CÔNG TY TNHH TRAINOCATE VIỆT NAM
DO285 - Containers, Kubernetes, and Red Hat OpenShift Administration II

DO285 - Containers, Kubernetes, and Red Hat OpenShift Administration II

DO285 - Containers, Kubernetes, and Red Hat OpenShift Administration II

Objectives

  • Learn about container, Docker, and OpenShift architecture. 
  • Create containerized services. 
  • Manage containers and container images. 
  • Create custom container images. 
  • Deploy multi-container applications. 
  • Install an OpenShift cluster. 
  • Configure and manage masters and nodes. 
  • Secure OpenShift. 
  • Control access to resources on OpenShift. 
  • Monitor and collect metrics on OpenShift. 
  • Deploy applications on OpenShift using source-to-image (S2I). 
  • Manage storage on OpenShift.

Content

1. Describe container technology
Describe how software can run in containers orchestrated by the OpenShift Container Platform.

2. Create containerized services
Provision a server using container technology.

3. Manage containers
Manipulate pre-built container images to create and manage containerized services.

4. Manage container images
Manage the life cycle of a container image from creation to deletion.

5. Create custom container images
Design and code a Dockerfile to build a custom container image.

6. Deploy multi-container applications
Deploy applications that are containerized using multiple container images.

7. Install OpenShift Container Platform
Install OpenShift and configure the cluster.

8. Explore OpenShift networking concepts
Describe and explore OpenShift networking concepts.

9. Deploy containerized applications on OpenShift
Deploy single container applications on OpenShift Container Platform.

10. Deploy multi-container applications on OpenShift
Deploy applications that are containerized using multiple container images on an OpenShift cluster.

11. Execute commands
Execute commands using the command-line interface.

12. Control resource access
Control access to OpenShift resources.

13. Allocate persistent storage
Implement persistent storage.

14. Manage application deployments
Manipulate resources to manage deployed applications.

15. Install the metrics subsystem
Install and configure the metrics gathering system.

16. Manage OpenShift Container Platform
Manage and monitor OpenShift resources and software.

Audience

  • Developers who want to containerize software applications 
  • Administrators who are new to container technology and container orchestration 
  • Architects who are considering using container technologies in software architectures 
  • System administrators who want to learn more about OpenShift System architects who want to learn more about OpenShift 
  • Architects and developers who want to install and configure OpenShift

Prerequisites

  • Have ability to use a Linux terminal session and issue operating system commands 
  • Become a Red Hat Certified System Administrator (RHCSA) or demonstrate equivalent knowledge 
  • Have experience with web application architectures and their corresponding technologies

Certification

This course is not associated with any Certification.

Schedule

Lịch khai giảng

Form đăng ký

Bằng cách nhấn nút "ĐĂNG KÝ", tôi hoàn toàn đồng ý với Chính sách bảo mật

Các khóa đào tạo Red Hat khác

DO370 - Enterprise Kubernetes Storage with Red Hat OpenShift Data Foundation

Traditional storage options available to Kubernetes administrators are limited and lack flexibility and/or versatility. Red Hat OpenShift Data Foundation provides real advantages, even when it is backed by cloud storage such as AWS EBS and sophisticated on-prem legacy storage like SAN arrays. Many companies rely on third-party solutions to manage backup and disaster recovery in production. However, proper planning to implement these solutions requires knowledge of the Kubernetes CSI and OAPD APIs. This course walks the student through the recommended steps of configuring and managing storage services for container and Kubernetes services. Course content coverage Deploy Red Hat OpenShift Data Foundation in internal and external mode.  Provision non-shareable block storage to applications like databases.  Provision shareable block storage to applications like virtual machines.  Provision shareable file storage to such applications as CI/CD pipelines and AI/ML. Provision shareable object storage to applications, such as AI/ML and media streaming.  Provision storage for Red Hat OpenShift cluster services, such as monitoring and registry.  Monitor and expand storage capacity and performance. Attach and detach storage from an application for backup and archiving.  Create and access volume snapshots and clones.  Troubleshoot internal Ceph components of Red Hat OpenShift Data Foundation.  Perform backup and restore operations using the OADP API.
4.0 ngày

RH415 - Red Hat Security: Linux in Physical, Virtual and Cloud

Manage security of Red Hat Enterprise Linux systems deployed in bare-metal, virtual, and cloud environments. Red Hat Security: Linux in Physical, Virtual, and Cloud (RH415) is designed for security administrators and system administrators who need to manage the secure operation of servers running Red Hat® Enterprise Linux®, whether deployed on physical hardware, as virtual machines, or as cloud instances. This course is based on Red Hat Enterprise Linux 7.5, Red Hat Satellite 6.3, Red Hat Ansible® Engine 2.5, Red Hat Ansible Tower 3.2, and Red Hat Insights. Maintaining security of computing systems is a process of managing risk through the implementation of processes and standards backed by technologies and tools. In this course, you will learn about resources that can be used to help you implement and comply with your security requirements. Manage compliance with OpenSCAP. Enable SELinux on a server from a disabled state, perform basic analysis of the system policy, and mitigate risk with advanced SELinux techniques. Proactively identify and resolve issues with Red Hat Insights. Monitor activity and changes on a server with Linux Audit and AIDE. Protect data from compromise with USBGuard and storage encryption. Manage authentication controls with PAM. Manually apply provided Ansible Playbooks to automate mitigation of security and compliance issues. Scale OpenSCAP and Red Hat Insights management with Red Hat Satellite and Red Hat Ansible Tower.
4.0 ngày

Bản quyền thuộc về Trainocate Việt Nam

back to top