Red Hat Advanced Cluster Security with OpenShift Pipelines and Slack Integration

Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]

Correct Estimates? A personal perspective

Motivation A while ago I paused an exchange on twitter. I have been in a strong disagreement with what was stated from Alex. To avoid being bullish on a short reply, it took some time to reply in due respect and also purposefully.  Nevertheless, I need to agree to some extend: There might be cases […]

“This space intentionally left blank”

We’ll be back next week…

Security aspects with OpenShift – an overview

Today more than ever availability and performance depend on resilience against increasingly frequent and powerful attacks on the confidentiality, availability and integrity of information and IT systems. It is not just that our systems are being threatened with continuous automated attacks, but also with highly sophisticated approaches, such as Advanced Persistent Threats (APTs), Ransomware, Side […]

Ansible Middleware : Automation of JBoss Web Server (JWS)

In a previous article, we discussed the importance of Ansible from a Middleware perspective and why making Middleware a first-class citizen in the Ansible ecosystem is crucial. In this post, we’ll explore the technical details of utilizing Ansible for automating a Middleware solution.  We’ll focus on one of the most used middleware software: Apache Tomcat. […]

“Oops, something is wrong with your GitOps application!”

GitOps – Operations by Pull Request GitOps, a natural evolution of the DevOps practice, has gained popularity ever since it was introduced by Weaveworks in 2017. The core idea of GitOps is to treat “everything” as code. What does it mean? You will need to describe the desired state of your system declaratively as code, […]

OpenShift absichern für die Gesundheitsbranche

For english content please see the blog post by Chris Jenkins at  https://www.redhat.com/en/blog/openshift-security-hardening-healthcare-industry which essentially presents the same information as this post. Because of the importance of the topic and the ask from our german-language customers we wanted to also present this information in german. “Security is not a product, it itself is a process” […]

42!

If 42 is the answer to all your OpenSource questions …..

Monitor and scale apps using your own metrics

In this blog I will guide you on How to enable an application performance monitoring (APM). How to scale a user application based on application metrics with a Horizontal Pod Autoscaler (HPA). How to create an alert based on application metrics and send this alert to an external system. For the monitoring, I will use […]

What on earth is KCP and why should I be very, very excited about it?

When people ask me what I do for a living I give up trying to explain what it is and just say ‘software’, at which point their eyes glaze over and the conversation shifts to weather, which politician has done what insanely hypocritical thing and whose round it is. And the reason I find it […]