Learners become familiar with Kubernetes, an open source system for automating the deployment, scaling, and management of containerized applications, and Amazon Elastic Kubernetes Service (Amazon EKS), a managed service to run a Kubernetes workload on Amazon Web Services (AWS) without needing to install, operate, and maintain your own Kubernetes cluster.
•     Course level: Intermediate
•     Duration: 2 hour(s)
Activities
This course includes: interactive content, videos, and knowledge check questions.
Course objectives
In this course, you will learn to:
•     Explain containers and Amazon EKS in detail.
•     Enumerate the various .NET applications types that can be run on Amazon EKS.
•     Describe the concept of Windows containers and their architecture.
•     Summarize how Windows Authentication works with Windows containers.
Intended audience
This course is intended for:
•     Architect
•     DevOps Engineer
•     Infrastructure Engineer
•     SRE (Site reliability engineer)
•     Platform Engineer Data engineers
Prerequisites
We recommend that attendees of this course have:
•   AWS Tools to Develop, Run, and Modernize .NET WorkloadsÂ
Course outline
Section 1: How to Use This Course, Introduction and Objectives
•     Lesson 1: How to Use This Course
•     Lesson 2: Objectives
Section 2: Containers Overview
•     Lesson 3: Introduction
•     Lesson 4: Containers Compared to VMs
•     Lesson 5: Advantages of Running Containers
•     Lesson 6: Knowledge Check
•     Section 3: Amazon EKS Overview
•     Lesson 7: Amazon EKS Overview
•     Lesson 8: Industries and Application Types
•     Lesson 9: Deployment Options
•     Lesson 10: Knowledge Check
•     Section 4: Amazon EKS Architecture
•     Lesson 11: Amazon EKS Architecture
•     Lesson 12: Storage Options
•     Lesson 13: Knowledge Check
•     Section 5: Containerizing .NET Applications
•     Lesson 14: Windows Containers on AWS
•     Lesson 15: Use cases
•     Lesson 16: .NET on AWS
•     Lesson 17: Advantages of containers for .NET apps
•     Lesson 18: Windows Container Types
•     Lesson 19: Anatomy of a Container
•     Lesson 20: Image behavior
•     Lesson 21: Best Practices
•     Lesson 22: Application Pod Density
•     Lesson 23: Linux vs Windows Considerations
•     Lesson 24: CI/CD Support
•     Lesson 25: Knowledge Check
Section 6: Authentication and Authorization
•     Lesson 26: Access to the Cluster
•     Lesson 27: IAM Roles for Pods
•     Lesson 28: Authentication With gMSA
•     Lesson 29: Domainless Windows Authentication
•     Lesson 30: Knowledge Check
Section 7: Decision Tree
•     Lesson 31: Decision Tree
Section 8: Summary and Conclusion
•     Lesson 32: Summary and Conclusion
Section 9: Final Assessment
•     Lesson 33: Final Assessment
Section 10: Feedback
•     Lesson 34: Feedback