Book Image

Kubernetes and Docker - An Enterprise Guide

By : Scott Surovich, Marc Boorshtein
Book Image

Kubernetes and Docker - An Enterprise Guide

By: Scott Surovich, Marc Boorshtein

Overview of this book

Containerization has changed the DevOps game completely, with Docker and Kubernetes playing important roles in altering the flow of app creation and deployment. This book will help you acquire the knowledge and tools required to integrate Kubernetes clusters in an enterprise environment. The book begins by introducing you to Docker and Kubernetes fundamentals, including a review of basic Kubernetes objects. You’ll then get to grips with containerization and understand its core functionalities, including how to create ephemeral multinode clusters using kind. As you make progress, you’ll learn about cluster architecture, Kubernetes cluster deployment, and cluster management, and get started with application deployment. Moving on, you’ll find out how to integrate your container to a cloud platform and integrate tools including MetalLB, externalDNS, OpenID connect (OIDC), pod security policies (PSPs), Open Policy Agent (OPA), Falco, and Velero. Finally, you will discover how to deploy an entire platform to the cloud using continuous integration and continuous delivery (CI/CD). By the end of this Kubernetes book, you will have learned how to create development clusters for testing applications and Kubernetes components, and be able to secure and audit a cluster by implementing various open-source solutions including OpenUnison, OPA, Falco, Kibana, and Velero.
Table of Contents (20 chapters)
1
Section 1: Docker and Container Fundamentals
5
Section 2: Creating Kubernetes Development Clusters, Understanding objects, and Exposing Services
9
Section 3: Running Kubernetes in the Enterprise

Questions

  1. Since Docker creates a default bridge network, there is no reason to create a custom bridge.

    A. True

    B. False

  2. Which of the following is an example of a socket?

    A. http:192.168.100.10

    B. 192.168.100.10

    C. 192.168.100.10:80

    D. https://192.168.100.10

  3. How would you start a container running a web server on port 8080 named nginx-web on a host that already has its host port (8080) bound to another container?

    A. docker run -d nginx-web bitnami/nginx

    B. docker run -p 8080:8080 -d nginx-web bitnami/nginx –force

    C. docker run -p 8081:8080 -d nginx-web bitnami/nginx

    D. Since port 8080 is bound on the host, you cannot run a container on port 8080

  4. You suspect an image may contain malware. You need to run the image safely to look at its contents. What Docker command will mitigate any network impact?

    A. docker run -isolate -it badimage bash

    B. docker run -p 0:0 -it badimage bash

    C. docker run -it badimage bash

    D. docker run --network=none -it badimage bash

  5. Once a container...