After discussing the theoretical background why patterns are useful in common IT-architectures in our first post and discussing the various levels of utilizing patterns in section two, we will now dive a little deeper and look how a pattern can be applied for a practical business problem. Requirements Let us assume we have an application […]
Category: 00 – Hybrid Cloud Infrastructure
OpenSourcerers 2023 is a wrap! It was packed with interesting articles covering a wide range of topics. There are 52 articles available covering high level topics down to the dirty technical details of using Red Hat’s products and other OpenSource technologies. Your Opensourcerers blog editors followed along of course! As we come from varying backgrounds […]
This blog takes a log of the current state and the future of confidential computing and how it will change our perception of secure computing. Executive summary As like the opening image, companies rightfully guard their secrets like a 3 headed dog. Especially when it comes to implementing regulatory requirements. They not only fear the […]
This guide will show you how to run the newly GA’ed bits of MicroShift on a Raspberry Pi 4 using Fedora IoT 38 or 39. It can announce routes via mDNS so hosting applications in an mDNS aware LAN is a breeze. THIS IS COMPLETELY UNSUPPORTED. DON’T EVEN THINK OF RED HAT SUPPORT WHEN YOU […]
This blog elaborates on how to configure Podman Desktop to be used together with MicroShift in a RHEL virtual machine (VM). Please note that the presented setup is not supported by Red Hat. 1. Introduction and use case One of the challenges in software development is a difference between development environment and target production. In […]
ˈpætɚns Image source https://vecteezy.com/ Recap In the first article, we discussed the need for patterns as an architectural paradigm, in order to achieve re-usability across complex environments such as Hybrid Cloud scenarios. We identified the benefits of a pattern based approach. We talked about automation, Hybrid Cloud, and about organizational aspects We’ve learned that patterns […]
This blog elaborates on how to discover issues before they occur and have a quicker root cause detection.
React on exception right away in an automated fashion. And with that reduce operational costs and enable faster delivery and MTRS time.
Photo by Robynne Hu on Unsplash In the perilous realm of digital security, trust is fragile. Transport Layer Security (TLS) web server authentication relies on trust anchors, but a flaw in the design puts web entities at risk of malicious impersonation. This article explores the origin of certificates in the RHEL root trust store and […]
In most Kubernetes installations, a well-maintained etcd is one of the key conditions for having a peaceful administrator life. Most Kubernetes distributions imply limitations on etcd and its size. For Openshift there’s a quota limit of 8GB. Typically that limitation should not hit you unless you run really large clusters and or utilize the cluster […]
The Problem with Security and Compliance Mixture When talking to customers or colleagues, I often see two distinct topics being conflated: Compliance and (IT-) Security. Some customers have requirements they say MUST be fulfilled. When asked what their goal with this requirement is, they cannot elaborate the intention. They often fall back into saying that […]