This article shows how MuleSoft’s Runtime Fabric (RTF) deployed to Red Hat OpenShift delivers a modern containerized API solution.

This article shows how MuleSoft’s Runtime Fabric (RTF) deployed to Red Hat OpenShift delivers a modern containerized API solution.
By Robert Baumgartner, Red Hat Austria, August 2023 Tested with OpenShift 4.13, AMQ Streams 2.4, Camel K 1.10, and OpenShift Serverless 1.29 Camel K helps us integrate systems in an easy, simple, and cost-effective way. Do more with less. Do more with less. That’s the goal for everyone right now. But every company also has […]
By Robert Baumgartner, Red Hat Austria, February 2023 (OpenShift 4.12) In this blog I will guide you on how to use service performance monitoring (SPM) with Jaeger. It should work with any application that is working with OpenTelemetry. This document is based on OpenShift 4.12. See Distributed tracing release notes. OpenShift distributed tracing platform Operator […]
Node Base Images are OCI container images that are used to deliver software updates and customizations to rpm-ostree based Linux systems running on bare metal and virtual machines, such as Fedora CoreOS, Fedora IoT, Fedora Silverblue, CentOS Stream CoreOS, RHEL CoreOS, and RHEL for Edge. Node Base Images are built with OSTree Native Containers. While application […]
From Java code in your repo to a running Pod on Kubernetes. This article explains all the steps needed, including basic shortcuts.
Foto Source: Darrel Und (www.pexels.com) Option: Service Mesh We have already introduced many different options how to secure micro-service applications based on roles (RBAC). In the last part of this series, we will explore how to use a Service Mesh for RBAC. For the implementation of the Service Mesh we are using the Open Source […]
Option: API Gateway Foto Source: Jeswin Thomas (www.pexels.com) In the last blog “OpenID Connect & Keycloak (part 5), we have described how a 3rd party component (Keycloak) can provide intermediary services for trust and security. Amongst others, keycloak takes care of the generation and configuration of the JWT token. The good thing: As all involved […]
Read this manual if you want to setup and demonstrate (or otherwise use) all the mechanisms of Quarkus GrumpyCat. First of all GrumpyCat is a micro services based multi player game, which you can use to demonstrate and play a nice PacMan / FatCat like game. But with this demo you can also easily demonstrate the benefits of using the GitOps principles for developing and deploying a bigger application.
Overview What steps can we take to establish trust in our Software Supply Chain and ensure that our software can be traced back to its origin without introducing malicious code or dependencies? Moreover, how can we integrate Open Source tools to enhance the security of our Software Supply Chain’s lifecycle? As we explained in our […]
Foto Source: Ron Lach (www.pexels.com) Option: OpenID & Keycloak In the previous blog (part 4), we have introduced JSON Web Token to allow more transparent and convenient authentication and access management. In this blog (part 5), we will explore how we can extend the concept of a JWT to achieve even better standardization through oAuth2 […]