A Path to a More Sustainable IT by Effective Power Monitoring

The Problem It’s getting worse. Every day. The global emissions of carbon dioxide are still increasing , while our global budget to stay in the range of 1.5° C and 2° C is rapidly exhausting. The main emissions are produced by burning fossil fuels for energy generation, transportation and industrial production. Another big source of […]

What’s a (D)DoS “(Distributed) Denial of Service” and how to protect against such an attack – technical.

Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are available and why such a denial of […]

Patterns III – How to start

After discussing the theoretical background why patterns are useful in common IT-architectures in our first post and discussing the various levels of utilizing patterns in section two, we will now dive a little deeper and look how a pattern can be applied for a practical business problem. Requirements Let us assume we have an application […]

Kubernetes at the Edge: MicroShift on Raspberry Pi 4 using Fedora IoT

This guide will show you how to run the newly GA’ed bits of MicroShift on a Raspberry Pi 4 using Fedora IoT 38 or 39. It can announce routes via mDNS so hosting applications in an mDNS aware LAN is a breeze. THIS IS COMPLETELY UNSUPPORTED. DON’T EVEN THINK OF RED HAT SUPPORT WHEN YOU […]

A personal AI assistant for developers that doesn’t phone home

tl;dr It’s no surprise that developers are looking for ways to include powerful new technologies like AI Assistants to improve their workflow and productivity. However, many companies are reluctant to allow such technology due to concerns about privacy, security and IP law. This article addresses the concerns about privacy and security and describes how to […]

Dynatrace & Red Hat – Unveiling the Automated Remediation Revolution

This blog elaborates on how to discover issues before they occur and have a quicker root cause detection.
React on exception right away in an automated fashion. And with that reduce operational costs and enable faster delivery and MTRS time.

Securing CICD pipelines with StackRox and Sigstore

How can we ensure the security of our supply chain and verify that all container images deployed in our Kubernetes clusters are both signed and protected, preventing the deployment of malicious ones? What methods can we adopt to sign and verify container images within our CI/CD pipelines, thereby bolstering the security of our DevOps workflows? […]

What you always wanted to know about your etcd usage

In most Kubernetes installations, a well-maintained etcd is one of the key conditions for having a peaceful administrator life. Most Kubernetes distributions imply limitations on etcd and its size. For Openshift there’s a quota limit of 8GB. Typically that limitation should not hit you unless you run really large clusters and or utilize the cluster […]

Forensic container checkpointing in OpenShift

Photo by Daniel van den Berg on Unsplash On a warm summer day, I visited the Kubernetes Community Days Munich and enjoyed Adrian Reber’s talk about “Forensic container checkpointing and analysis”. Now I want to try that with OpenShift 4.13! This blog post will mainly cover how to enable and use checkpointing on OpenShift 4.13. […]

Deep dive into a scalable enterprise integration platform with MuleSoft and OpenShift

This article shows how MuleSoft’s Runtime Fabric (RTF) deployed to Red Hat OpenShift delivers a modern containerized API solution.

close

Subscribe to our newsletter.

Please select all the ways you would like to hear from Open Sourcerers:

You can unsubscribe at any time by clicking the link in the footer of our emails. For information about our privacy practices, please visit our website.

We use Mailchimp as our newsletter platform. By clicking below to subscribe, you acknowledge that your information will be transferred to Mailchimp for processing. Learn more about Mailchimp's privacy practices here.