Manage users and policies, groups and permissions
This blog will cover the “Manage users and policies” objective of the EX280 exam from RedHat. In this post we will:
Configure the HTPasswd identity provider for authentication
Create and delete users
Modify user passwords
Modify user and group permissions
Create and manage groups
Will also sprinkle in a little bit from “Manage user...
Switch iTerm profile when running Vim
I love using iTerm2 and Vim on my Mac. Today we are going to have a look at Profile Switching feature that iTerm2 has and how we can combine this with Vim.
Recently I wrote about using vim-plug to easily install vim plugins. Using vim-plug I installed the theme “onehalfdark” (Theme link):
# .vimrc
"# Custom VIM File for CABenstein
"## Loading ...
Pod Affinity and Anti-affinity - Spreading out workloads
I have written about using Taints and Tolerations to prevent pods from running on certain (tainted) nodes and there is some influence on scheduling that we can exert using Limits and Requests.
But if we really want to control pod placement we have to look no further than Node/Pod Affinity and Anti-Affinity. This allows you to specify nodes that...
Quotas, limits and limit-ranges
In this post we will be diving in to quotas and limits. Quotas and limits can be used to allocate, limit en reserve resources within your cluster for one or multiple namepaces and can limit the usage of CPU and Memory for workloads. Limits can also be used to gurante (by reserving) resources for your workloads.
Understanding and using quotas and...
Scaling applications - Rollout, Scale and Auto-Scale Deployments
This post is gonna be a bit bigger broader then what is requested on the EX280 exam objectives. In this post we will have a look at:
Controlling roll-out of pods (manually rolling out or back a deployment)
Scaling Deployments on the command-line
Creating a auto scaler for a deployment on the command-line
Now, apart from the scaling bein...
ServiceAccounts and SCCs - Running pods with more permission's
In this blog we will take a look at SCC permissions that are needed to run a pod with escalated permissions and how to use a serviceaccount (sa) to run such a pod or deployment.
Small thing: I use the term pod and container in this post but I’m referring to the same idea. In Openshift and Kubernetes we talk about pods being the smallest unit of...
Creating and Using Secrets in OpenShift
Creating Secrets (like creating ConfigMaps) is a vital part of Managing OpenShift workloads and is an exam objectives of the EX280 exam. Knowing how they work and how to configure them (from the command-line) will give you a better understanding of Secrets.
Secrets, how do they work
Secrets provide information (like config files or credentials)...
Creating my EX280 page on Jekyll
As you might have notices I use Jekyll for this blog hosted on GitHub. I might do a post later on how I use it and how I set it up. For now, all you need to know is that Jekyll turns .md(markdown) file in to a blog. This happens using GitHub actions and builds my blog from source when I commit to main.
Jekyll support some dynamic code to genera...
34 post articles, 5 pages.