Harbor - Trusted Cloud Native Repository for Kubernetes
What you'll learn
- Install and use cloud native repository Kubernetes
- Harbor administration like managing users and settings
- Working with Projects and Project configuration in Harbor
- Working with Images, Tags and Helm Charts in Harbor
Requirements
- Understanding of Kubernetes and its concepts
- Concept of Containers, Images and Registry
Description
Understand the need and purpose of having a registry that can secure the artifacts in the Kubernetes environment. Introduction to Harbor and its role in providing an open-source registry to secure artifacts with policies and role-based access control.
This course has the following major sections
Introduction to Kubernetes ecosystem and role of Harbor within it
System requirement and system setup for Harbor installation
Installation and configuration of Harbor
Administration of Harbor
Working with Harbor projects
System setup for Harbor installation
Verify and decide the Harbor system requirements
Choosing the EC2 Instance image
Configure AWS EC2 security and authentication
Setup and login to AWS EC2 instances
Installation of Docker Compose
Downloading and installation of Harbor
Learn how to install and configure Harbor in Kubernetes environment with Docker support
Check the prerequisites and setup the installer script
Run the installer script
Verify installation with and without Notary, Trivy, and Chart repository service.
Administration of Harbor
WebUI Overview of Harbor administration screen
Creating new project
Push a sample Image to work with images
Configure Harbor and user settings
Managing users
Configure project quotas
Vulnerability Scanning in artifacts
Uses of robotic accounts
Working with Projects
Learn to create new projects in Harbor
Create project configuration
Create a custom docker image
Managing labels
Delete and Detag artifacts
Creating Tag retention rules
Manage Helm charts within projects
Manage tag immutability rules
Managing Tag retention and Immutability together in a project
Introduction to Preheat images
Pulling and Pushing Images in Docker Client
Who this course is for:
- Developers who wants to use secure registry
- Sysops administrator who wants to deploy secure registry
- Security administrators who wants to enforce role-based access control on secure registry
Instructor
A SMAC technologist passionate about creating solutions that will yield better results. New technology adviser and a startup incubator implementing innovative approaches, products and solutions by embracing latest technology. Worked on various technologies including Gen AI, RAG Pipeline, Argo, Spring Framework, Apache Spark, Scikit Learn, Tensor Flow, PyTorch, Mllib, Graph Processing, AWS, Medium to Large Hadoop Clusters, Cluster administration and setup. Having more than 24 years of industrial experience in various domains like Banking, Finance, Insurance, Staffing, etc.,