Course summary
1. Course summary
This brings us to the end of the “Architecting with Google Kubernetes Engine” course. Well done! At this point, you’ve discovered just how powerful GKE is, and we hope that you feel prepared to harness that power and leverage it in your own applications. We covered a lot of topics, so let’s take a moment to review what you’ve learned. The first section of the course was all about workloads in GKE. You learned what Deployments are, and how to configure, manage, and update them; how to use Jobs and CronJobs; how to scale clusters automatically and manually; and how to configure node and Pod affinity. Next, you learned about Pod and cluster networking in GKE, including service creation and load balancer configuration; container-native load balancing; and GKE networking. The third section of the course covered storage abstractions, where you explored running and maintaining pods using StatefulSets; using ConfigMaps to decouple configuration from Pods; managing and storing sensitive access and authentication data; and configuring persistent storage. From there, you moved on to authentication, authorization, and security in GKE, where you learned how to secure GKE clusters with Kubernetes RBAC and IAM; configure Workload Identity; use Pod Security Standards and Pod Security Admission to secure GKE; and implement Role-Based Access Control. Then we journeyed further into the world of monitoring in GKE in the fifth section, and you learned about Google Cloud Observability. You examined how to configure observability tools to monitor and manage performance availability; inspect Kubernetes logs; monitor system performance; create dashboards and alerts; and configure GKE-native monitoring and logging. And you didn’t stop there! In the sixth section of the course, you explored Google Cloud managed storage service options, where you learned to contrast managed storage services with self-managed storage; identify use cases for Cloud Storage for Kubernetes application; and compare the range of Google Cloud managed database services. You also explored Cloud SQL Auth Proxy and used Cloud SQL with GKE. Finally, in the last section of the course, you learned about CI/CD pipelines. This section covered Continuous Integration and Continuous Delivery pipelines, and how they can optimize app releases; code management in a source repository; and best practices for CI/CD pipelines. Whew, you made it! Pat yourself on the back, take a break, and when you return, you’ll be ready to get started building your own containerized applications on GKE. See you next time!2. Let's practice!
Create Your Free Account
or
By continuing, you accept our Terms of Use, our Privacy Policy and that your data is stored in the USA.