Course Overview

This course teaches you to plan and design advanced HPE compute solutions based on industry-standard advanced computing technologies and workloads, as they relate to optimizing performance and availability. Hands-on labs and activities guide you through complex design exercises such as information gathering and analyzing customer business outcomes and technical requirements. You learn to recommend and position HPE compute products, solutions, tools, and appropriate services for customer use cases and workloads. Finally, you architect and design an HPE solution based on customer needs, and then demonstrate and present the solution

Course Objectives

Upon completion of this course, you should be

able to:

• Describe industry-standard advanced

computing technologies and workloads

• Describe and position the HPE advanced

computing portfolio and the typical workloads

for each platform

• Size, design, and configure advanced

computing solutions for a set of customer

workloads

• Manage implementation and startup of

advanced computing solutions to ensure

desired customer outcome

• Monitor, manage, operate, and update

advanced computing solutions

• Optimize and troubleshoot advanced

computing solutions

Course Content

Advanced HPE Compute Solutions, Rev. 21.11 | HT2P3S

Course Overview

This hands-on, advanced technical-level, instructor-led course provides a deep dive into Amazon Web Services (AWS) best practices to help you perform effective and efficient AWS Well-Architected Framework reviews. The course covers the phases of a review, including how to prepare, run, and get guidance after a review has been performed. This course is designed for AWS customers and AWS Partners. Attendees should have familiarity with the AWS concepts, terminology, services, and tools that are covered in the intermediate 200-level precursor to this course. This course provides an AWS Well-Architected Framework review simulation and instructor led group exercises and discussions about prioritizing and resolving risks.The content focuses on how to prepare proposals on high and medium risk issues using the AWS Well-Architected Tool.

Course Objectives

In this course, you will learn to:

  • Recognize workload definition and key concepts
  • Identify the AWS Well-Architected Framework review phases, process, best practices, and anti-patterns
  • Identify high and medium risks
  • Prioritize improvements to the AWS Well-Architected workflow
  • Locate and use the AWS Well-Architected Framework white paper, labs, and prebuilt solutions in the AWS solutions library
  • Locate and use AWS Well-Architected independent software vendors (ISVs)
  • Locate and use the AWS Well-Architected Partner Program (WAPP)

Course Content

Module 0: Course Introduction

Module 1: AWS Well-Architected Framework Reviews

  • AWS Well-Architected Framework workload
  • AWS Well-Architected Framework review phases
  • AWS Well-Architected review approach, lessons learned, and use cases
  • AWS Well-Architected review best practices
  • AWS Well-Architected review anti-patterns
  • Knowledge check

Module 2: Customer Scenario Group Sessions

  • Customer Story
  • Demonstration of the workflow
  • Hands-on group exercise
  • Demonstration: Running a review in the Operational Excellence pillar
  • Role-play exercise: Running a review in the Security pillar
  • Role-play exercise: Running a review in the Reliability pillar
  • Role-play exercise: Running a review in the Performance Efficiency pillar
  • Role-play exercise: Running a review in the Cost Optimization pillar

Module 3: Risk Solutions and Priorities

  • AWS Well-Architected Framework review engagement workflow
  • High risk and medium risk issues
  • Defining risks
  • Resolving high-risk issues (HRIs) and medium-risk issues (MRIs)
  • Group discussion: Identifying and resolving significant risks for:
  • Operational Excellence
  • Security
  • Reliability
  • Performance Efficiency
  • Cost Optimization
  • Prioritizing improvements
  • AWS Well-Architected improvement workflow

Module 4: Resources

  • Resource pages
  • AWS Well-Architected ISVs
  • AWS Well-Architected Partner Program (WAPP)

Module 5: Course Summary

  • Debrief
  • What’s next?
  • Course feedback

Course Overview

In this course, each module presents a scenario with an architectural challenge to be solved. You will examine available AWS services and features as solutions to the problem. You will gain insights by participating in problem-based discussions and learning about the AWS services that you could apply to meet the challenges. Over 3 days, the course goes beyond the basics of a cloud infrastructure and covers topics to meet a variety of needs for AWS customers. Course modules focus on managing multiple AWS accounts, hybrid connectivity and devices, networking with a focus on AWS Transit Gateway connectivity, container services, automation tools for continuous integration/continuous delivery (CI/CD), security and distributed denial of service (DDoS) protection, data lakes and data stores, edge services, migration options, and managing costs. The course concludes by presenting you with scenarios and challenging you to identify the best solutions.

Course level: Advanced

Duration: 3 days

Activities

This course includes presentations, group discussions, use cases, videos, assessments, and hands-on labs.

Course Objectives

In this course, you will learn to:

  • Review the AWS Well-Architected Framework to ensure understanding of best cloud design practices by responding to poll questions while following a graphic presentation
  • Demonstrate the ability to secure Amazon Simple Storage Service (Amazon S3) virtual private cloud (VPC) endpoint connections in a lab environment
  • Identify how to implement centralized permissions management and reduce risk using AWS Organizations organizational units (OUs) and service control policies (SCPs) with AWS Single Sign[1]On
  • Compare the permissions management capabilities of OUs, SCPs, and AWS SSO with and without AWS Control Tower to determine best practices based on use cases
  • Discuss AWS hybrid network designs to address traffic increases and streamline remote work while ensuring FIPS 140-2 Level 2, or Level 3 security compliance
  • Explore the solutions and products available to design a hybrid infrastructure, including access to 5G networks, to optimize service and reduce latency while maintaining high security for critical on[1]premises applications
  • Explore ways to simplify the connection configurations between applications and high[1]performance workloads across global networks
  • Demonstrate the ability to configure a transit gateway in a lab environment
  • Identify and discuss container solutions and define container management options
  • Build and test a container in a lab environment
  • Examine how the AWS developer tools optimize the CI/CD pipeline with updates based on near[1]real-time data
  • Identify the anomaly detection and protection services that AWS offers to defend against DDoS attacks
  • Identify ways to secure data in transit, at rest, and in use with AWS Key Management Service (AWS KMS) and AWS Secrets Manager
  • Determine the best data management solution based on frequency of access, and data query and analysis needs
  • Set up a data lake and examine the advantages of this type of storage configuration to crawl and query data in a lab environment
  • Identify solutions to optimize edge services to eliminate latency, reduce inefficiencies, and mitigate risks
  • Identify the components used to automate the scaling of global applications using geolocation and traffic control
  • Deploy and activate an AWS Storage Gateway file gateway and AWS DataSync in a lab environment
  • Review AWS cost management tools to optimize costs while ensuring speed and performance
  • Review migration tools, services, and processes that AWS provides to implement effective cloud operation models based on use cases and business needs
  • Provide evidence of your ability to apply the technical knowledge and experience gained in the course to improve business practices by completing a Capstone Project

Course Content

Module 1: Course Overview

  • Logistics
  • Student resources
  • Agenda
  • Introductions

Module 2: Building a Web Application on AWS

  • Discuss the architecture of the application you are going to build during this course
  • Explore the AWS services needed to build your web application
  • Discover how to store, manage, and host your web application

Module 3: Getting Started with Development on AWS

  • Describe how to access AWS services programmatically
  • List some programmatic patterns and how they provide efficiencies within AWS SDKs and AWS CLI
  • Explain the value of AWS Cloud9

Module 4: Getting Started with Permissions

  • Review AWS Identity and Access Management (IAM) features and components permissions to support a development environment
  • Demonstrate how to test AWS IAM permissions
  • Configure your IDEs and SDKs to support a development environment
  • Demonstrate accessing AWS services using SDKs and AWS Cloud9

Lab 1: Configure the Developer Environment

  • Connect to a developer environment
  • Verify that the IDE and the AWS CLI are installed and configured to use the application profile
  • Verify that the necessary permissions have been granted to run AWS CLI commands
  • Assign an AWS IAM policy to a role to delete an Amazon S3 bucket

Module 5: Getting Started with Storage

  • Describe the basic concepts of Amazon S3
  • List the options for securing data using Amazon S3
  • Define SDK dependencies for your code
  • Explain how to connect to the Amazon S3 service
  • Describe request and response objects

Module 6: Processing Your Storage Operations

  • Perform key bucket and object operations
  • Explain how to handle multiple and large objects
  • Create and configure an Amazon S3 bucket to host a static website
  • Grant temporary access to your objects
  • Demonstrate performing Amazon S3 operations using SDKs

Lab 2: Develop Solutions Using Amazon S3

  • Interact with Amazon S3 programmatically using AWS SDKs and the AWS CLI
  • Create a bucket using waiters and verify service exceptions codes
  • Build the needed requests to upload an Amazon S3 object with metadata attached
  • Build requests to download an object from the bucket, process data, and upload the object back to the bucket
  • Configure a bucket to host the website and sync the source files using the AWS CLI
  • Add IAM bucket policies to access the S3 website.

Day 2

Module 7: Getting Started with Databases

  • Describe the key components of DynamoDB
  • Explain how to connect to DynamoDB
  • Describe how to build a request object
  • Explain how to read a response object
  • List the most common troubleshooting exceptions

Module 8: Processing Your Database Operations

  • Develop programs to interact with DynamoDB using AWS SDKs
  • Perform CRUD operations to access tables, indexes, and data
  • Describe developer best practices when accessing DynamoDB
  • Review caching options for DynamoDB to improve performance
  • Perform DynamoDB operations using SDK

Lab 3: Develop Solutions Using Amazon DynamoDB

  • Interact with Amazon DynamoDB programmatically using low-level, document, and highlevel APIs in your programs
  • Retrieve items from a table using key attributes, filters, expressions, and paginations
  • Load a table by reading JSON objects from a file
  • Search items from a table based on key attributes, filters, expressions, and paginations
  • Update items by adding new attributes and changing data conditionally
  • Access DynamoDB data using PartiQL and object-persistence models where applicable

Module 9: Processing Your Application Logic

  • Develop a Lambda function using SDKs
  • Configure triggers and permissions for Lambda functions
  • Test, deploy, and monitor Lambda functions

Lab 4: Develop Solutions Using AWS Lambda Functions

  • Create AWS Lambda functions and interact programmatically using AWS SDKs and AWS CLI
  • Configure AWS Lambda functions to use the environment variables and to integrate with other services
  • Generate Amazon S3 pre-signed URLs using AWS SDKs and verify the access to bucket objects
  • Deploy the AWS Lambda functions with .zip file archives through your IDE and test as needed
  • Invoke AWS Lambda functions using the AWS Console and AWS CLI

Module 10: Managing the APIs

  • Describe the key components of API Gateway
  • Develop API Gateway resources to integrate with AWS services
  • Configure API request and response calls for your application endpoints
  • Test API resources and deploy your application API endpoint
  • Demonstrate creating API Gateway resources to interact with your application APIs

Lab 5: Develop Solutions Using Amazon API Gateway

  • Create RESTful API Gateway resources and configure CORS for your application
  • Integrate API methods with AWS Lambda functions to process application data
  • Configure mapping templates to transform the pass-through data during method integration
  • Create a request model for API methods to ensure that the pass-through data format complies with application rules
  • Deploy the API Gateway to a stage and validate the results using the API endpoint

Day 3

Module 11: Building a Modern Application

  • Describe the challenges with traditional architectures
  • Describe the microservice architecture and benefits
  • Explain various approaches for designing microservice applications
  • Explain steps involved in decoupling monolithic applications
  • Demonstrate the orchestration of Lambda Functions using AWS Step Functions

Module 12: Granting Access to Your Application Users

  • Analyze the evolution of security protocols
  • Explore the authentication process using Amazon Cognito
  • Manage user access and authorize serverless APIs
  • Observe best practices for implementing Amazon Cognito
  • Demonstrate the integration of Amazon Cognito and review JWT tokens

Lab 6: Capstone – Complete the Application Build

  • Create a Userpool and an Application Client for your web application using
  • Add new users and confirm their ability to sign-in using the Amazon Cognito CLI
  • Configure API Gateway methods to use Amazon Cognito as an authorizer
  • Verify JWT authentication tokens are generated during API Gateway calls
  • Develop API Gateway resources rapidly using a Swagger importing strategy

Set up your web application frontend to use Amazon Cognito and API Gateway configurations and verify the entire application functionality

Module 13: Deploying Your Application

  • Identify risks associated with traditional software development practices
  • Understand DevOps methodology
  • Configure an AWS SAM template to deploy a serverless application
  • Describe various application deployment strategies
  • Demonstrate deploying a serverless application using AWS SAM

Module 14: Observing Your Application

  • Differentiate between monitoring and observability
  • Evaluate why observability is necessary in modern development and key components
  • Understand CloudWatch’s part in configuring the observability
  • Demonstrate using CloudWatch Application Insights to monitor applications
  • Demonstrate using X-Ray to debug your applications

Lab 7: Observe the Application Using AWS X-Ray

  • Instrument your application code to use AWS X-Ray capabilities
  • Enable your application deployment package to generate logs
  • Understand the key components of an AWS SAM template and deploy your application
  • Create AWS X-Ray service maps to observe end-to-end processing behavior of your application
  • Analyze and debug application issues using AWS X-Ray traces and annotations

Module 15: Course Wrap-up

  • Course overview
  • AWS training courses
  • Certifications
  • Course feedback

Course Overview

In this course, you learn more about the basic architecture of IBM Instana and how to install various kinds of host agents in different modes. In addition, you learn how to optionally pin an agent to a specific version in case that is ever needed. You learn how to install agents on various platforms, such as a Docker, directly to the host, YAML, Operator, and Helm chart. This course also describes how to configure and instrument a website for End User Monitoring (EUM) along with a discussion about how to review website monitoring page metrics. You learn how to use the Web REST API to perform IBM Instana functions programmatically. And, since Instana is only capable of producing dashboards for a single Instana instance at a time, this course shows you how to integrate Grafana with one or more Instana instances to produce federated dashboards.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

  • Review IBM Observability by Instana and basic architecture
  • Describe various host agent configuration and installation options and platforms
  • Describe version pinning
  • Install and configure Infrastructure-only mode host agents as Docker containers
  • Install and configure direct-to-host Infrastructure-only mode host agent
  • Add custom availability zone label
  • Install and configure a direct-to-host agent for a Linux-based Db2 server
  • Perform post-installation configuration, such as availability zone, full monitoring, and custom tags
  • Configure and deploy various kinds of Kubernetes based agents, including YAML, Operator, and Helm chart
  • Describe how to remove any of the types of agents installed
  • Describe the architecture of Instana Website Monitoring and instrument your websites with the Tracking Script
  • View website page metrics and dashboards and analyze page metrics
  • Use the Web REST API to perform Instana functions programmatically
  • Create API Tokens and set token permissions
  • Use the Instana OpenAPI documentation to locate API endpoints
  • Configure Instana for compatibility with Grafana and configure Grafana to be able to fetch metrics from Instana as a data source
  • Create Grafana dashboards of Instana metrics

Exercises

  • Exercise 1. Lab environment overview
  • Exercise 2. Installing a Docker Infrastructure agent on the Instana host
  • Exercise 3. Installing an Infrastructure agent directly on the Instana host
  • Exercise 4. Instana Db2 Agent Installation
  • Exercise 5. Installing host Agents in Kubernetes
  • Exercise 6. Website Monitoring
  • Exercise 7. Web REST API
  • Exercise 8. Grafana dashboards

Course Content


  • Course introduction
  • Unit 1. Review: IBM Instana Observability
  • Exercise 1. Lab environment overview
  • Unit 2. Installing host agents
  • Exercise 2. Installing a Docker Infrastructure agent on the Instana host
  • Unit 3. Installing an Infrastructure agent directly on the Instana host
  • Exercise 3. Installing an Infrastructure agent directly on the Instana host
  • Unit 4. Instana Db2 agent installation
  • Exercise 4. Instana Db2 Agent Installation
  • Unit 5. Installing host agents in Kubernetes
  • Exercise 5. Installing host Agents in Kubernetes
  • Unit 6. Website monitoring
  • Exercise 6. Website Monitoring
  • Unit 7. Web REST API
  • Exercise 7. Web REST API
  • Unit 8. Grafana integrations
  • Exercise 8. Grafana dashboards
  • Course summary

Course Overview

Exclusive – This course teaches IT Professionals how to manage core Windows Server workloads and services using on-premises, hybrid, and cloud technologies.

The course teaches IT Professionals how to implement and manage on-premises and hybrid solutions such as identity, management, compute, networking, and storage in a Windows Server hybrid environment.

Course Objectives

Students will learn to:

  • Deploy and manage identity infrastructure
  • Manage Windows Servers and workloads in a hybrid environment
  • Manage virtualization and containers in a hybrid environment
  • Implement and operate an on-premises and hybrid networking infrastructure
  • Configure storage and file services

Course Content

Deploy and manage identity infrastructure

  • Introduction to AD DS
  • Manage AD DS domain controllers and FSMO roles
  • Implement Group Policy Objects
  • Manage advanced features of AD DS
  • Implement hybrid identity with Windows Server
  • Deploy and manage Azure IaaS Active Directory domain controllers in Azure

Manage Windows Servers and workloads in a hybrid environment

  • Perform Windows Server secure administration
  • Describe Windows Server administration tools
  • Perform post-installation configuration of Windows Server
  • Administer and manage Windows Server IaaS Virtual Machine remotely
  • Manage hybrid workloads with Azure Arc
  • Optimizing IT operations and management with Azure Automanage
  • Just Enough Administration in Windows Server

Manage virtualization and containers in a hybrid environment

  • Configure and manage Hyper-V
  • Configure and manage Hyper-V virtual machines
  • Secure Hyper-V workloads
  • Plan and deploy Windows Server IaaS Virtual Machines
  • Customize Windows Server IaaS Virtual Machine images
  • Automate the configuration of Windows Server IaaS Virtual Machines
  • Run containers on Windows Server
  • Orchestrate containers on Windows Server using Kubernetes

Implement and operate an on-premises and hybrid networking infrastructure

  • Implement DNS for Windows Server IaaS VMs
  • Deploy and manage DHCP
  • Implement Windows Server DNS
  • Implement IP Address Management
  • Implement remote access
  • Implement hybrid network infrastructure
  • Implement Windows Server IaaS VM IP addressing and routing

Configure storage and file services

  • Manage Windows Server file servers
  • Implement Storage Spaces and Storage Spaces Direct
  • Implement Windows Server Data Deduplication
  • Implement Windows Server iSCSI
  • Implement Windows Server Storage Replica
  • Implement a hybrid file server infrastructure


Course Overview

IBM Cloud Pak for AIOps deploys advanced, explainable AI across the IT Operations (IT Ops) toolchain so that you can confidently assess, diagnose, and resolve incidents across mission-critical workloads. IBM Cloud Pak for AIOps brings the depth and breadth of IBM’s enterprise expertise to managing complex, mission-critical IT environments. It helps you apply AI to IT operations to maximize efficiency, reduce costs, and maintain the resiliency and security you need to drive meaningful innovation.

This course is designed to teach you how to perform important post-installation administration and configuration tasks for the IBM Cloud Pak for AIOps v4.3 platform, such as user management, troubleshooting, importing topology, enriching event data, configuring self-monitoring, and making runbooks to expedite or automate solutions to IT problems.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

After completing this course, you should be able to:

View runbook history

Understand how machine learning applies to IT operations problems

Explain the IBM Cloud Pak for AIOps architecture

Understand OpenShift concepts and terminology

Manage users and groups

Integrate the IBM Cloud Pak for AIOps console with an LDAP user repository

Create custom roles

Troubleshoot your environment

Monitor your IBM Cloud Pak deployment with the topology service

Course Content

Unit 1: IBM Cloud Pak for AIOps overview

Unit 2: Build connections to IBM Cloud Pak for AIOps

Unit 3. Essential troubleshooting skills

Unit 4. Configuring self-monitoring

Unit 5. Temporal, seasonal, and scope-based correlations

Unit 6. Topology import and event correlation’

Unit 7. Using runbooks, automations, and policies

Course Overview

During this four-day course, you learn about installing VMware Tanzu® Kubernetes GridTM in a VMware vSphere® environment and provisioning and managing Tanzu Kubernetes Grid clusters. The course covers how to install Tanzu Kubernetes Grid packages to provide services such as image registry, authentication, logging, ingress, multipod network interfaces, service discovery, image registry, and monitoring, in addition to day 2 operations such as backup, life cycle management, and application-specific tools. The concepts learned in this course are applicable for users who must install Tanzu Kubernetes Grid on supported clouds.

Course Objectives

By the end of the course, you should be able to meet the following objectives:

  • Describe how Tanzu Kubernetes Grid fits in the VMware Tanzu® portfolio
  • Describe the Tanzu Kubernetes Grid architecture
  • Deploy and manage Tanzu Kubernetes Grid management and supervisor clusters
  • Deploy and manage Tanzu Kubernetes Grid workload clusters
  • Deploy, configure, and manage Tanzu Kubernetes Grid packages
  • Perform day 2 operations
  • Perform basic troubleshooting

Course Content


1 Course Introduction

  • Introductions and course logistics
  • Course objectives

2 Introducing Tanzu Kubernetes Grid

  • Describe Tanzu Kubernetes Grid
  • Describe VMware vSphere® with VMware Tanzu®
  • Describe VMware Tanzu® Mission ControlTM
  • Describe VMware Tanzu® for Kubernetes Operations
  • Describe the Tanzu Kubernetes Grid components
  • Discuss bootstrapping multiple Tanzu Kubernetes Grid instances
  • Describe vSphere Namespaces
  • Describe the benefits of registering with VMware Tanzu Mission Control

3 CLI Tools and Cluster API

  • Describe the Tanzu CLI and plug-ins
  • Describe the Kubernetes CLI Tools for vSphere
  • Describe the Carvel tool set
  • Describe Cluster API
  • List the infrastructure providers
  • Detail the Cluster API controllers
  • List the Cluster API custom resource definitions

4 Authentication

  • Define Kubernetes roles and RBAC API objects
  • Define Pinniped and OpenID Connect
  • Define Dex and LDAP authentication
  • Define VMware vCenter® Single Sign-On integration with Tanzu Kubernetes Grid
  • Identify the management cluster authentication components
  • Describe the Pinniped workflow in Tanzu Kubernetes Grid on a management cluster
  • Describe vSphere Namespace permissions and roles
  • Define authentication using vCenter Single Sign-On
  • Define authentication using external identity providers
  • Identify the authentication options for kubectl and the Tanzu CLI

5 Load Balancers

  • Explain load balancing in Tanzu Kubernetes Grid
  • Describe the different load balancers that integrate with Tanzu Kubernetes Grid
  • Describe the components of VMware NSX®Advanced Load BalancerTM
  • Explain how Tanzu Kubernetes Grid integrates with NSX Advanced Load Balancer

6 VMware Tanzu Kubernetes Grid on vSphere

  • Outline the requirements for deploying a supervisor cluster in a vSphere environment
  • Describe the different options for deploying the supervisor cluster
  • Describe the licensing requirements for supervisor clusters
  • List the steps to install a Tanzu Kubernetes Grid supervisor cluster and retrieve its status
  • Describe how to apply a full license to the supervisor cluster
  • List the requirements for deploying a management cluster in a vSphere environment
  • List the requirements for a bootstrap machine
  • List the requirements for Internet-restricted environments
  • Explain how the Tanzu Kubernetes Grid version relates to specific OVA versions
  • Describe the optional configuration for deploying a management cluster in a vSphere environment
  • List the steps to install a Tanzu Kubernetes Grid management cluster
  • Summarize the creation of a management cluster
  • Define the commands available for working with management clusters
  • List the steps to register Tanzu Kubernetes Grid management clusters with VMware Tanzu Mission Control

7 Tanzu Kubernetes Grid Workload Clusters

  • List the options for deploying Tanzu Kubernetes Grid workload clusters
  • Describe the different types of Tanzu Kubernetes Grid workload clusters
  • Explain how Tanzu Kubernetes Grid clusters are created
  • Describe the VMs that are included in a workload cluster
  • Describe the components of a workload cluster
  • Describe the difference between machine images and custom machine images
  • List the available customizations
  • Explain how to build custom images
  • Describe how to use custom images
  • Describe the commands available for working with workload clusters
  • Explain how to scale workload clusters
  • Describe machine health checks

8 Tanzu Kubernetes Grid Packages

  • Explain how Tanzu Kubernetes Grid uses packages
  • Identify the different package repositories
  • Describe the different types of packages and their dependencies
  • Define auto-managed packages
  • Identify the auto-managed packages that are installed to every cluster and those that are installed based on configuration
  • Explain how auto-managed packages are installed and configured
  • Define CLI-managed packages
  • Explain how CLI-managed packages are installed and configured
  • Use the Tanzu CLI to configure and install optional packages and repositories

9 Configuring and Managing Tanzu Kubernetes Grid Networking Packages

  • Describe cert-manager
  • Explain how to install cert-manager
  • Describe the Contour ingress controller
  • Explain how to install Contour
  • Describe service discovery
  • Describe ExternalDNS
  • Detail the configuration options for BIND servers
  • Explain how to install ExternalDNS
  • Describe Multus
  • Describe Multus pod configuration
  • Describe Whereabouts
  • Explain how to install Multus and Whereabouts

10 Configuring and Managing Tanzu Kubernetes Grid Operation and Analytics Packages

  • Describe Fluent Bit
  • Detail the logs that Fluent Bit collects
  • Describe basic Fluent Bit configuration
  • Explain how to install Fluent Bit
  • Describe Prometheus
  • Describe Grafana
  • Describe the Harbor image registry
  • Explain Harbor vulnerability scanning

11 Tanzu Kubernetes Grid Day 2 Operations

  • Explain the process of authenticating Tanzu Kubernetes Grid workload clusters
  • Identify the method of creating restricted role[1]based access to components inside a workload cluster
  • Explain how Tanzu Kubernetes Grid integrates with NSX Advanced Load Balancer for ingress
  • Describe VMware Tanzu® Application PlatformTM
  • List the steps to install Tanzu Application Platform on Tanzu Kubernetes Grid workload clusters
  • Describe the prerequisites and steps for upgrading Tanzu Kubernetes Grid instances
  • Describe the prerequisites and steps for updating Tanzu Kubernetes Grid workload clusters
  • Understand how VMware Tanzu Mission Control manages the life cycle of Tanzu Kubernetes Grid
  • Define Velero Plugin for vSphere and standalone Velero
  • Describe Velero Plugin for vSphere
  • Identify the steps to install Velero on workload clusters
  • Explain how to back up and restore workload clusters with the Velero CLI and VMware Tanzu Mission Control

12 Troubleshooting Tanzu Kubernetes Grid

  • Describe the various Tanzu Kubernetes Grid logs
  • Explain how to review the Cluster API controller Logs
  • Identify the location of the Tanzu Kubernetes Grid logs
  • Explain the purpose of Crash Diagnostics
  • Describe how to use SSH to connect to Tanzu Kubernetes Grid nodes
  • Explain how to troubleshoot package installation errors

Course Overview

The HPE Ezmeral Runtime Enterprise product certification course is an in-depth introduction to the platform offered by HPE. The course covers the key concepts and benefits of HPE Ezmeral Runtime Enterprise. In addition to lecture, this course contains labs for hands on experience with exploring and using HPE Ezmeral Runtime Enterprise.

Course Objectives

After you successfully complete this course,

you should be able to:

• Explain foundational concepts necessary for

understanding how HPE Ezmeral Runtime

Enterprise works

• Explain the HPE Ezmeral Runtime

Enterprise model, features and functions

• Perform installation and setup processes

• Configure various environments and

demonstrate key capabilities

Course Content

Container Foundations

• Container overview

• Key Docker concepts

• Key Kubernetes concepts

Introduction to HPE Ezmeral Runtime Enterprise

• Why HPE Ezmeral Runtime Enterprise

• HPE Ezmeral Runtime Enterprise architecture and deployment

options

• HPE Ezmeral Runtime Enterprise reference architectures and

configurations

Getting Started with HPE Ezmeral Platform

• Deployment planning

• Deployment planning for high availability

• Installing Ezmeral Runtime Enterprise

• Introduction to platform administration

HPE Ezmeral Data Fabric

• Introduction to HPE Ezmeral Data Fabric

• HPE Ezmeral Data Fabric architecture

• Introduction to using Ezmeral Data Fabric within Ezmeral

Runtime Enterprise

HPE Ezmeral Runtime Enterprise

Kubernetes Management

• Review of Kubernetes architecture in Ezmeral Runtime Enterprise

• Deploying an internal Kubernetes cluster

• Importing an external Kubernetes cluster

• Managing the cluster as a site admin or Kubernetes cluster

administrator

Deploying Kubernetes Applications on

the HPE Ezmeral Runtime Enterprise

• Introduction

• Running applications with deployment objects

• Adding services

• Deploying applications with Helm

• Deploying applications with KubeDirector

• Using FS Mounts and DataTaps with applications

• Using Apache Spark on HPE Ezmeral Runtime Enterprise

• Using Istio with HPE Ezmeral Runtime Enterprise

Using HPE Ezmeral MLOPs with

Kubernetes Clusters

• Introduction to MLOps

• Implementing ML projects on HPE Ezmeral Runtime Enterprise

• Setting up Kubeflow on HPE Ezmeral Runtime Enterprise

HPE Ezmeral Runtime Enterprise with EPIC

• Architecture review

• Installing EPIC hosts and setting up tenants

• Deploying applications

Operations

• Ezmeral Runtime Enterprise monitoring

• Using Nagios alerts

• Updates

Course Overview

In this course, you will learn how to use Amazon EKS to manage and orchestrate containers with Kubernetes. With Amazon EKS you can run Kubernetes on AWS without needing to install, operate, and maintain your own Kubernetes control plane. You will manage container images using Amazon Elastic Container Registry (Amazon ECR) and learn how to automate application deployment. You will deploy applications using continuous integration and delivery (CI/CD) tools. You will learn how to monitor and scale your environment by using metrics, logging, tracing, and horizontal and vertical scaling. You will  also manage storage for your containerized applications, configure AWS networking services to support  the cluster, and learn how to secure your Amazon EKS environment.

Activities

This course includes presentations, hands-on labs, demonstrations, and group exercises.

Course Objectives

In this course, you will learn to:

  • Describe the main components of Kubernetes, including the key objects and the core  components of the Kubernetes API.
  • Describe how Amazon EKS manages the Kubernetes control plane and parts of the data  plane.
  • Build and maintain an Amazon EKS cluster.
  • Deploy applications to an Amazon EKS cluster.
  • Manage applications running in enterprise-scale Amazon EKS clusters.
  • Configure efficient, secure communication both within the cluster and with outside services.
  • Configure observability in an Amazon EKS cluster.
  • Provision storage for applications running on Amazon EKS.
  • Secure an Amazon EKS cluster.

Course Content

Day 1

Module 1: Kubernetes Fundamentals

  • Benefits of containers
  • Container orchestration
  • Kubernetes internals
  • Pod scheduling
  • Kubernetes objects

Module 2: Amazon EKS Fundamentals

  • Introduction to Amazon EKS
  • Amazon EKS control plane
  • Amazon EKS data plane
  • Fundamentals of Amazon EKS security
  • Two APIs: Kubernetes and Amazon EKS
  • Hands-On Lab: Deploying Kubernetes Pods

Module 3: Building and maintaining an Amazon EKS cluster

  • Creating an Amazon EKS cluster
  • Deploying nodes
  • Planning for an upgrade
  • Upgrading your Kubernetes version

Module 4: Deploying Applications to Your Amazon EKS Cluster

  • Application deployment methods
  • Working with Amazon ECR
  • Deploying applications with Helm
  • Hands-On Lab: Deploying Applications

Day 2

Module 5: Managing Applications at Scale in Amazon EKS

  • Scale to meet demand in Amazon EKS
  • Continuous deployment in Amazon EKS
  • GitOps and Amazon EKS
  • Hands-On Lab: Continuous Deployment and GitOps

Module 6: Managing Networking in Amazon EKS

  • Review: Networking in AWS
  • Communicating in Amazon EKS
  • Improving Pod-level security
  • Load balancing with Services

Module 7: Configuring Observability in Amazon EKS

  • Configuring observability in an Amazon EKS cluster
  • Collecting metrics
  • Managing logs
  • Application tracing in Amazon EKS
  • Hands-On Lab: Monitoring Amazon EKS

Day 3

Module 8: Managing Storage in Amazon EKS

  • Design patterns for storage
  • Persistent storage in Kubernetes
  • Persistent storage with AWS storage services
  • Managing secrets
  • Hands-On Lab: Persistent Storage in Amazon EKS

Module 9: Managing Security in Amazon EKS

  • Cloud security fundamentals
  • Authentication and authorization
  • Managing IAM and RBAC
  • Managing Pod permissions using RBAC service accounts
  • Hands-On Lab: Capstone Exercis

Course Overview

A developer introduction to building and managing containers with Podman for deploying applications on Red Hat OpenShift.

Red Hat OpenShift Development I: Introduction to Containers with Podman (DO188) introduces students to building, running, and managing containers with Podman and Red Hat OpenShift Container Platform. This course helps students build the core skills for developing containerized applications through hands-on experience. The Red Hat Certified Specialist in Containers exam (EX188) is included in this offering.

This course is based on Red Hat® Enterprise Linux® 9, Podman 4.4 and Red Hat OpenShift® 4.14.

Virtual Learning

This interactive training can be taken from any location, your office or home and is delivered by a trainer. This training does not have any delegates in the class with the instructor, since all delegates are virtually connected. Virtual delegates do not travel to this course, Global Knowledge will send you all the information needed before the start of the course and you can test the logins.

Course Objectives

  • Introduction to containers
  • Run containers with Podman CLI and Podman Desktop
  • Build custom container images
  • Manage container images
  • Remote debugging with containers
  • Basic container networking
  • Persist data with containers
  • Run multi-container applications
  • Troubleshoot Container Deployments
  • Orchestrate containers with OpenShift and Kubernetes

Course Content

Introduction and overview of containers
Describe how containers facilitate application development.

Podman basics
Manage and run containers with Podman.

Container images
Navigate container registries to find and manage container images.

Custom container images
Build custom container images to containerize applications.

Persisting data
Run database containers with persistence.

Troubleshooting containers
Analyze container logs and configure a remote debugger.

Multi-container applications with compose
Run multi-container applications using Compose.

Container orchestration with Kubernetes and OpenShift
Orchestrate containerized applications with Kubernetes and OpenShift.