COURSE OBJECTIVE:
Not available. Please contact.
TARGET AUDIENCE:
System Operators & Administrators
COURSE PREREQUISITES:
Attendees should meet the following prerequisites: • Familiarity with the bash shell • Filesystem navigation and manipulation • Command line text editors like vim or nano • Common tooling like curl, wget and ping
COURSE CONTENT:
This course combines all topics of CN100, CN110, CN212 and CN213Containerization motivations and implementation • Usecases • Comparison to virtual machinesCreating, managing and auditing containers • Container implementation from the Linux kernel • Container lifecycle details • Core container creation, auditing and management CLIBest practices in container image design • Layered filesystem implementation and performance implications • Creating images with Dockerfiles • Optimising image builds with multi-stage builds and image design best practicesSingle-host container networking • Docker native networking model • Software defined networks for containers • Docker-native single-host service discovery and routingProvisioning external storage • Docker volume creation and management • Best practices and usecases for container-external storage.Setting up and configuring a Swarm • Operational priorities of container orchestration • Containerized application architecture • Swarm scheduling workflow & task model • Automatic failure mitigation • Swarm installation & advanced customizationDeploying workloads on Swarm • Defining workloads as services • Scaling workloads • Container scheduling control • Rolling application updates and rollback • Application healthchecks • Application troubleshooting • Deploying applications as StacksNetworking Swarm workloads • Swarm service discovery and routing implementation • Routing strategies for stateful and stateless workloads • Swarm ingress trafficProvisioning dynamic configuration • Application configuration design • Environment variable management • Configuration file management • Provisioning sensitive informationProvisioning persistent storage • Storage backend architecture patterns • NFS backed SwarmsMonitoring Swarm • What to monitor in production-grade Swarms • Potential Swarm failure modes & mitigations • Swarm workload monitoringMirantis Kubernetes Engine Architecture • Production-grade deployment patterns • Containerized components of MKE • Networking & System requirements for MKE • Installing MKE via Launchpad for high availabilityAccess Control in MKE • MKE RBAC systems • PKI, client bundle and API authentication • Swarm and Kubernetes access control comparisonL7 Networking Features • Interlock for Swarm • Istio for Kubernetes • Sticky sessions, canary or blue/green deployments, and cookie usage for both orchestratorsMKE Support Dumps • Generating and understanding MKE support dumps • Finding critical information in support dumps for troubleshooting MKE • Enabling and exporting API audit logs for disaster post-mortemMKE Troubleshooting • Correlating MKE symptoms with components • Probing and reading MKE state databases • Recovering failed MKE managers • MKE backups & restore • Disaster recovery in event of critical MKE failureMirantis Secure Registry Architecture • Production-grade deployment patterns • Containerized components of MSR • Networking & System requirements for MSR • Installing MSR via Launchpad for high availability • Integrating external storage into MSRAccess Control in MSR • MSR RBAC systemContent Trust • Defeating man in the middle attacks with The Update Framework & Notary • Content Trust usage in MSRSecurity Scanning • Auditing container images for known vulnerabilities • Setting up MSR security scanning • Security scan integration in continuous integrationRepository Automation • Continuous integration pipeline architecture featuring MSR • Promoting and mirroring images through pipelines • Integrating MSR with external tooling via webhooksImage Management • Image pruning and garbage collection strategies and automation • Registry sizing strategy • Content caching for distributed teamsMSR Troubleshooting • Correlating MSR symptoms with components • Probing and reading MSR state databases • Recovering failed MSR replicas • MSR backups & restore • Disaster recovery in event of critical MSR failure
FOLLOW ON COURSES:
Not available. Please contact.