mirror of
https://github.com/nubenetes/awesome-kubernetes.git
synced 2026-03-05 11:10:43 +00:00
18 KiB
18 KiB
Openshift
- Wikipedia.org: Openshift
- try.openshift.com 🌟🌟🌟🌟
- docs.openshift.com
- https://github.com/openshift/origin 🌟🌟🌟
- docs.openshift.com: OpenShift Pipeline Builds
- https://hub.docker.com/u/openshift/
- https://www.reddit.com/r/openshift 🌟🌟🌟
- PodCTL Podcasts
- Openshift Awesome 🌟
- Openshift Awesome List 2
- Dzone.com: OpenShift Quick Start 🌟
- Dzone.com: OpenShift Quick Start: Build, Deployment, and Pipeline 🌟🌟🌟 Automation is the key to microservices success. Learn how to use the OpenShift platform to implement a continuous build and deployment platform.
- blog.openshift.com: Introducing Red Hat Quay
- redhat.com: How to gather and display metrics in Red Hat OpenShift (Prometheus + Grafana)
- claydesk.com: Google Cloud App Engine Vs Red Hat OpenShift
- https://github.com/fabric8io/fabric8-pipeline-library
- https://twitter.com/openshift
- developers.redhat.com: Source versus binary S2I workflows with Red Hat OpenShift Application Runtimes
- developers.redhat.com: Red Hat OpenShift Container Platform Cheat Sheet
- github.com: Openshift cheat sheet 1
- gist.github.com: Openshift cheat sheet 2
- github.com: openshift cheat sheet 3
- monodot.co.uk: openshift cheat sheet 4
- Red Hat Consulting DevOps And OpenShift Playbooks 🌟🌟🌟 Red Hat Consulting DevOps and OpenShift Playbooks are guides for implementing DevOps technical practices and container automation approaches using Red Hat commercial open source products, including OpenShift Enterprise 3. They are intended to reflect real-world experience delivering solutions through these processes and technologies.
- certdepot.net: OpenShift Free available resources 🌟🌟🌟
- blog.openshift.com: From zero to container deployment hero with OpenShift 3 (Video) 🌟🌟🌟
- blog.openshift.com: Using OpenShift 3 on your local environment 🌟
- blog.openshift.com: From Templates to Openshift Helm Charts
- developers.redhat.com: Securing .NET Core on OpenShift using HTTPS
- OpenShift Commons 🌟 Where users, partners, customers, and contributors come together to collaborate and work together on OpenShift.
- ODO: OpenShift Command line for Developers 🌟🌟🌟 OpenShift Do (Odo) is a CLI tool for developers who are writing, building, and deploying applications on OpenShift. With Odo, developers get an opinionated CLI tool that supports fast, iterative development which abstracts away Kubernetes and OpenShift concepts, thus allowing them to focus on what's most important to them: code.
- Deploying Docker Images to OpenShift We take a look at how to deploy a Docker image from DockerHub into RedHat's OpenShift environment, bringing added functionality along the way.
- Deploying PostgreSQL in MiniShift/OpenShift 3
- Clustering WildFly on Openshift
- Java EE example on Openshift
- Microprofile example on Openshift
- Deploying WildFly apps on Openshift
- Running Thorntail apps on Openshift
- Running Spring Boot applications on Openshift
Red Hat Communities of Practice
- Red Hat Communities of Practice
- OpenShift Toolkit 🌟🌟🌟🌟
- [OpenShift Playbooks](OpenShift Playbooks: https://github.com/redhat-cop/openshift-playbooks)
Identity Management
Quota Management
- GitHub redhat-cop: OpenShift Toolkit - Quota Management 🌟🌟🌟🌟
- OpenShift 4 Resource Management
- techbeatly.com: How to create, increase or decrease project quota
- Quotas setting per project
- Quotas setting across multiple projects
Openshift 4
- blog.openshift.com: Introducing Red Hat OpenShift 4
- Dzone: What’s in OpenShift 4?
- youtube: Installing OpenShift 4 on AWS with operatorhub.io integration 🌟🌟🌟🌟
- blog.openshift.com: OpenShift 4 Install Experience
- blog.openshift.com: OpenShift 4 Roadmap
- operatorhub.io OperatorHub.io is a new home for the Kubernetes community to share Operators. Find an existing Operator or list your own today.
- developers.redhat.com: Get started with Jenkins CI/CD in Red Hat OpenShift 4
- https://blog.openshift.com: Cloud-Native CI/CD with OpenShift Pipelines based on Tekton
- github.com: Tekton pipelines
- youtube: OpenShift 4 OAuth Identity Providers
- cloudowski.com: Honest review of OpenShift 4 🌟🌟🌟🌟
- github.com: Openshift 4 training
- kubevirt.io 🌟🌟🌟🌟
- Getting Started with KubeVirt Containers and Virtual Machines Together
- Open Policy Agent 🌟🌟🌟
- blog.openshift.com: Fine-Grained Policy Enforcement in OpenShift with Open Policy Agent 🌟🌟
E-books
- O'Reilly Free Book: DevOps with OpenShift
- O'Reilly Free Book: Openshift for developers
- Manning: Openshift in action
- Packt publishing: Learn Openshift
Online Learning
- learn.openshift.com 🌟🌟🌟🌟 Interactive Learning Portal
- katacoda.com 🌟🌟🌟🌟 Interactive Learning and Training Platform for Software Engineers
- Red Hat Tutorials & Examples 🌟🌟🌟
- redhatgov.io 🌟🌟
- udemy.com: Red Hat OpenShift With Jenkins: DevOps For Beginners
- udemy.com: OpenShift Enterprise v3.2 Installation and Configuration
- udemy.com: Ultimate Openshift (2018) Bootcamp by School of Devops 🌟🌟🌟 With Openshift Origin 3.10 / OKD 2018, Kubernetes, Jenkins Pipelines, Prometheus, Istio, Micro Services, PaaS
Local Installers
- developers.redhat.com: Red Hat Container Development Kit
- Fabric8.io Microservices Development Platform It is an open source microservices platform based on Docker, Kubernetes and Jenkins. It is built by the Red Hat guys.The purpose of the project is to make it easy to create microservices, build, test and deploy them via Continuous Delivery pipelines then run and manage them with Continuous Improvement and ChatOps. Fabric8 installs and configures the following things for you automatically: Jenkins, Gogs, Fabric8 registry, Nexus, SonarQube.
- A few other options to use OKD locally include oc cluster up and minishift. These may be a better fit for your use case if you only need a quick throwaway environment.
- github.com/redhatdemocentral: OpenShift Container Platform Install Demo 🌟🌟
Cluster Installers
- blog.openshift.com: Installing OKD 3.10 on a Single Host 🌟🌟🌟🌟
- youtube.com: OpenShift Origin is now OKD. Installation of OKD 3.10 from start to finish
- Install RedHat OKD 3.10 on your development box: This repository is a set of scripts that will allow you easily install the latest version (3.10) of OKD in a single node fashion. What that means is that all of the services required for OKD to function (master, node, etcd, etc.) will all be installed on a single host. The script supports a custom hostname which you can provide using the interactive mode.]
- docs.okd.io: Planning your installation
- belgium.devoteam.com: Using Ansible Tower to deploy OpenShift 3 on Azure: a step-by-step guide
NetworkPolicy
Security
- docs.openshift.com: Managing Security Context Constraints
- Dzone: Understanding OpenShift Security Context Constraints
Review Security Context Constraints
Security Context Constraints (SCCs) control what actions pods can perform and what resources they can access.
SCCs combine a set of security configurations into a single policy object that can be applied to pods. These security configurations include, but are not limited to, Linux Capabilities, Seccomp Profiles, User and Group ID Ranges, and types of mounts.
OpenShift ships with several SCCs. The most constrained is the restricted SCC, and the least constrained in the privileged SCC.
The other SCCs provide intermediate levels of constraint for various use cases. The restricted SCC is granted to all authenticated users by default.
The default SCC for most pods should be the restricted SCC. If required, a cluster administrator may allow certain pods to run with different SCCs. Pods should be run with the most restrictive SCC possible.
Pods inherit their SCC from the Service Account used to run the pod. With the default project template, new projects get a Service Account named default that is used to run pods. This default service account is only granted the ability to run the restricted SCC.
Recommendation:
Use OpenShift's Security Context Constraint feature, which has been contributed to Kubernetes as Pod Security Policies. PSPs are still beta in Kubernetes 1.10, 1.11, and 1.12.
Use the restricted SCC as the default
For pods that require additional access, use the SCC that grants the least amount of additional privileges or create a custom SCC
Audit
To show all available SCCs:
oc describe scc
To audit a single pod:
oc describe pod <POD> | grep openshift.io\/scc
Remediation
Apply the SCC with the least privilege required
Operators
Demos
- kubernetesbyexample.com 🌟🌟🌟🌟
- redhatgov.io RedHatGov.io is an open source collection of workshop materials that cover various topics relating to Red Hat's product portfolio.
Openshift Compliant Docker Images
- Red Hat Container Catalog - RedHat Registry (registry.redhat.io) License required
- DockerHub openshift
- https://github.com/sclorg/
- https://github.com/sclorg/postgresql-container/
- https://github.com/sclorg/mariadb-container