
Getting Started with Kubernetes - Second Edition: Orchestrate and manage large-scale Docker deployments
Paperback
General ComputersSystem Administration
ISBN13: 9781787283367
Publisher: Packt Pub
Published: May 31 2017
Pages: 286
Weight: 1.09
Height: 0.60 Width: 7.50 Depth: 9.25
Language: English
Learn how to schedule and run application containers using Kubernetes.
Key Features:
- Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
- Confidently manage your container clusters and networks using Kubernetes
- This practical guide will show you container application examples throughout to illustrate the concepts and features of Kubernetes
Book Description:
Kubernetes has continued to grow and achieve broad adoption across various industries, helping you to orchestrate and automate container deployments on a massive scale.
This book will give you a complete understanding of Kubernetes and how to get a cluster up and running. You will develop an understanding of the installation and configuration process. The book will then focus on the core Kubernetes constructs such as pods, services, replica sets, replication controllers, and labels. You will also understand how cluster level networking is done in Kubernetes.
The book will also show you how to manage deployments and perform updates with minimal downtime. Additionally, you will learn about operational aspects of Kubernetes such as monitoring and logging. Advanced concepts such as container security and cluster federation will also be covered. Finally, you will learn about the wider Kubernetes ecosystem with OCP, CoreOS, and Tectonic and explore the third-party extensions and tools that can be used with Kubernetes.
By the end of the book, you will have a complete understanding of the Kubernetes platform and will start deploying applications on it.
What You Will Learn:
- Download, install, and configure the Kubernetes codebase
- Understand the core concepts of a Kubernetes cluster
- Be able to set up and access monitoring and logging for Kubernetes clusters
- Set up external access to applications running in the cluster
- Understand how CoreOS and Kubernetes can help you achieve greater performance and container implementation agility
- Run multiple clusters and manage from a single control plane
- Explore container security as well as securing Kubernetes clusters
- Work with third-party extensions and tools
Who this book is for:
This book is for developers, sys admins, and DevOps engineers who want to automate the deployment process and scale their applications. You do not need any knowledge about Kubernetes.
Also in
System Administration
Site Reliability Engineering: How Google Runs Production Systems
Murphy, Niall Richard
Jones, Chris
Beyer, Betsy
Paperback
Comptia A+ Complete Certification Kit: Exam 220-1101 and Exam 220-1102
McMillan, Troy
Buhagiar, Jon
Docter, Quentin
Paperback
Prometheus: Up & Running: Infrastructure and Application Performance Monitoring
Pivotto, Julien
Brazil, Brian
Paperback
RAG-Driven Generative AI: Build custom retrieval augmented generation pipelines with LlamaIndex, Deep Lake, and Pinecone
Rothman, Denis
Paperback
Averting the Digital Dark Age: How Archivists, Librarians, and Technologists Built the Web a Memory
Milligan, Ian
Hardcover
Windows 11 Manual For Seniors: A Beginners Guide to Navigate Your Computer with Step-by-Step Instructions
Wells, Larry
Paperback
Building Multi-Tenant Saas Architectures: Principles, Practices, and Patterns Using AWS
Golding, Tod
Paperback
Data and Reality: A Timeless Perspective on Perceiving and Managing Information in Our Imprecise World, 3rd Edition
Kent, William
Paperback
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
Rice, Liz
Paperback
Microsoft 365 and SharePoint Online Cookbook - Second Edition: A complete guide to Microsoft Office 365 apps including SharePoint, Power Platform, Cop
Ghatak, Sudeep
Chamberlain, Nate
Mahajan, Gaurav
Paperback
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr
Dunkerley, Mark
Tumbarello, Matt
Paperback
Comptia A+ Complete Practice Tests: Core 1 Exam 220-1101 and Core 2 Exam 220-1102
O'Shea, Audrey
Parker, Jeff T.
Paperback
Learn Powershell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS
Plunk, Travis
Petty, James
Leonhardt, Tyler
Paperback
IT Helpdesk Training Best Practices: Desktop Support Troubleshooting and System Administration
Botwright, Rob
Paperback
Observability Engineering: Achieving Production Excellence
Majors, Charity
Fong-Jones, Liz
Miranda, George
Paperback
Practical Cybersecurity Architecture - Second Edition: A guide to creating and implementing robust designs for cybersecurity architects
Moyle, Ed
Kelley, Diana
Paperback
Mastering KVM Virtualization - Second Edition: Design expert data center virtualization solutions with the power of Linux KVM
Chirammal, Humble Devassy
Mukhedkar, Prasad
Dakic, Vedran
Paperback
Building Green Software: A Sustainable Approach to Software Development and Operations
Hsu, Sarah
Bergman, Sara
Currie, Anne
Paperback
Learn Powershell Scripting in a Month of Lunches, Second Edition: Write and Organize Scripts and Tools
Hicks, Jeffery
Petty, James
Jones, Don
Paperback
Linux Kernel Programming - Second Edition: A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization
Billimoria, Kaiwan N.
Paperback
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture
Nichols, Lester
Paperback
Multi-Cloud Mastery: Architecting Secure and Scalable Kubernetes Systems and Infrastructures.
Robertson, Adam
Paperback
Version Control with Git: Powerful Tools and Techniques for Collaborative Software Development
Ponuthorai, Prem Kumar
Loeliger, Jon
Paperback
Python for Devops: Learn Ruthlessly Effective Automation
Behrman, Kennedy
Deza, Alfredo
Gift, Noah
Paperback
pfSense Essentials: The Complete Reference to the pfSense Internet Gateway and Firewall
Reed, Jeremy C.
Paperback
Docker: Up & Running: Shipping Reliable Containers in Production
Kane, Sean P.
Matthias, Karl
Paperback
Scaling Cloud Finops: Proven Strategies to Accelerate Financial Success
Zeier, Matthew
Kanumuri, Sasi
Paperback
Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
Zhai, Chengxiang
Massung, Sean
Paperback
Container Security: Fundamental Technology Concepts That Protect Containerized Applications
Rice, Liz
Paperback
Mastering Terraform: A practical guide to building and deploying infrastructure on AWS, Azure, and GCP
Tinderholt, Mark
Paperback
Mastering Embedded Linux Programming - Third Edition: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell)
Vasquez, Frank
Simmonds, Chris
Paperback
Active Directory: Designing, Deploying, and Running Active Directory
Desmond, Brian
Richards, Joe
Allen, Robbie
Paperback
SAP S/4hana Financial Accounting Certification Guide: Application Associate Exam
Pougkas, Stefanos
Paperback
Practical Linux System Administration: A Guide to Installation, Configuration, and Management
Hess, Kenneth
Paperback
Linux for Beginners: An Introduction to the Linux Operating System and Command Line
Cannon, Jason
Paperback
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark
Botwright, Rob
Paperback
Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line
Troncone, Paul
Albing, Carl
Paperback
Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way
Meijer, Bas
Hochstein, Lorin
Moser, René
Paperback
Cybersecurity Tabletop Exercises: From Planning to Execution
Lelewski, Robert
Hollenberger, John
Paperback
Linux for Hackers: 3 books in 1 - The #1 Hacking Course From Beginner to Advanced. Learn it Well & Fast (2025)
Press, Cyberedge
Reed, Mark
Paperback
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
Blyth, Andrew
Paperback
Kubernetes Security and Observability: A Holistic Approach to Securing Containers and Cloud Native Applications
Gupta, Amit
Creane, Brendan
Paperback
Mastering Linux Administration - Second Edition: Take your sysadmin skills to the next level by configuring and maintaining Linux systems
Balog, Julian
Calcatinge, Alexandru
Paperback
Cisa Certified Information Systems Auditor All-In-One Exam Guide, Fourth Edition
Gregory, Peter H.
Paperback
Machine Learning Models and Algorithms for Big Data Classification: Thinking with Examples for Effective Learning
Suthaharan, Shan
Hardcover
Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture
Kahrer, Judith
Trojanowski, Michal
Archer, Gary
Paperback
Effective Devops: Building a Culture of Collaboration, Affinity, and Tooling at Scale
Davis, Jennifer
Daniels, Ryn
Paperback
Powershell Cookbook: Your Complete Guide to Scripting the Ubiquitous Object-Based Shell
Holmes, Lee
Paperback
Kubernetes - An Enterprise Guide - Third Edition: Master containerized application deployments, integrate enterprise systems, and achieve scalability
Boorshtein, Marc
Surovich, Scott
Paperback
Data Quality Fundamentals: A Practitioner's Guide to Building Trustworthy Data Pipelines
Gavish, Lior
Vorwerck, Molly
Moses, Barr
Paperback
Business Continuity and Disaster Recovery Planning for IT Professionals
Rima, Chris
Snedaker, Susan
Paperback
Kubernetes Best Practices: Blueprints for Building Successful Applications on Kubernetes
Villalba, Eddie
Strebel, Dave
Burns, Brendan
Paperback
Cisco Certified Devnet Associate Devasc 200-901 Official Cert Guide
Gooley, Jason
Jackson, Chris
Iliesiu, Adrian
Hardcover
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
Beyer, Betsy
Adkins, Heather
Blankinship, Paul
Paperback
DevOps Automation Cookbook: Harness the power of DevOps with 125+ automation recipes (English Edition)
Kumar Singirikonda, Ekambar
Paperback
Cryptography Algorithms - Second Edition: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography
Bertaccini, Massimo
Paperback
The Ridiculously Simple Guide to Gmail: The Absolute Beginners Guide to Getting Started with Email
La Counte, Scott
Paperback
Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment
Ackerman, Pascal
Paperback
Windows Internals: System Architecture, Processes, Threads, Memory Management, and More, Part 1
Solomon, David
Yosifovich, Pavel
Russinovich, Mark
Paperback
Architecting for Scale: How to Maintain High Availability and Manage Risk in the Cloud
Atchison, Lee
Paperback
The Ultimate Docker Container Book - Third Edition: Build, test, ship, and run containers with Docker and Kubernetes
Schenker, Gabriel N.
Paperback
Hands-On Network Programming with C: Learn socket programming in C and write secure and optimized network code
Van Winkle, Lewis
Paperback
NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library
Botwright, Rob
Paperback
Security Monitoring with Wazuh: A hands-on guide to effective enterprise security using real-life use cases in Wazuh
Gupta, Rajneesh
Paperback
Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)
Bellotti, Marianne
Paperback
The Self-Service Data Roadmap: Democratize Data and Reduce Time to Insight
Uttamchandani, Sandeep
Paperback
Learn Linux Quickly: A Comprehensive Guide for Getting Up to Speed on the Linux Command Line (Ubuntu)
Bartley, Paul H.
Quickly, Code
Paperback
Istio: Up and Running: Using a Service Mesh to Connect, Secure, Control, and Observe
Calcote, Lee
Butcher, Zack
Paperback
Getting Started With Ubuntu OS: A Ridiculously Simple Guide to the Linux Open Source Operating System
La Counte, Scott
Paperback
Learning Microsoft Intune: Unified Endpoint Management with Intune & the Microsoft 365 product suite
Duffey, Scott
Paperback
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
Roddie, Megan
Deyalsingh, Jason
Katz, Gary J.
Paperback
Blockchain: A Practical Guide to Developing Business, Law, and Technology Solutions
Allen, Paul R.
Iyer, Kedar
Bambara, Joseph J.
Paperback
Industrial Cybersecurity: Efficiently secure critical infrastructure systems
Ackerman, Pascal
Paperback
Linux: A complete guide to Linux command line for beginners, and how to get started with the Linux operating system!
Arthur, James
Paperback
Learning ServiceNow - Second Edition: Administration and development on the Now platform, for powerful IT automation
Woodruff, Tim
Paperback
The Kubernetes Bible - Second Edition: The definitive guide to deploying and managing Kubernetes across cloud and on-prem environments
Madapparambath, Gineesh
McKendrick, Russ
Paperback
The Ultimate Linux Shell Scripting Guide: Automate, Optimize, and Empower tasks with Linux Shell Scripting
Tevault, Donald a.
Paperback
AI Hacks for It Pros: Boost Your Productivity with AI Tools
Abshire, Brandon
Lemaire, Chrissy
Paperback
Active Directory and Powershell for Jobseekers: Learn How to Create, Manage, and Secure User Accounts
Wróbel, Mariusz
Paperback
A Friendly Guide to Data Science: Everything You Should Know about the Hottest Field in Tech
Vincent, Kelly P.
Paperback
Small, Sharp Software Tools: Harness the Combinatoric Power of Command-Line Tools and Utilities
Hogan, Brian
Paperback
The Enterprise Big Data Lake: Delivering the Promise of Big Data and Data Science
Gorelik, Alex
Paperback
Windows 11 for Enterprise Administrators - Second Edition: Unleash the power of Windows 11 with effective techniques and strategies
Miles, Steve
Singer, Manuel
Stokes, Jeff
Paperback
Mastering Malware Analysis - Second Edition: A malware analyst's practical guide to combating malicious software, APT, cybercrime, and IoT attacks
Thabet, Amr
Kleymenov, Alexey
Paperback
Implementing Zero-Knowledge Proofs With Practical Applications and Code Examples
Johnson, Hunter C.
Paperback
Jira Strategy Admin Workbook: Templates for the Application Administrator to Set Up, Clean Up, and Maintain Jira
Wright, Rachel
Paperback
The Myths of Security: What the Computer Security Industry Doesn't Want You to Know
Viega, John
Paperback
Result Page Generation for Web Searching: Emerging Research and Opportunities
Alli, Mostafa
Paperback
Practical Salesforce Architecture: Understanding and Deploying the Salesforce Ecosystem for the Enterprise
McCollum, Paul
Paperback
Podman in Action: Secure, Rootless Containers for Kubernetes, Microservices, and More
Walsh, Daniel
Paperback
The Well-Grounded Java Developer, Second Edition
Evans, Benjamin
Clark, Jason
Verburg, Martijn
Paperback
E-mail: A Write It Well Guide: How to Write and Manage E-mail in the Workplace
Chan, Janis Fisher
Paperback
Mastering Azure Virtual Desktop - Second Edition: A practical guide to designing, implementing, and managing Azure Virtual Desktop environments
Mangan, Ryan
Meurer, Marcel
McLoughlin, Neil
Paperback
AWS Penetration Testing: Beginner's guide to hacking AWS with tools such as Kali Linux, Metasploit, and Nmap
Helmus, Jonathan
Paperback
Mastering Linux Shell Scripting - Second Edition: A practical guide to Linux command-line, Bash scripting, and Shell programming
Ebrahim, Mokhtar
Mallett, Andrew
Paperback
Linux Device Drivers Development: Develop customized drivers for embedded Linux
Madieu, John
Paperback