{"id":198,"date":"2026-01-18T22:12:19","date_gmt":"2026-01-18T21:12:19","guid":{"rendered":"https:\/\/adler-tech.com\/?page_id=198"},"modified":"2026-01-19T09:29:38","modified_gmt":"2026-01-19T08:29:38","slug":"openshift-4-administration","status":"publish","type":"page","link":"https:\/\/adler-tech.com\/?page_id=198","title":{"rendered":"OpenShift 4 Administration"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>4 days<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Day 1: Application Lifecycle and Persistence<\/h3>\n\n\n\n<p><strong>Chapter 1: Enterprise Storage Management<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Storage Abstraction<\/strong> (Understanding the relationship between PVs, PVCs, and dynamic Provisioners)<\/li>\n\n\n\n<li><strong>Container Storage Interface (CSI)<\/strong> (Implementing CSI-compliant storage for snapshotting, cloning, and volume resizing)<\/li>\n\n\n\n<li><strong>Regional Disaster Recovery<\/strong> (Introduction to regional-DR patterns using native storage replication)<\/li>\n<\/ul>\n\n\n\n<p><strong>Chapter 2: Streamlined Application Delivery (S2I)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Source-to-Image (S2I) Workflow<\/strong> (Transforming code into container images without manual Dockerfiles)<\/li>\n\n\n\n<li><strong>Build Triggers and Automation<\/strong> (Configuring Webhooks and ImageStream triggers to enable Continuous Deployment)<\/li>\n\n\n\n<li><strong>Developer Perspective Mastery<\/strong> (Using the OpenShift Web Console to visualize application topology and deployment health)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Day 2: Modern Cluster Provisioning<\/h3>\n\n\n\n<p><strong>Chapter 3: The Evolution of OpenShift Installation<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Deployment Methodologies<\/strong> (Deep dive into Installer-Provisioned Infrastructure (IPI) vs. User-Provisioned Infrastructure (UPI))<\/li>\n\n\n\n<li><strong>The Assisted Installer Experience<\/strong> (Utilizing the web-based SaaS installer for simplified bare-metal and vSphere deployments)<\/li>\n\n\n\n<li><strong>Agent-Based Installations<\/strong> (Configuring disconnected environments using the new Agent-based Installer for edge and restricted networks)<\/li>\n\n\n\n<li><strong>RHCOS Fundamentals<\/strong> (Understanding Red Hat Enterprise Linux CoreOS as the immutable, container-optimized host OS)<\/li>\n<\/ul>\n\n\n\n<p><strong>Chapter 4: Control Plane and Node Management<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Masters and Workers<\/strong> (Configuring the highly available control plane and worker node pools)<\/li>\n\n\n\n<li><strong>Machine Management Framework<\/strong> (Using MachineSets and the Machine Config Operator (MCO) to automate node scaling and configuration)<\/li>\n\n\n\n<li><strong>Infrastructure Nodes<\/strong> (Segregating workload traffic by creating dedicated nodes for Ingress, Monitoring, and Registry)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Day 3: Security Hardening and Platform Observability<\/h3>\n\n\n\n<p><strong>Chapter 5: Securing the OpenShift Ecosystem<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Identity and Access Management<\/strong> (Integrating with external providers like Microsoft Entra ID (LDAP\/OIDC) and configuring the internal OAuth server)<\/li>\n\n\n\n<li><strong>Workload Isolation<\/strong> (Applying Security Context Constraints (SCC) and Pod Security Admissions (PSA) to enforce zero-trust)<\/li>\n\n\n\n<li><strong>Network Security<\/strong> (Implementing OVN-Kubernetes as the default CNI and managing Egress Firewalls and Ingress Controllers)<\/li>\n<\/ul>\n\n\n\n<p><strong>Chapter 6: Advanced Monitoring and Insights<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Observability Stack<\/strong> (Overview of the Prometheus, Grafana, and Alertmanager integration for cluster-level health)<\/li>\n\n\n\n<li><strong>User Workload Monitoring<\/strong> (Enabling opt-in observability for business-critical applications in non-system namespaces)<\/li>\n\n\n\n<li><strong>Network Observability<\/strong> (Using the Network Observability Operator to visualize flow traffic and identify bottlenecks)<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">Day 4: Operational Continuity and Future Roadmapping<\/h3>\n\n\n\n<p><strong>Chapter 7: Cluster Maintenance and Upgrades<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>The Over-the-Air (OTA) Update System<\/strong> (Managing cluster versioning via Update Channels and the Cluster Version Operator)<\/li>\n\n\n\n<li><strong>Handling Node Disruptions<\/strong> (Implementing Node Disruption Policies to minimize impact during automated maintenance)<\/li>\n<\/ul>\n\n\n\n<p><strong>Chapter 8: Summary and the Path Forward<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Advanced Capabilities<\/strong> (Brief overview of OpenShift Virtualization, Serverless, and Service Mesh)<\/li>\n\n\n\n<li><strong>AI and Hybrid Cloud<\/strong> (Introducing OpenShift AI and the integration with modern GPU-accelerated workloads)<\/li>\n\n\n\n<li><strong>Final Workshop Review<\/strong> (Q&amp;A session and guidance on Red Hat Certification pathways)<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>4 days Day 1: Application Lifecycle and Persistence Chapter 1: Enterprise Storage Management Chapter 2: Streamlined Application Delivery (S2I) Day 2: Modern Cluster Provisioning Chapter 3: The Evolution of OpenShift Installation Chapter 4: Control Plane and Node Management Day 3: Security Hardening and Platform Observability Chapter 5: Securing the OpenShift Ecosystem Chapter 6: Advanced Monitoring [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":185,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-198","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/adler-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=198"}],"version-history":[{"count":4,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/198\/revisions"}],"predecessor-version":[{"id":215,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/198\/revisions\/215"}],"up":[{"embeddable":true,"href":"https:\/\/adler-tech.com\/index.php?rest_route=\/wp\/v2\/pages\/185"}],"wp:attachment":[{"href":"https:\/\/adler-tech.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}