The Kubernetes Book, 2021 Edition

Workflow

Work in process based on Adler - How To Read A Book. Keeping this handy for the moment- will move to probably the sources page.

Inspectional

  1. Write purpose and expectations
  2. Review ToC
  3. Scan Index and note interesting terms.
  4. Read book quickly to try and understand it as a whole.
  5. Write brief summary.
  6. Define the structure.

Analytical & Syntopical

  1. Read Works Cited (Notes section).
  2. Go back and review particularly interesting sections where detailed notes may be useful if warranted. Suport of Syntopical reading.
  3. Start at the beginning and read more thoroughly and take detailed notes if warranted. Support of Analytical reading.

Purpose

I've been working my way toward Kubernetes for a while. It wasn't that long ago that I had limited familiarity with Linux and in the last several years I've tackled multiple distros of linux, several different languages, and containerization via Docker. So this is the next step down the rabbit hole that started sometime around when I read the Phoenix Project and came to understand that the tooling exists to make working with applications easier.

Expectations

I expect to learn a bit more about what makes K8s work. I'm especially interested in how to leverage K8s beyond just the cloud. My understanding is that it is designed with resiliency in mind (if a node goes down that the cluster can rerun the job and easily recover). I enjoy building solutions that punch above their weight. I hope that this book will give me enough understanding so I can start tinkering with a cluster and make things fly.

Table of Contents

  1. Preface
  2. Kubernetes Primer
  3. Kubernetes Principles of Operation
  4. Getting Kubernetes*
  5. Working with Pods
  6. Virtual Clusters with Namespaces
  7. Kubernetes Deployments
  8. Kubernetes Services
  9. Ingress
  10. Service Discovery Deep Dive
  11. Kubernetes Storage
  12. Configmaps and Secrets
  13. Stateful Sets
  14. API Security and RBAC
  15. The Kubernetes API
  16. Threat Modeling Kubernetes
  17. Real-world Kubernetes Security
  18. Terminology & Outro

Notes

Works Cited

Relectations and further research

Notes