►
From YouTube: OpenShift Commons en Vivo: Cumplimiento en OpenShift con Juan Antonio Osorio (Red Hat)
Description
OpenShift Commons en Vivo
Cumplimiento en OpenShift con
Juan Antonio Osorio (Red Hat)
December 10, 2020
A
A
B
A
A
B
If
this
is
a
little
when
he
told
people
about
what
I
do,
it
is
not
the
most
attractive
job
from
a
certain
aspect,
but
compliance
is
this:
make
sure
that
the
software
that
we
provide
to
clients
is
capable
of
complying
with
the
rules
and
regulations
of
the
countries
where
it
will
run,
after
all,
each
country
has
its
own
rules,.
Each
country
has
certain
requirements
that
must
be
met
in
order
to
run
what
it
needs
to
run
So,
for
example,
in
the
US,.
B
Depending
on
what
you
are
going
to
do,,
you
have
certain
rules
to
comply:
with.,
For
example,.
If
you
are
going
to
work
with
credit
card
data,,
you
have
to
be
initial
and
not
those,.
If
you
are
going
to
work
with
the
government,,
you
will
be
doing
fetra
and
there
is
many
many
things
that
must
be
complied
with,
so
we
are
dedicated
to
helping
to
comply
with
such
rules
in
opinion.
A
Very
well
so,
in
this
episode
we
are
going
to
talk
about
security,
a
very
prominent
topic,
the
news
almost
always
not
for
good
reasons.
So
it
is
the
motto
you
want
to
be
pretty
proactive,
be
pretty
ready
and
know
why,
with
a
product
like
openshift,
even
though
we're
making
improvements
for
a
certain
type
of
customer
users
etc.
A
But
first,
let's
talk
a
little
bit
about
security
and
compliance
within
the
roadmap
of
the
open.
So
let's
go
to
the
next
one.
It's
a
layman
in
it
in
the
product
area.
We
always
have
to
talk
about
the
roadmap
of
what
we
are
planning
and
where
we
are
located,
then
openshift,
because
it
has
many
areas
to
cover
the
area
of
application
developers
of
the
platform
and
in
the
part
of
openshift
mans,
the
services
offered
by
red
haris
and
our
partners,
where
we
give
openshift
completely
ready
for
our
clients
in
4.6.
A
Here
they
see
in
a
circle
the
compliance
or
pereiro
that
came
in
4.6,
which
is
the
version
that
is
currently
available
in
4.7
4.8.
We
are
going
to
talk
about
openshift,
eric
gerets
and
physical
certification,
as
well
as
other
certification,
beyond
chips
later
on,
such
as
ambroise
de
ram.
So
we
follow
the
next
smile.
As
you
can
see,
we
are
talking
about
certifications
that
are
specific
to
certain
countries
or
certain
things,
but
in
reality
all
this
type
of
work.
All
this
all
this,
let's
say
not
even
in
tuti
reading.
B
Clear
that
compliance
and
security
are
terms
that
are
closely
related,
but
are
not
really
the
same,
and
there
is
a
very
subtle
difference
in
them,.
This
security
is
clearly
dedicated
to
protecting
your
organization
from
risks
and
from
attackers
who
come
to
try
to
hack,
steal
data
or
things
from
you,.
B
While
compliance
is
generally
dedicated
to
protecting
certain
types
of
data,
well,
then
they
are
related,
but
there
is
a
subtle
difference.
As
I
said
what
I
mean
by
data
well
vice
aliens
is
that
he
mentioned
a
little
earlier
is
dedicated
to
protecting
financial
data
of
your
clients.
Well,
this
team
is
dedicated
to
protecting
health
data.
Well,
then,
all
these
regulations
have
rules
and
those
rules
have
controls
and
the
controls
are
forms
or
recommendations
on
how
to
protect
this
type
of
data.
B
So,
and
you
follow
these
rules
that
some
countries,
of
course,,
it
is
mandatory
to
follow
them.
Therefore
it
can
be
safer
but
clear.
The
fact
that
it
is
that
you
have
compliance
does
not
mean
that
your
organization
is
safe,.
It
is
not
clear,.
You
have
to
take
the
next
step
and
continue
monitoring
and
follow
this,,
because
strengthening
all
the
defenses
of
all
of
you
can
probably
be
as
many
clear
and
the
other
thing
is
that
You
have
to
keep
in
mind
that
to
be
compliant.
B
A
Very
well,,
so
I
will
also
help
you.
I
was
asking
something
a
bit
related
to
what
you
were
talking
about,,
why
it
is
important
to
comply
with
these
regulations,
and
we
talked
about
how
they
are
different
for
each
country
and
also
different
for
each
industry..
I
also
know
that,
for
example,
banks
that
we
do
not
work
with
are
focused
on
certain
regulations.
We
also
work
with
the
public
sector,.
There
are
different
regulations
that
each
country
has
made
for
its
public
sector,,
but
how
to
do
it
with
openshift
and
what
and
what
regulations
of
each
country,?
A
B
Well,,
this
is
it.
very
difficult
to
follow
all
the
regulations
and
rules
of
all
the
countries,
but
you
have
several
similarities
and
there
are
certain
standards
that
are
followed
by
many
countries.
You
have
accounts.
No,
they
will
not
apply
it
directly
to
you,
but
if
they
know
you
are
certified
in
a
certain
thing,
this
is
generally
accepted
in
several
countries
and
floppy.
If
there
are
10.
That
is
a
very,
very
common
and
well
known
standard.
So
if
you
have
phishing
protections
and
controls
in
other
countries,
of
course,
they
are
happy
that
you
have
it.
B
No,
then
they
will
accept
another.
For
example,
it
is
faith
trump
that
and
follow
the
requirements
set
by
the
list,
and
if
you
have
certain
bases,
then
they
have
low,
moderate
and
high,
and
you
are
in
moderate
and
high
in
other
countries
of
course,.
You
can
map
directly
from
the
nist
requirements
to
what
a
certain
country
asks
of
you
and
well,.
That's
what
that
sometimes,
for
example,.
We
are
not
going
to
give
you
a
specifically
certified
system.
Of
course
we
are
going
to
sell
it,,
it
can
be
certified,
but
the
certification
depends
on
each
implementation.
B
So
it
certifies
us,
it
is
a
product
certifies,
it
is
an
implementation
of
the
product.
So
you
as
a
base
client
install
open
set
base,
be
clear
about
all
the
details
of
your
implementation
and
it
was
going
to
come
to
an
audit
and
it
is
going
to
check
it.
So
we
don't
check
them,
we,
in
the
registry,.
We
help
you
to
comply
with
those
requirements,.
A
A
B
So
that
is
very
common,
because
if
you
have
a
problem
that
someone
gets
into
your
system,
you
have
to
go
to
court,
sometimes
in
certain
sectors
and
present
the
evidence,
so
that
evidence
has
to
be
kept
in
some
external
system
or
either
in
the
tic's
plan.
That
ibm
has
its
own,
always
many
implementations,
but
hey
you
have
to
keep
them
there
and
present
it
for
audit
and
for
evidence.
Well,
then,
there
are
many
very
important
things,
not
only
because
it
helps
you
certify,
but
it
also
helps
you
In
a
legal
environment,.
A
Say
these
regulations,,
let's
say
that
it
says
what
you
have
to
have,
for
example,.
You
need
to
have
lengths
and
power,
and
that's
what
they
have
to
send,,
whether
it's
a
site
and
they
have
to
be
auditable..
But
it
doesn't
tell
you
how
to
do
it
ss
how
to
implement
what
it
gives
to
each
type
of
implementation.
But
let's
say
you
have
to
have
it.
B
That's
exactly
it
exists
that
the
rules
are
generally
a
little
bit
abstract,
but
it
has
a
reason
for
being:
no.
No,
they
are
not
supposed
to
apply
to
the
systems
in
general.
Instead
of
telling
you
exactly
how
to
do
it,
because
if
they
did
it
that
way,
it
would
be
too
strict
and
I
know
that
over
the
years
it
would
deteriorate
because
it
still
happens
now
with
some
of
those
rules.
But
in
most
cases
there
are
many
rules
of
regulations
and
compliance
that
are
applicable
to
any
system.
B
Have
this
audit
logs
have
a
certain
type
of
inclination?
Have
this
the
ability
to
have
a
beard
exposed
to
have
rules
so
that
certain
users
can
have
certain
actions
and
others
are
not
very
general
things,
but
that
apply,
for
example,
to
open,
take
openshift
to
leave
virtualization.
So
it
is
very
general.
A
And
accesses
based
on
different
roles,
the
security
and
component
part
is
actually
in
all
these
parts
of
the
platform.
Let's
say
all
those
guidelines
you
have
to
be
aware
and
work
both
at
the
level
of
the
operating
system
like
at
the
level
of
rulers
like
at
the
level
of
kloster
television
like
at
the
level
of
the
application
and
data
up
to
multiples
ter
manager
is,
you
have
to
know
a
little,
let's
say
about
all
the
levels
of
the
implementation,
so
this
part
seems
very
interesting
to
me.
B
B
A
Deployment,
sorry,
thank
you.
The
deployment
of
openshift,
because
also,
if
we
are
talking
about
a
deployment,
for
example,
virtualization
fish
in
a
physical
environment
where
to
go
to
the
center,
has
to
have
certain
security
guidelines.
If
you
want
to
have
it
in
a
public
cloud,
because
there
are
already
certain
guidelines
that
by
design
are
not
met
because
since
it
is
in
a
republic,
they
have
different
accesses,
etc.
so
you
can
complying
with
all
the
guidelines
depending
on
where
you
are
here.
A
Deployment
is
interesting,
and
it
also
seems
to
me
that
all
this
hybrid
cloud
strategy,
that
name
also
seems
super
foreign
to
me,
the
one
that
stops
being
virtual,
but
the
hybrid
cloud
that
also
helps
to
solve
that.
Suddenly,
not
in
all
aspects
of
the
loads
that
you
are
running,
do
not
need
to
have
everything
they
can
run
freely
in
the
public
cloud.
For
example.
A
Suddenly
you
need
some
that
have
to
comply
with
certain
other
guidelines,
they
have
to
say,
or
do
it
in
a
physical
environment
with
certain
types
of
controls
Or
if
it
is
going
to
be
in
a
public
cloud,,
then
in
something
that
is
specifically
for
the
public
sector
that
covers
a
very
smooth
sail
or
not,
an
availability
skill
zone
that
has
certain
guidelines
to
be
able
to
meet
all
the
security
requirements,.
So
good,
asus.,
For
me,.
A
Is
that
all
the
two
improvements
that
are
made
in
google
put
in
openshift
for
a
client
or
for
a
type
of
user
because
they
come
to
benefit
everyone
and
all
those
changes,
because
they
continue
increasing
to
a
car
so
good.
If
we
go
to
the
following
ones
today,
we
talk
about
it
as
the
green
compliance
that
you
can
tell
us
about
this.
B
Good,
because
that
is
a
project
in
which
we
worked
for
a
long
time
and
it
finally
came
out
in
a
4.6
this
good
here,
We
are
just
showing
a
little
bit
of
what
the
documentation
looks
like,,
but
it
is
an
operator
that,
well,,
as
you
know,.
The
operators
in
operation
are
a
way
of
automating
certain
actions
that
a
good
operator
would
have
to
do..
We
have
something
to
see
compliance
and
what
it
does
is:
try
to
automate
and
make
life
easier.
B
When
you
have
to
do
security
scans
on
your
system
against
a
certain
security
profile,,
then
it
has
the
way
of
running
periodic
or
constant
scans,
and
it
will
tell
you
if
you
have
any
security
problems,
how
to
fix
it.
This
one
can
even
fix
certain
things
automatically,
even
this
one
that
doesn't
apply
to
all
all
deployments.
Well,
this
and
yes
well,
I'm
very
excited
because
we
spent
a
long
time
working
on
this
and
we
think
it's
going
to
be
very
useful
for
customers.
Well,
that.
A
Is
compliance
is
not
something
that
is
the
first
day
of
deployment
and
from
ewan
you
do
all
the
deployment.
Everything
is
perfect,
they
have
the
auditors,
everyone
checks
very
well,
and
then
you
forget
about
compliance
like
this.
It
doesn't
work
you
need,
you
need
to
continue
monitoring
and
doing
and
having
it.
Oxital
and
This
project
also
helps
you
automate
certain
types
of.
B
A
And
the
operator
also
helps
you
to
make
it
something
that
you
can
run,,
let's
say:
constantly,,
but
also
consistently,.
They
are
the
ones
that
do
a
single
check
and
that's
it,
and
the
next
time.
Someone
else
does
it
and
they
forgot
to
do
it.
this
other
mark,.
But
when
running
the
operator,,
you
have
a
kind
of
consistency.
Every
time
you
do
the
checks,,
which
is
important,
because
not
everyone
stays
working
in
all
the
companies,
all
their
lives,
of.
B
B
Even
but
if
it
is
installed
one
is
you
run
the
scans
that
you
have
to
run
and
You
can
save,
as
in
any
other
object
in
which
vernet
is
you
can
save
it
in
git,
even
and
have
it
there
and
in
the
other
system,
as
well
as
a
clerical
manager
that
runs
it
in
all
the
deployments.
You
are
opening
many
doors
to
have
it
to
have
a
much
easier
history
of
compliance.
A
Basically,
as
a
cloud
operator,
it
is,
let's
say,
more
information
that
helps
you
to
know
how
your
environment
is
working
and
to
know
that
there
is
Consistency
not
only
in
performance
but
also
in
how
you
are
complying
with
the
design
of
your
environment.
So
that's
a
great
part
I'm
excited
that
you
show
me
how
it
works.
So
it's
more
time
to
time.
B
But
of
course
this
here
we
have
well
I
have
a
system
that
I
had
in
development
Well,
because
I'm
just
writing
more
content,.
So
we'll
see
everything
works
very
well,
because
it's
this,
everything
is
in
development,,
but
hey,
there's
a
stable
version
that
isn't
Braun,
but
hey,.
Here
it
shows
you
what
we
have,
I,
don't
have
a
4.7
version
right
now,
that's
just
going
to
come.
Out.
B
B
A
B
B
B
We
checked
in
Córdoba
are
very
simple:
things.
Well,,
you
have
your
files,.
They
have
the
correct
mode,,
the
correct
permissions,,
this
one
that
does
not
have
certain,
for
example,.
It
is
very
easy
for
someone
to
move
a
configuration
just
to
do
pocking
and
modify
a
file
so
that
it
is
seen
by
all
users
in
the
system.
This
is
generally
wrong,
so
we
check
that
everything
is
in
the
correct
state
so
that
there
are
no
vulnerabilities
are
things
we
criticize.
B
For
example,
you
can
have
certain
configurations
for
the
scans,
for
example,
in
this
case,
to
save
the
two
results.
We
have
a
certainty
because
of
the
position
you
can
put,
even
when
you
want
to
run
the
scans
in
this
case,
I
run
every
day
at
1
in
the
morning,
but
you
can
run
every
half
hour
every
hour,
usually
actions
that
you
have
to
stop
anyway.
This
is
what
what
we
offer
you
by
default
driver
runs
me
every.
A
B
You
events
that
there
is
an
opposite
result:
it
was
waiting
for
the
results
in
cv,
objects,
verne
test,
and
apart
from
that,,
it
keeps
the
results
per
day
in
a
volume
that
you
can
download
and
you
can
send
an
auditor,,
which
is
what
auditors
usually
see,,
but
you
can
even
remove
everything
by
rulers
themselves,
for
example,.
What
we
are
going
to
do
right
now
is
run
the
profile
it
is
already
is,
and
the
only
thing
we
say
to
it,
recursively
is
I,
want
this
object
to
exist
and
then
continue
with
it.
B
If
you
have
the
scan
without
a
banner
that
is
towards
a
bending
of
the
scan
configuration
towards
the
profiles
that
you
want
to
run
and
to
follow
the
results
in
alive,
you
can
use
something
called
compliance
suite,
so
we
are
going
to
follow
it
and
it
tells
you
water,
I,
have
it.
If
you
are,
it
is
already
running,
but
there
is
still
no
result
and
it
will
continue
running
and
in
a
moment
it
will
tell
us
how
our
deployment
is.
What.
B
B
It
depends
on
the
profile
this
the
benchmark
said
is
good.
It
has
a
lot
of
results,
but
there
are
not
so
many
something
like
petro
marbet.
It
has
more
than
500
checks
that
do
all
kinds
of
checks
on
your
system,
so
it
exists.
It
takes
a
little
longer,
but
in
this
case
no
this
is
a
lot.
We
can
see
the
results
as
a
follow
everyone,
and
it
tells
you
everything
you
don't
have
good
if
there
are
a
lot
of
checks,
but
generally
everything
is
happening.
It
tells
you
well.
B
A
B
This
case
the
20
participate.
We
are
already
writing
it
yet
so
no,
it
will
not
seem
formally
to
you
yet
the
control,
but
when
we
take
it
out,
it
will
already
seem
so
then
this,
for
example,
with
the
checks
they
will
defend,
marbet,
that
we
are
also
writing
there.
If
everything
turns
out
good,
you
have
the
anise
17
check,
then
everything
will
turn
out
there.
You
want
to
see
the
good
control
also
with
a
plugin.
We
can
see
when
the
control
of
the
result
and
results.
A
A
Later,
if
you
didn't
fall
asleep
or
you
don't
have
to
start
to
see
how
all
these
checks
are
and
do
let's
say
this
manual
check-
and
that
is
what
I
am
telling
you
is
not
only
to
do
it
constantly
but
consistently
not
to
fight
a
check
beforehand.
That
is
what
I
think
is
the
value
of
this
type
of
operation
to
be
able
to
automate
this.
This
job
of.
B
Is
good
Just,
as
you
say,
no,
right
now,
I
am
seeing
the
result
of
a
control
and
it
tells
you
what
it
is
about,
it
gives
it
a
description,.
It
says
why
it
is
important
to
check
it
and
it
even
tells
you
which
control
in
this
case
gave
me
the
df
brand.
Also
because
all
the
information
is
there
but
I,
it
says
that
control
is
being
fulfilled
specifically,.
It
is
something
very
important
when
you
are
checking
the
results,.
B
It
does
not
also
tell
you
if
there
is
any
remediation
because
it
can
remediate
automatically
and
it
tells
you,
well,.
What
was
the
rule
that
you
had
to
comply
with
and
so
on,,
so
in
this
case,
for
example,
the
one
that
I'm
looking
at
this
check
and
you're
sending
your
audit
blogs
to
another
system.
We
don't
have
an
automatic
remediation
system
because
we
don't
want
to
tell
you
where
to
send
it,,
not
everything,.
B
B
We
have
the
login
or
project
faculty
also.
Well,
it's
not
from
my
team.
No,
but
another
team
has
it
anyway
of
accounts
this
and
this
operator
helps
you
send
them
elsewhere.
So,
first
we
are
going
to
install
it.
We
are
going
to
wait
a
little
bit
for
it
to
be
installed
and
what
we
are
going
to
do
is
the
following:
we
are
going
to.
A
B
How
it
is,
then,
what
we're
going
to
do
is
something
very
simple,
we're
just
going
to
tell
you
something,,
but
let's
install
the
operator
that
also
projected
the
network
that
is
much
easier
than
having
to
go
and
install
a
giant
charteau
something
or
something
similar.
So
we
are
going
to
install
these
two
things
to
an
instance
of
claustro
loving,
which
is
the
entire
system
of
fluent
and
elastic,
and
so
on
and
What
a
correct
system
and
the
other
of
the
love
order
class
that
all
it
does
is
send.
B
A
B
A
B
Like
this,,
for
example,
we
have
other
types
of
things
that
are
good
in
certain
types
of
checks.
It
is
very
easy
to
know
if
it
is
good
to
know
how
to
fix
the
problem,
because
it's
nothing
more.
There
is
a
solution,
for
example,
if
it
is
20,
it
strongly
says.
Well,
you
have
to
encrypt
your
citi
instance
and
in
opinion
this
is
something
very
simple.
B
B
B
Course,,
in
this
case,
it
just
gave
me
a
no,,
so
it's
the
only
problem
there
was,,
but
other
profiles
will
have
other
remediations
For
example,
in
Ferro
Madrid.
There
are
many
things
you
have
to
have
certain
types
of
audit
rules
for
Audi
Ti
in
colors.
Generally,.
We
don't
want
to
enable
those
by
default,
well,
from
the
box,,
because
well,
that's
going
to
be
a
little
slower
for
you,,
so
no.
B
all
clients
want
this
type
of
d,
so
auditing
rules
do
not
need
as
much,
and
that
is
why
it
is
not
the
one
in
the
photo
but
well.
The
full
support
helps
you
so
that
you
have
everything
you
need
in
this
aspect
also
in
certain
parameters,
the
kernel
that
is
there
to
enable
morett
by
iron.
Specifically,
so
all
these
kinds
of
things
can
be
done
automatically
with
worker
compliance.
You
can
do
it
as
I
did
right
now
by
changing
a
plan
that
initiates
a
lawsuit
but
also
in
the
settings.
Well,.
B
A
Obviously
this
one
said
you
have
to
have
more
confidence
in
the
system,
knowing
what
you're
doing
and
being,
let's
say,
a
problem:
it's
usually
remediating
to
do
it
with
confidence,
but
but
but
Also,.
One
of
the
things
that
I'm
learning
is
that
when
it
happens,
it's
the
compliance
operator
for
a
certain
type
of
area,,
the
fact
that
it's
false
or
that
it
gives
you
certain
alerts,
doesn't
mean
that
they
necessarily
have
a
problem,.
It
could
be
that
Let's
say
on
the
design
side,.
This
particular
deployment
will
never
meet
that
objective,,
but
I
also
say
more.
B
And
of
course,,
and
the
operator
also
has
the
option
to
modify
profiles
because,
as
you
say,.
There
are
some
checks
that
do
not
apply
to
certain
profiles
for
performance
reasons
or
because
for
any
reason
you
do
not
have
any
other
solution
that
is
unique
for
your
deployment.
Then
you
can
also
do
something
called
tailoring.
It
is
like
a
tailor,,
not
one
modifies
a
profile
and
well
well,.
It
would
be
unique
for
your
deployment,.
The
operator
can
also
do
that
kind
of
thing,.
A
B
A
B
Exactly
then,
can
you
give
a
list
of
what
or
what
to
disable?
Is
these
checks
completely
or
I?
Want
you
to
add
these
other
checks,
because
our
security
team
has
defined
that
they
are
important
and
that
they
also
need
to
check
for
water.
You
can
do
these
two
things
also
in
certain
values,
well,.
You
know
that
I
want
to
check
that
this
value
for
the
audit
buffer
is
instead
of
8000,
be
it
10,000
water.
You
can
do
it
too.
A
B
And
this
object
would
extend
another
profile,
for
example,
if
we
go
here
in
the
spect
of
pain
profile,
you
can
say
well
extend
this
profile
and
add
these
rules.
Remove
these
rules
with
these
values.
from
this
So
I
want
you
to
put
this
description
in
this
title
so
that
it
is
understood
exactly
what
we
are
doing.
So
all
those
kinds
of
things
can
be
done.
A
B
It
is
then,
to
conclude
this:
we
can
take
it
in
case.
Compliance
mirror
now
does
not
run
again,
because
in
this
case,
I
am
not
having
a
continuous
check,.
I
say
that
it
can
be
done.
I
can
also
do
it
by
modifying
it,,
but
in
this
case
I
can
run
it
on
hop,
so
I
want
to
run
it
since
it
would
run
and
that's
it,.
Now.
Yes,.
A
B
B
But
we
try
to
focus
a
lot
on
that,,
especially
because
in
the
past,,
when
you
run
these
types
of
applications,,
you
have
to
know
Exactly
the
lead
and
read
xml,
so
you
have
to
put
all
the
data
in
it,
and
people
tend
to
make
a
lot
of
mistakes.
So,
having
already
made
profiles
having
objects
that
nothing
else,
well,,
it
creates
a
seed,,
you
put
them
in
a
kit,,
it's
a
little
easier,.
B
B
So,,
as
I
mentioned
before,,
the
results
are
stored
in
a
volume
in
which
Vernet
is
this,.
That
volume
will
be
in
your
cloud,
and
in
this
case,
what
we
are
going
to
do
after
downloading
it,,
and
these
are
the
results
that
many
auditors
are
already
used
to
seeing..
They
can
clearly
see
the
objects
in
which
mind
if
they
want,,
but
if
they
already
have
certain
utilities
or
programs
to
see
and
audit
all
this,,
they
can
also
use
them,.
So
we
are
not
changing
any
of
those
standards
that
are
followed
in
the
industry,.
B
A
This
effect
that
this
spectrum
that
you
do,
you
can
also
make
it
part
of
the
sky,
or
let's
say
if
you
place
it,
every
15
days,
every
time
you
send
it
to
this
place,
and
then
the
Sunday
freighter
logo
is
the
one
that
is
in
charge
of
saying
how
long
that
has
to
be
there,.
How
often
do
you
do
a
power,?
How
often
do
you
send
it
to
another
file
so
that
it
doesn't
because
I
also
know
the
Guinness
part,
like
knowing
when
to
stop
looking
for
things
or
when
to
ask
for
more?
B
Clear
well
in
this
case,
these
are
not
logs
themselves;
they
are
results
and
a
file,
this
theft.
Well,
what
I
thought
would
generally
do
then,
in
this
case,
a
variant
of
the
report
that
many
auditors
are
already
used
to
having,
and
it
tells
you
well,
it
said
this
is
what
we
arrived
at
in
general
in
your
deployment.
I
also
have
the
xml,
because
there
are
also
other
utilities
to
read
it,
but
good
for
the
master
loud.
B
B
A
A
Let's
continue
the
next
slide
next
week
in
our
next
episode.
We
are
going
to
talk
about
physics,
not
thinking
and
ramón.
Acedo
will
also
be
there
that
he
talks
about
opel
and
that
he
doesn't
think
he
has
super
experience
in
this
type
of
deployment
that
we
are
going
to
talk
about
what
tools
have
been
used
to
improve
the
deployment
of
openstack
in
disconnected
environments,
also
with
openshift
and
how
openshift
works.
A
Let's
say
in
this
in
this
deployment
and
the
end
of
Let's
say
this
is
to
run
in
the
same
environment,
both
in
virtual
machines
and
containers.
We
also
have
virtualization
pensions,
but
let's
say
you
don't
have
virtualization
pensions.
You
can
run
virtual
machines
in
open
tag,
which
is
what
we
do
for
years
of
years
and
containers
too,
but
also,
obviously
you
can
have
it
in
the
south.