Table of contents : Table of Contents 0: About the book Paperback editions Audio book eBook and Kindle editions Feedback Why should anyone read this book or care about Kubernetes? Should I buy the book if I've already watched your video training courses? Updates to the book The book's GitHub repo Versions of the book 1: Kubernetes primer Kubernetes background Where did Kubernetes come from The operating system of the cloud Chapter summary 2: Kubernetes principles of operation Kubernetes from 40K feet Masters and nodes Kubernetes DNS Packaging apps for Kubernetes The declarative model and desired state Pods Deployments Services and network stable networking Chapter summary 3: Installing Kubernetes Kubernetes playgrounds Hosted Kubernetes DIY Kubernetes clusters Installing Kubernetes Play with Kubernetes Docker Desktop Google Kubernetes Engine (GKE) Other installation methods kubectl Chapter summary 4: Working with Pods Pod theory Hands-on with Pods Chapter Summary 5: Kubernetes Deployments Deployment theory How to create a Deployment Performing a rolling update How to perform a rollback Chapter summary 6: Kubernetes Services Setting the scene Theory Hands-on with Services Real world example Chapter Summary 7: Service discovery Quick background Service registration Service discovery Service discovery and Namespaces Troubleshooting service discovery Summary 8: Kubernetes storage The big picture Storage Providers The Container Storage Interface (CSI) The Kubernetes persistent volume subsystem Storage Classes and Dynamic Provisioning Demo Chapter Summary 9: ConfigMaps The big picture ConfigMap theory Hands-on with ConfigMaps Chapter Summary 10: StatefulSets The theory of StatefulSets Hands-on with StatefulSets Chapter Summary 11: Threat modeling Kubernetes Threat model Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of privilege Pod Security Policies Towards more secure Kubernetes Chapter summary 12: Real-world Kubernetes security CI/CD pipeline Infrastructure and networking Identity and access management (IAM) Auditing and security monitoring Real world example Chapter summary Glossary What next Practice makes perfect More books Video training Events and meetups Feedback