Module 0: Introduction and Getting Started
Think of Module 0 as setting the baseline. You'll create a local Kubernetes cluster using KIND, deploy all five components of the voting application, and verify it works end-to-end. This deployment works, but it's not production-ready. Over the next nine modules, you'll evolve this basic setup into a robust, scalable, secure production deployment.
By the end of this module, you'll have a working multi-node Kubernetes cluster with the Example Voting App running locally. This exact setup becomes your playground for exploring advanced scheduling, autoscaling, traffic management, security policies, and more.
0/8
Module 1: Advanced Pod Scheduling
This module teaches you to take control of the scheduler. You'll learn how to place postgres on SSD nodes, spread vote replicas across different machines, and use taints to keep general workloads off your database servers. These are the first production readiness improvements to your application.
0/9
Module 2: Autoscaling – HPA, VPA and KEDA
Autoscaling makes the app self-adjusting. Kubernetes watches metrics, compares them to targets you define, and automatically adjusts replicas or resource allocations. Your Voting App becomes resilient to traffic spikes without manual intervention.
0/8
Module 3: Gateway API
In this module, you'll install a Gateway controller (Contour), create Gateway and HTTPRoute resources, implement sophisticated routing rules for the Voting App, and explore traffic splitting patterns for canary deployments. By the end, you'll understand why Gateway API is the future of Kubernetes traffic management.
0/11
Module 4: Service Mesh
Service mesh is a crossroads decision in production readiness. Many teams adopt it prematurely, adding complexity without benefit. Others add it too late, missing observability and security gaps. This module teaches you when a service mesh adds value versus when it adds unnecessary overhead.
0/11
Module 5: Security – Network Policies, Pod Security Admission , RBAC Policies
This module teaches defense-in-depth security for Kubernetes applications. You'll build multiple layers of protection, each addressing different attack vectors. NetworkPolicy controls traffic at the network level. Pod Security Admission prevents privilege escalation at the pod level. RBAC limits API access. Secrets management protects credentials. Together, these layers create a security posture that's resilient even when individual components are compromised.
0/9
Module 6: Writing Helm Charts
Helm is the package manager for Kubernetes. It transforms your collection of YAML files into reusable, parameterized, versionable deployment packages called charts.
0/12
Module 7: CRDs
CRDs are the foundation of the Kubernetes extension model. Once you understand CRDs, you unlock Operators (Module 8), Helm patterns, and the entire CNCF ecosystem
0/4
Module 8: Building K8s Operators (Workflow)
This module transforms you from "I created a CRD" to "I built an operator that automates reconciliation." You'll build a working VoteConfig operator using Kubebuilder that watches VoteConfig resources and automatically creates and updates ConfigMaps. By the end, you'll understand the complete operator development workflow and how operators make custom resources truly declarative.
0/4
Module 9: Intro to Agentic Kubernetes
This module introduces the emerging field of AI-assisted Kubernetes operations. You will learn how Model Context Protocol enables AI models to interact with your cluster safely, try AI-powered troubleshooting on deliberately broken deployments, and develop the safety awareness needed to use these tools responsibly.
0/4