Three days of real cluster work
Day 1
Architecture & Core Objects
- Control plane: API server, etcd, scheduler, controller manager — what each component does and why it matters
- Worker nodes: kubelet, kube-proxy, container runtime — the node-level stack explained
- Pods, ReplicaSets, Deployments, Namespaces: The fundamental workload objects and their relationships
- Services: ClusterIP, NodePort, LoadBalancer — when to use each service type
- ConfigMaps & Secrets: Clean separation of config from code, secure usage patterns
- kubectl daily toolkit: get, describe, apply, exec, logs, port-forward — the commands you'll use every day
Day 2
Workloads, Networking & Storage
- StatefulSets, DaemonSets, Jobs & CronJobs: The right workload type for stateful apps, node-level daemons, and batch tasks
- Liveness, readiness, and startup health probes: Configuring probes correctly to avoid false restarts and missed traffic
- Ingress: nginx controller, TLS termination, path routing — exposing services to the outside world
- Network Policies: Default-deny, namespace-to-namespace rules — securing pod communication
- Resource requests & limits, LimitRange, ResourceQuota: Preventing noisy-neighbour problems and enforcing fair cluster usage
- PersistentVolumes, PVCs, StorageClasses, dynamic provisioning: Persistent storage from first principles to cloud-native provisioners
Day 3
Security, Operations & Helm
- RBAC: ServiceAccounts, Roles, ClusterRoles, RoleBindings — least-privilege access control
- Pod security: SecurityContext, PodSecurityAdmission, non-root containers — hardening workloads
- HPA, VPA, Cluster Autoscaler: Scaling workloads and clusters automatically based on load
- Helm: Deploying charts, authoring your own — the Kubernetes package manager in practice
- Troubleshooting: CrashLoopBackOff, Pending, OOMKilled, ImagePullBackOff — systematic debugging methodology
What your team walks away with
Three days of hands-on cluster work. Participants leave with real operational confidence — not slides and theory.
- Deploy, configure, and scale applications independently in a real cluster
- Debug failures systematically — no guessing
- Set up RBAC and network policies for least-privilege security
- Write and manage Helm charts for reproducible deployments
Book the Kubernetes training
Available as a 3-day comprehensive course or focused on specific areas — scheduling, security, or storage.
Get in touch