This lab session is a low-level, hands-on introduction to container security using the container tools included with Red Hat Enterprise Linux 8. It is intended to be consumed as a series of self paced exercises.
An introductory knowledge of Linux and containers is helpful.
Basic text editing skills using vim
or nano
.
Lab Environment
Server | Function |
---|---|
bastion |
External ssh and container host |
node1 |
Image registry and container host |
node2 |
Image registry and container host |
These servers can not be rebuilt in a timely fashion. |
Do not rm
any files or directories you did not create.
Make a backup copy before modifying any file.
Shells and Prompts
ec2-user ~
command
with sample output
.cat /etc/redhat-release
Red Hat Enterprise Linux release 8.1 (Ootpa)
Use the web console to login to the bastion:
https://bastion-0.example.redhatgov.io:9090/system/terminal
ssh
to login to the nodes, from the bastion:ssh node1-0.example.redhatgov.io
ssh node2-0.example.redhatgov.io
For each node, you will be asked to confirm that the key fingerprint is OK, as you haven’t logged into it, before.
Node 1:
The authenticity of host 'node1-0.example.redhatgov.io (10.0.2.128)' can't be established. ECDSA key fingerprint is SHA256:X6KOWD5YgDqcGxnSKDgT0ZYWqBeG8yw9CKTvgFwT6sQ. Are you sure you want to continue connecting (yes/no/[fingerprint])?
Respond with yes
or y
to accept the key:
yes
Logout when done.
Node 2:
The authenticity of host 'node2-0.example.redhatgov.io (10.0.2.125)' can't be established. ECDSA key fingerprint is SHA256:n2/LxFOXS2of8osIEcY/5911N6OmqaJJpsYRgnVrsiA. Are you sure you want to continue connecting (yes/no/[fingerprint])?
Again, respond with yes
or y
to accept the key:
yes
Logout when done.
Now, let’s move on to lab #2!
Domain | ||
Workshop | ||
Student ID |