DO280 Course Outline
DO280 Course Outline
DescribingOpenShiftContainerPlatformFeatures....................................................... 2
Quiz: Describing OpenShift Container Platform Features ..........................................7
Describing the Architecture of OpenShift .................................................................... 11
Quiz: Describing the Architecture of OpenShift ........................................................ 14
Describing Cluster Operators .................................................................................... 16
Quiz:DescribingClusterOperators ............................................................................ 19
Summary ................................................................................................................ 21
s
fi
fi
fi
s
t
DescribingInstallationMethods................................................................................ 24
Quiz: Describing Installation Methods ......................................................................... 26
Troubleshooting OpenShift Clusters and Applications................................................. 28
Guided Exercise: Troubleshooting OpenShift Clusters and Applications ........................
36 Introducing OpenShift Dynamic Storage ....................................................................
43 Guided Exercise: Introducing OpenShift Dynamic
Storage ............................................ 47
Summary ............................................................................................................... 52
Con guringIdentityProviders................................................................................. 54
Guided Exercise: Con guring Identity Providers ...........................................................
61 De ning and Applying Permissions Using
RBAC .......................................................... 70 Guided Exercise: De ning and Applying
Permissions using RBAC ............................... 74 Lab: Con guring Authentication and
Authorization ................................................... 79
Summary ............................................................................................................... 87
6. Controlling Pod Scheduling