With OpenShift routes, you can expose your applications to external networks securely.
The types of secure routes are edge, passthrough, and re-encryption.
With network policies, you can configure isolation policies for individual pods.
You can use network policies to create logical zones in the SDN that map to your organization network zones.
In contrast to traditional firewalls, Kubernetes network policies control network traffic between pods by using labels instead of IP addresses.
OpenShift provides the service-ca controller to generate and sign service certificates for internal traffic.
To generate a certificate and key pair, apply the service.beta.openshift.io/serving-cert-secret-name=your-secret annotation to a service.
OpenShift can inject its CA into configuration maps with a custom annotation. Client applications can use these configuration maps to validate connections to services that run in the cluster.
Click CREATE to build all of the virtual machines needed for the classroom lab environment. This may take several minutes to complete. Once created the environment can then be stopped and restarted to pause your experience.
If you DELETE your lab, you will remove all of the virtual machines in your classroom and lose all of your progress.