Get up to 50% off on CKA, CKAD, CKS, KCNA, KCSA exams and courses!
Muhammad Aizuddin Zali

Muhammad Aizuddin Zali

RHCA | AppDev & Platform Consultant | DevSecOps

OpenShift 4: Pushing my cluster to the limit

When I involved in the design of Red Hat OpenShift 4 platform for customer deployment, the common question coming from the customer was how much my …

SigStore: Securing my software with a new standard

SigStore: Securing my software with a new standard

The secure dependencies dilemma I had one situation where the customer asking how we can ensure that our 3rd party libraries or any external public …

OpenShift 4: Query Prometheus API for Firing Alert

Introduction Prometheus is a robust, efficient and cloud native monitoring tools, graduated from CNCF incubator. It was part of the OpenShift since …

OpenShift 4.5 KNI Labs (Step-by-step)

OpenShift 4.5 KNI Labs (Step-by-step)

KNI, Kubernetes Native Infrastructure is one of the method deploying OpenShift baremetal with IPI (Installer Provided Infrastructure), yes you read it …

OpenShift 4.5 : NooBaa S3 Bucket for internal image registry

OpenShift 4.5 : NooBaa S3 Bucket for internal image registry

Image registry storage is best and recommended to run on S3 storage endpoint(then filesystem storage, then block). In this blog context, we are going …

OpenShift 4: OSSM Jaeger`s External ElasticSearch

OpenShift 4: OSSM Jaeger`s External ElasticSearch

One of the features provided by Red Hat OpenShift Service Mesh(OSSM) is tracing capability. This capability is provided by Jaeger , an OpenTracing …

OpenShift 4: EgressIP for egress(outbound) connection

OpenShift 4: EgressIP for egress(outbound) connection

Introduction By default, all namespace egress networking will be using host IP where the pod sits as SNAT rule, similar to how our home router works …

OpenShift 4: AlertManager + Slack Configuration

OpenShift 4: AlertManager + Slack Configuration

Objective Sending alert to Slack and defined proper channel for each alert type. Pre-Requisites:

OpenShift 4: Installation Bonding Setup

OpenShift 4: Installation Bonding Setup

Objective Setting up 2 x LACP bonding using boot params options. For guidance on the boot params available look here . (Cover image : 2 x LACP Bonding …

OpenShift 4: DHCPD High Availability

OpenShift 4: DHCPD High Availability

Objective One of the support component to install OpenShift 4 is the DHCP . We need to ensure this DHCP is r esilient and highly available hence this …

OpenShift 4: Custom API URL Endpoint

OpenShift 4: Custom API URL Endpoint

https://unsplash.com/@pankajpatel Objective On top of the standard api.<cluster_name>. as external API endpoint, we are going to serve this …

Certificate & TLS: Becoming Custom(or Own) Root Certificate Authority

Certificate & TLS: Becoming Custom(or Own) Root Certificate Authority

Image: https://qph.fs.quoracdn.net/main-qimg-f2d9af77cbca3c6bc42bdd31437a7d6c Objective Becoming organization/private PKI provider Shared rootCA …

OpenShift 4: Splunk HEC Integration

OpenShift 4: Splunk HEC Integration

Image: https://unsplash.com/@lukechesser NOTE : This article focused on technical feasibility and features. For production usage this require detail …

OpenShift 4: Red Hat OpenShift Container Storage 4.5 Lab Installation

OpenShift 4: Red Hat OpenShift Container Storage 4.5 Lab Installation

Image : plutonlogistics.com Official documentation of Red Hat OpenShift Container Storage can be found h e re . This blog merely written only to show …

OpenShift 4: Libvirt Platform Agnostic installation

Hello everyone, just a couple of months ago, Red Hat has released a shiny OpenShift 4 [1] based on CoreOS technology. In this guide, we going to see …

OpenShift 3: DevSecOps with OpenShift – Image Signing

INTRODUCTION Just like an RPM signing, container image singing can be used to verify authenticity of a container image created by users/developers …

OpenShift 3: Enforcing modern and strong OCP TLS & Cipher Suites

OpenShift 3: Enforcing modern and strong OCP TLS & Cipher Suites

Image : newsbtc.com Introduction Enforcing strong and modern cipher is critical to ensure our deployment are well protected from old and weak cipher. …