Level 1 (CKAD) | Level 2 (Baseline for production) | Level 3 (Expert) |
---|---|---|
Create and configure basic Pods |
|
|
Understand SecurityContexts |
|
|
Define an applications resource requirements |
|
Define pod disruption budgets |
Create and consume secrets | -- | Use an external vault with key management |
Understand ServiceAccounts | Manage role based access control (RBAC) | Know how to integrate with external authentication and authorization systems |
Understand multi-container Pod design patterns | -- | Understand network level details of sidecar injection |
Understand LivenessProbes and ReadinessProbes | Know how to configure metrics server incl. external systems | -- |
Understand container logging | Configure log harvesting to external systems | Install and configure complete logging stack (e.g. ELK) |
Understand how to monitor applications | Understand object lifecycle inside the cluster | Know the value of integrating with external SIEM systems |
Understand Deployments and how to perform rolling updates | Know how to design applications for business continuity and recoverability | -- |
Understand Deployments and how to perform rollbacks | Know how to design applications for business continuity and recoverability | -- |
Understand Jobs and CronJobs | Design self managing microservice architecture by leveraging scheduled batch operations | -- |
Understand how to use Labels, Selectors, and Annotations | Use Labels and Selectors to isolate and categorize objects | Use Labels and Selectors to provide visibility to resource utilization, use annotations to create custom toolings |
Understand Services | Understand Ingresses and Loadbalancers | Understand how to setup a secure, multi-layered front-end architecture with SSL configuration, host setup and integrate with external IDAM solutions |
Demonstrate basic understanding of NetworkPolicies | Can configure network policies inclusing IP and host filtering | Understand and design Pod security policies at teh cluster level, use and integrate with container firewalls, understand CNI specification |
Understand PersistentVolumeClaims for storage | Use StatefulSets for databases and stateful loads | Define and manage cluster level storage options, understand CSI specification |
-- | Admission Controllers | |
-- | -- | CIS Benchmarks |
-- | -- | Implement Continuous Security Vulnerability Scanning |
Last active
December 17, 2020 21:59
-
-
Save sensei-wu/b516ffa111b99e133c4c5df06b604cbc to your computer and use it in GitHub Desktop.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment