Skip to content
Full Metal Kubernetes
Kubernetes day 2
Initializing search
Build a cluster
Networking
Storage
Authentication
Sensitive data and secrets
Applications
Day 2 Operations
Glossary
Full Metal Kubernetes
Build a cluster
Build a cluster
Install local tools
Helm
Encryption at rest
k0sctl and k0s
Examine cluster state
Networking
Networking
Install a cluster networking interface (CNI)
Service address pools
BGP
Layer 2 announcements
Network Policies
Ingress and Gateway objects
Storage
Storage
Hyperconverged storage
Ceph and Rook-Ceph
Authentication
Authentication
Kubernetes, roles, and authentication
OAuth2 and OpenID Connect
Role-based access control or RBAC
kubeconfig, contexts, and multiple clusters
Sensitive data and secrets
Sensitive data and secrets
Kubernetes Secrets objects
Mozilla SOPS
1Password
Applications
Applications
Putting it all together
Operators
PostgreSQL
Authoritative DNS
LDAP
Keycloak
Monitoring with Prometheus
Access with the Tailscale Operator
Backups with Kasten K10
Day 2 Operations
Day 2 Operations
k0s day 2 operations
Kubernetes day 2
Kubernetes day 2
Table of contents
Resource management
Networking day 2 operations
Storage day 2 operations
Glossary
Glossary
Glossary
Table of contents
Resource management
Kubernetes day 2
Resource management