0% found this document useful (0 votes)
118 views3 pages

DO280 Course Outline

This document provides an overview of the topics covered in the Red Hat OpenShift Administration II course, including describing OpenShift features and architecture, verifying cluster health, configuring authentication and authorization, application security, networking, pod scheduling, cluster updates, and managing the cluster with the web console.

Uploaded by

Aslam Ansari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
118 views3 pages

DO280 Course Outline

This document provides an overview of the topics covered in the Red Hat OpenShift Administration II course, including describing OpenShift features and architecture, verifying cluster health, configuring authentication and authorization, application security, networking, pod scheduling, cluster updates, and managing the cluster with the web console.

Uploaded by

Aslam Ansari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

DO280 Red Hat OpenShift Administration II: Operating a Production Kubernete

Duration: 5 weeks @ 1.5 hr/day

Pre Requisites Concepts


- Introduction to SELinux concepts and managemen
- How to con gure Web Server with Custom Document Root and Custom Por
- Virtualization and Containerizatio
- Docker Basic
- Podman Basic
- Difference in between Rootful, Rootless, Privileged Container
- Skopeo and Builda
- How to con gure Container private registry using Docker imag
- Container File to create a custom container image
- Git Basic
- How to con gure git private registr
- Openshift Cluster Installation (POC)

1. Describing the Red Hat OpenShift Container Platform

DescribingOpenShiftContainerPlatformFeatures....................................................... 2
Quiz: Describing OpenShift Container Platform Features ..........................................7
Describing the Architecture of OpenShift .................................................................... 11
Quiz: Describing the Architecture of OpenShift ........................................................ 14
Describing Cluster Operators .................................................................................... 16
Quiz:DescribingClusterOperators ............................................................................ 19
Summary ................................................................................................................ 21
s

fi
fi
fi
s


t

2. Verifying the Health of a Cluster

DescribingInstallationMethods................................................................................ 24
Quiz: Describing Installation Methods ......................................................................... 26
Troubleshooting OpenShift Clusters and Applications................................................. 28
Guided Exercise: Troubleshooting OpenShift Clusters and Applications ........................
36 Introducing OpenShift Dynamic Storage ....................................................................
43 Guided Exercise: Introducing OpenShift Dynamic
Storage ............................................ 47
Summary ............................................................................................................... 52

3. Con guring Authentication and Authorization

Con guringIdentityProviders................................................................................. 54
Guided Exercise: Con guring Identity Providers ...........................................................
61 De ning and Applying Permissions Using
RBAC .......................................................... 70 Guided Exercise: De ning and Applying
Permissions using RBAC ............................... 74 Lab: Con guring Authentication and
Authorization ................................................... 79
Summary ............................................................................................................... 87

4. Con guring Application Security

Managing Sensitive Information with Secrets .............................................................. 90


Guided Exercise: Managing Sensitive Information With Secrets ....................................
95 Controlling Application Permissions with Security Context Constraints.......................
101 Guided Exercise: Controlling Application Permissions with Security Context
Constraints Lab: Con guring Application
Security ....................................................................... 108
Summary ............................................................................................................... 115

5. Con guring OpenShift Networking for Applications

Troubleshooting OpenShift Software-de ned Networking........................................... 118


Guided Exercise: Troubleshooting OpenShift Software-de nedNetworking................
125 Exposing Applications for External Access .................................................................
134 Guided Exercise: Exposing Applications for External Access...................................
140 Con guring Network Policies ...................................................................................
150 Guided Exercise: Con guring Network
Policies ........................................................... 154 Lab: Con guring OpenShift
Networking for Applications ........................................... 162
Summary .............................................................................................................. 175
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi
fi


6. Controlling Pod Scheduling

Controlling Pod Scheduling Behavior ........................................................................ 178


Guided Exercise: Controlling Pod Scheduling Behavior ............................................ 185
Limiting Resource Usage by an Application................................................................ 191
Guided Exercise: Limiting Resource Usage by an Application .................................. 201

Scaling an Application .............................................................................................. 211


Guided Exercise: Scaling an Application.................................................................... 215
Lab: Controlling Pod Scheduling ............................................................................... 221
Summary ............................................................................................................. 229

7. Describing Cluster Updates

Describing the Cluster Update Process.................................................................... 232


Quiz: Describing the Cluster Update Process.......................................................... 242
Summary ............................................................................................................. 246

8. Managing a Cluster with the Web Console

Performing Cluster Administration ............................................................................ 248


Guided Exercise: Performing Cluster Administration ............................................... 252
Managing Workloads and Operators........................................................................... 259
Guided Exercise: Managing Workloads and Operators .............................................. 264
Examining Cluster Metrics .......................................................................................... 273
Guided Exercise: Examining Cluster Metrics .............................................................. 277
Lab:Managing a Cluster with the Web Console............................................................ 282
Summary........................................................................................................................ 292

You might also like