Course Overview
Create and configure production-grade ROSA clusters as part of a larger AWS customer’s footprint and then integrate applications on ROSA with AWS services while keeping a good security posture.
Deploying Production AWS ROSA Clusters: Creation, Configuration, and Application Integration (CS229) teaches how to configure ROSA clusters as part of pre-existing AWS environments and how to integrate ROSA with AWS services commonly used by IT operations teams, such as Amazon CloudWatch. This course also teaches how to integrate applications deployed on ROSA with AWS services in a way that cluster administrators and platform engineers retain control of credentials and roles required by applications to access AWS services instead of exposing those credentials to application developers.
Note: This course is offered as a 4 day in person class or a 5 day virtual class. Durations may vary based on the delivery. For full course details, scheduling, and pricing, select your location then “get started” on the right hand menu.
Virtual Learning
This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.
Course Objectives
- Create ROSA STS PrivateLink clusters
- Connect PrivateLink ROSA clusters to existing VPCs and enable administrators and developers to access those clusters
- Configure dedicated machine pools and node/pod autoscaling
- Configure node, cluster, and audit log forwarding to Amazon CloudWatch
- Configure authentication and group sync with Amazon Cognito
- Integrate with external container registries such as ECR and Quay.io to deploy applications from private image repositories
- Configure storage classes to enable application access to different EBS volume types
- Configure storage classes and security contexts to enable application access to shared EFS storage volumes
- Configure pod identity using STS/IRSA to enable application access to AWS services such as database (Aurora), integration (SQS), and object storage (S3)
- Provision AWS services for applications using the AWS Controllers for Kubernetes (ACK)
- Federate and query application metrics (application workload monitoring) with Amazon Managed Prometheus Service
- Aggregate and query structured application logs with Amazon CloudWatch
- Configure custom domains and TLS certificates for secure public access to applications
Course Content
PrivateLink Red Hat OpenShift on AWS (ROSA) Clusters
Create a PrivateLink ROSA cluster with STS and enable developers or administrators to access the API and router endpoints of the cluster.
Node and Pod Autoscaling
Configure a ROSA cluster and a workload to dynamically scale the number of cluster nodes and application pods according to load.
Integrate ROSA Clusters with Amazon Web Services
Configure ROSA clusters to forward logs to Amazon CloudWatch for long-term storage, aggregation, and analysis, and to authenticate OpenShift users by using Amazon Cognito.
Deploy Applications From External Registries
Deploy applications on Red Hat OpenShift Service on AWS (ROSA) from private container image repositories in external centralized container image registries.
Provide Amazon Storage Volumes for Applications
Configure Amazon Elastic Block Storage (EBS) or Amazon Elastic File System (EFS) volumes that meet the cost, performance, and sharing requirements of their applications.
Configure Application Access to AWS Services
Configure applications for access to shared AWS services by using Kubernetes service accounts, and provision dedicated AWS services by using Kubernetes custom resources.
OpenShift and AWS Application Observability
Configure ROSA clusters to forward application logs to Amazon CloudWatch and application metrics to Amazon Managed Service for Prometheus.
Custom Domains for ROSA Applications
Expose applications to internet users with secure URLs by using human-readable DNS domains.