The CKA path

As one of the highest-rated open source projects, Kubernete's use is just exploding!
The Cloud Native Computing Foundation is committed to growing the community of Kubernetes Administrators, thereby allowing continued growth across the broad set of companies and organizations that are using Kubernetes.

Certification is a key step in that process, allowing certified administrators to quickly establish their credibility and value in the job market, and also allowing companies to more quickly hire high-quality teams to support their growth.

The Exam structure

According to the official certification course’s curriculum and the exam details, there are, in general, five categories:

· Cluster Architecture, Installation…


There is a widespread panic all over the internet lately with regards to the last move of Kubernetes to shun Docker from its platform.

Sparkling headlines like “The End of a Docker”, “Kubernetes Killed Docker” and an infinite amount of click baits are scattered all across the web discussing this issue.

The truth is that those claims are not that dramatic and certainly not accurate.

In this short article, I will spare you the unnecessary superlatives and excessive data and simply explain to you what is going to happen with Docker and Kubernetes in the near future.

Spoiler — not…


The scenario

Using an architecture based on target groups behind an application load balancer it’s a common practice for EC2 based applications.
But what happens when you have several applications that need to be accessible from the internet and need to communicate with each other maintaining the lowest possible latency?

The problem

As there are many applications that interact with each other and rely on vast intercommunication with each other, the problem of latency becomes a considerable issue.


Background

As a DevOps consultant I often find myself receiving numerous & various clients’ requests, Some of them are complicated due to clients particular circumstances ,objectives and constrains.
Once in a while, the stars are aligning and you find yourself in this “unicorn” situation, which is best described as:
Very simple at first glance, but complicated down the road

The scenario

One of my clients, a leading global cyber security company (name confidential) asked my assistance with an AWS related situation.

“I want every EC2 instance and Volume to be tagged with the identity of the provisioner upon resource creation. …


Prolog

As a DevOps & Cloud consultant, I am required to understand the
developers’ objectives and their perception for the way to obtain
them. Accordingly, follow their thought process and continuously
introduce them with cutting edge solutions that cater to their
needs.

Through my interaction with the AWS Platform, I have explored
its unique and effective set of services to expand developers’
options, mainly focusing on serverless architecture. …


The scenario

Using an architecture based on target groups behind an application load balancer it’s a common practice for EC2 based applications.
But what happens when you have several applications that need to be accessible from the internet and need to communicate with each other maintaining the lowest possible latency?

The problem

As there are many applications that interact with each other and rely on vast intercommunication with each other, the problem of latency becomes a considerable issue.

Case flowchart

The solution

Many solutions were examined until the right best formula was found:

a) Add an internal load balancer

b) Create a private hosted zone on Route53 thus…


Prologue

Working as a DevOps consultant in various companies profiles leads you (inevitably) to many edge use cases that you are sure that many people have already encountered before, and obviously there is a clear & quick solution to the problem, but sadly there is not one,
Thus you need to grapple with it on your own.

The Scenario

One of my clients wanted me to improve their fast provisioning process.

The simplistic scheme of the provisioning procedure goes like this:
1. A Jenkins job receives a specific desired server-template specification from A user
2. the user chooses AWS/VMware provider
3. …


Background

As a DevOps consultant I often find myself receiving numerous & various clients’ requests, Some of them are complicated due to clients particular circumstances ,objectives and constrains.
Once in a while, the stars are aligning and you find yourself in this “unicorn” situation, which is best described as:
Very simple at first glance, but complicated down the road

The scenario

One of my clients, a leading global cyber security company (name confidential) asked my assistance with an AWS related situation.

“I want every EC2 instance and Volume to be tagged with the identity of the provisioner upon resource creation. (For example- Tag-name…

Ormaman

- DevOps & Infra specialist — Entrepreneur — Project leader — Consultant

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store