back to home

ViktorUJ / cks

Open-source Platform for learning kubernetes and aws eks and preparation for for Certified Kubernetes exams (CKA ,CKS , CKAD, ICA)

1,405 stars
268 forks
2 issues
ShellHCLGo

AI Architecture Analysis

This repository is indexed by RepoMind. By analyzing ViktorUJ/cks in our AI interface, you can instantly generate complete architecture diagrams, visualize control flows, and perform automated security audits across the entire codebase.

Our Agentic Context Augmented Generation (Agentic CAG) engine loads full source files into context on-demand, avoiding the fragmentation of traditional RAG systems. Ask questions about the architecture, dependencies, or specific features to see it in action.

Source files are only loaded when you start an analysis to optimize performance.

Embed this Badge

Showcase RepoMind's analysis directly in your repository's README.

[![Analyzed by RepoMind](https://img.shields.io/badge/Analyzed%20by-RepoMind-4F46E5?style=for-the-badge)](https://repomind.in/repo/ViktorUJ/cks)
Preview:Analyzed by RepoMind

Repository Overview (README excerpt)

Crawler view

Welcome to the SRE Learning Platform! The **SRE Learning Platform** is an open-source hub designed to help IT engineers effectively prepare for the **CKA (Certified Kubernetes Administrator)**, **CKS (Certified Kubernetes Security Specialist)**, **CKAD (Certified Kubernetes Application Developer)**, and **LFCS (Linux Foundation Certified System Administrator)** exams. Additionally, this platform offers invaluable hands-on experience with **AWS EKS (Elastic Kubernetes Service)**, equipping users with practical insights for real-world applications. Whether you're aiming to validate your skills, boost your career prospects in Kubernetes administration, security, application development, or delve into AWS EKS, this platform provides hands-on labs, practice tests, and expert guidance to ensure certification success. • Prepare for the **CKA**: Certified Kubernetes Administrator Exam • Enhance your skills for the **CKS**: Certified Kubernetes Security Specialist Exam • Excel in the **CKAD**: Certified Kubernetes Application Developer Exam • Excel in the **ICA**: Istio Certified Associate Exam • Prepare for the **KCNA**: Kubernetes and Cloud Native Associate • Prepare for the **KCSA**: Kubernetes and Cloud Native Security Associate • Prepare for the **LFCS**: Linux Foundation Certified System Administrator • Prepare for the **KCNA**: Kubernetes and Cloud Native Associate • Prepare for the AWS Certified AI Practitioner Master Kubernetes concepts, gain practical experience, and excel in the CKA, CKS, and CKAD exams with the **SRE Learning Platform**. Quick start run via docker Requirements • GNU Make >= 4.2.1 • terrafrom >= v1.6.6 • terragrunt >= v0.54.8 • jq >= 1.6 • aws IAM user + Access key (or IAM role ) with Admin privilege for VPC, EC2, IAM, EKS • AWS CLI > 2.2.30 • aws profile **Or you can** run via docker ( video instruction ) Repository Structure The repository is organized into the following sections: • **Makefile** - File contains scenarios for launching hands-on labs and mock exams. • **tasks** - Directory contains lab scenarios and mock exam scripts. • **cka** - Directory contains everything related to CKA. • **labs** - Directory contains hands-on labs for the CKA exam. • **mock** - Directory contains mock scripts for the CKA exam. • **cks** - Directory contains everything related to CKS. • **labs** - Directory contains hands-on labs for the CKS exam. • **mock** - Directory contains mock scripts for the CKS exam. • **terraform** - Directory contains modules and Terraform environments. • **environments** - Directory contains terragrunt (terraform) environments. • **modules** - Directory contains terraform modules. About CKA, CKS, CKAD scenarios • the platform uses **aws** to create following resources : **vpc**, **subnets**, **security groups**, **ec2** (spot ), **s3** • after you launch the scenarios the platform will create all the necessary resources and give access to k8s clusters. • to create clusters the platform uses **kubeadm** • you can easily add your own scenario using the already existing terraform module k8s_self_managment • k8s_self_managment module supports versions: make delete_cka_mock make delete_cks_mock make delete_ica_mock make delete_ckad_mock make delete_hr_mock `make delete_eks_tas _...truncated for preview_