Summary
In this chapter, we learned about GKE and how it orchestrates and manages the deployment, configuration, and scaling of our container-based microservices. We learned how to provide configuration for our microservices using Kubernetes ConfigMaps and Secrets, and how to manage true secrets using Google Secret Manager. We then learned how to configure and deploy our microservices and how to expose them securely to a public endpoint so that they can be accessed from outside the cluster. Finally, we learned when to use GKE.
With the information provided in this chapter, we can decide whether GKE is appropriate for hosting our application microservices and if it is, how to provision a GKE cluster, deploy and configure our microservices, and provide a public endpoint for users of the application to access via a web browser.
In the next chapter, we will learn how to deploy and run our microservices in the most mature serverless platform on Google Cloud, Google App Engine (Flexible...