Recently, we released our new “Calico Certified Operator: AWS Expert” course. You can read more about why we created this course and how it can benefit your organization in the introductory blog post.
This blog post is different; it’s an opportunity for you, the potential learner, to get a glimpse of just a few interesting parts of the course. You won’t learn all the answers here, but you’ll learn some of the questions!
If you find that you already know the answers, then you’re all set to grab yourself a shiny badge. If not, consider taking some time to invest in your personal development and pick up some new knowledge in AWS and container networking—really current and relevant knowledge.
Let’s take a sneak peek at what the “Calico Certified Operator: AWS Expert” course has to offer.
There are several ways to build a Kubernetes cluster in AWS. There is no single “right” way. What are the considerations your organization should have in mind, and how can you help your organization make an informed choice?
You will review, amongst many other things, how to decide:
Depending on the implementation, a Kubernetes cluster’s networking sometimes obfuscates the real source IP address of the requesting user or service. Under what circumstances does this occur, and how can it be mitigated?
You will discover the reasons that the original source IP can be lost in Kubernetes networking, and how this can be avoided.
What’s a Calico data plane? What options are available in AWS? What advantages do the different options offer?
We’ll uncover the different Calico data planes available in AWS, and the advantages each can bring to the cluster. The course contrasts the benefits and requirements of the Linux iptables and Linux eBPF Calico data planes.
Do you know the answers to the following questions?
If not, you’ll find them in this course.
How can you deploy Kubernetes in AWS? What are the pros and cons of the different options?
Using the right tools, deploying a Kubernetes cluster in AWS can be reduced to just a few manageable steps. However, depending on the use case, there are many tools that might be the right fit.
The course provides an overview of:
Is Application Layer Policy available in Kubernetes cluster deployments in AWS? What features are available?
Application Layer Policy can help you deliver a zero-trust network in the public cloud.
Have questions? We thought you might.
You guessed it, you can find the answers in this course.
Can data on-the-wire between nodes in an AWS Kubernetes cluster be protected? If so, how?
Your organization might already have a requirement to protect data “at rest” in your public cloud environments. What about data in flight, though?
Hopefully this post has piqued your interest, either because you already know the answers or because it has posed some interesting questions!
The reality of public cloud deployments, including those in AWS, is that there are many factors to consider. It’s unlikely that you will make all the right decisions, and that’s okay.
This course aims to help attendees recognize the known unknowns and consider how their organizational needs should influence their choices.
If you think it would be valuable to you and your organization, you can sign up here. It’s free, and you can adapt the course to your busy calendar. There’s no time like the present!
More questions? You can read more about Tigera’s Calico certification program here.
Get Calico certified. Sign up now!
Get updates on blog posts, new releases and more!