GC Partner no outline H
8574  Reviews star_rate star_rate star_rate star_rate star_half

Manage Scalable Workloads in GKE Enterprise

Discover how to modernize, manage, and observe applications at scale using Google Kubernetes Engine Enterprise. This course uses lectures and hands-on labs to help you explore and deploy using Google...

Read More
$2,700 USD
Duration 3 days
Course Code GCP-MAN-GKE
Available Formats Classroom

Overview

Discover how to modernize, manage, and observe applications at scale using Google Kubernetes Engine Enterprise. This course uses lectures and hands-on labs to help you explore and deploy using Google Kubernetes Engine (GKE), GKE Fleets, Cloud Service Mesh, and Config Controller capabilities that will enable you to work with modern applications, even when they are split among multiple clusters hosted by multiple providers.

Skills Gained

  • Describe the components and architecture of GKE Enterprise
  • Identify and describe the core components of a GKE Enterprise fleet.
  • Describe how fleets discover and communicate with each other in GKE Enterprise.
  • Detail the benefits of using Service Mesh and use it to implement advanced routing and traffic management.
  • Secure traffic between microservices using Cloud Service Mesh.
  • Create multi-cluster networking architectures with Cloud Service Mesh.
  • Use authentication to effectively manage identity in GKE Enterprise.
  • Evaluate and apply various security measures to effectively protect and manage GKE deployments.
  • Evaluate options and Google Cloud products that allow you to create scalable CI/CD implementations within a GKE Enterprise environment.
  • Explore how GKE facilitates the deployment and optimization of gen AI models.

Who Can Benefit

  • Google Cloud practitioners.
  • Individuals using Google Cloud to create, integrate, or modernize solutions using secure, scalable microservices architectures in hybrid environments

Prerequisites

  • Having completed Google Cloud Platform Fundamentals: Core Infrastructure or having equivalent experience.
  • Having completed Architecting with GKE or having equivalent experience.

Course Details

Introduction to GKE Enterprise

  • Recognize the challenges of designing and building multi-environment solutions.
  • Compare and contrast GKE modes of operation.
  • Describe the concepts of sameness and trust, and use them to manage fleets.
  • Identify the features and components of the GKE Enterprise technology stack.

GKE Enterprise architecture

  • Recognize how GKE Enterprise can be used to centralize cluster management.
  • Examine the architecture of GKE Enterprise clusters.
  • Create, connect, and manage GKE Enterprise clusters.
  • Securely access GKE Enterprise clusters.

Fleets and teams

  • Define GKE fleets.
  • Describe how GKE fleets can solve common cluster management problems.
  • Manage fleets and teams in GKE Enterprise.
  • Detail the elements of fleet management.

Managing GKE configuration at scale

  • Recognize the challenges of scaling multi-cluster, multi-tenant configurations.
  • Configure a centralized configuration management using a GitOps model.
  • Describe the benefits and architecture of Config Sync.
  • Use Policy Controller to enforce security and compliance in GKE.
  • Create a standardized, reusable, and policy-driven foundation for Kubernetes deployments.

Fleet networking

  • Explain how fleet networking works.
  • Describe how Pods in a Kubernetes cluster communicate with each other.
  • Enable multi-cluster Services.
  • Configure multi-cluster Services.
  • Detail the elements of fleet management.
  • Outline the role of a multi-cluster gateway.
  • Configure a multi-cluster gateway.

Cloud Service Mesh

  • List and describe the benefits of using Cloud Service Mesh.
  • Install and configure Cloud Service Mesh on different clusters.
  • Trace the path of a request through the mesh, correctly identifying and explaining the role of key components like Envoy proxies, Mesh CA, and extensions in handling the request.
  • Create Service Mesh dashboards from workload telemetry including metrics, traces, and logs.

Cloud Service Mesh routing

  • Explain how Cloud Service Mesh learns the network from Kubernetes.
  • Deploy mesh API resources such as the VirtualService, DestinationRule, Gateway, Service Entry, and the Sidecar to configure the mesh.
  • Describe how to harden the mesh network by introducing new functionality such as request retries, request timeouts, and circuit breakers.
  • Explore Service Mesh resilience by creating failures and delays on specific services

Service Mesh security

  • Encrypt traffic between microservices to prevent anyone in the network from gaining access to private information.
  • Authorize services and requests, ensuring that services only access the information that is allowed access from other services.
  • Authenticate and authorize services and requests to verify trust among services in the mesh and among end users.
  • Limit service access in the network so that granular controls over the communication can be established.

Multi-cluster networking with Cloud Service Mesh

  • Set up a multi-cluster mesh with a single subnet in a single VPC network. Account for variations like multi-region clusters, multiple projects, shared VPC, and private clusters.
  • Enable communication between GKE clusters on different networks using an east-west gateway and attached clusters.

Managing identity for GKE Enterprise using GKE Identity Service

  • Explain the differences between authentication methods for GKE clusters.
  • Summarize the key features of Connect gateway. Explain how it simplifies and secures connections to GKE Enterprise fleet member clusters.
  • Configure Connect gateway for authentication and authorization.
  • Securely access clusters using OpenID Connect (OIDC) and third-party identity providers (IdPs).
  • Configure GKE Identity Service to enable authentication and authorization for users using a third-party identity provider (IdP).
  • Differentiate between Workload Identity and Workload Identity Federation, and explain when to use each.

Security posture, compliance, and preventative controls

  • Describe GKE security posture.
  • Navigate and interpret the GKE security posture dashboard to identify security issues.
  • Analyze methods for hardening the GKE control plane, and evaluate their effectiveness in mitigating specific security risks.
  • Implement node security measures to protect GKE worker nodes from potential threats.
  • Describe the process of vulnerability scanning in GKE.
  • Apply the insights from the GKE security posture dashboard to prioritize and remediate vulnerabilities in GKE deployments.
  • Explain the roles and capabilities of Google Cloud's Artifact Analysis and Security Command Center in enhancing GKE security

CI/CD at scale in GKE

  • Describe the core components of Google Cloud's CI/CD pipeline and how they address common challenges in application modernization.
  • Analyze how Google Cloud Deploy integrates with GKE to manage Kubernetes manifests and control deployments.
  • Compare and contrast the deployment strategies for Cloud Run services and jobs within GKE Enterprise.
  • Explain the steps required to establish a peered VPC connection for secure CI/CD in a private network.
  • Evaluate the various security measures and tools available within Google Cloud for securing the software supply chain.

Generative AI for GKE Enterprise

  • Explain how GKE serves as a suitable platform for large language models and the increasing demand for hardware accelerators.
  • Describe the high-level architecture of a GKE-based training platform for AI models.
  • Outline the architecture for a GKE-based model serving platform.
  • Outline different cost management strategies available when using GKE for AI/ML workloads.

Schedule

FAQ

Does the course schedule include a Lunchbreak?

Classes typically include a 1-hour lunch break around midday. However, the exact break times and duration can vary depending on the specific class. Your instructor will provide detailed information at the start of the course.

What languages are used to deliver training?

Most courses are conducted in English, unless otherwise specified. Some courses will have the word "FRENCH" marked in red beside the scheduled date(s) indicating the language of instruction.

What does GTR stand for?

GTR stands for Guaranteed to Run; if you see a course with this status, it means this event is confirmed to run. View our GTR page to see our full list of Guaranteed to Run courses.

Does Ascendient Learning deliver group training?

Yes, we provide training for groups, individuals and private on sites. View our group training page for more information.

What does vendor-authorized training mean?

As a vendor-authorized training partner, we offer a curriculum that our partners have vetted. We use the same course materials and facilitate the same labs as our vendor-delivered training. These courses are considered the gold standard and, as such, are priced accordingly.

Is the training too basic, or will you go deep into technology?

It depends on your requirements, your role in your company, and your depth of knowledge. The good news about many of our learning paths, you can start from the fundamentals to highly specialized training.

How up-to-date are your courses and support materials?

We continuously work with our vendors to evaluate and refresh course material to reflect the latest training courses and best practices.

Are your instructors seasoned trainers who have deep knowledge of the training topic?

Ascendient Learning instructors have an average of 27 years of practical IT experience and have also served as consultants for an average of 15 years. To stay current, instructors spend at least 25 percent of their time learning new, emerging technologies and courses.

Do you provide hands-on training and exercises in an actual lab environment?

Lab access is dependent on the vendor and the type of training you sign up for. However, many of our top vendors will provide lab access to students to test and practice. The course description will specify lab access.

Will you customize the training for our company’s specific needs and goals?

We will work with you to identify training needs and areas of growth.  We offer a variety of training methods, such as private group training, on-site of your choice, and virtually. We provide courses and certifications that are aligned with your business goals.

How do I get started with certification?

Getting started on a certification pathway depends on your goals and the vendor you choose to get certified in. Many vendors offer entry-level IT certification to advanced IT certification that can boost your career. To get access to certification vouchers and discounts, please contact info@ascendientlearning.com.

Will I get access to content after I complete a course?

You will get access to the PDF of course books and guides, but access to the recording and slides will depend on the vendor and type of training you receive.

How do I request a W9 for Ascendient Learning?

View our filing status and how to request a W9.

Reviews

Great and very intuitive. Better than the traditional hit the wrong button/lose points.

I like their training. A lot of material covered. The labs are very good. l learned a lot.

Provided good amount of material and a great instructor to teach the material.

The labs and course material gave me valuable insights into cloud security architecture

Exit certified was great as it is very in depth and hands on learning which made it very easy to learn this type of work.