Progress on exercise 4.
This commit is contained in:
@ -38,4 +38,4 @@ To complete the lab exercises you'll use a mix of an `ssh` terminal session for
|
||||
|
||||
Links to a browser based terminal and vnc session are available in the spreadsheet, along with any credentials required. You are welcome to use your own terminal or vnc software if you prefer.
|
||||
|
||||
Once you have both a terminal and vnc session working you're ready to get underway with the workshop, please move on to [Exercise 2](https://rhdemo.win/workshop/exercise2).
|
||||
Once you have both a terminal and vnc session working you're ready to get underway with the workshop, please move on to exercise 2 🚀
|
||||
|
||||
@ -215,3 +215,5 @@ Once the updates are applied we can then check that our new operators are availa
|
||||
|:-----------------------------------------------------------------------------:|
|
||||
| *Check disconnected operator hub* |
|
||||
</Zoom>
|
||||
|
||||
If your mirroring has completed successfully you are ready to move on to exercise 3 and install the three new operators 🎉
|
||||
|
||||
@ -132,3 +132,5 @@ If you check back on your web console, after a short wait the **Red Hat Develope
|
||||
| *List of installed operators* |
|
||||
</Zoom>
|
||||
|
||||
If all three operators are now installed congratulations you are ready to move on to Exercise 3 🎉
|
||||
|
||||
|
||||
31
data/workshop/exercise4.mdx
Normal file
31
data/workshop/exercise4.mdx
Normal file
@ -0,0 +1,31 @@
|
||||
---
|
||||
title: Deploy advanced cluster security
|
||||
exercise: 4
|
||||
date: '2024-08-31'
|
||||
tags: ['openshift','containers','kubernetes','disconnected']
|
||||
draft: false
|
||||
authors: ['default']
|
||||
summary: "Time to up our security & compliance game! 🔒"
|
||||
---
|
||||
|
||||
With our Red Hat Advanced Cluster Security Operator installed and standing by to do some work for us, let's give it some work to do by telling it to deploy Red Hat Advanced Cluster Security for us.
|
||||
|
||||
## 4.1 - Getting familiar with rhacs
|
||||
|
||||
Before we get into the technical implementation let's take a moment to get up to speed with Red Hat Advanced Cluster Security works.
|
||||
|
||||
Fundamentally you install RHACS as a set of containers in your OpenShift Container Platform or Kubernetes cluster. RHACS includes the following services:
|
||||
|
||||
1. **Central** services you install on a designated "hub" cluster.
|
||||
2. **Secured cluster** services you install on each cluster you want to secure by RHACS.
|
||||
|
||||
<Zoom>
|
||||
| |
|
||||
|:-----------------------------------------------------------------------------:|
|
||||
| *Red Hat Advanced Cluster Security high level architecture* |
|
||||
</Zoom>
|
||||
|
||||
> Note: For an overview of which sources Red Hat Advanced Cluster Security uses for vulnerability information and a more detailed walkthrough of each compoent, take a moment to review https://docs.redhat.com/en/documentation/red_hat_advanced_cluster_security_for_kubernetes/4.5/html-single/architecture/index.
|
||||
|
||||
|
||||
|
||||
BIN
public/static/images/compliance/acs-architecture-kubernetes.png
Normal file
BIN
public/static/images/compliance/acs-architecture-kubernetes.png
Normal file
Binary file not shown.
|
After Width: | Height: | Size: 139 KiB |
Reference in New Issue
Block a user