Securing CICD pipelines with StackRox and Sigstore

How can we ensure the security of our supply chain and verify that all container images deployed in our Kubernetes clusters are both signed and protected, preventing the deployment of malicious ones? What methods can we adopt to sign and verify container images within our CI/CD pipelines, thereby bolstering the security of our DevOps workflows? […]

Deep dive into a scalable enterprise integration platform with MuleSoft and OpenShift

This article shows how MuleSoft’s Runtime Fabric (RTF) deployed to Red Hat OpenShift delivers a modern containerized API solution.

Software Supply Chain Security

What is Software Supply Chain Security ? In this day and age most of us are looking for trust and security. This is also true for our IT infrastructure as challenges from the outside grow more and more dangerous to the continuation of undisturbed business. Attacks on the IT infrastructure of companies not only rise […]

How to set up and demonstrate Quarkus GrumpyCat GitOps demo

Read this manual if you want to setup and demonstrate (or otherwise use) all the mechanisms of Quarkus GrumpyCat. First of all GrumpyCat is a micro services based multi player game, which you can use to demonstrate and play a nice PacMan / FatCat like game. But with this demo you can also easily demonstrate the benefits of using the GitOps principles for developing and deploying a bigger application.

Building Trust in the Software Supply Chain

Overview What steps can we take to establish trust in our Software Supply Chain and ensure that our software can be traced back to its origin without introducing malicious code or dependencies? Moreover, how can we integrate Open Source tools to enhance the security of our Software Supply Chain’s lifecycle? As we explained in our […]

Securing the integrity of Software Supply Chains

Overview How can we secure the integrity of our Software Supply Chains and have confidence that our software has not been tampered with and can be traced to its source? Which are the main parts of the software supply chain security? Before explaining how to secure the Software Supply Chain, we need first to understand […]

OpenShift Local or Single Node OpenShift

Are you a developer or just a curious individual who wants to dip their toes in the Cloud, but are not sure whether to go for OpenShift Local or Single Node OpenShift? You’ve come to the right place. In this article, I will explore the differences and similarities between these two variants of OpenShift, so […]

Develop faster, operate smart: A Kubernetes-native guide to AI application development

tl;dr A Kubernetes-native software engineering approach for the development of AI applications helps you increase developer productivity, optimize resource consumption as well as simplify operations. A hands-on demo of this approach can be seen here. Two-step development approach The usage of an AI/ML model in an application requires basically a two-step development approach. The first […]

Red Hat Advanced Cluster Security with OpenShift Pipelines and Slack Integration

Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]

Automated Application Packaging And Distribution with OpenShift – GitOps and ArgoCD – Part 4/4

Part 4/4 of the article series “Automated Application Packaging and Distribution with OpenShift – A guide through the jungle of modern development practices with Kubernetes”. This part explains GitOps and discusses an example with ArgoCD and Tekton.

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.