Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Intensive Kubernetes: Advanced Concepts, а также все другие курсы, прямо сейчас!
Премиум
  1. Урок 1. 00:17:10
    1.1 - Front Matter
  2. Урок 2. 00:13:12
    1.2 - Dockercoins, Our Sample Application
  3. Урок 3. 00:32:09
    1.3.1 - Kustomize
  4. Урок 4. 00:17:48
    1.3.2 - Kustomize
  5. Урок 5. 00:22:43
    1.4.1 - Helm
  6. Урок 6. 00:27:27
    1.4.2 - Helm
  7. Урок 7. 00:37:07
    1.5.1 - Homework: Creating Better Charts
  8. Урок 8. 00:14:04
    1.5.2 - Homework: Creating Better Charts
  9. Урок 9. 00:02:45
    1.6 - Extra content
  10. Урок 10. 00:03:38
    2.0 - Front Matter
  11. Урок 11. 00:35:40
    2.1.1 - Container capacity planning
  12. Урок 12. 00:30:57
    2.1.2 - Container capacity planning
  13. Урок 13. 00:40:24
    2.2 - Cluster Capacity Planning
  14. Урок 14. 00:19:49
    2.3.1 - Extending the Kubernetes API
  15. Урок 15. 00:48:05
    2.3.2 - Extending the Kubernetes API
  16. Урок 16. 00:02:07
    3.0 - Front Matter
  17. Урок 17. 00:10:29
    3.1.1 - Network Policies Part 1
  18. Урок 18. 00:06:51
    3.1.2 - Network Policies Part 2
  19. Урок 19. 00:10:42
    3.1.3 Network Policies Part 3
  20. Урок 20. 00:11:29
    3.1.4 - Network Policies Part 4
  21. Урок 21. 00:06:46
    3.1.5 - Network Policies Part 5
  22. Урок 22. 00:05:22
    3.2.1 - Authentication & Authorization Part 1
  23. Урок 23. 00:10:01
    3.2.2 - Authentication & Authorization Part 2
  24. Урок 24. 00:09:44
    3.2.3 - Authentication & Authorization Part 3
  25. Урок 25. 00:08:58
    3.2.4 - Authentication & Authorization Part 4
  26. Урок 26. 00:08:44
    3.2.5 - Authentication & Authorization Part 5
  27. Урок 27. 00:05:09
    3.2.6 - Authentication & Authorization Part 6
  28. Урок 28. 00:06:28
    3.3.1 - Pod Security Policies Part 1
  29. Урок 29. 00:06:59
    3.3.2 - Pod Security Policies Part 2
  30. Урок 30. 00:02:49
    3.3.3 - Pod Security Policies Part 3
  31. Урок 31. 00:13:40
    3.3.4 - Pod Security Policies Part 4
  32. Урок 32. 00:01:53
    3.3.5 - Pod Security Policies Part 5
  33. Урок 33. 00:02:42
    3.3.6 - Pod Security Policies Part 6
  34. Урок 34. 00:01:54
    3.3.7 - Pod Security Policies Part 7
  35. Урок 35. 00:21:59
    3.4.1 - Managing User Access Part 1
  36. Урок 36. 00:16:29
    3.4.2 - Managing User Access Part 2
  37. Урок 37. 00:01:13
    3.4.3 - Managing User Access Part 3
  38. Урок 38. 00:02:01
    4.0 - Front Matter
  39. Урок 39. 00:08:14
    4.1.1 - Volumes
  40. Урок 40. 00:14:45
    4.1.2 - Volumes
  41. Урок 41. 00:11:22
    4.1.3 - Volumes
  42. Урок 42. 00:08:15
    4.1.4 - Volumes
  43. Урок 43. 00:01:32
    4.1.5 - Volumes
  44. Урок 44. 00:02:19
    4.1.6 - Volumes
  45. Урок 45. 00:05:19
    4.1.7 - Volumes
  46. Урок 46. 00:14:14
    4.2.1 - Managing configuration
  47. Урок 47. 00:18:17
    4.2.2 - Managing configuration
  48. Урок 48. 00:08:12
    4.2.3 - Managing configuration