Back

CN253: Mirantis Cloud Native Platform Bootcamp

-
+

NOK 37.000


In this intense bootcamp, you'll encounter containers for the first time, learn to orchestrate them into scalable, highly available applications orchestrated by Docker Swarm, and finally discover how to enhance the security of your entire software supply chain and production environments using Mirantis Kubernetes Engine and Mirantis Secure Registry. This bundle is ideal for students who are just starting out with containerization and want to leverage the full power of Swarm and the Mirantis orchestration platform as soon as possible.

TARGET AUDIENCE:
System Operators & Administrators

COURSE PREREQUISITES:
Attendees should meet the following prerequisites:

• Familiarity with the bash shell
• Filesystem navigation and manipulation
• Command line text editors like vim or nano
• Common tooling like curl, wget and ping

COURSE CONTENT:
This course combines all topics of CN100, CN110, CN212 and CN213

Containerization motivations and implementation

• Usecases
• Comparison to virtual machines
Creating, managing and auditing containers

• Container implementation from the Linux kernel
• Container lifecycle details
• Core container creation, auditing and management CLI
Best practices in container image design

• Layered filesystem implementation and performance implications
• Creating images with Dockerfiles
• Optimising image builds with multi-stage builds and image design best practices
Single-host container networking

• Docker native networking model
• Software defined networks for containers
• Docker-native single-host service discovery and routing
Provisioning external storage

• Docker volume creation and management
• Best practices and usecases for container-external storage.

Setting up and configuring a Swarm

• Operational priorities of container orchestration
• Containerized application architecture
• Swarm scheduling workflow & task model
• Automatic failure mitigation
• Swarm installation & advanced customization
Deploying workloads on Swarm

• Defining workloads as services
• Scaling workloads
• Container scheduling control
• Rolling application updates and rollback
• Application healthchecks
• Application troubleshooting
• Deploying applications as Stacks
Networking Swarm workloads

• Swarm service discovery and routing implementation
• Routing strategies for stateful and stateless workloads
• Swarm ingress traffic
Provisioning dynamic configuration

• Application configuration design
• Environment variable management
• Configuration file management
• Provisioning sensitive information
Provisioning persistent storage

• Storage backend architecture patterns
• NFS backed Swarms
Monitoring Swarm

• What to monitor in production-grade Swarms
• Potential Swarm failure modes & mitigations
• Swarm workload monitoring

Mirantis Kubernetes Engine Architecture

• Production-grade deployment patterns
• Containerized components of MKE
• Networking & System requirements for MKE
• Installing MKE via Launchpad for high availability
Access Control in MKE

• MKE RBAC systems
• PKI, client bundle and API authentication
• Swarm and Kubernetes access control comparison
L7 Networking Features

• Interlock for Swarm
• Istio for Kubernetes
• Sticky sessions, canary or blue/green deployments, and cookie usage for both orchestrators
MKE Support Dumps

• Generating and understanding MKE support dumps
• Finding critical information in support dumps for troubleshooting MKE
• Enabling and exporting API audit logs for disaster post-mortem
MKE Troubleshooting

• Correlating MKE symptoms with components
• Probing and reading MKE state databases
• Recovering failed MKE managers
• MKE backups & restore
• Disaster recovery in event of critical MKE failure

Mirantis Secure Registry Architecture

• Production-grade deployment patterns
• Containerized components of MSR
• Networking & System requirements for MSR
• Installing MSR via Launchpad for high availability
• Integrating external storage into MSR
Access Control in MSR

• MSR RBAC system
Content Trust

• Defeating man in the middle attacks with The Update Framework & Notary
• Content Trust usage in MSR
Security Scanning

• Auditing container images for known vulnerabilities
• Setting up MSR security scanning
• Security scan integration in continuous integration
Repository Automation

• Continuous integration pipeline architecture featuring MSR
• Promoting and mirroring images through pipelines
• Integrating MSR with external tooling via webhooks
Image Management

• Image pruning and garbage collection strategies and automation
• Registry sizing strategy
• Content caching for distributed teams
MSR Troubleshooting

• Correlating MSR symptoms with components
• Probing and reading MSR state databases
• Recovering failed MSR replicas
• MSR backups & restore
• Disaster recovery in event of critical MSR failure

COURSE OBJECTIVE:
Not available. Please contact.

FOLLOW ON COURSES:
Not available. Please contact.