Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Intensive Kubernetes: Advanced Concepts, а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:17:10
    1.1 - Front Matter
  • Урок 2. 00:13:12
    1.2 - Dockercoins, Our Sample Application
  • Урок 3. 00:32:09
    1.3.1 - Kustomize
  • Урок 4. 00:17:48
    1.3.2 - Kustomize
  • Урок 5. 00:22:43
    1.4.1 - Helm
  • Урок 6. 00:27:27
    1.4.2 - Helm
  • Урок 7. 00:37:07
    1.5.1 - Homework: Creating Better Charts
  • Урок 8. 00:14:04
    1.5.2 - Homework: Creating Better Charts
  • Урок 9. 00:02:45
    1.6 - Extra content
  • Урок 10. 00:03:38
    2.0 - Front Matter
  • Урок 11. 00:35:40
    2.1.1 - Container capacity planning
  • Урок 12. 00:30:57
    2.1.2 - Container capacity planning
  • Урок 13. 00:40:24
    2.2 - Cluster Capacity Planning
  • Урок 14. 00:19:49
    2.3.1 - Extending the Kubernetes API
  • Урок 15. 00:48:05
    2.3.2 - Extending the Kubernetes API
  • Урок 16. 00:02:07
    3.0 - Front Matter
  • Урок 17. 00:10:29
    3.1.1 - Network Policies Part 1
  • Урок 18. 00:06:51
    3.1.2 - Network Policies Part 2
  • Урок 19. 00:10:42
    3.1.3 Network Policies Part 3
  • Урок 20. 00:11:29
    3.1.4 - Network Policies Part 4
  • Урок 21. 00:06:46
    3.1.5 - Network Policies Part 5
  • Урок 22. 00:05:22
    3.2.1 - Authentication & Authorization Part 1
  • Урок 23. 00:10:01
    3.2.2 - Authentication & Authorization Part 2
  • Урок 24. 00:09:44
    3.2.3 - Authentication & Authorization Part 3
  • Урок 25. 00:08:58
    3.2.4 - Authentication & Authorization Part 4
  • Урок 26. 00:08:44
    3.2.5 - Authentication & Authorization Part 5
  • Урок 27. 00:05:09
    3.2.6 - Authentication & Authorization Part 6
  • Урок 28. 00:06:28
    3.3.1 - Pod Security Policies Part 1
  • Урок 29. 00:06:59
    3.3.2 - Pod Security Policies Part 2
  • Урок 30. 00:02:49
    3.3.3 - Pod Security Policies Part 3
  • Урок 31. 00:13:40
    3.3.4 - Pod Security Policies Part 4
  • Урок 32. 00:01:53
    3.3.5 - Pod Security Policies Part 5
  • Урок 33. 00:02:42
    3.3.6 - Pod Security Policies Part 6
  • Урок 34. 00:01:54
    3.3.7 - Pod Security Policies Part 7
  • Урок 35. 00:21:59
    3.4.1 - Managing User Access Part 1
  • Урок 36. 00:16:29
    3.4.2 - Managing User Access Part 2
  • Урок 37. 00:01:13
    3.4.3 - Managing User Access Part 3
  • Урок 38. 00:02:01
    4.0 - Front Matter
  • Урок 39. 00:08:14
    4.1.1 - Volumes
  • Урок 40. 00:14:45
    4.1.2 - Volumes
  • Урок 41. 00:11:22
    4.1.3 - Volumes
  • Урок 42. 00:08:15
    4.1.4 - Volumes
  • Урок 43. 00:01:32
    4.1.5 - Volumes
  • Урок 44. 00:02:19
    4.1.6 - Volumes
  • Урок 45. 00:05:19
    4.1.7 - Volumes
  • Урок 46. 00:14:14
    4.2.1 - Managing configuration
  • Урок 47. 00:18:17
    4.2.2 - Managing configuration
  • Урок 48. 00:08:12
    4.2.3 - Managing configuration