OKD Engineering

  • Disediakan oleh

You will design an OKD High Avaibility Cluster, then build and test it. You will use this cluster to examine more advanced topics in the administration and operation of a robust OKD cluster in the remainder of the course.

Content Summary

  • Learn OKD cluster features, architecture, and sizing.
  • Investigate OKD cluster installation methods.
  • Configure storage providers and storage classes.
  • OKD GitOps & CI/CD
  • Scale OKD clusters.
  • Manage OKD resources.

Kurikulum Kursus

  • Modul 1

    Introduction

    • Containerization
    • Container Orchestration
    • Standardization through Containerization
    • OKD Overview
    • OKD Features
    • OKD Life Cycle
    • Architecture Components
    • OKD Machine Roles
    • OKD Operators
  • Modul 2

    Provisioning OKD Cluster

    • Available Platforms
    • Installation Overview
    • The Installation Process of Both Types of OKD Clusters
    • The Installation Process Details
    • Machines Requirements
    • Network Requirements
    • Minimum Resource Requirements
    • About FCOS
    • About Ignition
    • Firewall
    • Network Topology Requirements
    • DNS Requirements
    • Lab 2.1 - Install OKD Cluster - Setup DNS Server
    • Lab 2.2 - Install OKD Cluster - Setup DHCP Server
    • Lab 2.3 - Install OKD Cluster - Install TFTP Server
    • Lab 2.4 - Install OKD Cluster - Setup Matchbox
    • Lab 2.5 - Install OKD Cluster - Configure NTP Server
    • Lab 2.6 - Install OKD Cluster - Configure HAProxy and Rsyslog
    • Lab 2.7 - Install OKD Cluster - Provisioning OKD Cluster
  • Modul 3

    Allocate Persistent Storage

    • Ephemeral Storage
    • Types of Ephemeral Storage
    • Persistent Storage Overview
    • Lifecycle of a Volume and Claim
    • Types of PVs
    • Access Modes
    • Volume Phase and Mount Options
    • Lab 3.1 - Setup NFS Server
    • Lab 3.2 - Setup Persistent Storage
    • Lab 3.3 - Setup Image Registry Persistent Storage
  • Modul 4

    Securing Access to OKD Resources

    • Users and Groups
    • Authenticating API Requests
    • The Authentication Operator
    • Identity Providers
    • Role-based Access Control (RBAC)
    • Default Roles
    • User Types
    • Secrets Overview
    • Features and Types of Secrets
    • Use Cases for Secrets
    • Security Context Constraints (SCCs)
    • Lab 4.1 - Configuring HTPasswd Identity Providers
    • Lab 4.2 - Create Users from the Secret
    • Lab 4.3 - Update User Password from the Secret
    • Lab 4.4 - Delete User from the Secret
    • Lab 4.5 - Defining and Applying Permissions using RBAC
    • Lab 4.6 - Managing Sensitive Information With Secrets
    • Lab 4.7 - Controlling Application Permissions with Security Context Constraints (SCC)
    • Quiz 4.1 Create User
  • Modul 5

    Explore OKD Networking Concepts

    • Introducing OpenShift Software-Defined Networking
    • Networking Model
    • Using Services for Accessing Pods
    • Defining Service Types
    • Discussing the DNS Operator and DNS Records for Services
    • The Cluster Network Operator
    • Network Modes
    • Comparing and Contrasting Network Modes
    • Multus Container Network Interface (CNI)
    • Accessing Application from External Networks
    • Methods for Managing Ingress Traffic
    • Route Options and Route Types
    • Insecure Routes
    • Securing Applications with Edge Routes
    • Securing Applications with Pass-through Routes
    • Lab 5.1 - Create a Route to Access the Frontend service
    • Lab 5.2 - Create a Secure Edge Route
  • Modul 6

    Scaling Cluster and Applications

    • Introducing the Machine API
    • Manually Scaling Worker Nodes
    • Automatically Scaling a Cluster
    • Implementing Automatic Scaling
    • Specifying Pod Replicas in Configuration Workloads
    • Manually Scaling the Number of Pod Replicas
    • Autoscaling Pods
    • Lab 6.1 - Manual Scaling the Loadtest Application
    • Lab 6.2 - Horizontal Pod Autoscaler
  • Modul 7

    Pod Scheduling

    • Introducing the Scheduler Algorithm
    • Scheduling and Topology
    • Labeling Nodes and MachineSets
    • Controlling Pod Placement
    • Configuring a Node Selector for a Project
    • Scaling the Number of Pod Replicas
    • Resource Requests and Limits for Pods
    • Applying Quotas
    • Applying Limit Ranges
    • Applying Quotas to Multiple Projects
    • Lab 7.1 - Labeling Nodes
    • Lab 7.2 - Limiting Resource Usage
  • Modul 8

    Managing Images and Registry

    • Managing Image Overview
    • Image Tags
    • Image Tag Conventions
    • Using Image Streams
    • Adding Tags to Image Streams
    • Image Pull Policy
    • Using Image Pull Secrets
    • The Source-to-Image (S2I)
    • The Benefits of Source-to-Image (S2I)
    • How Source-to-Image Works
    • The Source-to-Image (S2I) Process
    • Lab 8.1 - Review the Images
    • Lab 8.2 - Managing Image Registry - Accessing to Image registry
    • Lab 8.3 - Managing Image Registry - Build an Image
    • Lab 8.4 - Managing Image Registry - Push Images to the Registry
    • Lab 8.5 - Create the Deployment using Image from the Registry
    • Lab 8.6 - Building an Application with The Source-to-Image (S2I)
    • Lab 8.7 - Manage images with The Source-to-Image (S2I)
    • Quiz 8.1 Build an application with S2I tool
  • Modul 9

    Managing a Cluster with the Web Console

    • Describing the Web Console
    • Accessing the OKD Web Console
    • Finding Resources
    • Creating Users and Groups
    • Creating a Project
    • Exploring Workload Resources
    • Managing Workloads
    • Deploying Applications
    • Installing and Using Operators
    • Viewing Cluster Metrics
    • Viewing Project Metrics
    • Viewing Resource Metrics
    • Performing Prometheus Queries in the Web Console
    • Lab 9.1 - Add a Tester User Entry to the Localusers Secret via Web Console
    • Lab 9.2 - Create and Configure a New Project Named console-apps via Web Console
  • Modul 10

    Build Applications

    • Applications Overview
    • Creating Sample Applications
    • Creating Applications using the CLI
    • Modifying Applications
    • Helm Charts
    • Deployment and DeploymentConfig
    • Replication Controllers
    • Replica Sets
    • DeploymentConfig Objects
    • DeploymentConfig Object-Specific Features
    • Deployment-Specific Features
    • Choosing a Deployment Strategy
    • Route-Based Deployment Strategies
    • Lab 10.1 Creating Sample applications
    • Lab 11.2 Importing a codebase from Git to create an application
    • Lab 10.3 Build and deploy a WordPress app
  • Modul 11

    Manage and Monitor OKD Resources

    • The Monitoring Stack
    • Default Monitoring Components
    • Default Monitoring Targets
    • Understanding Metrics
    • Alerts and AlertManager
    • Prometheus
    • Describing Prometheus Query Language
    • Introducing Grafana
    • Lab 11.1 - Review detail of the Monitoring Resources
    • Lab 11.2 - Monitoring Cluster Resouces
    • Lab 11.3 - Alerting and Metrics
    • Lab 11.4 - Grafana and Prometheus
  • Modul 12

    GitOps

    • About GitOps
    • ArgoCD basics
    • Lab 12.1 - Setup ArgoCD from OKD Operators
    • Lab 12.2 - Implementing GitOps using ArgoCD
  • Modul 13

    Continuous Integration and Deployment (CI/CD)

    • About CI/CD
    • OKD CI/CD Overview
    • Jenkins Overview
    • Lab 13.1 - Setup Jenkins in OKD
    • Lab 13.2 - Implementing CI/CD using Jenkins
  • Modul 14

    Maintain an OKD cluster

    • Maintain an OKD Cluster
    • Lab 14.1 - Add New Compute
  • Modul 15

    HA Simulation

    • High Availability Cluster
    • Lab 15.1 - High Availability Simulation

Reviews (0)


Level Menengah
-

Kategori

OKDENG