KubeAcademy by VMware
Networking in Kubernetes Course Wrap Up
Next Lesson

Join 80,000+ fellow learners

Get hands-on practice with Kubernetes, track your progress, and more with a free KubeAcademy account.

Log In / Register

In this video we will review the key concepts we learned in the Networking in Kubernetes course.

Eric Smalling

Docker Captain and Senior Developer Advocate at Snyk

Eric is a Docker Captain and Senior Developer Advocate at Snyk.io where he helps developers secure the applications, containers and Kubernetes platforms they build and deploy to.

View Profile

Congratulations, you've completed the networking and Kubernetes Course from KubeAcademy. Let's take a quick review of what all we've covered.

We started the course with a deep dive into the basic rules of how Kubernetes pods communicate with each other, the mechanics of how that network traffic works, and introduced the concept of the container network interface. We also delved into the benefits the Kubernetes network model gives over traditional deployments with a simple microservices deployment example.

Once you understand how pods are able to communicate with each other and the outside world, the services lesson went over how the service discovery works and provides a single point of contact for your pods no matter where they're currently running in the cluster. Routing to services would be a maintenance nightmare if you had to constantly be updating external routing systems for the constantly changing application end points. So we showed you how an ingress provider allows for higher level traffic routing based on a host name, URL, or other criteria.

Controlling what traffic should or should not have access to your cluster workloads is essential in maintaining secure application platforms. In the network policies lesson, we went over how Kubernetes provides policy APIs to enforce rules dynamically, as well as how to implement a deny all style security posture.

Next, we dove into the container networking interface, APIs, and how different networking implementations are abstracted away from the Kubelet by plugins implementing it. We looked at a couple of the most popular open source plugins in use today, and the technical trade-offs to watch for as you choose the right plugin for your clusters.

Finally, we wrapped up with a session on the concepts and design considerations unique to the public cloud providers and what to watch out for when running on their platforms.

We sincerely hope you've enjoyed the lesson material, and that it provides help for you in deploying, managing, and securing your network applications in Kubernetes. Thanks for joining us. We look forward to seeing you in another lesson.

Give Feedback

Help us improve by sharing your thoughts.

Share