SitePoint
  • Blog
  • Forum
  • Library
  • Login
Join Premium
Start Kubernetes
Close
    • Start Kurbenetes
    • What is the difference Kubernetes and Docker?
    • Kubernetes vs. Docker Swarm?
    • Master nodes
    • Worker nodes
    • Labels and selectors
    • Annotations
    • Working with Pods
    • Scaling Pods
    • Creating Pods
    • Managing Pods with ReplicaSets
    • Zero-downtime updates?
    • Creating Deployments
    • How to scale the Pods up or down?
    • Updating the Pod templates
    • Deployment strategies
    • Accessing and exposing Pods with Services
    • How to access the Pods without a service?
    • Using a Kubernetes Service
    • Using the Kubernetes proxy
    • Viewing Service details
    • Kubernetes service types
    • Exposing multiple applications with Ingress
    • Installing the Ambassador API gateway
    • Single service Ingress
    • Path based routing with Ingress
    • Name-based Ingress
    • Cleanup
    • Other Ingress controller responsibilities
    • Organizing applications with namespaces
    • Jobs and CronJobs
    • CronJobs
    • Configuring application through arguments
    • Difference between CMD and ENTRYPOINT in Dockerfiles
    • Creating and using ConfigMaps
    • Creating ConfigMaps using Kubernetes CLI
    • Storing secrets in Kubernetes
    • Consuming Secrets as environment variables
    • Consuming Secrets from Volumes
    • What are Volumes?
    • Persisting data with Persistent Volumes and Persistent Volume Claims
    • Storage classes
    • Creating Persistent Volumes
    • Using Storage Class for dynamic provisioning
    • Running stateful workloads with StatefulSets
    • Init containers
    • Sidecar container pattern
    • Ambassador container pattern
    • Adapter container pattern
    • Application Liveness probe
    • HTTP Probe
    • Command Probe
    • TCP Probe
    • Application Startup probe
    • Application Readiness probe
    • What are service accounts?
    • Using Role-Based Access Control (RBAC)
    • Roles
    • Bindings
    • Security contexts
    • Privileged containers
    • User (UID) and group ID (GID)
    • Linux capabilities
    • SELinux
    • AppArmor
    • Seccomp
    • Pod security policies
    • Network Policies
    • Installing Cilium
    • Common Network Policies
    • Scaling and autoscaling Pods
    • Resource requests and limits
    • Resource quotas
    • Horizontal scaling
    • Using affinity, taints, and tolerations
    • Using custom resource definitions (CRDs)
    • Create a CustomResourceDefinition
    • Create a controller
    • Kubernetes Operators
    • Helm 101
    • Using an Ingress controller for SSL termination
    • Deploying the sample application
    • Deploying cert-manager
    • Challenges
    • Ambassador
    • Requesting a certificate
    • Configuring TLS in Ingress
    • Cleanup

What do I need to start with Kubernetes?

This book is a mix of theoretical explanations and practical examples. You’ll get the most out of this book if you follow along with the practical examples. To do that, you will need the following tools:

  • Docker Desktop
  • Access to a Kubernetes cluster, see Which Kubernetes cluster should I use?
  • Kubernetes CLI (kubectl)

For some sections, you might also need other tools that I mention in the specific chapters.

End of PreviewSign Up to unlock the rest of this title.

Community Questions