The Problem It’s getting worse. Every day. The global emissions of carbon dioxide are still increasing , while our global budget to stay in the range of 1.5° C and 2° C is rapidly exhausting. The main emissions are produced by burning fossil fuels for energy generation, transportation and industrial production. Another big source of […]
Tag: OpenShift
Introduction The topic “Denial of Service” (DoS) and “Distributed Denial of Service” (DDoS) is always a hot topic because it could happen at any time for any Service at any Layers. To understand what a (D)DoS is, let us explain what a “service” is, what possible attacks are available and why such a denial of […]
After discussing the theoretical background why patterns are useful in common IT-architectures in our first post and discussing the various levels of utilizing patterns in section two, we will now dive a little deeper and look how a pattern can be applied for a practical business problem. Requirements Let us assume we have an application […]
This guide will show you how to run the newly GA’ed bits of MicroShift on a Raspberry Pi 4 using Fedora IoT 38 or 39. It can announce routes via mDNS so hosting applications in an mDNS aware LAN is a breeze. THIS IS COMPLETELY UNSUPPORTED. DON’T EVEN THINK OF RED HAT SUPPORT WHEN YOU […]
tl;dr It’s no surprise that developers are looking for ways to include powerful new technologies like AI Assistants to improve their workflow and productivity. However, many companies are reluctant to allow such technology due to concerns about privacy, security and IP law. This article addresses the concerns about privacy and security and describes how to […]
This blog elaborates on how to discover issues before they occur and have a quicker root cause detection.
React on exception right away in an automated fashion. And with that reduce operational costs and enable faster delivery and MTRS time.
How can we ensure the security of our supply chain and verify that all container images deployed in our Kubernetes clusters are both signed and protected, preventing the deployment of malicious ones? What methods can we adopt to sign and verify container images within our CI/CD pipelines, thereby bolstering the security of our DevOps workflows? […]
In most Kubernetes installations, a well-maintained etcd is one of the key conditions for having a peaceful administrator life. Most Kubernetes distributions imply limitations on etcd and its size. For Openshift there’s a quota limit of 8GB. Typically that limitation should not hit you unless you run really large clusters and or utilize the cluster […]
Photo by Daniel van den Berg on Unsplash On a warm summer day, I visited the Kubernetes Community Days Munich and enjoyed Adrian Reber’s talk about “Forensic container checkpointing and analysis”. Now I want to try that with OpenShift 4.13! This blog post will mainly cover how to enable and use checkpointing on OpenShift 4.13. […]
This article shows how MuleSoft’s Runtime Fabric (RTF) deployed to Red Hat OpenShift delivers a modern containerized API solution.