Getting Started with Kubernetes - Second Edition: Orchestrate and manage large-scale Docker deployments
Paperback
General ComputersSystem Administration
ISBN13: 9781787283367
Publisher: Packt Pub
Published: May 31 2017
Pages: 286
Weight: 1.09
Height: 0.60 Width: 7.50 Depth: 9.25
Language: English
Learn how to schedule and run application containers using Kubernetes.
Key Features:
- Get well-versed with the fundamentals of Kubernetes and get it production-ready for deployments
- Confidently manage your container clusters and networks using Kubernetes
- This practical guide will show you container application examples throughout to illustrate the concepts and features of Kubernetes
Book Description:
Kubernetes has continued to grow and achieve broad adoption across various industries, helping you to orchestrate and automate container deployments on a massive scale.
This book will give you a complete understanding of Kubernetes and how to get a cluster up and running. You will develop an understanding of the installation and configuration process. The book will then focus on the core Kubernetes constructs such as pods, services, replica sets, replication controllers, and labels. You will also understand how cluster level networking is done in Kubernetes.
The book will also show you how to manage deployments and perform updates with minimal downtime. Additionally, you will learn about operational aspects of Kubernetes such as monitoring and logging. Advanced concepts such as container security and cluster federation will also be covered. Finally, you will learn about the wider Kubernetes ecosystem with OCP, CoreOS, and Tectonic and explore the third-party extensions and tools that can be used with Kubernetes.
By the end of the book, you will have a complete understanding of the Kubernetes platform and will start deploying applications on it.
What You Will Learn:
- Download, install, and configure the Kubernetes codebase
- Understand the core concepts of a Kubernetes cluster
- Be able to set up and access monitoring and logging for Kubernetes clusters
- Set up external access to applications running in the cluster
- Understand how CoreOS and Kubernetes can help you achieve greater performance and container implementation agility
- Run multiple clusters and manage from a single control plane
- Explore container security as well as securing Kubernetes clusters
- Work with third-party extensions and tools
Who this book is for:
This book is for developers, sys admins, and DevOps engineers who want to automate the deployment process and scale their applications. You do not need any knowledge about Kubernetes.
Also in
System Administration
Site Reliability Engineering: How Google Runs Production Systems
Jones, Chris
Beyer, Betsy
Murphy, Niall Richard
Paperback
Windows 11 Manual For Seniors: A Beginners Guide to Navigate Your Computer with Step-by-Step Instructions
Wells, Larry
Paperback
Take Back Your Life!: Using Microsoft Office Outlook to Get Organized and Stay Organized
McGhee, Sally
Paperback
Building AI Agents with LLMs, RAG, and Knowledge Graphs: A practical guide to autonomous and modern AI agents
Iuculano, Gabriele
Raieli, Salvatore
Paperback
Microsoft 365 and SharePoint Online Cookbook - Second Edition: A complete guide to Microsoft Office 365 apps including SharePoint, Power Platform, Cop
Ghatak, Sudeep
Chamberlain, Nate
Mahajan, Gaurav
Paperback
Learn Powershell in a Month of Lunches, Fourth Edition: Covers Windows, Linux, and macOS
Petty, James
Leonhardt, Tyler
Plunk, Travis
Paperback
Data and Reality: A Timeless Perspective on Perceiving and Managing Information in Our Imprecise World, 3rd Edition
Kent, William
Paperback
Observability Engineering: Achieving Production Excellence
Miranda, George
Majors, Charity
Fong-Jones, Liz
Paperback
SAP S/4hana Financial Accounting Certification Guide: Application Associate Exam
Pougkas, Stefanos
Paperback
A Friendly Guide to Data Science: Everything You Should Know about the Hottest Field in Tech
Vincent, Kelly P.
Paperback
Comptia A+ Complete Certification Kit: Exam 220-1101 and Exam 220-1102
McMillan, Troy
Buhagiar, Jon
Docter, Quentin
Paperback
Microsoft Power Automate Cookbook: Automating Business Processes Easily, Intuitively, and Quickly
Najjar, Ahmad
Paperback
Free Opensource Office Suite Software Apps For Windows 11 OS Hardcover Ver
Sakura, Cyber Jannah
Hardcover
Learning eBPF: Programming the Linux Kernel for Enhanced Observability, Networking, and Security
Rice, Liz
Paperback
Red Hat Certified Engineer (Rhce) Ansible Automation Study Guide: In-Depth Guidance and Practice
Block, Andrew
Bueno, Alex Soto
Paperback
Windows Internals: System Architecture, Processes, Threads, Memory Management, and More, Part 1
Yosifovich, Pavel
Russinovich, Mark
Ionescu, Alex
Paperback
Linux Kernel Programming - Second Edition: A comprehensive and practical guide to kernel internals, writing modules, and kernel synchronization
Billimoria, Kaiwan N.
Paperback
Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems
Blankinship, Paul
Beyer, Betsy
Adkins, Heather
Paperback
Docker: Up & Running: Shipping Reliable Containers in Production
Kane, Sean P.
Matthias, Karl
Paperback
Linux for Beginners: An Introduction to the Linux Operating System and Command Line
Cannon, Jason
Paperback
Practical Cybersecurity Architecture - Second Edition: A guide to creating and implementing robust designs for cybersecurity architects
Moyle, Ed
Kelley, Diana
Paperback
Version Control with Git: Powerful Tools and Techniques for Collaborative Software Development
Loeliger, Jon
Ponuthorai, Prem Kumar
Paperback
Cisco Certified Devnet Associate Devasc 200-901 Official Cert Guide
Gooley, Jason
Jackson, Chris
Iliesiu, Adrian
Hardcover
Intelligent Continuous Security: Ai-Enabled Transformation for Seamless Protection
Hornbeek, Marc
Paperback
SQL Server 2025 Unveiled: The Ai-Ready Enterprise Database with Microsoft Fabric Integration
Ward, Bob
Paperback
Salesforce Certified Platform Administrator Study Guide: Launch and Elevate Your Salesforce Career
Wheeler, Mike
Paperback
Attack Surface Management: Strategies and Techniques for Safeguarding Your Digital Assets
Eddings, Ron
Kaufmann, Mj
Paperback
Ansible: Up and Running: Automating Configuration Management and Deployment the Easy Way
Moser, René
Meijer, Bas
Hochstein, Lorin
Paperback
RAG-Driven Generative AI: Build custom retrieval augmented generation pipelines with LlamaIndex, Deep Lake, and Pinecone
Rothman, Denis
Paperback
pfSense Essentials: The Complete Reference to the pfSense Internet Gateway and Firewall
Reed, Jeremy C.
Paperback
Mastering Windows Security and Hardening - Second Edition: Secure and protect your Windows environment from cyber threats using zero-trust security pr
Dunkerley, Mark
Tumbarello, Matt
Paperback
Averting the Digital Dark Age: How Archivists, Librarians, and Technologists Built the Web a Memory
Milligan, Ian
Hardcover
Mastering Embedded Linux Development - Fourth Edition: Craft fast and reliable embedded solutions with Linux 6.6 and The Yocto Project 5.0 (Scarthgap)
Vasquez, Frank
Simmonds, Chris
Paperback
Kill It with Fire: Manage Aging Computer Systems (and Future Proof Modern Ones)
Bellotti, Marianne
Paperback
Mastering Terraform: A practical guide to building and deploying infrastructure on AWS, Azure, and GCP
Tinderholt, Mark
Paperback
Mastering Embedded Linux Programming - Third Edition: Create fast and reliable embedded solutions with Linux 5.4 and the Yocto Project 3.1 (Dunfell)
Simmonds, Chris
Vasquez, Frank
Paperback
Powershell Cookbook: Your Complete Guide to Scripting the Ubiquitous Object-Based Shell
Holmes, Lee
Paperback
Kubernetes Best Practices: Blueprints for Building Successful Applications on Kubernetes
Strebel, Dave
Burns, Brendan
Villalba, Eddie
Paperback
Cloud Native Data Security with Oauth: A Scalable Zero Trust Architecture
Archer, Gary
Kahrer, Judith
Trojanowski, Michal
Paperback
PowerShell Automation and Scripting for Cybersecurity: Hacking and defense for red and blue teamers
Wiesner, Miriam C.
Paperback
Building Green Software: A Sustainable Approach to Software Development and Operations
Currie, Anne
Hsu, Sarah
Bergman, Sara
Paperback
The Kubernetes Bible - Second Edition: The definitive guide to deploying and managing Kubernetes across cloud and on-prem environments
McKendrick, Russ
Madapparambath, Gineesh
Paperback
Mastering Windows Server 2016: A comprehensive and practical guide to Windows Server 2016
Krause, Jordan
Paperback
The FPGA Programming Handbook - Second Edition: An essential guide to FPGA design for transforming ideas into hardware using SystemVerilog and VHDL
Eschemann, Guy
Bruno, Frank
Paperback
DevOps and Site Reliability Engineering (SRE) Handbook: Non-Programmer's Guide
Fleming, Stephen
Paperback
Unix And Linux System Administration Handbook: Mastering Networking, Security, Cloud, Performance, And Devops
Botwright, Rob
Paperback
Data Quality Fundamentals: A Practitioner's Guide to Building Trustworthy Data Pipelines
Gavish, Lior
Vorwerck, Molly
Moses, Barr
Paperback
Text Data Management and Analysis: A Practical Introduction to Information Retrieval and Text Mining
Zhai, Chengxiang
Massung, Sean
Paperback
Cryptography Algorithms - Second Edition: Explore New Algorithms in Zero-knowledge, Homomorphic Encryption, and Quantum Cryptography
Bertaccini, Massimo
Paperback
The Embedded Linux Security Handbook: Fortify your embedded Linux systems from design to deployment
St Onge, Matt
Paperback
The Ultimate Linux Shell Scripting Guide: Automate, Optimize, and Empower tasks with Linux Shell Scripting
Tevault, Donald a.
Paperback
Industrial Cybersecurity - Second Edition: Efficiently monitor the cybersecurity posture of your ICS environment
Ackerman, Pascal
Paperback
Linux: The ultimate guide to Linux for beginners, Linux hacking, Linux command line, Linux operating system, and more!
Newport, Craig
Paperback
Linux: A complete guide to Linux command line for beginners, and how to get started with the Linux operating system!
Arthur, James
Paperback
Mastering Office 365 Administration: A complete and comprehensive guide to Office 365 Administration - manage users, domains, licenses, and much more
Rogers, Alara
Carpe, Thomas
Carter, Nikkia
Paperback
E-mail: A Write It Well Guide: How to Write and Manage E-mail in the Workplace
Chan, Janis Fisher
Paperback
The TCP/IP Guide: A Comprehensive, Illustrated Internet Protocols Reference
Kozierok, Charles M.
Hardcover
LINUX Beginner's Crash Course: Linux for Beginner's Guide to Linux Command Line, Linux System & Linux Commands
Start Guides, Quick
Paperback
135 Tips on Email and Instant Messages: Plus Blogs, Chatrooms, and Texting
Lindsell-Roberts, Sheryl
Paperback
The Ultimate Docker Container Book - Third Edition: Build, test, ship, and run containers with Docker and Kubernetes
Schenker, Gabriel N.
Paperback
Building Multi-Tenant Saas Architectures: Principles, Practices, and Patterns Using AWS
Golding, Tod
Paperback
Learn Powershell Scripting in a Month of Lunches, Second Edition: Write and Organize Scripts and Tools
Petty, James
Jones, Don
Hicks, Jeffery
Paperback
Cybersecurity Ops with Bash: Attack, Defend, and Analyze from the Command Line
D. Carl Albing Ph.
Troncone, Paul
Paperback
Accelerated Windows Memory Dump Analysis, Sixth Edition, Part 2, Kernel and Complete Spaces: Training Course Transcript and WinDbg Practice Exercises
Vostokov, Dmitry
Software Diagnostics Services
Paperback
NMAP Network Scanning Series: Network Security, Monitoring, And Scanning Library
Botwright, Rob
Paperback
Cybersecurity Tabletop Exercises: From Planning to Execution
Lelewski, Robert
Hollenberger, John
Paperback
Prometheus: Up & Running: Infrastructure and Application Performance Monitoring
Pivotto, Julien
Brazil, Brian
Paperback
Zabbix 7 IT Infrastructure Monitoring Cookbook - Third Edition: Explore the new features of Zabbix 7 for designing, building, and maintaining your Zab
Liefting, Nathan
Baekel, Brian Van
Paperback
Windows 11 for Enterprise Administrators - Second Edition: Unleash the power of Windows 11 with effective techniques and strategies
Miles, Steve
Singer, Manuel
Stokes, Jeff
Paperback
Multi-Cloud Mastery: Architecting Secure and Scalable Kubernetes Systems and Infrastructures.
Robertson, Adam
Paperback
PowerShell for Penetration Testing: Explore the capabilities of PowerShell for pentesters across multiple platforms
Blyth, Andrew
Paperback
Wireless Exploits And Countermeasures: Kali Linux Nethunter, Aircrack-NG, Kismet, And Wireshark
Botwright, Rob
Paperback
The Accidental Administrator: Cisco Router Step-by-Step Configuration Guide
Crawley, Don R.
Paperback
Cybersecurity Architect's Handbook: An end-to-end guide to implementing and maintaining robust security architecture
Nichols, Lester
Paperback
Mastering Vim - Second Edition: Efficient and effortless editing with Vim and Vimscript
Osipov, Ruslan
Paperback
Practical Threat Detection Engineering: A hands-on guide to planning, developing, and validating detection capabilities
Deyalsingh, Jason
Katz, Gary J.
Roddie, Megan
Paperback
Linux: The ultimate guide to Linux for beginners, Linux hacking, Linux command line, Linux operating system, and more!
Newport, Craig
Hardcover
Linux Kernel Debugging: Leverage proven tools and advanced techniques to effectively debug Linux kernels and kernel modules
N. Billimoria, Kaiwan
Paperback
Active Directory: Designing, Deploying, and Running Active Directory
Desmond, Brian
Richards, Joe
Allen, Robbie
Paperback
Linux: A Complete Guide to Learn Linux Commands, Linux Operating System and Shell Scripting Step-by-Step
Ayden, Nicholas
Paperback
