courses kubernetes administrator
reviews kursus adinusa

0.0(0)

Pro Training

OKD Engineering (OK-ENG)

Disusun oleh

This course provides knowledge on how to configure, troubleshoot, and manage the OKD Platform. This hands-on, lab-based course shows participants how to review the installation of a cluster, configure it, and manage it on a day-to-day basis and troubleshoot the deployment of containerized applications. You will design an OKD High Availability Cluster, then build and test it. You will use this cluster to examine more advanced topics in the administration and operation of a robust OKD cluster in the reminder of the course.

Advanced
Sertifikat
15 Modul
ornament kursus adinusa

Deskripsi

Silabus

Modul 1
Containerization
Container Orchestration
Standardization through Containerization
OKD Overview
OKD Features
OKD Life Cycle
Architecture Components
OKD Machine Roles
OKD Operators
Modul 2
Available Platforms
Installation Overview
The Installation Process of Both Types of OKD Clusters
The Installation Process Details
Machines Requirements
Network Requirements
Minimum Resource Requirements
About FCOS
About Ignition
Firewall
Network Topology Requirements
DNS Requirements
Lab 2.1 - Install OKD Cluster - Setup DNS Server
Lab 2.2 - Install OKD Cluster - Setup DHCP Server
Lab 2.3 - Install OKD Cluster - Install TFTP Server
Lab 2.4 - Install OKD Cluster - Setup Matchbox
Lab 2.5 - Install OKD Cluster - Configure NTP Server
Lab 2.6 - Install OKD Cluster - Configure HAProxy and Rsyslog
Lab 2.7 - Install OKD Cluster - Provisioning OKD Cluster
Modul 3
Ephemeral Storage
Types of Ephemeral Storage
Persistent Storage Overview
Lifecycle of a Volume and Claim
Types of PVs
Access Modes
Volume Phase and Mount Options
Lab 3.1 - Setup NFS Server
Lab 3.2 - Setup Persistent Storage
Lab 3.3 - Setup Image Registry Persistent Storage
Modul 4
Users and Groups
Authenticating API Requests
The Authentication Operator
Identity Providers
Role-based Access Control (RBAC)
Default Roles
User Types
Secrets Overview
Features and Types of Secrets
Use Cases for Secrets
Security Context Constraints (SCCs)
Lab 4.1 - Configuring HTPasswd Identity Providers
Lab 4.2 - Create Users from the Secret
Lab 4.3 - Update User Password from the Secret
Lab 4.4 - Delete User from the Secret
Lab 4.5 - Defining and Applying Permissions using RBAC
Lab 4.6 - Managing Sensitive Information With Secrets
Lab 4.7 - Controlling Application Permissions with Security Context Constraints (SCC)
Quiz 4.1 Create User
Modul 5
Introducing OpenShift Software-Defined Networking
Networking Model
Using Services for Accessing Pods
Defining Service Types
Discussing the DNS Operator and DNS Records for Services
The Cluster Network Operator
Network Modes
Comparing and Contrasting Network Modes
Multus Container Network Interface (CNI)
Accessing Application from External Networks
Methods for Managing Ingress Traffic
Route Options and Route Types
Insecure Routes
Securing Applications with Edge Routes
Securing Applications with Pass-through Routes
Lab 5.1 - Create a Route to Access the Frontend service
Lab 5.2 - Create a Secure Edge Route
Modul 6
Introducing the Machine API
Manually Scaling Worker Nodes
Automatically Scaling a Cluster
Implementing Automatic Scaling
Specifying Pod Replicas in Configuration Workloads
Manually Scaling the Number of Pod Replicas
Autoscaling Pods
Lab 6.1 - Manual Scaling the Loadtest Application
Lab 6.2 - Horizontal Pod Autoscaler
Modul 7
Introducing the Scheduler Algorithm
Scheduling and Topology
Labeling Nodes and MachineSets
Controlling Pod Placement
Configuring a Node Selector for a Project
Scaling the Number of Pod Replicas
Resource Requests and Limits for Pods
Applying Quotas
Applying Limit Ranges
Applying Quotas to Multiple Projects
Lab 7.1 - Labeling Nodes
Lab 7.2 - Limiting Resource Usage
Modul 8
Managing Image Overview
Image Tags
Image Tag Conventions
Using Image Streams
Adding Tags to Image Streams
Image Pull Policy
Using Image Pull Secrets
The Source-to-Image (S2I)
The Benefits of Source-to-Image (S2I)
How Source-to-Image Works
The Source-to-Image (S2I) Process
Lab 8.1 - Review the Images
Lab 8.2 - Managing Image Registry - Accessing to Image registry
Lab 8.3 - Managing Image Registry - Build an Image
Lab 8.4 - Managing Image Registry - Push Images to the Registry
Lab 8.5 - Create the Deployment using Image from the Registry
Lab 8.6 - Building an Application with The Source-to-Image (S2I)
Lab 8.7 - Manage images with The Source-to-Image (S2I)
Quiz 8.1 Build an application with S2I tool
Modul 9
Describing the Web Console
Accessing the OKD Web Console
Finding Resources
Creating Users and Groups
Creating a Project
Exploring Workload Resources
Managing Workloads
Deploying Applications
Installing and Using Operators
Viewing Cluster Metrics
Viewing Project Metrics
Viewing Resource Metrics
Performing Prometheus Queries in the Web Console
Lab 9.1 - Add a Tester User Entry to the Localusers Secret via Web Console
Lab 9.2 - Create and Configure a New Project Named console-apps via Web Console
Modul 10
Applications Overview
Creating Sample Applications
Creating Applications using the CLI
Modifying Applications
Helm Charts
Deployment and DeploymentConfig
Replication Controllers
Replica Sets
DeploymentConfig Objects
DeploymentConfig Object-Specific Features
Deployment-Specific Features
Choosing a Deployment Strategy
Route-Based Deployment Strategies
Lab 10.1 Creating Sample applications
Lab 11.2 Importing a codebase from Git to create an application
Lab 10.3 Build and deploy a WordPress app
Modul 11
The Monitoring Stack
Default Monitoring Components
Default Monitoring Targets
Understanding Metrics
Alerts and AlertManager
Prometheus
Describing Prometheus Query Language
Introducing Grafana
Lab 11.1 - Review detail of the Monitoring Resources
Lab 11.2 - Monitoring Cluster Resouces
Lab 11.3 - Alerting and Metrics
Lab 11.4 - Grafana and Prometheus
Modul 12
About GitOps
ArgoCD basics
Lab 12.1 - Setup ArgoCD from OKD Operators
Lab 12.2 - Implementing GitOps using ArgoCD
Modul 13
About CI/CD
OKD CI/CD Overview
Jenkins Overview
Lab 13.1 - Setup Jenkins in OKD
Lab 13.2 - Implementing CI/CD using Jenkins
Modul 14
Maintain an OKD Cluster
Lab 14.1 - Add New Compute
Modul 15
High Availability Cluster
Lab 15.1 - High Availability Simulation

Informasi Kursus

Level Advanced
Akses Course 1 Tahun
Estimasi belajar 4 Hari
Harga Offline

Rp8.200.000

Harga Online

Rp7.100.000

Kategori Cloud
Benefit
Sertifikat penyelesaian
Teori dan hands-on lab
Akses materi course 1 tahun
Pembaharuan materi secara berkala
Akses lab hingga h+5 pasca training

FAQ

ADINUSA Pro Training adalah layanan pelatihan ditujukan untuk para profesional atau karyawan diperusahaan yang ingin meningkatkan kemampuannya.

Ketika perusahaan kustomer bekerja sama dengan kami untuk melaksanakan kegiatan pelatihan.

Pengajar ADINUSA Pro Training merupakan praktisi yang memiliki pengalaman di bidangnya serta sudah tersertifikasi lembaga yang kredibel.

Untuk mengikuti pelatihan di ADINUSA Pro Training dapat menghubungi sales@btech.id

Kegiatan ADINUSA Pro Training dapat dilakukan secara offline atau online dan tempatnya menyesuaikan dengan kebutuhan kustomer.

Jumlah peserta untuk melaksanakan pelatihan minimal 4 orang

Materi yang tersedia dapat dilihat pada katalog ADINUSA Pro Training

Silakan berkonsultasi dengan tim sales kami di sales@btech.id atau +62-811-1123-242.