Once you've packaged and deployed your application services to a Kubernetes cluster, you have to figure out how to expose them for client access. This course will set you in the right direction for managing ingress traffic to your deployed services.
Once all the hard work of packaging your services into the container format is complete, and you've successfully deployed them to a Kubernetes cluster, you still have the task of exposing those services beyond the cluster for external consumption. In this course, Managing Ingress Traffic Patterns for Kubernetes Services, you'll learn how to expose your Kubernetes services to fit your own unique deployment requirements. First, you'll learn about the different options available for exposing Kubernetes services, and how they might suit particular circumstances. Next, you'll see how to use the Kubernetes Ingress API for managing external traffic as it enters the cluster, and how it can be securely routed to its intended destination. Finally, you'll discover how to accommodate some advanced traffic routing patterns, as well as gain an understanding of some of the future directions for managing ingress in Kubernetes clusters. By the end of the course, you'll have the skills and knowledge necessary for making your microservices available for consumption beyond the Kubernetes cluster boundary.
Nigel is an IT professional with over 25 years of experience, gained in technical and management roles, including as CEO of a technical consulting organization. He has recently returned to his technical roots, and provide tuition in the domain of microservices and container technologies.
Course Overview [Autogenerated] Hi, everyone. My name is Nigel Brown and welcome to my course managing ingress. Traffic patterns for kubernetes services. I'm an independent writer, courseware, developer and classroom training for cloud native software technologies such as Docker and Kubernetes. Kubernetes is one out as the de facto delivery platform for hosting and orchestrating out native software applications that conformed to the micro services architecture. It's a complex platform with many important features, but one essential ingredient that kubernetes is required to provide is the reliable and secure routing of external client traffic to its intended destination in the platform. This course deals with the different tools and techniques for managing ingress traffic as it arrives at the edge of a kubernetes cluster. During the course. The main topics that will cover include getting to grips with the kubernetes ingress concept and ingress controls, configuring ingress definitions for routing traffic to services in the cluster, automating the secure configuration off transport layer security for deployed services, handling more advanced traffic routing requirements such as Canary deployments on discussing some of the limitations of the English a p I, and using alternative tools and techniques when we get to the end of the course, you'll have the knowledge of the tools, techniques and patterns that will enable you to confidently configure traffic routes to the services running in your kubernetes cluster. Ideally, before you get started with this course, you should already have some practical experience of the limits command line, some understanding of micro services on their delivery as prepackaged containers and familiarity with kubernetes. And it's a P eyes. I hope you'll join me on this journey to learn about managing ingress traffic patterns for kubernetes services.