The Operator Update Information Checker

By Robert Baumgartner, Red Hat Austria, March 2023 Summary Recently Red Hat has released a tool at the Customer Portal Labs that can give very detailed information about Operators and available updates, supported versions, and much more. The name of this tool is Red Hat OpenShift Container Platform Operator Update Information Checker Where to find […]

Using OSTree Native Containers as Node Base Images

Node Base Images are OCI container images that are used to deliver software updates and customizations to rpm-ostree based Linux systems running on bare metal and virtual machines, such as Fedora CoreOS, Fedora IoT, Fedora Silverblue, CentOS Stream CoreOS, RHEL CoreOS, and RHEL for Edge. Node Base Images are built with OSTree Native Containers. While application […]

Java to Pod

From Java code in your repo to a running Pod on Kubernetes. This article explains all the steps needed, including basic shortcuts.

AI and its hype, some recommendations for reading

Lately we have been seeing many things around AI and most prominently was the advent of ChatGPT, which brought AI within the average person’s viewpoint. Also here on OpenSourcerers we have had some articles around AI and ML lately, just scroll down through the list (one entry point is also linked also below).. What I’m […]

How to secure microservice applications with role-based access control? (7/7)

Foto Source: Darrel Und (www.pexels.com) Option: Service Mesh We have already introduced many different options how to secure micro-service applications based on roles (RBAC). In the last part of this series, we will explore how to use a Service Mesh for RBAC. For the implementation of the Service Mesh we are using the Open Source […]

How to secure microservice applications with role-based access control? (6/7)

Option: API Gateway Foto Source: Jeswin Thomas (www.pexels.com) In the last blog “OpenID Connect & Keycloak (part 5), we have described how a 3rd party component (Keycloak) can provide intermediary services for trust and security. Amongst others, keycloak takes care of the generation and configuration of the JWT token. The good thing: As all involved […]

How to set up and demonstrate Quarkus GrumpyCat GitOps demo

Read this manual if you want to setup and demonstrate (or otherwise use) all the mechanisms of Quarkus GrumpyCat. First of all GrumpyCat is a micro services based multi player game, which you can use to demonstrate and play a nice PacMan / FatCat like game. But with this demo you can also easily demonstrate the benefits of using the GitOps principles for developing and deploying a bigger application.

KubeCon Trip Report

As a computer scientist, I think the best thing about our job is clearly the need to keep up with the latest technological achievements. Depending on the specific area you work in, you can actually always be sure that the solutions to challenges are constantly changing. Kubernetes is no different in that regard. Let’s find […]

Building Trust in the Software Supply Chain

Overview What steps can we take to establish trust in our Software Supply Chain and ensure that our software can be traced back to its origin without introducing malicious code or dependencies? Moreover, how can we integrate Open Source tools to enhance the security of our Software Supply Chain’s lifecycle? As we explained in our […]

How to secure microservice applications with role-based access control? (5/7)

Foto Source: Ron Lach (www.pexels.com) Option: OpenID & Keycloak In the previous blog (part 4), we have introduced JSON Web Token to allow more transparent and convenient authentication and access management. In this blog (part 5), we will explore how we can extend the concept of a JWT to achieve even better standardization through oAuth2 […]

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.