Kahibaro
Discord
Login
Register
☰
Home
Courses
Our website is made possible by displaying online advertisements to our visitors.
Please consider supporting us by disabling your ad blocker.
Course Overview ▼
Containers and Cloud-Native Fundamentals ▼
Kubernetes Fundamentals ▼
OpenShift Architecture ▼
OpenShift Installation and Deployment Models ▼
Accessing and Using OpenShift ▼
Building and Deploying Applications ▼
Networking in OpenShift ▼
Storage in OpenShift ▼
Configuration and Secrets Management ▼
Scaling and High Availability ▼
Monitoring, Logging, and Observability ▼
Security in OpenShift ▼
CI/CD and DevOps with OpenShift ▼
Operators and Platform Services ▼
Upgrades, Maintenance, and Operations ▼
OpenShift on HPC and Specialized Workloads ▼
OpenShift in Practice ▼
Future Directions and Ecosystem ▼
Final Project and Hands-On Exercises ▼
☰
OpenShift
OpenShift
Course Overview
▼
What is OpenShift
Why OpenShift is used in modern IT and cloud environments
OpenShift vs Kubernetes
Typical OpenShift use cases
Structure and goals of the course
Containers and Cloud-Native Fundamentals
▼
What is a container
Containers vs virtual machines
Introduction to Docker and container images
Container registries
Basics of cloud-native applications
Kubernetes Fundamentals
▼
What is Kubernetes
Kubernetes architecture
Control plane components
Worker node components
Kubernetes objects and resources
Declarative configuration model
OpenShift Architecture
▼
Overview of OpenShift architecture
Control plane in OpenShift
Nodes and machine roles
OpenShift Operators
OpenShift networking model
OpenShift storage model
OpenShift Installation and Deployment Models
▼
OpenShift deployment options
Installer-Provisioned Infrastructure
User-Provisioned Infrastructure
Managed OpenShift services
Single-node OpenShift
Cluster lifecycle management
Accessing and Using OpenShift
▼
OpenShift web console
OpenShift CLI (oc)
Authentication and authorization
Projects and namespaces
Resource quotas and limits
Building and Deploying Applications
▼
Application deployment concepts
Source-to-Image (S2I)
Container-based deployments
DeploymentConfigs and Deployments
Rolling updates and rollbacks
Networking in OpenShift
▼
Services and service discovery
Routes and ingress
Network policies
Load balancing
External access to applications
Storage in OpenShift
▼
Persistent storage concepts
Persistent Volumes
Persistent Volume Claims
StorageClasses
Dynamic provisioning
Stateful applications
Configuration and Secrets Management
▼
ConfigMaps
Secrets
Environment variables
Managing sensitive data
Best practices for configuration
Scaling and High Availability
▼
Horizontal pod autoscaling
Vertical scaling
Self-healing and pod restarts
High availability concepts
Multi-zone and multi-region clusters
Monitoring, Logging, and Observability
▼
Built-in monitoring stack
Metrics and alerts
Logging architecture
Distributed tracing
Troubleshooting applications
Security in OpenShift
▼
Security model overview
Role-Based Access Control
Security Context Constraints
Image security and scanning
Network security
Compliance and auditing
CI/CD and DevOps with OpenShift
▼
DevOps concepts
CI/CD pipelines overview
OpenShift Pipelines (Tekton)
GitOps with Argo CD
Integrating OpenShift with external CI tools
Operators and Platform Services
▼
What are Operators
Operator Lifecycle Manager
Installing and managing Operators
Common platform Operators
Custom Operators
Upgrades, Maintenance, and Operations
▼
OpenShift upgrade process
Backup and restore
Node maintenance
Cluster troubleshooting
Capacity planning
OpenShift on HPC and Specialized Workloads
▼
Running batch workloads on OpenShift
OpenShift and GPUs
MPI and parallel workloads in containers
Hybrid HPC and cloud workflows
OpenShift in Practice
▼
Typical OpenShift workflows
Development to production lifecycle
Case studies from industry
Common pitfalls and best practices
Future Directions and Ecosystem
▼
Kubernetes ecosystem overview
OpenShift roadmap
Serverless and event-driven workloads
AI and data platforms on OpenShift
Final Project and Hands-On Exercises
▼
Deploying a containerized application
Implementing CI/CD with OpenShift
Securing and scaling an application
Monitoring and troubleshooting report
Where to Move
Move chapter:
☰
Course Overview
☰
What is OpenShift
☰
Why OpenShift is used in modern IT and cloud environments
☰
OpenShift vs Kubernetes
☰
Typical OpenShift use cases
☰
Structure and goals of the course
☰
Containers and Cloud-Native Fundamentals
☰
What is a container
☰
Containers vs virtual machines
☰
Introduction to Docker and container images
☰
Container registries
☰
Basics of cloud-native applications
☰
Kubernetes Fundamentals
☰
What is Kubernetes
☰
Kubernetes architecture
☰
Control plane components
☰
Worker node components
☰
Kubernetes objects and resources
☰
Declarative configuration model
☰
OpenShift Architecture
☰
Overview of OpenShift architecture
☰
Control plane in OpenShift
☰
Nodes and machine roles
☰
OpenShift Operators
☰
OpenShift networking model
☰
OpenShift storage model
☰
OpenShift Installation and Deployment Models
☰
OpenShift deployment options
☰
Installer-Provisioned Infrastructure
☰
User-Provisioned Infrastructure
☰
Managed OpenShift services
☰
Single-node OpenShift
☰
Cluster lifecycle management
☰
Accessing and Using OpenShift
☰
OpenShift web console
☰
OpenShift CLI (oc)
☰
Authentication and authorization
☰
Projects and namespaces
☰
Resource quotas and limits
☰
Building and Deploying Applications
☰
Application deployment concepts
☰
Source-to-Image (S2I)
☰
Container-based deployments
☰
DeploymentConfigs and Deployments
☰
Rolling updates and rollbacks
☰
Networking in OpenShift
☰
Services and service discovery
☰
Routes and ingress
☰
Network policies
☰
Load balancing
☰
External access to applications
☰
Storage in OpenShift
☰
Persistent storage concepts
☰
Persistent Volumes
☰
Persistent Volume Claims
☰
StorageClasses
☰
Dynamic provisioning
☰
Stateful applications
☰
Configuration and Secrets Management
☰
ConfigMaps
☰
Secrets
☰
Environment variables
☰
Managing sensitive data
☰
Best practices for configuration
☰
Scaling and High Availability
☰
Horizontal pod autoscaling
☰
Vertical scaling
☰
Self-healing and pod restarts
☰
High availability concepts
☰
Multi-zone and multi-region clusters
☰
Monitoring, Logging, and Observability
☰
Built-in monitoring stack
☰
Metrics and alerts
☰
Logging architecture
☰
Distributed tracing
☰
Troubleshooting applications
☰
Security in OpenShift
☰
Security model overview
☰
Role-Based Access Control
☰
Security Context Constraints
☰
Image security and scanning
☰
Network security
☰
Compliance and auditing
☰
CI/CD and DevOps with OpenShift
☰
DevOps concepts
☰
CI/CD pipelines overview
☰
OpenShift Pipelines (Tekton)
☰
GitOps with Argo CD
☰
Integrating OpenShift with external CI tools
☰
Operators and Platform Services
☰
What are Operators
☰
Operator Lifecycle Manager
☰
Installing and managing Operators
☰
Common platform Operators
☰
Custom Operators
☰
Upgrades, Maintenance, and Operations
☰
OpenShift upgrade process
☰
Backup and restore
☰
Node maintenance
☰
Cluster troubleshooting
☰
Capacity planning
☰
OpenShift on HPC and Specialized Workloads
☰
Running batch workloads on OpenShift
☰
OpenShift and GPUs
☰
MPI and parallel workloads in containers
☰
Hybrid HPC and cloud workflows
☰
OpenShift in Practice
☰
Typical OpenShift workflows
☰
Development to production lifecycle
☰
Case studies from industry
☰
Common pitfalls and best practices
☰
Future Directions and Ecosystem
☰
Kubernetes ecosystem overview
☰
OpenShift roadmap
☰
Serverless and event-driven workloads
☰
AI and data platforms on OpenShift
☰
Final Project and Hands-On Exercises
☰
Deploying a containerized application
☰
Implementing CI/CD with OpenShift
☰
Securing and scaling an application
☰
Monitoring and troubleshooting report
Close