Kubernetes:
- How to manage all my K8s secrets in git securely with Bitnami Sealed Secrets,
- Breaking Changes in Argo CD 2.4,
- Continuous Development on Kubernetes with GitOps Approach,
- Kubernetes Security Profiles Operator v0.4.3 release announcement,
- How to manage Kubernetes secrets with GitOps?
- Kubernetes Autoscaling: Getting Started + Examples,
- Kyverno v1.7.0 is here! Mutate and generate existing resources and tons more!
- Kube-green: a k8s operator to reduce CO2 footprint of your clusters,
- Pod-lifetime-limiter: a Kubernetes operator that allows to set maximum lifetime for pods,
- Kubernetes 1.24: Avoid Collisions Assigning IP Addresses to Services,
- Argo CD Best Practices,
- A Deep Dive Into the Four Types of Prometheus Metrics,
- A deep dive into OpenTelemetry metrics,
- Helm Teller: A Helm chart to manage configuration and secrets from multiple provider while masking the secrets at the deployment,
- Kubernetes security risks that keep developers up at night,
- 4 tips for achieving better security on Kubernetes,
- Streaming Kubernetes Events in Slack,
- Kubernetes 1.24: Maximum Unavailable Replicas for StatefulSet,
- How to Troubleshoot Applications on Kubernetes,
- How to deploy and distribute the workload on a multi-cloud Kubernetes environment,
- Redesigning Kubernetes Cluster Autoscaling using Karpenter for Intelligent Node Provisioning and Service Defragmentation,
- RKE vs. RKE2: Comparing Kubernetes Distros,
- Varnish-operator: Run and manage Varnish clusters on Kubernetes,
- How to Model Your Gitops Environments and Promote Releases between Them,
OpenShift:
- OpenShift GitOps – Enable your Developers to Deploy Applications Seamlessly Through ArgoCD,
- A Guide to Core Dump Handling in OpenShift,
- A Guide to OpenShift Machine Pool Design Strategies for Red Hat OpenShift Data Science,
- Backup and Restore Hub Clusters with Red Hat Advanced Cluster Management for Kubernetes,
- How to use Tekton to set up a CI pipeline with OpenShift Pipelines,
- Red Hat Advanced Cluster Management 2.5 release announcement,
- Eliminate downtime during OpenShift rolling updates,
- How to use Argo CD to set up a CD pipeline with OpenShift Pipelines,
- Get started with Red Hat OpenShift Connectors,
- Kubernetes Operators: good security practices,
- Example of Deploying a Windows VM from a Template Using Openshift Virtualization,
- Installing Openshift on GCP (6min),
- How to Backup and Restore ACM with OADP and MinIO,
- Red Hat OpenShift Dev Spaces 3.0 is out!
- Azure Red Hat OpenShift (ARO) documentation / pdf,
- Manage Redhat MicroShift Cluster through Shipa,
- How we use eBPF to observe OpenShift network metrics,
- Free eBook: Getting started with Azure Red Hat OpenShift,
- How to Deploy RHCS Using Minimum Hardware and Making it Work for Multiple OCP Clusters via ODF,
- A Guide to Going From Zero to OpenShift Cluster with GitOps,
- Updating Custom Images When Dependencies Are Updated,
- Learn about OpenShift command-line tools,
Containers:
- Containers vulnerability risk assessment,
- How to Build Container Images in Isolated Environments using Red Hat OpenShift Sandboxed Containers,
- Podman Compose or Docker Compose: Which should you use in Podman?
Service Mesh:
- eBPF, sidecars, and the future of the service mesh,
- Update Istio the GitOps way,
- Scaling Production Globally: The service mesh facelift (Part-1),
- Scaling Production Globally: Solving observability problems for developers (Part-2),
- Jaeger Tracing: A Friendly Guide for Beginners,
- Introducing native support for OpenTelemetry in Jaeger,
- Service mesh at scale: How Xbox Cloud Gaming secures 22k pods with Linkerd,
- CNCF Service Mesh MicroSurvey,
RHEL:
- Inside Ansible Automation Platform’s Automation Services Catalog,
- Configuring virt-who with vSphere to report hypervisor host information to the Red Hat customer portal,
- Thousands of PyPI and RubyGems RPMs now available for RHEL 9,
- Red Hat Enterprise Linux 9.0 Performing Well, Great Benefit To Newer Intel Xeon & AMD EPYC Servers,
- Getting a list of fixes for a Red Hat product between two dates is easy with daysofrisk.pl,
- 8 private automation hub features about automation execution environments,
- How to enable live kernel patching on Linux,
- Pump-Up your ITIL with Automation,
- Using Multipath TCP to better survive outages and increase bandwidth,
- “Legacy” cryptography in Fedora 36 and Red Hat Enterprise Linux 9,
- Red Hat Ansible Automation Platform on Microsoft Azure – Network Access – blog #1,
- Red Hat Ansible Automation Platform on Microsoft Azure – Network Access – blog #2,
- TrustyAI – an open source project looking to solve AI’s bias,
- AlmaLinux 9 Running Well, Performance On Par With RHEL 9.0,
- How to interrupt the Linux boot process,
- Save time and money with Red Hat Insights Compliance reporting,
- Using cloud, application and data services—plus other hosted tools—in the Red Hat Hybrid Cloud Console,
- Common Security Advisory Framework (CSAF) beta files now available,
- Deploy enterprise applications on Red Hat Enterprise Linux in Microsoft Azure,
Certifications:
- CKAD Scenarios about Ingress and NetworkPolicy,
- Learn OpenShift – A Comprehensive Guide for OpenShift Courses and Exams,
- Upskill on RHEL 9,
Miscellaneous:
- What’s new in version 2.7 of the Red Hat build of Quarkus,
- Kafka Monthly Digest: May 2022,
- How to configure chrony as an NTP client or server in Linux,
- How to debug stack frames and recursion in GDB,
- How to use Keycloak to configure SSO and MFA for command-line applications,
- 9 awesome updates in Cryostat 2.1,
- 5 Vim features for power users,
- Detecting nondeterministic test cases with Bunsen,
- Git Cheat Sheet,
- Test API interactions with Mockoon,
- How to get your application to show up in GNOME Software,
- A quick way to translate physical addresses into virtual ones,
- How to install JupyterLab on Linux,
- Use OpenVINO to convert speech to text,
- Grafana 9.0: Prometheus and Grafana Loki visual query builders, new navigation, improved workflows, heatmap panels, and more!
- Fedora vs Ubuntu: What are the key differences?
- KDE Plasma 5.25 is out!
- Best practices for successful DevSecOps,
- OpenSSL 3.0: Dealing with a Turkish locale bug,
- Free System Design PDF,
- Data and System Visualization Tools That Will Boost Your Productivity,
- Post-quantum cryptography, an introduction,
- How to convert a web application to Software-as-a-Service,
- How to configure Network File System on Linux,
- Hardening Virtio for emerging security usecases.
Recent Comments