KubeCon Trip Report

As a computer scientist, I think the best thing about our job is clearly the need to keep up with the latest technological achievements. Depending on the specific area you work in, you can actually always be sure that the solutions to challenges are constantly changing. Kubernetes is no different in that regard. Let’s find […]

Building Trust in the Software Supply Chain

Overview What steps can we take to establish trust in our Software Supply Chain and ensure that our software can be traced back to its origin without introducing malicious code or dependencies? Moreover, how can we integrate Open Source tools to enhance the security of our Software Supply Chain’s lifecycle? As we explained in our […]

How to secure microservice applications with role-based access control? (5/7)

Foto Source: Ron Lach (www.pexels.com) Option: OpenID & Keycloak In the previous blog (part 4), we have introduced JSON Web Token to allow more transparent and convenient authentication and access management. In this blog (part 5), we will explore how we can extend the concept of a JWT to achieve even better standardization through oAuth2 […]

How to secure microservice applications with role-based access control? (4/7)

Foto Source: Nataliya Vaitkevich (www. pexels.com) Option: JWT In the previous blog part (part 3) we have used  BasicAuthentication for transferring credentials which are then enforced in the requested service. This approach has several disadvantages. First and foremost, each service has access to user credentials. Thus, if one service is hacked, all services are impacted. […]

Using OpenTelemetry and Grafana Tempo with Your Own Services/Application

By Robert Baumgartner, Red Hat Austria, March 2023 (OpenShift 4.12, OpenShift distributed tracing data collection 0.63) In this blog, I will guide you on how to use OpenTelemetry with a Quarkus application; how to forward your OpenTelemetry information to Tempo and display it in Grafana UI. I will use distributed tracing to instrument my services […]

Language (r)evolution

As ancient Greek philosopher Heraclitus once said, the only constant in life is change. And it accurately applies to language as well. The spectacle of language change can be observed from two perspectives: synchronous (different language versions going hand-in-hand at the same time) and asynchronous (how language evolves across decades, centuries or millennia). And, taking […]

How to secure microservice applications with role-based access control? (3/7)

Foto Source: CottonBro Studio (www.pexels.com) Option: BasicAuthentication In the previous post (Part 2), we have set the scene by implementing a basic service-to-service communication with 3 REST end-points (publicEP, userEP, adminEP). The checking of the role has been done programmatically against an HTTP query parameter. We have elaborated on the down-sides of this option and […]

How to secure microservice applications with role-based access control (2/7)?

Foto Source: Ron Lach (www. pixels.com) Option: HTTP Query Param In Part 2 of our 7-part blog series “How to secure microservice applications with role-based access control”, we will build the basic services and establish a connection. Later, we are going to implement a basic Role-based Access Control (RBAC) by transmitting the role information via […]

How to secure microservice applications with role-based access control? (1/7)

Foto Source: Life of Pix (www.pixels.com) Role-based Access Control (shortly RBAC) is one of the first things that come to mind if you think about security. But how can you do this consistently, without overburdening developers and IT-operation? And how can this be done in the context of micro-services architectures or – more generally speaking […]

Kubernetes: How a Rejected Internal Project Became a Global Standard

San Francisco, June 9-10, 2014. In the halls of the Marriott Marquis hotel, the first DockerCon is held. “Containers everywhere!” is printed on the back of event T-shirts. The first big news of DockerCon is the launch of Docker 1.0, but there is much more to come. It is the beginning of what is later […]