Kubernetes:
- EKS-Anywhere: Run Amazon EKS on your own infrastructure,
- GitOps is a placebo,
- K8sPurger: Hunt Unused Resources In Kubernetes,
- gRPC load balancing on Kubernetes (using Headless Service),
- Applying DevSecOps practices to Kubernetes: software supply chain,
- Deploying Tornjak with Helm Charts,
- Tomasz Cholewa’s Kubernetes workshop #1,
- Why and How of Kubernetes Ingress (and Networking),
- Results of Kubernetes Adoption Survey Show it’s Everywhere,
- K8up: Kubernetes Backup Operator,
- Prometheus Cheat Sheet – How to Join Multiple Metrics (Vector Matching),
- Most Common Kubernetes Security Issues and Concerns to Address,
- 13 Best Practices for using Helm,
- Advanced Kubernetes pod to node scheduling,
- Adding Image Digest References to Your Helm Charts,
- Kubernetes configuration and security policies with KubeLinter (35min),
- Announcing Backup for GKE: the easiest way to protect GKE workloads,
- Sciuro: Alertmanager to Kubernetes Node conditions bridge,
- 6 Tips to Improve Availability with AWS Load Balancers and Kubernetes,
- Kubernetes admission control with validating webhooks,
- 16 things you didn’t know about Kube APIs and CRDs,
- CNCF Operator white paper,
- Reflector: a custom Kubernetes controller that can be used to replicate secrets, configmaps and certificates,
OpenShift:
- Private Matters – ROSA and AWS PrivateLink Working Together,
- Managing NIST 800-53 Controls in a Multicluster OpenShift Environment – Part 1,
- Managing NIST 800-53 Controls in a Multicluster OpenShift Environment – Part 2,
- Managing NIST 800-53 controls in a multicluster OpenShift environment – Part 3,
- Improve cross-team collaboration with Camel K,
- TCPDump for OpenShift Workloads,
- Ask an OpenShift Admin Office Hour – OpenShift at the Edge,
- Node.js circuit breakers for serverless functions,
- MTC 1.6.0: State Migration (8min),
- Deploy Disconnected Single Node OpenShift via Baremetal Installer,
- General availability: Azure Red Hat OpenShift support for OpenShift 4.8,
- Assisted Installer on premise deep dive,
- Getting Started running Spark workloads on OpenShift,
- How to automatically remediate issues using the compliance Operator,
- Ask an OpenShift Admin Office Hour – Bring Windows nodes to OpenShift,
- Applying DevSecOps practices to Kubernetes: security analysis and remediation,
- Using Red Hat Advanced Cluster Security with the OpenShift Registry,
- Testing eBPF in Openshift 4,
- Deploy Single Node OpenShift via BM Installer on Nvidia Jetson AGX,
Containers:
- Setting Up a Remote Podman Service,
- Running Podman Machine on the Mac M1,
- Running Podman machine on macOS,
- Run a Linux virtual machine in Podman,
- Distroless Container Debugging on K8s/OpenShift,
- Kubernetes : two different OCI runtimes,
- Why distroless containers aren’t the security solution you think they are,
- Integrating Amazon EFS with Podman running on Red Hat Enterprise Linux,
- How to run Podman on Windows,
- How to set up a local image repository with Podman,
- Helm Charts from ChartMuseum to Redhat Quay in 5 Steps,
- Top 10 Container Security Best Practices,
- Hadolint: Dockerfile linter, validate inline bash,
Storage:
- How to secure persistent data in a multitenant kubernetes environment,
- Using CSI snapshots to backup and restore your data in Kubernetes (20min),
- OpenShift 4: Red Hat OpenShift Container Storage 4.5 Lab Installation,
- How to deploy OpenShift Container Storage 4 in OCP 4.6 with no GUI involved,
- How to deploy Quay with RHOCS backend on OCP 4.6,
- A look at Red Hat Ceph Storage 5,
Service Mesh:
- How to configure zero trust Authn/Authz with Istio,
- How to get Istio traceability with Grafana Tempo and Grafana Loki,
- The operational overhead of Istio’s External Control Plane,
- Connect Your Services Seamlessly with Amazon EKS Anywhere and Istio,
- Configuration as Data, GitOps, and Controllers: it’s not simple for multi-cluster,
- A Kubernetes engineer’s guide to mTLS,
- OpenShift 4: OSSM Jaeger`s External ElasticSearch,
RHEL:
- Now Available: Multi Target Replication on SAP HANA for Red Hat Enterprise Linux,
- When everything is in the cloud, does the OS matter?
- Navy Linux 8.4r1 Released,
- How to Install Webmin on CentOS 8 and Rocky Linux 8,
- The state of CentOS Stream: Innovation in action,
- How to Install Redis Server on Rocky Linux,
- Reviewing RHEL systems on the Red Hat Customer Portal,
- The Open RAN ecosystem: How Red Hat and partners support NTT DOCOMO to deliver the Open RAN vision,
- Advanced automation and management of Network Bound Disk Encryption with RHEL System Roles,
- CentOS 8 – Tested Hardware & Statistics,
- Minutes for CentOS Board of Directors for 2021-09-08,
- Red Hat Satellite 6.9 with Puma Web Server,
- The service provider edge: Building the case for an open source approach,
- How To Set Up SSH Keys on Rocky Linux 8,
- Initial Server Setup with Rocky Linux 8,
- How to Install Nodejs on Rocky Linux 8.4,
- How To Install and Configure Nagios on CentOS 8,
- How to Install Wikijs on Rocky Linux,
- How to Install and Use MongoDB on Rocky Linux 8,
- How to install, configure and use Nessus Vulnerability Scanner on CentOS 8,
- Red Hat wants to boost HDR support on Linux,
- RHEL/CentOS 7 Fix for Let’s Encrypt Change,
- Installing Rocky Linux 8 (6min),
- Getting started with JBoss,
Certifications:
- Managing Operators with Web Console – Red Hat OpenShift Administration: Red Hat EX280 video lesson (6min),
- 5 Mistakes You Should Avoid During Kubernetes Exam,
- Schedule soon: An update on Red Hat Certification exam extensions,
Miscellaneous:
- Sqlcommenter now extending the vision of OpenTelemetry to databases,
- 8 Linux virsh subcommands for managing VMs on the command line,
- A cloud architect’s guide to operations,
- Five things to know before learning Python,
- 3 must-know Linux commands for text manipulation,
- MAKE MORE with Inkscape – Ink/Stitch,
- Audit user accounts for never-expiring passwords with a Bash script,
- What’s new: Automating ServiceNow with Ansible Automation Platform,
- Debugging Python C extensions with GDB,
- Set the order of task execution in Ansible with these two keywords,
- An illustrated guide to the essentials of mobile computing architecture: Wireless networking,
- How to check for update info and changelogs with rpm-ostree db,
- “Secret” Agent Exposes Azure Customers To Unauthorized Code Execution,
- Shenandoah in OpenJDK 17: Sub-millisecond GC pauses,
- How OpenStack’s Keystone handles authentication and authorization,
- Resolve Python dependencies with Thoth Dependency Monkey,
- Cool happenings in Fedora Workstation land,
- Open source game achievements,
- Quarkus for Spring developers: Getting started,
- Distributed transaction patterns for microservices compared.
Recent Comments