Bookmark this page

Chapter 10.  Comprehensive Review

Abstract

Goal

Review tasks from Red Hat OpenShift Administration II: Configuring a Production Cluster.

Sections
  • Comprehensive Review

Lab
  • Cluster Self-service Setup

  • Secure Applications

  • Deploy Packaged Applications

Comprehensive Review

Objectives

After completing this section, you should have reviewed and refreshed the knowledge and skills that you learned in Red Hat OpenShift Administration II: Configuring a Production Cluster.

Reviewing Red Hat OpenShift Administration II: Configuring a Production Cluster

Before beginning the comprehensive review for this course, you should be comfortable with the topics covered in each chapter. Do not hesitate to ask the instructor for extra guidance or clarification on these topics.

Deploy and update applications from resource manifests that are parameterized for different target environments.

  • Deploy and update applications from resource manifests that are stored as YAML files.

  • Deploy and update applications from resource manifests that are augmented by Kustomize.

Deploy and update applications from resource manifests that are packaged for sharing and distribution.

  • Deploy an application and its dependencies from resource manifests that are stored in an OpenShift template.

  • Deploy and update applications from resource manifests that are packaged as Helm charts.

Configure authentication with the HTPasswd identity provider and assign roles to users and groups.

  • Configure the HTPasswd identity provider for OpenShift authentication.

  • Define role-based access controls and apply permissions to users.

Protect network traffic between applications inside and outside the cluster.

  • Allow and protect network connections to applications inside an OpenShift cluster.

  • Restrict network traffic between projects and pods.

  • Configure and use automatic service certificates.

Expose applications to external access without using an ingress controller.

  • Expose applications to external access by using load balancer services.

  • Expose applications to external access by using a secondary network.

Configure clusters for safe self-service by developers from multiple teams, and disallow self-service if operations staff must provision projects.

  • Configure compute resource quotas and Kubernetes resource count quotas per project and cluster-wide.

  • Configure default and maximum compute resource requirements for pods per project.

  • Configure default quotas, limit ranges, role bindings, and other restrictions for new projects, and the allowed users to self-provision new projects.

Install and update operators that the Operator Lifecycle Manager and the Cluster Version Operator manage.

  • Explain the operator pattern and different approaches for installing and updating Kubernetes operators.

  • Install and update operators by using the web console and the Operator Lifecycle Manager.

  • Install and update operators by using the Operator Lifecycle Manager APIs.

Run applications that require elevated or special privileges from the host operating system or Kubernetes.

  • Create service accounts and apply permissions, and manage security context constraints.

  • Run an application that requires access to the Kubernetes API of the application's cluster.

  • Automate regular cluster and application management tasks by using Kubernetes cron jobs.

Update an OpenShift cluster and minimize disruption to deployed applications.

  • Describe the cluster update process.

  • Identify applications that use deprecated Kubernetes APIs.

  • Update OLM-managed operators by using the web console and CLI.

Revision: do280-4.14-08d11e1