Szkolenia Mirantis

Cel szkolenia szkolenie zdalne - dlearning

kod: CN210 | wersja: 1

In this operations-focused course, you’ll deep dive into all the features of the Docker Enterprise platform, and discover how it enables a secure software supply chain from development to production. We’ll discuss managing and enhancing your Kubernetes and Swarm applications through Universal Control Plane, how to harden image security by building pipelines in Docker Trusted Registry, and how to enhance the security of the Docker Enterprise platform via operational best practices.

Who Should Attend

This course is targeted at students with the following:

  • Motivations: Leverage all the features of Universal Control Plane and Docker Trusted registry to securely manage containerized applications in a cloud or datacenter.
  • Roles: System Operators & Administrators

Plan szkolenia Rozwiń listę

  1. Docker Enterprise architecture
    • DE usage patterns
    • Containerized components of DE
    • Networking & System requirements for DE
    • Installing UCP & DTR
    • UCP & DTR high availability
  2. Access control in Docker Enterprise
    • UCP and DTR RBAC systems
    • PKI, client bundle and API authentication
    • Swarm and Kubernetes access control comparison
  3. Deploying Swarm and Kubernetes applications on UCP
    • Orchestrator architecture
    • Swarm and Kubernetes networking and architecture comparison
    • Application deployment on UCP
  4. Container networking patterns
    • Routing and service discovery for stateful and stateless applications on Swarm and Kubernetes
    • Ingress vs. cluster internal routing
    • L7 routing featuring sticky sessions and path based routing in Swarm and Kubernetes
    • Introduction to Istio service mesh
    • Canary and Blue-Green deployment patterns in UCP
  5. Cluster-wide logging patterns
    • Engine log management
    • UCP audit logging
    • Log aggregation and management
  6. Enhancing platform security
    • Options for improving host-level container security
    • Kubernetes admission controllers and pod security policies
    • Container network encryption
    • Kubernetes network policies
  7. Content Trust in DTR
    • Man-in-the-middle mitigation per the Update Framework
    • Setting up content trust keys
    • Signing images with content trust
  8. Security Scanning in DTR
    • Security scanning setup
    • Interpreting and filtering scanner reuslts
  9. Building image pipelines with webhooks and image promotion
    • Continuous integration pipeline tools
    • Triggering webhooks
    • Automatic and manual image promotion through pipeline stages
  10. DTR Image Management
    • Tag pruning and garbage collection
    • DTR sizing for development and production clusters
    • DTR content caching
Pobierz konspekt szkolenia w formacie PDF

Dodatkowe informacje

Wymagania wstępne
  • CN110 course and prerequisites therein, or equivalent experience
  • Familiarity with the Bash shell 
    • Filesystem navigation and manipulation
    • Command line text editors like vim or nano
    • Common tooling like curl, wget and ping
  • Familiarity with YAML and JSON notation
Poziom trudności
Czas trwania 3 dni

The participants will obtain certificates signed by Mirantis.


Authorized Mirantis Trainer

Pozostałe szkolenia Mirantis | Cloud Native

Szkolenia powiązane tematycznie



Formularz kontaktowy

Prosimy o wypełnienie poniższego formularza, jeśli chcą Państwo uzyskać więcej informacji o powyższym szkoleniu.

* pola oznaczone (*) są wymagane

Informacje o przetwarzaniu danych przez Compendium – Centrum Edukacyjne Spółka z o.o.


Najbliższe szkolenia Mirantis

Harmonogram szkoleń Mirantis