- Introduction
- Defining and Consuming Configuration Data
- Creating a ConfigMap
- Consuming a ConfigMap as Environment Variables
- Mounting a ConfigMap as Volume
- Creating a Secret
- Consuming a Secret as Environment Variables
- Mounting a Secret as Volume
- Understanding Security Contexts
- Understanding Resource Boundaries
- Creating a ResourceQuota
- Exploring ResourceQuota Enforcement
- Understanding Service Accounts
- Creating and Assigning Custom Service Accounts
- Exam Essentials
- Sample Exercises