Skip to main content
Ctrl+K
GuiSam Notes v0.2.5 documentation - Home GuiSam Notes v0.2.5 documentation - Home
  • ๐Ÿ‘จโ€๐ŸŽ“ Certifications
  • ๐Ÿ““ Awk
    • ๐Ÿ“‘ Getting Started with awk
    • ๐Ÿ“‘ Running awk and gawk
    • ๐Ÿ“‘ Regular Expressions
    • ๐Ÿ“‘ Reading Input Files
    • ๐Ÿ“‘ Printing Output
    • ๐Ÿ“‘ Expressions
    • ๐Ÿ“‘ Patterns, Actions, and Variables
    • ๐Ÿ“‘ Arrays in awk
    • ๐Ÿ“‘ Functions
    • โ™ฅ๏ธ Awk is awesome
  • ๐Ÿ““ CKA
    • ๐Ÿ”– Cluster Architecture Installation and Configuration
      • ๐Ÿท๏ธ Prepare underlying infrastructure for installing a Kubernetes cluster
      • ๐Ÿท๏ธ Create and manage Kubernetes clusters using kubeadm
      • ๐Ÿท๏ธ Manage the lifecycle of Kubernetes clusters
      • ๐Ÿท๏ธ Understand extension interfaces (CNI, CSI, CRI, etcโ€ฆ)
      • ๐Ÿท๏ธ Use Helm and Kustomize to install cluster components
      • ๐Ÿท๏ธ Manage role based access control (RBAC)
      • ๐Ÿท๏ธ Implement and configure a highly-available control plane
      • ๐Ÿท๏ธ Understand CRDs, install and configure operators
    • ๐Ÿ”– Servicing and Networking
      • ๐Ÿท๏ธ Use ClusterIP, NodePort, LoadBalancer service types and endpoints
      • ๐Ÿท๏ธ Understand connectivity between Pods
      • ๐Ÿท๏ธ Understand and use CoreDNS
      • ๐Ÿท๏ธ Know how to use Ingress controllers and Ingress resources
      • ๐Ÿท๏ธ Use the Gateway API to manage Ingress traffic
      • ๐Ÿท๏ธ Define and enforce Network Policies
    • ๐Ÿ”– Storage
      • ๐Ÿท๏ธ Configure volume types, access modes and reclaim policies
      • ๐Ÿท๏ธ Manage persistent volumes and persistent volume claims
      • ๐Ÿท๏ธ Implement storage classes and dynamic volume provisioning
    • ๐Ÿ”– Workloads and Scheduling
      • ๐Ÿท๏ธ Understand application deployments and how to perform rolling update and rollbacks
      • ๐Ÿท๏ธ Use ConfigMaps and Secrets to configure applications
      • ๐Ÿท๏ธ Configure Pod admission and scheduling (limits, node affinity, etc.)
      • ๐Ÿท๏ธ Understand the primitives used to create robust, self-healing, application deployments
      • ๐Ÿท๏ธ Configure workload autoscaling
    • ๐Ÿ”– Troubleshooting
      • ๐Ÿท๏ธ Troubleshoot cluster and nodes
      • ๐Ÿท๏ธ Troubleshoot cluster component
      • ๐Ÿท๏ธ Monitor cluster and application resource usage
      • ๐Ÿท๏ธ Manage and evaluate container output streams
      • ๐Ÿท๏ธ Troubleshoot services and networking
  • ๐Ÿ““ CKS
    • ๐Ÿ”– Cluster Setup
      • ๐Ÿท๏ธ Use Network security policies to restrict cluster level access
      • ๐Ÿท๏ธ Use CIS benchmark to review the security configuration
      • ๐Ÿท๏ธ Properly set up Ingress objects with TLS
      • ๐Ÿท๏ธ Protect node metadata and endpoints
      • ๐Ÿท๏ธ Verify platform binaries before deploying
    • ๐Ÿ”– Cluster Hardenning
      • ๐Ÿท๏ธ Use Role Based Access Controls to minimize exposure
      • ๐Ÿท๏ธ Exercise caution in using service accounts
      • ๐Ÿท๏ธ Restrict access to Kubernetes API
      • ๐Ÿท๏ธ Upgrade Kubernetes to avoid vulnerabilities
    • ๐Ÿ”– System Hardenning
      • ๐Ÿท๏ธ Minimize host OS footprint (reduce attack surface)
      • ๐Ÿท๏ธ Using least-privilege identity and access management
      • ๐Ÿท๏ธ Minimize external access to the network
      • ๐Ÿท๏ธ Appropriately use kernel hardening tools such as AppArmor, seccomp
    • ๐Ÿ”– Minimize Microservice Vulnerabilities
      • ๐Ÿท๏ธ Use appropriate pod security standards
      • ๐Ÿท๏ธ Manage kubernetes secrets
      • ๐Ÿท๏ธ Understand and implement isolation techniques
      • ๐Ÿท๏ธ Implement Pod-to-Pod encryption
    • ๐Ÿ”– Supply Chain Security
      • ๐Ÿท๏ธ Minimize base image footprint
      • ๐Ÿท๏ธ Understand your supply chain
      • ๐Ÿท๏ธ Secure your supply chain
      • ๐Ÿท๏ธ Perform static analysis of user workloads and container images
    • ๐Ÿ”– Monitoring, Logging and Runtime Security
      • ๐Ÿท๏ธ Perform behavioral analytics to detect malicious activities
      • ๐Ÿท๏ธ Detect threats within physical infrastructure, apps, networks, data, users and workloads
      • ๐Ÿท๏ธ Investigate and identify phases of attack and bad actors within the environment
      • ๐Ÿท๏ธ Ensure immutability of containers at runtime
      • ๐Ÿท๏ธ Use Kubernetes audit logs to monitor access
  • ๐Ÿ““ Desktop
    • ๐ŸŽฎ Batocera
    • ๐Ÿ“˜ Byobu
    • ๐Ÿ“˜ Csh History
    • ๐Ÿ“˜ Ditaa
    • ๐Ÿ“˜ Fedora Workstation
    • ๐Ÿ“˜ GNOME
    • ๐Ÿ“˜ LUKS
    • ๐Ÿ“˜ SELinux
    • ๐Ÿ“˜ Passwd Recovery
    • ๐Ÿ“˜ Vim
    • ๐Ÿ“˜ Zsh
  • ๐Ÿ““ Network
    • ๐Ÿ“™ Ipset
    • ๐Ÿ“™ Nftables
    • ๐Ÿ“™ OPNSense
    • ๐Ÿ“™ OSI Model
  • ๐Ÿ““ System
    • ๐Ÿ“— Ansible from scratch
    • ๐Ÿ“— ArgoCD
    • ๐Ÿ“— Argo Workflows
    • ๐Ÿ“— Apache Cassandra
    • ๐Ÿ“— Apache Tomcat
    • ๐Ÿ“— Docker
    • ๐Ÿ“— Forgejo
    • ๐Ÿ“— Letโ€™s Encrypt
    • ๐Ÿ“— MySQL Replication
    • ๐Ÿ“— Nginx
    • ๐Ÿ“— PostgreSQL
    • ๐Ÿ“— Systemd
    • ๐Ÿ“— Terraform
  • .rst

๐Ÿ““ CKA

Contents

  • ๐Ÿงพ Certi๏ฌed Kubernetes Administrator
  • ๐ŸŒ View online resources
  • ๐Ÿชช Curriculum
  • ๐Ÿ—ƒ๏ธ Topics

๐Ÿ““ CKA#

๐Ÿงพ Certi๏ฌed Kubernetes Administrator#

  • linuxfoundation cka

  • lfx.linuxfoundation.org

  • killer.sh

  • killercoda.com - login

  • guisam credly badges

๐ŸŒ View online resources#

  • home page

  • releases

  • documentation

  • source code

  • opened bug issues

๐Ÿชช Curriculum#

See cncf/curriculum .
Or CKA_Curriculum_v1.33.pdf.

cka-cv

๐Ÿ—ƒ๏ธ Topics#

  • ๐Ÿ”– Cluster Architecture Installation and Configuration
  • ๐Ÿ”– Servicing and Networking
  • ๐Ÿ”– Storage
  • ๐Ÿ”– Workloads and Scheduling
  • ๐Ÿ”– Troubleshooting

previous

โ™ฅ๏ธ Awk is awesome

next

๐Ÿ”– Cluster Architecture Installation and Configuration

Contents
  • ๐Ÿงพ Certi๏ฌed Kubernetes Administrator
  • ๐ŸŒ View online resources
  • ๐Ÿชช Curriculum
  • ๐Ÿ—ƒ๏ธ Topics

By GuiSam

ยฉ Copyright 2026, GuiSam.