0% found this document useful (0 votes)
23 views7 pages

High Level Prepratuion

Uploaded by

shiva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views7 pages

High Level Prepratuion

Uploaded by

shiva
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as XLSX, PDF, TXT or read online on Scribd
You are on page 1/ 7

pods

deployment

service

service LB N
schedule
storage
secrets
security

AWS
Terraform .tf files state
Ansible yaml
Jenkins environments
Docker
Kubernete yaml files
Namespace
NetworkPolicy ingress and egress
ResourceQuota CPU and memory
4. LimitRange Limit
5. PodSecurityPolicy
6. PodDisruptionBudgmaxUnavilable and minAvailable
7. ServiceAccount Toke request API token volume projection service account token secrets
8. Secret A Secret is an object that contains a small amount of sensitive data such as a password, a token, or a key
9. SecretList
10. ConfigMap A ConfigMap is an API object used to store non-confidential data in key-value pairs.
11. StorageClass
12. PersistentVolume
13. PersistentVolumeClaim
14. CustomResourceDefinition
15. ClusterRole
16. ClusterRoleList
17. ClusterRoleBinding
18. ClusterRoleBindingList
19. Role
20. RoleList
21. RoleBinding
22. RoleBindingList
23. Service
24. DaemonSet
25. Pod
26. ReplicationController
27. ReplicaSet
28. Deployment
29. HorizontalPodAutoscaler
30. StatefulSet
31. Job
32. CronJob
33. Ingress
34. APIService
s a password, a token, or a key.
AWS Ec2 S3 vpc iam
Terraform .tf fies state file provision workspace
Ansible Control no Managed nInventory Playbooks Plays Roles Tasks Handlers Modules
Jenkins CI/CD Pipeline Users security secrets
Docker Image container volume network
Kubernete Pod Deployment Service Storage/Volume Security secrets
shell Read Command Substitution Argument Passing Arithmetic Operation Conditiona
Linux file User system process network

Python Strings and Int


Keywords and Variables
Functions, Modules and Packages
Environment variables and Command Line Arguments
Operators
Conditional Handling - If, else, If else
Lists and Tuples
Loops - For loops and While loops
Advanced Lists and Tuples concepts using Loops
Dictionaries and Sets. - Project -1
File Operations in Python
Boto3 - Project 3
GitHub JIRA Integration using Python - Project 4
Plugins Collections

loops functions variables dict set arrays


OSI, application, presentation, session, transport, network, data link, physical
TCP/IP application, transport, network, network interface
Protocols User Datagram Protocol, HTPP, FTP, NFS, SMTP
VPC Subnets route table Route 53
Choose AMI Instance Type Configure instance Add storage Add tags SG EBS
Load Balancing, Auto Scaling, RDS, EFS, S3 Buckets
Cluster namespace pod (D, S) Load balancer auto scaling
Container Image and artefact
CI/CD Checkout Build and Test Build and push docker image update the deployment file
Checkout, build docker, push the artefacts, checkout k8s manifest SCM, update the K8s manifest and push the repo
Quotas Annotations Labels and Selectors Liveness and readiness Probes HPA VPA
Taints and Tolerations node affinity pod pre sets
Cluster Autosclar Configs Secrets, RABC, Storage Class
t and push the repo

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy