Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with RHEL

This year you’ve got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.

There are breakout sessionsbirds-of-a-feather sessionsmini sessionspanelsworkshops, and instructor led labs that you’re trying to juggle into your daily schedule. To help with these plans, let’s try to provide an overview of the labs in this series.

In this article let’s examine a track focusing only on Red Hat Enterprise Linux (RHEL). It’s a selection of labs where you’ll get hands-on with package management, OS security, dig into RHEL internals, build a RHEL image for the cloud and more.

The following hands-on labs are on the agenda, so let’s look at the details of each one.

Continue reading “Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with RHEL”

Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with Security

This year you’ve got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.

There are breakout sessionsbirds-of-a-feather sessionsmini sessionspanelsworkshops, and instructor led labs that you’re trying to juggle into your daily schedule. To help with these plans, let’s try to provide an overview of the labs in this series.

In this article, the focus narrows to security, where you can get hands-on with everything from cloud security, security compliance automation, developing secure solutions and digging in to container security.

The following hands-on labs are on the agenda, so let’s look at the details of each one.

 

Practical OpenSCAP

In this hands-on lab, we’ll review using OpenSCAP to perform automated security compliance for bare-metal machines, virtual machines, and containers. SCAP content customization lets you fit security policies to your use case.

– Evaluate targets using the command-line and GUI interface.

– Learn how to scale to small and large infrastructures using Red Hat Satellite 6.

– Explore new possibilities to generate Ansible Playbooks from security compliance content, then deploy at scale using Red Hat Ansible Tower.

 

Presenters: Martin Preisler, Red Hat, Watson Sato, Red Hat

 

A Practical Introduction to Container Security (3rd Ed.)

Linux containers provide convenient application packing and run time isolation in multi tenant environments. However, the security implications of running containerized applications is often taken for granted. For example, today it is very easy to pull container images from the Internet and run them in the enterprise without examining their content and authenticity.

In this lab, you’ll complete a series of low-level, hands-on exercises aimed at understanding the concepts, challenges, and best practises associated with deploying containers in a secure fashion. Topics include registry configuration, SELinux, capabilities, and SECCOMP profiles, along with image inspection, scanning, and signing. This third edition may be based on CRI-O, depending on Red Hat Enterprise Linux feature release time frames.

Presenters: Bob Kozdemba, Red Hat, Daniel Walsh, Red Hat, Aaron Weitekamp, Red Hat

 

OpenShift + single sign-on = Happy security teams and happy users

One username and password to rule them all.

In this lab, we’ll discuss and demonstrate single sign-on technologies and how to implement them using Red Hat products. We’ll take you through bringing up an OpenShift cluster in a development environment, installing Red Hat single sign-on on top of it, and then integrating that with a variety of example applications.


Presenters: Dustin Minnich, Red Hat, Josh Cain, Red Hat, Jared Blashka, Red Hat, Brian Atkisson, Red Hat

 

Defend yourself using built-in Red Hat Enterprise Linux security technologies

In this lab, you’ll learn about the built-in security technologies available to you in Red Hat Enterprise Linux.

You will use OpenSCAP to scan and remediate against vulnerabilities and configuration security baselines. You will then block possible attacks from vulnerabilities using Security-Enhanced Linux (SELinux) and use Network Bound Disk Encryption to securely decrypt your encrypted boot volumes unattended. You will also use USBGuard to implement basic white listing and black listing to define which USB devices are and are not authorized and how a USB device may interact with your system. Throughout your investigation of the security issues in your systems, you will utilize the improved audit logs and automate as many of your tasks as possible using Red Hat Ansible Automation. Finally, you will make multiple configuration changes to your systems across different versions of Red Hat Enterprise Linux running in your environment, in an automated fashion, using the Systems Roles feature.

Presenters: Lucy Kerner, Red Hat, Miroslav Grepl, Red Hat, Paul Moore, Red Hat, Martin Preisler, Red Hat, Peter Beniaris

 

Up and running with Red Hat identity management

Red Hat identity management (IdM) can play a central role in user authentication, authorization, and control. It can manage critical security components such as SSH keys, host-based access controls, and SELinux contexts—in a standalone environment or in a trust relationship with a Microsoft Active Directory domain controller.

In this lab, you’ll learn:

– Basic installation and configuration of IdM

– Configuration of an IdM replica – Joining of clients to the IdM domain

– Basic user and host management activities

– sudo setup

– SSH key management

Attendees will leave with a lab that can be repeated in their own environments and form the basics for a rudimentary environment.


Presenters: James Wildman, Red Hat, Chuck Mattern, Red Hat

 

Implementing proactive security and compliance automation

In this hands-on lab, we’ll show you how to automate security and compliance using a combination of Red Hat CloudForms, Red Hat Satellite, Red Hat Ansible Tower, Red Hat Insights, and OpenSCAP.

Specifically, you’ll do a series of exercises to show you how to:

– Use Red Hat CloudForms to create control policies.

– Use the data provided by Red Hat Insights for proactive security and automated risk management.

– Use Red Hat Ansible Tower for automated security remediations.

– Use Red Hat CloudForms as the central place for security and compliance automation.

– Automate security scans and remediations using the OpenSCAP integration with Red Hat Satellite and Red Hat Ansible Tower.

ultimate guide red hat summit labs-Use Red Hat CloudForms to manage the security of the container images running in your Openshift environment


Presenters: Lucy Kerner, Red Hat, William Nix, Red Hat, Kevin Morey, Red Hat, Patrick Rutledge, Red Hat, Nate Stephany, Red Hat

 

Stay tuned for more Red Hat Summit 2018 Labs and watch for more online under the tag #RHSummitLabs.

Red Hat Summit 2018 Labs: Linux is Containers

This year you’ve got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.

There are breakout sessionsbirds-of-a-feather sessionsmini sessionspanelsworkshops, and instructor led labs that you’re trying to juggle into your daily schedule. To help with these plans, let’s try to provide an overview of the labs in this series.

Our first article is starting with a focus on Linux containers, where you can get hands-on with everything from container security, containerizing applications, developing container solutions and digging in to container internals.

The following hands-on labs are on the agenda, so let’s look at the details of each one.


Linux Container Internals: Part 1

Have you ever wondered how Linux containers work? How they really work, deep down inside? Questions like:

– How does sVirt/SELinux, SECCOMP, namespaces, and isolation really work?

– How does the Docker Daemon work?

– How does Kubernetes talk to the Docker Daemon?

– How are container images made?

In this lab, we’ll answer all of these questions and more. If you want a deep technical understanding of containers, this is the lab for you. It’s an engineering walk through the deep, dark internals of the container host, what’s packaged in the container image, and how container orchestration work. You’ll get the knowledge and confidence it takes to apply your current Linux technical knowledge to containers.

Presenters: Scott McCarty, Red Hat, John Osborne, Red Hat, Jamie Duncan, Red Hat

Linux Container Internals: Part 2

Have you ever wondered how Linux containers work? How they really work, deep down inside? Questions like:


– How does sVirt/SELinux, SECCOMP, namespaces, and isolation really work?

– How does the Docker Daemon work?

– How does Kubernetes talk to the Docker Daemon?

– How are container images made?


In this lab, we’ll answer all these questions and more. If you want a deep technical understanding of containers, this is the lab for you. It’s an engineering walk through the deep, dark internals of the container host, what’s packaged in the container image, and how container orchestration work. You’ll get the knowledge and confidence it takes to apply your current Linux technical knowledge to containers.

Presenters: Scott McCarty, Red Hat, John Osborne, Red Hat, Jamie Duncan, Red Hat

A Practical Introduction to Container Security (3rd Ed.)

Linux containers provide convenient application packing and run time isolation in multi tenant environments. However, the security implications of running containerized applications is often taken for granted. For example, today it is very easy to pull container images from the Internet and run them in the enterprise without examining their content and authenticity.

In this lab, you’ll complete a series of low-level, hands-on exercises aimed at understanding the concepts, challenges, and best practises associated with deploying containers in a secure fashion. Topics include registry configuration, SELinux, capabilities, and SECCOMP profiles, along with image inspection, scanning, and signing. This third edition may be based on CRI-O, depending on Red Hat Enterprise Linux feature release time frames.

Presenters: Bob Kozdemba, Red Hat, Inc., Daniel Walsh, Red Hat, Aaron Weitekamp, Red Hat

Containerizing applications – existing and new

In this hands-on lab, based on highly rated labs from Red Hat Summit 2016 and 2017, you’ll learn how to create containerized applications from scratch and from existing applications.

Learn how to build and test these applications in a Red Hat OpenShift environment, as well as deploy new containers to Red Hat Enterprise Linux Atomic Host. You’ll quickly develop a basic containerized application, migrate a simple popular application to a containerized version, and deploy your new applications to container host platforms. You’ll get a feel for the different container host platforms and learn how to choose the best one for your container needs. And finally, you’ll learn what to consider and what tools you can use when implementing a containerized microservices architecture.

Presenters: Langdon White, Red Hat, Scott Collier, Red Hat, Tommy Hughes, Red Hat, Dusty Mabe, Red Hat

Develop IoT solutions with containers and serverless patterns

The Internet of Things (IoT) is expected to generate a diverse range of data types that will need different mechanisms to process and trigger actions. Combined with other considerations, like total cost of ownership, required skill set, and operations, the back end solution may be composed of different architectures and patterns.

ultimate guide red hat summit labsIn this hands-on lab, you’ll learn how to build a containerized. intelligent IoT solution that can process different data types using the elasticity of a container platform, such as Red Hat OpenShift Container Platform, and serverless architectures to execute on-demand functions in response to IoT events. Using the qualities of each architectural style, developers can focus on writing code without worrying about provisioning and operating server resources, regardless of the scale. The methodologies exemplified within this lab can be used by companies looking to use their cloud computing infrastructure to build complex and robust IoT solutions.

Presenters: Ishu Verma, Red Hat, Andrew Block, Red Hat

Stay tuned for more Red Hat Summit 2018 Labs and watch for more online under the tag #RHSummitLabs.

Red Hat Summit 2017 – Planning your IoT Labs

summit-labs

This year in Boston, MA you can attend the Red Hat Summit 2017, the event to get your updates on open source technologies and meet with all the experts you follow throughout the year.

It’s taking place from May 2-4 and is full of interesting sessions, keynotes, and labs.

This year I was part of the process of selecting the labs you are going to experience at Red Hat Summit and wanted to share here some to help you plan your hands-on time with IoT focused labs. These labs are for you to spend time with the experts who will teach you hands-on how to get the most from IoT using open technologies.

Each lab is a 2-hour session, so planning is essential to getting the most out of your days at Red Hat Summit.

As you might be struggling to find and plan your sessions together with some lab time, here is an overview of the labs you can find in the session catalog for exact room and times. Each entry includes the lab number, title, abstract, instructors and is linked to the session catalog entry:

Continue reading “Red Hat Summit 2017 – Planning your IoT Labs”

Red Hat Summit 2017 – Planning your Security Labs

summit-labs

This year in Boston, MA you can attend the Red Hat Summit 2017, the event to get your updates on open source technologies and meet with all the experts you follow throughout the year.

It’s taking place from May 2-4 and is full of interesting sessions, keynotes, and labs.

This year I was part of the process of selecting the labs you are going to experience at Red Hat Summit and wanted to share here some to help you plan your hands-on time with security focused labs. These labs are for you to spend time with the experts who will teach you hands-on how to get the most secure environments and applications you can using your open technologies.

Each lab is a 2-hour session, so planning is essential to getting the most out of your days at Red Hat Summit.

As you might be struggling to find and plan your sessions together with some lab time, here is an overview of the labs you can find in the session catalog for exact room and times. Each entry includes the lab number, title, abstract, instructors and is linked to the session catalog entry:

Continue reading “Red Hat Summit 2017 – Planning your Security Labs”

Self-paced labs at Red Hat Summit

Red Hat Summit 2016: Self-paced labs

Choose from 50+ labs featuring a range of Red Hat products and solutions to complete at your own pace, on your own time. Self-paced labs are available each day from 10:15 a.m. – 12:30 p.m. and 3:30 p.m. – 6:00 p.m.

Hands-on labs are available for topics such as:

  • Red Hat Enterprise Linux
  • Red Hat JBoss Middleware
  • Red Hat Satellite 6
  • Red Hat Enterprise Virtualization
  • Red Hat OpenStack Platform
  • OpenShift
  • Red Hat Ceph Storage
  • Red Hat Gluster Storage
  • Red Hat Atomic and Containers

Don’t forget, these labs fill up fast! Add them to your Red Hat Summit agenda today.

Self-paced training

Getting started with Red Hat CloudForms and its service catalog (replay)

In this lab, we’ll start with the simple installation and configuration of Red Hat CloudForms. You’ll gain hands-on experience as you explore typical use cases for installing CloudForms into both new and existing environments. You’ll also set up a service catalog and work with provisioning workflow scenarios that vary from simple to advanced. Assistance will be provided throughout the lab by some of the most experienced Red Hat solution architects, consultants, and technical product managers who help our customers successfully create and manage their clouds.

This lab is also offered on Tuesday from 1:20-3:20 p.m..

Protecting your data with Red Hat Storage Server

Whether it’s the fear of data loss through system or datacenter failures or data theft by parties whose intentions are unknown, there is no shortage of things to keep you up at night. In this session, we’ll guide you through how Red Hat Storage Server can help you sleep better knowing your data is protected against multiple failure scenarios, including theft. You’ll learn how to use Red Hat Storage Server to encrypt and replicate your data locally as well as remotely, and how to access the data securely over SSL.