Difference between revisions of "Certified Kubernetes Administrator v1.18"
Jump to navigation
Jump to search
Line 65: | Line 65: | ||
* [[Kubernetes installation|Install Kubernetes master and nodes]] | * [[Kubernetes installation|Install Kubernetes master and nodes]] | ||
* Configure secure cluster communications | * Configure secure cluster communications | ||
+ | * Configure a Highly-Available Kubernetes Cluster | ||
+ | * Know where to get Kubernetes release binaries | ||
+ | * Provision underlying infrastructure to deploy a Kubernetes cluster | ||
+ | * Choose a network solution | ||
+ | * Choose your Kubernetes infrastructure configuration | ||
+ | * Run end-to-end test on you cluster | ||
+ | * Analyze end-to-end test results | ||
+ | * Run Node end-to-end test | ||
+ | * Install and use <code>[[kubeadm]]</code> to install, configure and manage Kubernetes clustes. | ||
==See also == | ==See also == |
Revision as of 05:34, 3 May 2020
- Certified Kubernetes Administrator based on v1.18.0 (March 2020): https://github.com/cncf/curriculum/blob/master/CKA_Curriculum_V1.18.pdf
Contents
Scheduling (5%)
- Use label selectors to schedule Pods
- Understand the role of DaemonSets
- Understand how resource limits can affect Pod scheduling
- Manually schedule a pod without a scheduler
- Display scheduler events
- Know how to configure the Kubernetes scheduler
Logging/Monitoring (5%)
- Understand how to monitor all cluster components.
- Understand how to monitor applications
- Manage cluster component logs
- Manage application logs
Application Lifecycle Management (8%)
- Understand deployments and how to perform updates and rollbacks
- Know various ways to configure applications
- Know how to scale applications
- Understand the primitives necessary to create a self-healing application
Cluster Maintenance (11%)
- Understand Kubernetes cluster upgrade process
- Facilitate operatig system upgrades
- Implement backup and restore methodologies
Security (12%)
- Know how to configure authetication and authorization
- Understand Kubernetes security primitivies
- Know to configure network policies
- Create and manage TLS certificates for cluster components
- Work with images securely
- Define security contexts
- Security persistent key value store
Storage (7%)
- Understand persistent volumes and know how to create them
- Understand access modes for volumes
- Understand Kubernetes storage objects
- Know how to configure applications with persistent storage
Troubleshooting (10%)
- Troubleshoot application failure
- Troubleshoot control plane failure
- Troubleshoot worker node failure
- Troubleshoot networking
Core concepts (19%)
- Understand the Kubernetes API primitives
- Understand the Kubernetes cluster architecture
- Understand Services and other network primitives
Networking (11%)
- Understand the networking configuration on the cluster nodes
- Understand Pod networking concepts
- Understand service networking
- Deploy and configure network load balancer
- Know how to use Ingress rules
- Know how to configure and use the cluster DNS
- Undertand CNI
Installation, Configuration & Validation (12%)
- Design a Kubernetes cluster
- Install Kubernetes master and nodes
- Configure secure cluster communications
- Configure a Highly-Available Kubernetes Cluster
- Know where to get Kubernetes release binaries
- Provision underlying infrastructure to deploy a Kubernetes cluster
- Choose a network solution
- Choose your Kubernetes infrastructure configuration
- Run end-to-end test on you cluster
- Analyze end-to-end test results
- Run Node end-to-end test
- Install and use
kubeadm
to install, configure and manage Kubernetes clustes.
See also
Advertising: