cieszyły sie dużym zainteresowaniem, a których nakład został wyprzedany.
Dla naszych Czytelników wydrukowaliśmy dodatkową pulę egzemplarzy w technice druku cyfrowego.
Co powinieneś wiedzieć o usłudze "Druk na żądanie":
- usługa obejmuje tylko widoczną poniżej listę tytułów, którą na bieżąco aktualizujemy;
- cena książki może być wyższa od początkowej ceny detalicznej, co jest spowodowane kosztami druku cyfrowego (wyższymi niż koszty tradycyjnego druku offsetowego). Obowiązująca cena jest zawsze podawana na stronie WWW książki;
- zawartość książki wraz z dodatkami (płyta CD, DVD) odpowiada jej pierwotnemu wydaniu i jest w pełni komplementarna;
- usługa nie obejmuje książek w kolorze.
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka, którą chcesz zamówić pochodzi z końcówki nakładu. Oznacza to, że mogą się pojawić drobne defekty (otarcia, rysy, zagięcia).
Co powinieneś wiedzieć o usłudze "Końcówka nakładu":
- usługa obejmuje tylko książki oznaczone tagiem "Końcówka nakładu";
- wady o których mowa powyżej nie podlegają reklamacji;
Masz pytanie o konkretny tytuł? Napisz do nas: sklep[at]helion.pl.
Książka drukowana
![Loader](https://static01.helion.com.pl/ebookpoint/img/ajax-loader.gif)
![ajax-loader](https://static01.helion.com.pl/ebookpoint/img/ajax-loader.gif)
Oceny i opinie klientów: Certified Kubernetes Application Developer (CKAD) Study Guide. 2nd Edition Benjamin Muschko (0)
Weryfikacja opinii następuję na podstawie historii zamówień na koncie Użytkownika umieszczającego opinię. Użytkownik mógł otrzymać punkty za opublikowanie opinii uprawniające do uzyskania rabatu w ramach Programu Punktowego.