Preface A: Introduction
Section A.1: Red Hat OpenShift Administration II: Configuring a Production Cluster
Section A.2: Orientation to the Classroom Environment
Section A.3: Performing Lab Exercises
Chapter 1: Declarative Resource Management
Section 1.1: Resource Manifests
Section 1.2: Guided Exercise: Resource Manifests
Section 1.3: Kustomize Overlays
Section 1.4: Guided Exercise: Kustomize Overlays
Section 1.5: Lab: Declarative Resource Management
Section 1.6: Summary
Chapter 2: Deploy Packaged Applications
Section 2.1: OpenShift Templates
Section 2.2: Guided Exercise: OpenShift Templates
Section 2.3: Helm Charts
Section 2.4: Guided Exercise: Helm Charts
Section 2.5: Lab: Deploy Packaged Applications
Section 2.6: Summary
Chapter 3: Authentication and Authorization
Section 3.1: Configure Identity Providers
Section 3.2: Guided Exercise: Configure Identity Providers
Section 3.3: Define and Apply Permissions with RBAC
Section 3.4: Guided Exercise: Define and Apply Permissions with RBAC
Section 3.5: Lab: Authentication and Authorization
Section 3.6: Summary
Chapter 4: Network Security
Section 4.1: Protect External Traffic with TLS
Section 4.2: Guided Exercise: Protect External Traffic with TLS
Section 4.3: Configure Network Policies
Section 4.4: Guided Exercise: Configure Network Policies
Section 4.5: Protect Internal Traffic with TLS
Section 4.6: Guided Exercise: Protect Internal Traffic with TLS
Section 4.7: Lab: Network Security
Section 4.8: Summary
Chapter 5: Expose non-HTTP/SNI Applications
Section 5.1: Load Balancer Services
Section 5.2: Guided Exercise: Load Balancer Services
Section 5.3: Multus Secondary Networks
Section 5.4: Guided Exercise: Multus Secondary Networks
Section 5.5: Lab: Expose non-HTTP/SNI Applications
Section 5.6: Summary
Chapter 6: Enable Developer Self-Service
Section 6.1: Project and Cluster Quotas
Section 6.2: Guided Exercise: Project and Cluster Quotas
Section 6.3: Per-Project Resource Constraints: Limit Ranges
Section 6.4: Guided Exercise: Per-Project Resource Constraints: Limit Ranges
Section 6.5: The Project Template and the Self-Provisioner Role
Section 6.6: Guided Exercise: The Project Template and the Self-Provisioner Role
Section 6.7: Lab: Enable Developer Self-Service
Section 6.8: Summary
Chapter 7: Manage Kubernetes Operators
Section 7.1: Kubernetes Operators and the Operator Lifecycle Manager
Section 7.2: Quiz: Kubernetes Operators and the Operator Lifecycle Manager
Section 7.3: Install Operators with the Web Console
Section 7.4: Guided Exercise: Install Operators with the Web Console
Section 7.5: Install Operators with the CLI
Section 7.6: Guided Exercise: Install Operators with the CLI
Section 7.7: Lab: Manage Kubernetes Operators
Section 7.8: Summary
SectionChapter 8: Application Security
SectionSection 8.1: Control Application Permissions with Security Context Constraints
Section 8.2: Guided Exercise: Control Application Permissions with Security Context Constraints
Section 8.3: Allow Application Access to Kubernetes APIs
Section 8.4: Guided Exercise: Allow Application Access to Kubernetes APIs
Section 8.5: Cluster and Node Maintenance with Kubernetes Cron Jobs
Section 8.6: Guided Exercise: Cluster and Node Maintenance with Kubernetes Cron Jobs
Section 8.7: Lab: Application Security
Section 8.8: Summary
Chapter 9: OpenShift Updates
Section 9.1: The Cluster Update Process
Section 9.2: Quiz: The Cluster Update Process
Section 9.3: Detect Deprecated Kubernetes API Usage
Section 9.4: Quiz: Detect Deprecated Kubernetes API Usage
Section 9.5: Update Operators with the OLM
Section 9.6: Quiz: Update Operators with the OLM
Section 9.7: Quiz: OpenShift Updates
Section 9.8: Summary
Chapter 10: Comprehensive Review
Section 10.1: Comprehensive Review
Section 10.2: Lab: Cluster Self-service Setup
Section 10.3: Lab: Secure Applications
Section 10.4: Lab: Deploy Packaged Applications