As a Developer, it is important to secure your applications to avoid network attacks like spoofing or attacks that disrupt route discovery, to secure your data and your users’ data, and ensure the quality of your service. In this workshop, you will learn more about network security on Red Hat OpenShift.
On Red Hat OpenShift, a route is a way to expose a service by giving it an externally-reachable hostname. Routers provide external hostname mapping and load balancing to services over protocols that pass distinguishing information directly to the router and they support different protocols like HTTP & HTTPS. In this workshop, you will learn different ways of exposing applications for external access, including secure and insecure routes, you will learn the difference between different types of routes and how to secure your routes on Red Hat OpenShift.
🎓 What you will learn
- Secure vs insecure routes
- Different types of Secured Routes on Red Hat OpenShift
- Exposing applications for external access
- How to secure edge and passthrough routes
👩💻 Who should attend
- Developers, Architects
- Anyone who’s interested in Red Hat OpenShift Security or Kubernetes Security
- Masa Abushamleh, Developer Advocate, https://www.linkedin.com/in/masa-abushamleh
- Youssef Alnemr, Developer Advocate, https://www.linkedin.com/in/youssef-alnemr-01a022156/
- Sign up for your IBM Cloud account – https://ibm.biz/BdfEBn
- Register for the live stream and access the replay – https://www.crowdcast.io/e/secure-routes
- Background knowledge in containers and Kubernetes
By registering for this event, you acknowledge that this video will be recorded and you consent for it to be featured on IBM media platforms and pages.