There’s Kubernetes theory and then there’s Kubernetes practice. This eBook is the latter—written by Brendan Burns (one of three original Kubernetes creators) and Craig Tracey (Heptio Field Engineer).

Here's the complete chapter list. Don't miss out on this awesome content.

Chapter 1

Introduction

Chapter 2

An overview of Kubernetes

Chapter 3

Kubernetes Architecture

Chapter 4

The Kubernetes API Server

Chapter 8

Authorization

Chapter 9

Admission Control

Chapter 10

Networking

Chapter 11

Monitoring Kubernetes

Get the eBook

FULL CHAPTER LIST

Craig Tracey is a technical leader and team builder. In his current role as a Staff Field Engineer at Heptio, Craig helps complex enterprises in financial services, telecommunications and technology make best use of Kubernetes. Previous experiences include Blue Box Group, Hubspot and VMware. Craig is always close to the cutting edge of technology and hands-on with customers  

ABOUT THE AUTHOR  

CRAIG TRACEY, STAFF FIELD ENGINEER - HEPTIO 

901 5th Ave, Suite 3310, Seattle, WA 98164 | ©2018 Heptio | Privacy Policy 

GET THE EBOOK >

Chapter 5

Scheduler

Chapter 6

Installing Kubernetes

Chapter 7

Authentication & User Management

Disaster Recovery

Chapter 12

Chapter 13

Extending Kubernetes

Chapter 14

Conclusions

Managing

Kubernetes

>

Use the Kubernetes API Server  

Learn how to:

There were lots of decisions to make. Which networking drivers do you use? How do I get logs flowing? Do I go with tracing? That’s not even the beginning of the list. That’s where Heptio came in.

"

Eric Wood

Director of Platform Engineering, Under Armour

Control scheduling with labels, affinity and tolerations  
Install the Kubernetes control plane  

*Heptio is committed to keeping your e-mail address confidential. We do not sell, rent, or lease our subscription lists to third parties. You may receive some emails with updates and invites from us if we believe they will be relevant to you. You may unsubscribe from these communications at any time. For more information on how to unsubscribe, our privacy practices, and how we are committed to protecting and respecting your privacy, please review our Privacy Policy.  

Establish role-based access controls (RBAC)  
Monitor your footprint and manage disaster recovery