• Introduction
  • Defining and Consuming Configuration Data
  • Creating a ConfigMap
  • Consuming a ConfigMap as Environment Variables
  • Mounting a ConfigMap as Volume
  • Creating a Secret
  • Consuming a Secret as Environment Variables
  • Mounting a Secret as Volume
  • Understanding Security Contexts
  • Understanding Resource Boundaries
  • Creating a ResourceQuota
  • Exploring ResourceQuota Enforcement
  • Understanding Service Accounts
  • Creating and Assigning Custom Service Accounts
  • Exam Essentials
  • Sample Exercises