Kubernetes Course Chapter Outline
This article presents a comprehensive 41‑chapter outline of a Kubernetes training course, covering preparation, pod creation, API server permissions, custom admission controllers, core services, scheduling, kubelet lifecycle management, resource managers, container runtimes, garbage collection, networking, storage, autoscaling, CRDs, and service mesh components such as Istio and Envoy.
Chapter 1: Preparation work
Chapter 2: kubectl execution flow and design patterns when creating a pod
Chapter 3: Permissions in the apiserver
Chapter 4: Custom admission controller and nginx sidecar injection
Chapter 5: Core API service processing flow
Chapter 6: kube-scheduler pod scheduling process
Chapter 7: Role of kube-controller-manager
Chapter 8: kubelet's management of container lifecycle on nodes
Chapter 9: kubelet stability guarantees – eviction and OOM
Chapter 10: Understanding cgroupManager in kubelet
Chapter 11: kubelet resource managers – cpuManager, memoryManager, deviceManager
Chapter 12: kubelet pleg objects and containerManager summary
Chapter 13: kubelet containerRuntime and sandbox containers
Chapter 14: Pre‑work for containerRuntime creating init containers
Chapter 15: Post‑work for creating init and app containers
Chapter 16: containerRuntime container termination process
Chapter 17: kubelet Garbage Collection
Chapter 18: kubelet syncLoop primary configCh listener
Chapter 19: kubelet syncLoop other listeners
Chapter 20: Built‑in cAdvisor in kubelet
Chapter 21: Built‑in dockershim mechanism in kubelet
Chapter 22: Underlying container technology – image principles
Chapter 23: Source code analysis of k8s Job and CronJob
Chapter 24: k8s Deployment source code analysis
Chapter 25: k8s ReplicaSetController source code analysis
Chapter 26: k8s DaemonSet source code analysis
Chapter 27: k8s StatefulSet source code analysis
Chapter 28: Definition and concept of Service
Chapter 29: kube‑proxy iptables and ipvs mode source code analysis
Chapter 30: Underlying principles of k8s networking
Chapter 31: k8s Ingress 7‑layer routing mechanism and Traefik source code analysis
Chapter 32: k8s storage object source code analysis
Chapter 33: k8s ConfigMap and Secret analysis
Chapter 34: k8s HPA scaling and Aggregator plugin principle analysis
Chapter 35: Custom‑metric HPA based on prometheus‑adaptor
Chapter 36: k8s VPA scaling
Chapter 37: metrics‑server source code for HPA/VPA and kubelet top principle
Chapter 38: k8s CRD development
Chapter 39: Getting started with Istio and sidecar traffic hijacking principle
Chapter 40: Basics of Envoy
Chapter 41: Istio component analysis
The article concludes with a call for readers to like, share, and comment, noting that a paid extraction code is available via comments.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Practical DevOps Architecture
Hands‑on DevOps operations using Docker, K8s, Jenkins, and Ansible—empowering ops professionals to grow together through sharing, discussion, knowledge consolidation, and continuous improvement.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
