This is an example of a simple banner

Training: AWS – Running Containers on Amazon Elastic Kubernetes Service

Ref. AWS-205
Duration:
3
 days
Exam:
Optional
Level:
Intermediate

AWS - Running Containers on Amazon Elastic Kubernetes Service

Running Containers on Amazon Elastic Kubernetes Service is a comprehensive course for cloud professionals looking to master container orchestration with Kubernetes on AWS. With Amazon EKS, you can run Kubernetes clusters on AWS without the need to manage your own Kubernetes control plane, greatly simplifying containerized application management. This course will teach you how to deploy applications using continuous integration (CI/CD) tools, effectively configure networking, ensure security, and automate scaling. Whether you’re a cloud architect or a DevOps engineer, this training will provide the skills you need to manage Kubernetes environments at scale.

Why choose Amazon EKS for your containers?

Amazon EKS allows you to run Kubernetes in the AWS cloud without the complexities of installing and maintaining your own infrastructure. You’ll learn how to secure and observe your clusters while optimizing the performance of your containerized applications. This course is ideal for professionals looking to automate container deployment and management with increased flexibility and resilience.

Optimize your deployments with Kubernetes and Amazon EKS

Whether you’re an experienced cloud expert or a beginner with a solid foundation in Linux, this course will equip you with the knowledge needed to architect, deploy, and maintain complex solutions on AWS using Kubernetes. Through hands-on workshops, you’ll learn how to manage Amazon EKS clusters, deploy applications, and configure full observability for your production environments.

Participant profiles

  • Cloud architects
  • DevOps engineers
  • Systems administrators
  • Application deployment specialists

Objectives

  • Master Kubernetes key components
  • Manage Kubernetes control plane with Amazon EKS
  • Build and maintain an Amazon EKS cluster
  • Deploy applications on Amazon EKS clusters
  • Ensure security in EKS environments
  • Configure complete observability of EKS clusters

Prerequisites

  • Basic knowledge of Linux and network administration
  • Familiarity with containers and Docker fundamentals
  • Completion of the Amazon EKS introduction course
  • Understanding of microservices architecture
  • Experience with AWS services

Course content

Module 1: Fundamentals of Containers

  • Design principles for building applications
  • What are containers?
  • Container components
  • Writing Dockerfiles

Module 2: Kubernetes Basics

  • Challenges of managing many containers
  • What is Kubernetes and why is it important?
  • Kubernetes control plane components
  • Kubernetes worker nodes and pods
  • Key Kubernetes objects
  • Managing Kubernetes with kubectl
  • Workshop 1: Deploying Kubernetes pods

Module 3: Amazon EKS Fundamentals

  • How Amazon EKS manages the Kubernetes control plane
  • Amazon EKS security fundamentals
  • Use cases for extending Amazon EKS to the data plane
  • Running worker nodes on managed node groups
  • Running containers on AWS Fargate with Amazon EKS
  • Amazon EKS tasks and Kubernetes tasks

Module 4: Building an Amazon EKS Cluster

  • Visual review of the Amazon EKS architecture to be built in labs
  • IAM authentication
  • Amazon VPC and AWS networking fundamentals
  • Different methods to create a cluster
  • High-level steps in creating a cluster
  • eksctl function
  • Preparation for labs: Reviewing course lab activities
  • Workshop 2: Creating an Amazon EKS cluster

Module 5: Deploying Applications on Your Amazon EKS Cluster

  • Pushing container images to Amazon ECR
  • Deploying applications with Helm
  • Continuous deployment in Amazon EKS
  • GitOps and Amazon EKS
  • Workshop 3: Deploying applications

Module 6: Architectures on Amazon EKS Part 1: Observing and Optimizing

  • Configuring observability in an Amazon EKS cluster
  • Collecting metrics
  • Using metrics to automatically scale EC2 Auto Scaling groups
  • Managing logs
  • Tracing applications in Amazon EKS
  • Gaining insights and applying observability findings
  • Workshop 4: Monitoring Amazon EKS

Module 7: Architectures on Amazon EKS Part 2: Balancing Efficiency, Resilience, and Cost

  • Optimizing your Amazon EKS application architecture
  • Balancing cost, efficiency, and resilience
  • Anatomy of an Amazon EKS cluster from a cost perspective
  • Using pod placement and tagging for cost accountability
  • Effective sizing of containers and worker nodes

Module 8: Managing Networking in Amazon EKS

  • Review: VPC fundamentals
  • The importance of key communication components
  • Communication flows in a non-containerized architecture
  • Networking challenges in Kubernetes
  • Comparison of Docker communication with Kubernetes model
  • How Amazon EKS and Amazon VPC simplify inter-node communications
  • Managing pod-to-pod communication in Amazon EKS
  • The relationship between communication and scalability
  • Running worker nodes in a non-cluster subnet
  • Managing service name resolution
  • Using service mesh with Amazon EKS
  • Configuring AWS App Mesh
  • Workshop 5: Exploring Amazon EKS communication

Module 9: Securing Amazon EKS Clusters

  • How IAM integrates with Kubernetes role-based access control (RBAC)
  • Managing access control to cluster endpoints
  • Auditing access with AWS CloudTrail logs
  • Mitigating security risks when building container images
  • Securing network communications
  • Managing secrets
  • Workshop 6: Securing Amazon EKS

Module 10: Managing Updates in Amazon EKS

  • Contrast between Kubernetes version updates and Amazon EKS platform version updates
  • Upgrading your Kubernetes version
  • Upgrading your Amazon EKS version
  • Maintaining third-party applications

Documentation

  • Digital course material included

Complementary courses

Additional information

Master container orchestration with Amazon EKS

The Running Containers on Amazon Elastic Kubernetes Service course is designed to equip you with the skills needed to manage containerized applications on AWS. You will learn the fundamental principles of containers, along with a complete understanding of Amazon EKS, which removes the complexity of managing the Kubernetes control plane. By choosing Amazon EKS, you benefit from the flexibility, scalability, and security of a managed infrastructure, allowing you to focus on deploying and managing your applications. This course includes hands-on labs to build and secure your Kubernetes clusters while optimizing performance using observability and metrics management tools.

Hands-on labs for mastering Kubernetes and EKS

In addition to theoretical knowledge, this course offers practical labs. You will learn how to deploy Kubernetes pods, build an Amazon EKS cluster, and monitor your applications in real-time. These labs provide the skills necessary to automate deployments and secure your environments. By using tools like Amazon Elastic Container Registry (Amazon ECR) to manage your container images, you can deploy applications continuously while ensuring their security and resilience.

Amazon EKS: A solution for observability and performance optimization

This course also covers how Amazon EKS simplifies performance management through observability tools. You will configure metric collection, manage logs, and perform full application tracing with tools like AWS CloudWatch. These features allow you to quickly diagnose issues, optimize the scalability of your applications, and automatically manage EC2 Auto Scaling groups based on observed metrics. These skills are crucial for ensuring performance and availability in large-scale cloud deployments.

Optimize costs and strengthen security with Amazon EKS

This course will teach you how to optimize costs while enhancing security in Kubernetes environments. Amazon EKS allows you to use EC2 Auto Scaling groups and manage your containers with both Amazon EC2 and AWS Fargate. By tagging pods and containers, you can track costs associated with each component of your architecture and adjust resources based on actual needs. Cost optimization is vital for companies looking to maximize profitability while maintaining high-performance levels.

Secure your clusters and communications with Amazon EKS

Security is a central focus of the Running Containers on Amazon Elastic Kubernetes Service course. You will learn to use IAM policies to manage permissions and integrate IAM with Kubernetes role-based access control (RBAC). Additionally, you’ll discover how to secure intra-cluster communications, manage secrets, and protect container images from vulnerabilities. With monitoring tools like AWS CloudTrail, you can audit all actions performed in your Kubernetes environment, mitigating security risks.

How to manage networking in Amazon EKS

Networking management is another key aspect of the course. You will use Amazon Virtual Private Cloud (Amazon VPC) to configure subnets, secure communication flows, and manage service name resolution within your Kubernetes environment. The labs will guide you in setting up AWS App Mesh to manage service mesh, ensuring reliable and secure communication between your pods and services. These skills are essential for maintaining large-scale containerized environments while ensuring the stability and scalability of deployed applications.

FAQ

What is Amazon Elastic Kubernetes Service (EKS)?

Amazon EKS is a managed service that lets you run Kubernetes on AWS without having to manage your own Kubernetes control plane.

Why choose Amazon EKS for your containerized applications?

Amazon EKS simplifies container management while ensuring security and performance at scale, without the complexity of a self-managed infrastructure.

How does Amazon EKS optimize cluster management?

Amazon EKS supports automated updates, scalability, and monitoring integration, reducing management efforts while ensuring optimal performance.

What are the security benefits of Amazon EKS?

Amazon EKS integrates with IAM and RBAC, offering fine-grained access control and enhanced security for network communications and container images.

Prix de l'inscription
CHF 2'550.-
Inclus dans ce cours
  • Training provided by a domain expert
  • Digital documentation and support materials
  • Achievement badge
Mois actuel

Session scheduled on demand, please contact us to open a session

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday
8:30 AM to 6:00 PM
Tel. 058 307 73 00

Contact-us

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Make a request

Contact

ITTA
Route des jeunes 35
1227 Carouge, Suisse

Opening hours

Monday to Friday, from 8:30 am to 06:00 pm.

Contact us

Your request