Patterns III – How to start

After discussing the theoretical background why patterns are useful in common IT-architectures in our first post and discussing the various levels of utilizing patterns in section two, we will now dive a little deeper and look how a pattern can be applied for a practical business problem. Requirements Let us assume we have an application […]

Review of 2023

OpenSourcerers 2023 is a wrap! It was packed with interesting articles covering a wide range of topics. There are 52 articles available covering high level topics down to the dirty technical details of using Red Hat’s products and other OpenSource technologies. Your Opensourcerers blog editors followed along of course! As we come from varying backgrounds […]

Confidentiality in a crazy world

This blog takes a log of the current state and the future of confidential computing and how it will change our perception of secure computing. Executive summary As like the opening image, companies rightfully guard their secrets like a 3 headed dog. Especially when it comes to implementing regulatory requirements. They not only fear the […]

Kubernetes at the Edge: MicroShift on Raspberry Pi 4 using Fedora IoT

This guide will show you how to run the newly GA’ed bits of MicroShift on a Raspberry Pi 4 using Fedora IoT 38 or 39. It can announce routes via mDNS so hosting applications in an mDNS aware LAN is a breeze. THIS IS COMPLETELY UNSUPPORTED. DON’T EVEN THINK OF RED HAT SUPPORT WHEN YOU […]

Podman Desktop Integration with MicroShift in a RHEL Virtual Machine

This blog elaborates on how to configure Podman Desktop to be used together with MicroShift in a RHEL virtual machine (VM). Please note that the presented setup is not supported by Red Hat. 1. Introduction and use case One of the challenges in software development is a difference between development environment and target production. In […]

Patterns II – The Approach

ˈpætɚns Image source https://vecteezy.com/ Recap In the first article, we discussed the need for patterns as an architectural paradigm, in order to achieve re-usability across complex environments such as Hybrid Cloud scenarios. We identified the benefits of a pattern based approach. We talked about automation, Hybrid Cloud, and about organizational aspects We’ve learned that patterns […]

Dynatrace & Red Hat – Unveiling the Automated Remediation Revolution

This blog elaborates on how to discover issues before they occur and have a quicker root cause detection.
React on exception right away in an automated fashion. And with that reduce operational costs and enable faster delivery and MTRS time.

The RHEL root trust store and why it matters for security

Photo by Robynne Hu on Unsplash In the perilous realm of digital security, trust is fragile. Transport Layer Security (TLS) web server authentication relies on trust anchors, but a flaw in the design puts web entities at risk of malicious impersonation. This article explores the origin of certificates in the RHEL root trust store and […]

What you always wanted to know about your etcd usage

In most Kubernetes installations, a well-maintained etcd is one of the key conditions for having a peaceful administrator life. Most Kubernetes distributions imply limitations on etcd and its size. For Openshift there’s a quota limit of 8GB. Typically that limitation should not hit you unless you run really large clusters and or utilize the cluster […]

Compliance is NOT Security

The Problem with Security and Compliance Mixture When talking to customers or colleagues, I often see two distinct topics being conflated: Compliance and (IT-) Security. Some customers have requirements they say MUST be fulfilled. When asked what their goal with this requirement is, they cannot elaborate the intention. They often fall back into saying that […]

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.