►
From YouTube: Certs Magic with Walid Shaari
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
A
A
A
Let's
second,
my
camera
was
not
positioned
correctly,
okay,
so
this
is
the
seventh
episode
siam
and
his
guest
covered.
What
is
certifications?
A
Why
do
you
need
to
go
for
a
certification
or
not
troubleshooting
workload
and
scheduling,
among
other
things
today?
I'm
thinking
that
maybe
we
should
cover
something
that
is
common
between
the
three
certifications.
First
of
all,
who's,
who
am
I
my
name,
is
willy
chary.
This
is
my
twitter
handle
my
linkedin
handle
and
my
github
rebel.
I
have
two
github
rebels,
one
for
cka
and
one
for
cks.
A
I,
before
being
interested
in
cloud
native.
I
was
basically
administering
hpc
linux
clusters.
Some
of
them
are
from
the
top
500,
I'm
passionate
about
configuration
management
infrastructure
as
code
and
now
I'm
very
passionate
about
software
as
code
as
justin
garrison
and
chris
nova
debate,
the
need
for
software
as
code
as
in
kubernetes
and
cluster
apis,
I'm
advocating
for
open
source
automation,
infrastructure
containers
and
cncf,
I'm
leading
an
aws
meetup
and
docker
meetup
in
the
local
region.
A
Okay,
so
my
main
topic
I
was
going
to
give
today
actually
was
workload
and
scheduling,
and
then
I
found
out
that
it's
already
covered.
So
what
what
we
are?
What
I
was
thinking
I
was
thinking
looking
at
the
cks
curriculum,
ckid
curriculum
and
cka
curriculum
and
finding
something
similar,
something
that
is
in
common
and
there
is
lots
of
commonality
you
will
find
out
that
there
is
lots
of
commonality.
A
Before
I
start
going
on
the
the
certifications
and
things
like
this,
let's
get
some
news:
let's
get
some
news
out
if
you
want
to
chat,
if
you
want
to
ask
me
questions
or
anything,
please
do.
A
A
So,
let's
before
that,
we
go
into
the
main
topic.
Let's
do
some
news.
I
would
love
to
do
some
news,
so
this
there
was
an
article
and
me
and
siam
participated
in
it.
Okay,
we
were
interviewed
with
other
guests,
and
this
article
is
for
reason
to
get
kubernetes
certified
and
for
reason
not
to
so.
If
you
are
wondering,
should
you
take
the
certification
or
shouldn't?
Will
it
affect
your
salary?
Will
it
affect
your
job
promotions,
merit
increases
and
stuff
like
this?
What
what
do
I
gain
from
doing
certification?
A
This
is
a
good
article
to
read:
okay,
scott
carey
is
the
uk
group
editor
for
idg
here
he
just
wrote
recently
another
hot
article
about
the
failing
of
docker
this
one
how
the
car
broke
in
half.
If
you
want
to
read
this,
please
read
the
tweets
from
solomon
hike.
To
put
this
into
context
now
other
news
regarding
certification:
there
is
new
updates
to
the
ckid
2021.
A
A
A
Okay,
talking
about
authentication
authorization
and
mission
control.
This
reminds
me
of
a
good
article
from
our
friends
at
stack
rocks.
They
have
lots
of
good
white
papers,
they
are
very
simple
and
easy
to
read.
One
of
them
is
about
this
new
subject
that
is
covered
in
the
ckad,
and
this
is
admission
control.
What
are
admission
control
like
limit
ranges
and
and
mutating
webhook
validating
webhook?
So
this
is
a
good
read.
A
A
Ga
eks
anywhere,
which
in
new
kubernetes
distribution
from
aws
it's
open
source.
You
don't
have
to
be
an
aws
customer.
It
just
became
ga.
What
does
that
mean?
That
means
basically,
as
justin
garrison
puts
it,
he
has
a
tweet
here,
okay
and
as
he
puts
it,
that's
that's
and
kubernetes
distribution.
You
can
run
on
brem.
A
Currently
it
uses
cluster
api
and
it
has
certain
providers
like
docker
provider
kind
provider,
but
the
current
production
provider,
I
believe,
is
vsphere,
but
things
will
come
and
it's
supported
by
lots
of
partners
like
susie
rancher,
so
they
have
support
for
it
and
stuff
like
that.
So
there
is
a
twitter
space
and
there
is
a
webcast.
A
So
look
out
for
this
and
look
out
for
justin
garrison,
tweets,
steve,
steve,
gaguera
and
michael
foster
and
eddie
andy
martin.
They
just
actually
were
streaming
or
finished
streaming.
This
is
a
new
webcast
targeted
towards
security.
I
recommend
it
highly
because
it's
very
diverse
in
terms
of
topics
and
it's
very
easy
to
grab
security
from
these
from
these
two
guys,
and
especially
from
andy
martin,
who
was
the
guest
today.
A
Another
thing
about
security
that
could
could
be
nice
for
the
cks.
There
is
this
article
from
frederick
fernando
it's
actually
an
old
article,
but
I
just
saw
it
recently
introduction
to
cuban
security
using
falco
I'll,
put
the
links
later
on
on
a
tweet
or
a
blog,
or
something
okay
and
they'll
share
it
with
you.
A
Okay,
we
have
no
questions,
that's
good,
so,
third,
magic.
We
will
cover
the
configuration,
as
we
said,
tips
for
for
any
exam
you
need
to
be.
You
need
to
be
ready,
and
that
means
practice
practice
practice.
You
need
to
get
familiar
with
kubernetes
concepts
with
kubernetes
tasks
and
with
the
kubernetes
cube
control
cheat
sheet.
A
These
are
the
main
three
categories
in
the
kubernetes
documentation:
combinations
that
I
owe
that
you
have
to
be
familiar
with,
of
course,
the
code
control
commands
and
how
to
optimize
your
cube
control.
That
would
be
nice,
but
if
you
cover
the
concept,
the
task
and
the
cube
control
cheat
sheet,
I
think
you
covered
30
to
40
percent
of
your
exam.
A
Dimitris
elias,
dimitri's,
elias
and
anastasius
sorry,
dimitri
with
cka
the
exercises
we'll
try
to
do
some.
I
haven't
checked
them
yet
actually,
but
let's
help
to
do
some
now
coming
back.
So
this
is
the
cheat
sheet
make
sure
that
you-
and
you
can
see
that
I
highlighted
the
this-
is
the
first
thing
you
need
to
do.
I
don't
think
you
need
to
do
it
anymore.
A
Okay,
config
map,
that's
what
we're
gonna
study
today.
Basically,
the
concept
of
configuration.
Why
do
we
need
configuration?
And
why
did
I
select
the
subject
after
I
found
out
that
siam
has
already
done
the
workload
and
scheduling?
Subject,
two
reasons:
one
reasons
this
week
have
been
hectic
week
and
some
of
the
issues
for
onboarding
users
was:
how
do
I
share
data
with
other
with
other
services?
So
I
am
doing
a
deployment.
I
have
several
bots
and
I
want
to
share
data
among
these
bots.
I
need
nfs.
Read
write
many!
No
you
don't!
A
You
can
share
data
using
config
maps
if
it's
sensitive
data
usually
use
it
as
a
secret
and
when
we
say
secrets
it's
not
because
they
are
encrypted,
but
because
they
have
several
controls
that
that
you
can
control
access
to
them.
So
you
can
allow
only
access
from
cubelet.
You
can
do
rolls
and
roll
outbacks
and
stuff
like
that
which
hopefully
we
can
cover
a
little
bit
okay.
So
this
is
what
we're
gonna
do
config
map
and
secrets,
and
how
to
manage
these
from
bots
and
deployments
okay,
and
we
might
cover
security
context.
A
If
there
is
time-
and
I
want
to
show
you
just
an
example-
if
you
go
here,
there
should
be
if
I
do
config
map.
Yes,
so
that's
what
I'm
saying
about
the
task.
You
should
find
the
tasks
that
are
relevant
to
your
certifications
and
try
to
go
over
them
most
of
the
time
they
point
to
a
catacota
scenario,
which
is
actually
good.
A
Okay
for
security
context.
I
will
point
you
also
to
my
friend
eric
smalling
and
matt
jarvis,
I
think
coming
security
context.
He
has
also
videos
accompanied
these,
but
this
is
a
cheat
sheet
for
security
context
and
it's
very
important
for
your
ckad
exam
and
cks
exam.
Okay.
A
A
A
This
is
something
that
you
need
to
make
sure
just
in
case.
One
of
the
topics
for
ckd
depreciation
is
that
you
need
to
know
about
api
depreciations
like
what
like
what
security
policy
is
going
to
depreciate
by
1.25.
So
it's
still
a
time.
A
A
Is
the
kubernetes
version
that
I
am
using?
Okay,
so
basically
I
have
already
the
alias
so
okay,
yes,
I
have
the
alias,
so
I
say
get
mods.
I
have
oh,
I
have
bots,
let's
delete
this
once
okay,
I
have
issue
with
the
auto
completion
and
this
issue
is
usually
because
the
auto
completion
is
not
auto
sourced
I'd
source.
It
okay,
delete
bots
minus
all
so
that
we
start
clean
okay.
Now
I
want
to
know
the
version,
so
I
am
version
120,
which
is
this
is
the
client,
so
that's
fine.
A
The
client
can
be
one
version
below
or
one
version
higher.
So
that's
fine,
it's
better
to
be
on
the
same
version
as
the
the
control
plane,
the
api
server.
A
However,
if
you
are
one
version,
if
the
miner
is
one
version
lower
or
higher,
that's
fine,
the
server
is
121,
which
is
the
exam
which
is
the
current
exam.
How
do
I
know
this
if
you
go
to
the
exam
curriculum
and
you'll
find
that
it's
pointing
to
this
version
right
now?
A
Okay,
so
this
is
the
exam,
the
my
setup,
okay,
how
many
notes
now
one
thing
of
the
exam
that
most
of
the
exam
covers
is
exploration,
especially
the
cka
and
ckid.
Do
you
know
how
to
get
your
bots?
Do
you
know
how
to
get
your
nodes?
Do
you
know
how
to
get
you
know
what
ib
addresses
they
are
using?
Do
you
know
which
one
is
highly
utilized,
cb,
wise
or
memory
wise
or
something
like
this?
Can
you
explore?
Can
you
do
you
know
your
environment,
yeah,
so
k
get
nodes?
A
A
A
A
Let's
find
what
resources
we
have
for
admission,
okay,
so
by
default.
If
I
don't
install
what
we
call
operators,
an
operator
is
basically
data
definition,
which
is
called
crd
cluster
resource
definition
and
the
controller,
and
they
will
add
more
resource.
They
will
add
more
api
object.
They
will
add
more
kubernetes
object.
That
looks
as
first
class
they
will
be.
You
will
be
able
to
see
them
here,
but
if
we,
I
don't
add
by
default,
I
will
see
that
I
have
mutating
webhook
configuration
and
I
have
validating
webhook
configuration.
A
A
A
I
have
nothing
so
validating
and
rotating
workbooks
has
to
do
with
authorization.
Okay,
so
there
is
authorization,
authentication
and
basically
webhooks
and
the
mutating
valid
mutating
web
hook.
If
you
want,
for
example,
to
enforce
a
policy,
you
put
it
there,
so
if
it's
not
included
in
the
deployment,
it
will
include
some
objects
or
attributes
to
the
deployment
like,
for
example,
it
will
add
security
context
or
something
like
this
or
it
will
enforce
the
number
of
replicas
and
the
validating
web
hook.
Then
it
will
validate
whatever
is
final.
Output
of
the
deployment
is
correct.
A
And
we
we
have
two
ways
to:
we
can
do
it.
Let's
start
from
the
okay,
let's
start
from
demetrius
website,
so
he
says
configuration
and
current
exam.
It's
18
percent,
let's
see
on
the
other
exam
on
the
new
exam.
So
in
the
new
exam,
it's
not
clear.
A
Okay,
it's
it's
not
clear
how
but
basically
define
build,
modify
container
images.
That
means
something
also
related
to
how
to
the
best
practices
of
building
a
container
image
such
as
using
the
user
directive
and
when
you
use,
add
versus
copy
when
you
use
entry
point
versus
command
and
stuff
like
that.
A
Okay,
here
we
have
in
this
application
environment
configuration
security.
We
have
understand.
Config
map
create,
consume
secrets,
understand
service
account,
understand
security
accounts,
so
it
is
mixed
with
the
crd,
and
I
showed
you
that
the
crd
is
it's
not
something
that
you
need
to
be
afraid
of
the
authentication,
authorization
and
mission
control.
We
mentioned
the
article
or
the
white
paper
from
stack
rocks
and
if
I
go,
there
is
a
very
famous.
This
is
from
kubernetes
io.
A
A
Yes,
the
api
server
will
do
certain
tasks
it
will
check.
Basically,
are
you
authenticated
if
you
are
authenticated?
What
the?
What
can
you
do?
If
this
is
done,
then
it
will
go
to
the
mutating
admission
and
the
mutating
admission
will
call
webhooks.
This
could
be
internal
in
the
cluster
or
it
could.
They
could
be
external
okay
and
they
will
enforce
a
certain
policy
after
this.
A
Basically,
it
will
come
to
the
object,
schema,
validation
and
again
this
could
be
internal
to
the
cluster
or
external,
and
if
everything
is
fine,
the
object
will
resist
an
lcd
and
the
controller
will
work
on
it
later.
Okay,
so
this
is
the
section
of
the
crds.
You
don't
need
to
be
worried
about
it
most
likely
it
will
be
the
exploratory
part.
I
don't
take
my
word
for
it,
but
think
about
it.
What
can
they
ask
you
about
it?
A
Okay,
he
wants
us
to
create,
so
cube
control
create
okay.
Okay,
do
I
have
config
map?
Yes,
I
have
config
map,
and
always
I
can
use
help
so
here
here
help
cube
control,
create
config
map.
I
need
to
name
it.
I
need
to
give
it
a
name-
and
in
this
case
this
are
from
file,
but
in
the
question
it
was
not
from
file.
A
A
Okay,
let's
do
this
okay
now
this
is
imperative
and
the
way
forward.
If
you
really
want
to
learn
and
do
this
during
in
your
job
later
on,
you
need
to
do
like
a
dry
run
so
that
this
one
doesn't
actually
resist
on
hcd
and
you
need
to
present
the
ml
diamond
output
exactly
one
knee.
We
didn't
so
what's
the
mistake
and
that's
another
thing
which
is
good.
Actually,
if
you
make
mistake,
this
is
good
as
long
as
you
learn
from
them.
So
what's
my
mistake
here:
keep
control
create
configmap.
A
A
A
So
if
you,
if
I
do
again
my
api
resources
grip
config,
you
can
see
that
there
is
config
map.
I
can
actually
use
a
short
shorthand
cm
and
it
is
in
the
core
group.
So
this
is
another
way
to
if
you
are
confused
about
which
version
the
api,
especially
in
something
that
is
you
see
here,
for
example,
this
is
v
one
beta
one.
This
is
have
not
graduated
yet
to
ga.
A
A
So
there
is
a
life
cycle
for
the
api
and
sometimes
the
technical
detail
changes
okay.
So
this
is
the
first
question.
Okay,
now
what
I
can
do,
I
can
resist
it
in
a
file.
Let's
call
this
file
t
config
dot
yammer,
which
is
a
really
bad
name.
What
I
can
do,
especially
in
production
I
can
use
like
a
prefix
or
bossfix.
That
tells
me
what
type
of
object
is
this
okay
and
I
actually
use
t
in
the
exam
so
that
basically,
I
can
validate
the
output
while
writing
to
the
file.
A
Okay,
there
is
no
yousef
thanks
for
the
insight.
Thank
you
yusuf.
Keep
it
coming
guys,
folks,
okay,
now
I
don't
want
to.
I
will
not
apply
this
one,
and
I
will
tell
you
why,
so,
usually
you
should
apply
the
conf,
the
the
config
map
or
the
secret
before
you
use
them
in
a
deployment
or
a
bot
or
any
other
object,
even
set
or
whatever,
but
one
thing,
while
you're
learning
or
practicing
for
the
exam
try
to
do
things
out
of
order.
Try
to
do
things
differently.
A
A
Okay:
okay,
let's
see
the
other
question
display
its
values.
Yes
with
so
okay,
let's
see,
what's
his
solution,
keep
control
create
config
map.
Yes,
yes,
exactly
display
its
value.
Okay,
he
wants
us
to
apply
it.
Let's
apply
it
so
to
apply
it.
You
have
two
choices.
You
can
do
create
or
apply.
I
I
love
apply,
because
basically
it
can
be
partial.
If
it's,
you
are
changing,
something
that
is
already
exist.
A
A
Okay.
Now,
if
I
do
k
describe
cm
config,
I
will
see
that
it's.
The
configuration
map
is
called
config
it's
in
the
name.
Space
default-
and
this
is
very
important
in
the
exam
most
likely
will
not
implement
things
on
default.
Most
likely,
you
need
to
implement
things
on
a
different
name
spaces,
so
this
command
will
be
wrong
in
the
exam.
It's
missing
the
minus
n.
It's
missing
the
minus
n
name
space.
So
make
sure
that
always
you
have.
You
have
sorry.
A
Make
sure
you
have
like
a
system
that
you
always
put,
for
example,
space
before
okay
or
after
your
commands
or
at
the
end
of
your
commands,
if
you
put
it
before
so
that
it
you'll
be
flexible,
you
can
say,
for
example,
apply
now
minus
f
again.
If
you
have
changed
the
config
map.
A
Okay,
now,
let's
go
to
the
second
question
now:
what's
the
difference
between
config
map
and
secret,
I
said
secret.
You
have
more
access
control
over
it
display
its
value.
You
can
do
cube,
control
get
cm,
config
minus,
oh
yaml,
or
you
just
can
describe.
I
I
think,
describe
works,
better,
create
and
display
config
map
from
a
file.
Now
that's
the
other
case,
so
he's
inserting
a
key
value
in
a
file
so
he's
inserting
fu3,
equal
lily
and
another
key
value
into
a
file.
Config.Text.
A
A
So
it's
the
same
thing,
but
instead,
instead
of
from
literal
this
time
what
we
do,
this
time
we
do
from
file
and
we
don't.
We
don't
forget
the
name
space.
Okay.
If
there
is
a
namespace,
we
don't
forget
the
namespace
and
we
don't
forget
the
name.
The
name
has
to
be
exactly
as
the
question
is
asking
us
create
and
display,
create
and
display
configmar
from
file
create
the
file
with
whatever
create
display,
config
map;
okay,
it
doesn't
say
the
name
config
map
to
okay,
that's
very
innovative.
A
Okay,
let's
call
this
to
from
file
from
file,
and
I
have
to
give
it
a
file.
So
the
file
was
config
dot
text
from
file
unknown
flag
queue,
control,
create
a
create
config
map,
config
map
2
and,
let's
use
the
shortcut
this
time,
create
cm
configmap2
from
file
okay,
and
it
actually
give
me
the
ml
shortcut
when
you
have
different
values
when
you
have
multi-line,
so
you
have
four
three
equally
and
four
four
equal
whatever
and
you
see
the
data
is
clever
enough
to
know
that
the
file
is
called
config.txt.
A
Let's
say
that
and
he
wants
you
to
read
it
from
a
file,
but
when
you
save
it,
you
call
it
a
different
file
name.
My
keys,
like,
let's
see,
let's
he's
asking
you
to
that
the
file
name
is,
should
be
my
keys
yeah,
so
you
can
actually
put
it
here.
You
can
say
from
file,
but
you
change
the
file
inside
your
emails.
You
say:
look
I
know
that
I'm
reading
file
called
config.text,
but
I
don't
want
it
config
the
text
in
my
manifest.
I
want
it
to
be
my
keys.
A
A
A
Okay,
so
we
have
this:
what
endeavor?
Okay?
So
let's
jump,
because
this
is
really
easy:
okay,
let's
jump
to
create
and
display
config
map
from
an
n
file.
So
basically,
here
he's
doing
the
same
thing,
key,
equal
value
and
then
slash
n
for
a
new
line
and
he's
putting
a
comment.
Then
another
key,
equal
value
and
putting
another
comment:
okay,
so
config
map
from
m
file,
so
yeah,
okay.
A
So
this
is
like
he's
assuming
that
the
files
are
not
key
value
there
he's
assuming
that
the
file
represents
an
environment,
very
an
environment
file
which
is
the
same
format
as
a
as
a
file
and
then
basically
creating
it's
the
same
concept:
a
create
and
display
configmo
file,
giving
the
key
special.
A
A
A
A
A
Is
there
a
way
that
I
can
associate
it
with
the
config
map,
because
one?
So
what
are
config
maps
so
config
maps
are
a
way
to
share
data.
They
are
centralized
on
their
name
space.
So
when
I
do
get
k
get
cm,
I
can
see
the
config
maps.
If
I
do
get
secrets
which
act
as
a
config
maps,
I
can
see
the
secret
and
the
secret
here
is
a
secret
for
the
service
account.
So
I
have
a
default
service
account
by
default.
A
If
I
do
k
get
sa,
which
is
a
short
for
service
account,
I
will
see
by
default.
I
have
a
service
account
in
other
companies
distribution.
You
might
have
many,
for
example,
in
openshift
you
have
default,
build,
deploy
and
something
else
here
we
have
one
which
we
are
not
is.
If
we
are
doing
our
own
application,
it's
not
recommended
to
use
the
default
one.
It's
recommended
to
use
your
own,
you
create
specific
one
for
the
application
and
you
assign
it
the
required
minimum
permissions
minimum
roles
and
role
bindings.
A
A
A
A
A
Basically,
the
annotation
shows
which
service
account
name
is
associated
with
it,
and
the
user
id
for
the
service
account.
Okay
and
what
type
it
is.
Kubernetes
io
service
account
token.
Now
the
data
is
basically
using
several
bind,
and
there
is
a
token
now.
This
token
is
encoded
in
base
64..
So
if
you
need,
you
need
to
use
this
token
like,
for
example,
authorization
pair
or
something
you
need
to
decode
it
okay,
so
you
decode
it
using
the
base.
A
64
minus
the
command-
and
you
can
see
now
that
this
is
the
secret-
is
using
algorithm,
rs
256
and
then
basically,
this
is
the
token
okay.
Now
what
I
want
so
now
I
have
secret.
I
have
configuration
config
maps
and
I
have
about,
but
the
bot
I
want
to
use
the
data
inside
the
config
map.
How
can
I
do
this?
There
is
another
command
you
can
do
it
by
going
to
the
documentation
and
finding
how
you
define
a
config,
an
environment
variable
or
how
you
mount
the
value.
A
A
A
A
And
now
I
want
to
bind
the
bod
to
the
cm,
so
cube
control
set
f
from
it's,
not
from
a
secret,
it's
from
config
map,
and
the
name
is,
let's
say,
config
map
to
okay,
and
I,
where
do
I
want
to
set
it
in
the
bot?
That
is
that's.
Actually,
the
body
is
not
immutable.
I
don't
think
this
would
work,
but
let's
try
it
yes,
so
you
see
it
gives
me
an
error.
Why?
A
Because
the
bot
object
is
immutable.
The
only
thing
you
can
change
in
a
what
object
is
the
image
name
or
the
image
tag.
So
it
comes
back.
Let's
try
to
change
the
bot,
but
then
it
said
failed
to
batch
and
update
to
button
blade.
Both
engine
x
is
invalid.
Forbidden
updates
may
not
change
fields
other
than
spec.containers.image.
You
cannot
yes,
so
we
need
the
deployment.
A
A
So,
let's
see
so
this
is
an
easy
way
if
you
don't
remember
how
to
define
environment
inside
a
container
or
inside
the
bot.
This
is
an
easy
command
that
will
do
it
for
you
and
the
why
I
like
this
command,
because
basically
it
follows
the
best
practices
convention
for
environmental
variable.
So
you
see
that
my
keys,
the
environment
variable.
I
used
key
my
keys,
which
is
small
letter,
which
is
not
how
you
define
environment
variables.
A
A
A
A
So,
basically,
what
we
have
showed
I
have
showed
that
I
can
create.
Of
course,
I
cannot
create
a
bot,
I
need
to
create
a
deployment
and
if
I
create
a
deployment-
and
I
want
to
associate
it
with
the
config
map,
I
can
do
it
with
using
the
command
cubecontrol
set.
A
A
A
A
A
A
A
Unless
you
are
looking
for
something
that
is
not
yeah,
so
you
see
here
under
container,
I
have
arguments
if
I
want
to
pass
arguments
to
the
container
command
command
or
command.
If
I
want
to
override
the
command
that
is
used
in
the
container
and
I
have
m
and
if
I
use
m,
I
need
to
name
the
environment
variable
where
the
value-
and
I
give
it
a
value
or
I
get
value
from.
A
Okay,
now
was
that
what
was
the
command
to
list
all
those
options?
Okay,
yes,
so
this
is,
mr
second,
if
I
can
get
my
cursor.
A
J
j
m
raicha,
j
m
ricer,
the
command
was
cube,
control,
explain,
okay,
cube
control,
explain
and
don't
explore
it
before
the
exam.
As
you
see
now
so,
basically,
okay,
let's,
let's
select
something
else:
let's
select
ibi
resources,
let's
say
that
in
the
exam
that
you
that
they
are
asking
you
to
do
something
for
an
abi
resource,
that
is
traffic
and
you
haven't
really
played
with
traffic
before
okay,
so
you
say,
cube
control,
explain
and
you
you
put
the
object.
A
Oh
sorry,
yes,
you
put
the
object,
name
bot
deployment,
any
api
resource
services,
whatever
okay,
and
it
will
tell
you
okay
in
this
case,
there
is
not
much.
There
is
the
kind
version
description
and
this
this
one
doesn't
really
have
an
explain.
Let's
do
service,
let's
do
service,
cube
control,
explain,
service,
okay,
and
it
tells
you
that
basically
service.
A
Okay
and
you
have
to
have
a
metadata
and
you
can
and
if
you
are
wondering
what
kind
of
metadata
I
need
for
a
service,
you
can
say
service,
meter
data
and
it
will
tell
you
what
kind
of
metadata
you
have
you
can
have
name.
You
can
have
name
space,
you
own,
a
reference
resource
version,
self
link,
uid.
A
If
you
want
them
without
explanation,
but
you
want
all
of
them.
You
can
say
recursive,
okay,
so
this
will
show
you
all
the
metadata
you
can
have.
You
can
have
annotation.
You
can
have
cluster
name
creation
timestamp.
All
these
are
possible
metadata
fields,
but
no,
I'm
not
interested
in
the
metadata,
I'm
interested
in
the
scope.
A
A
A
A
A
A
Okay
now,
let's
see
make
sure
so
make
sure
that
you
register
for
cubecon
and
then
cubecon.
There
is
a
security
day
in
the
day
zero
and
there
will
be
capture
the
flag
so
make
sure
that
you
register
and
it
will
not
be
difficult,
but
it
will
be
very
educational.
A
What's
my
twitter?
Yes,
let's
just
second,
I
write
it
down.
A
A
Thank
you,
okay,
okay,
let's
what
else
do
you
need
to
say
regarding
okay,
let's
go
back
to
the
new
certain,
the
new
exam
debugging
and
kubernetes.
There
is
a
very
nice
article
about
debugging
applications
in
kubernetes
from
kate's
learning.
A
It
covers
most
of
the
case,
but
how
do
you
do
debugging
so
basically,
first
of
all
try
to
fail
during
your
practices.
Second
use
cube
control
describe
okay.
Let's
do
this
cube
control
describe,
I
don't
think
we
have
time
and
cube
control
logs
for
the
bot
yeah.
So
it's
basically
cube
control,
get
events
cube
control
describe
to
control,
get
events
from
these
three.
You
can
really
tell
what
the
issue
is,
but
sometimes
you
will
know
what
the
issue
is,
but
you
don't
know
how
to
resolve
it.
A
A
If
you
have
any
questions
or
if
you,
if
you
want
to
pursue,
if
you
have
any
questions
regarding
certifications
regarding
kubernetes
regarding
anything
that
I
can
answer
or
I
can
forward
to
somebody
who
can
answer,
let
me
know
thank
you
very
much
and
keep
watching
cloud
native
tv.
There
is
lots
of
resources
and
there
is
lots
of
awesome
people
that
are
presenting.