Home

Exposing services with routes and SSL

This blog will go in to “Configure networking components” objective of the EX280 exam from RedHat. In this post we will: Have a look at services Expose a service with a URL Check out the types of routes we can create Creating a route to a service that is encrypted with SSL As always. We will be doing all the examples in a CRC (Code R...

Read more

Manage users and policies, groups and permissions

This blog will cover the “Manage users and policies” objective of the EX280 exam from RedHat. In this post we will: Configure the HTPasswd identity provider for authentication Create and delete users Modify user passwords Modify user and group permissions Create and manage groups Will also sprinkle in a little bit from “Manage user...

Read more

Switch iTerm profile when running Vim

I love using iTerm2 and Vim on my Mac. Today we are going to have a look at Profile Switching feature that iTerm2 has and how we can combine this with Vim. Recently I wrote about using vim-plug to easily install vim plugins. Using vim-plug I installed the theme “onehalfdark” (Theme link): # .vimrc "# Custom VIM File for CABenstein "## Loading ...

Read more

Pod Affinity and Anti-affinity - Spreading out workloads

I have written about using Taints and Tolerations to prevent pods from running on certain (tainted) nodes and there is some influence on scheduling that we can exert using Limits and Requests. But if we really want to control pod placement we have to look no further than Node/Pod Affinity and Anti-Affinity. This allows you to specify nodes that...

Read more

Quotas, limits and limit-ranges

In this post we will be diving in to quotas and limits. Quotas and limits can be used to allocate, limit en reserve resources within your cluster for one or multiple namepaces and can limit the usage of CPU and Memory for workloads. Limits can also be used to gurante (by reserving) resources for your workloads. Understanding and using quotas and...

Read more

Creating and Using Secrets in OpenShift

Creating Secrets (like creating ConfigMaps) is a vital part of Managing OpenShift workloads and is an exam objectives of the EX280 exam. Knowing how they work and how to configure them (from the command-line) will give you a better understanding of Secrets. Secrets, how do they work Secrets provide information (like config files or credentials)...

Read more