menu

Google Kubernetes Engine Best Practices

Advanced 6 Steps 6h 30m 44 Credits

Get Anthos Ready. Demand for Google Kubernetes Engine is growing, and customers are looking to Google and its partners to provide in-depth technical knowledge. These Google Kubernetes Engine-centric best practices will get you started containerizing to modernize in place , and then managing automated policies and security at scale -- key benefits when deploying production GKE environments -- including access control, monitoring, tracing, and logging.

Infrastructure Security

Quest Outline

Hands-On Lab

GKE Migrating to Containers

This lab provides a basic walkthrough of migrating a stateless application from running on a VM to running on Kubernetes Engine (GKE). It demonstrates the lifecycle of an application transitioning from a typical VM/OS-based deployment to three different containerized cloud infrastructure platforms.

Hands-On Lab

Monitoring with Stackdriver on Kubernetes Engine

In this lab you will set up Monitoring and visualizing metrics from a Kubernetes Engine cluster

Hands-On Lab

Tracing with Stackdriver on Kubernetes Engine

This lab deployings a Kubernetes Engine cluster, then a simple web application fronted by a load balancer is deployed to the cluster. The web app publishes messages provided by the user to a Cloud Pub/Sub topic. You will see the correlated telemetry data from HTTP requests to the app will be available in the Stackdriver Trace Console.

Hands-On Lab

Using Role-based Access Control in Kubernetes Engine

After provisioning two service accounts to represent user personas and three namespaces: dev, test, and prod, you will test the access controls of the personals in each namespace.

Hands-On Lab

Google Kubernetes Engine Security: Binary Authorization

This lab deploys a Kubernetes Engine Cluster with the Binary Authorization feature enabled; you'll learn how to whitelist approved container registries and the process of creating and running a signed container.

Hands-On Lab

Hardening Default GKE Cluster Configurations

This lab demonstrates some of the security concerns of a default GKE cluster configuration and the corresponding hardening measures to prevent multiple paths of pod escape and cluster privilege escalation

Enroll Now

Enroll in this quest to track your progress toward earning a badge.

home
Home
school
Catalog
menu
More
More