SKILL BENCHMARK
Kubernetes Proficiency (Advanced Level)
- 35m
- 35 questions
The Kubernetes Proficiency benchmark measures whether a developer learning persona has experience with typical and common Kubernetes terminology, tools, and technologies. A learner who scores high on this benchmark demonstrates a high level of skill of commonly used Kubernetes services and tools.
Topics covered
- configure a Kubernetes cluster
- configure Multus CNI to allow Kubernetes pods to be created with multiple network interfaces
- define what a cluster and nodes are and understand the motivation behind clustering
- describe Azure Kubernetes Service (AKS) and outline how it's managed for continuous delivery
- describe features and benefits of Amazon Elastic Kubernetes Services (EKS) and how it's managed for continuous delivery
- describe how Amazon Elastic Kubernetes Services (EKS) handles logging and monitoring
- describe how Google Cloud Operations for Google Kubernetes Engine (GKE) handles logging and monitoring
- describe how Microsoft Azure Kubernetes Services (AKS) handles logging and monitoring
- describe Kubernetes objects and their purpose
- describe operators in Kubernetes and the operator pattern
- describe several types of infrastructure extensions that are available in Kubernetes
- describe some of the methods for extending Kubernetes on the client side
- describe some of the methods for extending Kubernetes on the server side
- describe the authentication and authorization process for using the Kubernetes API
- describe the features and benefits of Kubernetes load balancing
- describe the process for securing a Kubernetes cluster
- describe the use of iptables and routing tables with Kubernetes, how they're implemented, and how traffic is routed between nodes
- describe the YAML templating language
- describe what Google Kubernetes Engine (GKE) is and outline how it's managed for continuous delivery
- describe what makes Kubernetes networking different than other platform networking considerations with reference to the history of enterprise networked applications and services
- explain how Kubernetes was designed for distributed computing and that it is clustering software
- identify several key features of Kubernetes
- identify some of the main Kubernetes cluster security concerns that make Kubernetes vulnerable to attacks
- identify the phases of a pod's life and describe a pod's lifecycle
- identify what a DaemonSet is in Kubernetes and why they are used
- identify what a pod is, and explain its crucial role in Kubernetes
- identify what a ReplicaSet is in Kubernetes and recognize its role
- outline how cloud computing helps accelerate scalable solutions
- outline how security contexts are normally applied to Pods in Kubernetes
- outline the 4C's of cloud-native security and how cloud providers, such as AWS and Azure, implement this security
- recognize some of the main security concerns and vulnerabilities faced when migrating to the cloud
- recognize the benefits of containerized applications
- recognize why it is beneficial to extend Kubernetes and the tools involved in this operation
- summarize common security issues and exploits when using Kubernetes
- summarize the basics of Kubernetes networking, including IP address management