Skip to content

Containerize your enterprise - tutorials and resources for learning Kubernetes hands on using azure!

Notifications You must be signed in to change notification settings

denniszielke/phoenix

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Project Phoenix - Containerize your enterprize

Welcome to project Phoenix - a hands on workshop to practice container technology in the enterprise.

What do we want to achieve?

After the workshop you should have hands on experience with:

  1. Defining application and system architectures for containers.
  2. Configuration options for automatic upgrades for containerized workloads.
  3. Unterstanding of Kubernetes objects (Pods, Services, Deployments, Secrets) and their usage for multi container applications.
  4. Gaining operational insights by logging and monitoring of your containerized worloads.
  5. Securing ingress and network communication paths to and inside your cluster
  6. Learn about advanced continous deployment process for your apps

Your path to there

  1. Set up your system.
  2. Accomplish the Single Loop Challenge and learn about container basics and Azure Container Instances for single container applications.
  3. Do the Kubernetes 101 Challenges and learn about Kubernetes basic concepts (pods and services),deploy a container to your cluster and make it available in the internet.
  4. Face the Kubernetes Multicontainer Challenge and deploy a complex multi container application update with zero downtime using an end to end automated azure devops pipeline.
  5. Professionalize your operations using insights in the Operations and Application Insights Challenge. Upgrade your application with another backend implementation written in Go, meassure the performance, reason about the performance metrics using Application Insights and if the new version is not good enough perform a rollback - without downtime.
  6. Secure your application for enterprise use case by using secure ingress, network policies, auth proxy and keyvault. Security Challenge.
  7. Implement continous blue green deployments by using ingress