When on the road, some of us bring a handheld Linux computer such as the Steam Deck for entertainment. But after some time of hunting ghosts and shooting portals the desire to be productive returns. How about quitting the game and starting OpenShift on our handheld gaming compani … | Continue reading
This is the follow-up article to my Introduction to the Advanced Intrusion Detection Environment (AIDE). It presents a Proof of Concept (PoC) that shows how AIDE can be remotely controlled using an Ansible role. Knowledge of the introductory article is assumed. Basic Ansible know … | Continue reading
This introduction provides answers to the following questions: For this introduction I used RHEL 9 as my operating system of choice, but AIDE is available for other Linux distributions as well. In order to follow this introduction, you should be familiar with the basics of Linux … | Continue reading
A Guide to Seamless Connectivity in OpenShift and OKD In today’s rapidly evolving technological landscape, the integration of complex architectures into our systems is becoming more prevalent than ever. One of these challenges is to consolidate a multi-cloud architecture into a t … | Continue reading
Source: https://commons.wikimedia.org/wiki/File:Grand_Turk(34).jpg (Georges Jansoone) Abstract In the rapidly evolving landscape of software development, documentation of modifications and updates is crucial for maintaining project continuity and ensuring team alignment. This blo … | Continue reading
Introduction In this article I will put the spotlight on some aspects of the Open Source activities in the public sector in germany. While I have a few insights in some of these, I am currently unable to cover everything that is going on. So if I missed parts, please let me know … | Continue reading
The Problem It’s getting worse. Every day. The global emissions of carbon dioxide are still increasing , while our global budget to stay in the range of 1.5° C and 2° C is rapidly exhausting. The main emissions are produced by burning fossil fuels for energy generation, transport … | Continue reading
The potential of AI has been acknowledged for years, along with the understanding that data is the key driver of this potential. This realization sparked a gold rush to amass data, a pursuit driven more by the allure of future possibilities than by practical use cases. Consequent … | Continue reading
We all know the limitations of building multi-architecture images on an infrastructure that is not providing all the expected CPU architectures. We also know that emulation of those architectures is something that can help us out of that dilemma. Unfortunately, switching CPU arch … | Continue reading
Open source has become widely adopted as a default, making it easy to overlook its significance in the field of Data science. There is a need to appreciate the greater value in this area. Data scientists can enhance efficiency and improve work performance by utilizing Open source … | Continue reading
Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are avail … | Continue reading
In just two months, ChatGPT reached 100 million users, outpacing TikTok and WhatsApp. This shows AI’s growing popularity, especially versatile generative AI. In 2024, generative AI’s influence in tech and finance is undeniable. This article looks at key generative AI trends in fi … | Continue reading
After discussing the theoretical background why patterns are useful in common IT-architectures in our first post and discussing the various levels of utilizing patterns in section two, we will now dive a little deeper and look how a pattern can be applied for a practical business … | Continue reading
OpenSourcerers 2023 is a wrap! It was packed with interesting articles covering a wide range of topics. There are 52 articles available covering high level topics down to the dirty technical details of using Red Hat’s products and other OpenSource technologies. Your Opensourcerer … | Continue reading
Without many words, the OpenSourcerers Chief Editors wish you all a relaxing vacation period, Merry Christmas and a happy New Year! We want to take the opportunity to thank all authors, supporters and readers of our blog entries. Stay safe and healthy and stay prudent of the rein … | Continue reading
Abstract As technology rapidly advances and organizations expand, a diverse array of tools and infrastructures are being integrated into our IT ecosystems. This growth presents challenges in managing service complexity, increasing the risk of fragmentation and reduced reliability … | Continue reading
This blog takes a log of the current state and the future of confidential computing and how it will change our perception of secure computing. Executive summary As like the opening image, companies rightfully guard their secrets like a 3 headed dog. Especially when it comes to im … | Continue reading
At Red Hat, we develop enterprise software through an open-source development model. This implies that communities play a pivotal role in shaping everything we do – from our products and culture to the solutions we provide to our customers. Naturally, communities are at the cente … | Continue reading
Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Level. To understand what a (D)DoS is, let us explain what a “Service” is, what possible attacks are availa … | Continue reading
This guide will show you how to run the newly GA’ed bits of MicroShift on a Raspberry Pi 4 using Fedora IoT 38 or 39. It can announce routes via mDNS so hosting applications in an mDNS aware LAN is a breeze. THIS IS COMPLETELY UNSUPPORTED. DON’T EVEN THINK OF RED HAT SUPPORT WHEN … | Continue reading
This blog elaborates on how to configure Podman Desktop to be used together with MicroShift in a RHEL virtual machine (VM). 1. Introduction and use case One of the challenges in software development is a difference between development environment and target production. In other w … | Continue reading
tl;dr It’s no surprise that developers are looking for ways to include powerful new technologies like AI Assistants to improve their workflow and productivity. However, many companies are reluctant to allow such technology due to concerns about privacy, security and IP law. This … | Continue reading
ˈpætɚns Image source https://vecteezy.com/ Recap In the first article, we discussed the need for patterns as an architectural paradigm, in order to achieve re-usability across complex environments such as Hybrid Cloud scenarios. We identified the benefits of a pattern based appro … | Continue reading
This blog elaborates on how to discover issues before they occur and have a quicker root cause detection. React on exception right away in an automated fashion. And with that reduce operational costs and enable faster delivery and MTRS time. The post Dynatrace & Red Hat – Unveili … | Continue reading
In this post, I am going to show you how to enable faster Podman builds in Eclipse Che / OpenShift Dev Spaces by enabling support for /dev/fuse in your workspace. This will eliminate the need for using vfs with podman. It also gets us closer to being able to do podman run in a ro … | Continue reading
How can we ensure the security of our supply chain and verify that all container images deployed in our Kubernetes clusters are both signed and protected, preventing the deployment of malicious ones? What methods can we adopt to sign and verify container images within our CI/CD p … | Continue reading
Photo by Robynne Hu on Unsplash In the perilous realm of digital security, trust is fragile. Transport Layer Security (TLS) web server authentication relies on trust anchors, but a flaw in the design puts web entities at risk of malicious impersonation. This article explores the … | Continue reading
In most Kubernetes installations, a well-maintained etcd is one of the key conditions for having a peaceful administrator life. Most Kubernetes distributions imply limitations on etcd and its size. For Openshift there’s a quota limit of 8GB. Typically that limitation should not h … | Continue reading
The Problem with Security and Compliance Mixture When talking to customers or colleagues, I often see two distinct topics being conflated: Compliance and (IT-) Security. Some customers have requirements they say MUST be fulfilled. When asked what their goal with this requirement … | Continue reading
Photo by Daniel van den Berg on Unsplash On a warm summer day, I visited the Kubernetes Community Days Munich and enjoyed Adrian Reber’s talk about “Forensic container checkpointing and analysis”. Now I want to try that with OpenShift 4.13! This blog post will mainly cover how to … | Continue reading
Photo by Timelab on Unsplash In this tutorial I will show you how to configure automatic updates for containers in rootless Podman environments and how systemd manages these containers as services. The tutorial is divided into the following sections: If you are not interested in … | Continue reading