create an image that is 99% complete Scenario 1 create an image that supports multiple targets Scenario 2 create an image pipeline that is trustable Scenario 3
Scenario 1 Scenario 2 Scenario 3 dynamically configure images using cloud-init make infrastructure changes predictable alter infrastructure based on external inputs
Scenario 1 Scenario 2 Scenario 3 make infrastructure changes predictable manage passwords and API tokens externally manage user directories and access policies
Scenario 1 Scenario 2 Scenario 3 create secure ingress / egress flows build observability into your network stack update DNS based on cluster utilization
Scenario 1 Scenario 2 Scenario 3 deploy workloads based on hardware requirements experiment with different deployment methods build a pipeline to run an app on an orchestrator