Kubernetes:
- Running Vault and Consul on Kubernetes,
- Is Vanilla Kubernetes Really Too Heavy For The Raspberry Pi?
- The Business Case for Kubernetes,
- Running K3S workload in a restricted environment,
- Generating Kubernetes Network Policies Automatically By Sniffing Network Traffic,
- Kubernetes Kpt in The Wild: What it is and how to use it,
- 47 Things To Become a Kubernetes Expert,
- Kubernetes API Priority and Fairness,
- NFS Subdirectory External Provisioner Helm Chart,
- Shell-operator: a tool for running event-driven scripts in a Kubernetes cluster,
- Comparing Kubernetes operators for PostgreSQL,
- Kubernetes Pod Tolerations and Postgres Deployment Strategies,
- Deploying Talos and Kubernetes with Cluster-API on Equinix Metal,
- Building a real-time leaderboard with Red Hat Data Grid and Quarkus on a hybrid Kubernetes deployment,
- Detect intrusions that happened in your Kubernetes cluster through audit logs using Falco,
- How etcd works and 6 tips to keep in mind,
- Kubernetes Kpt in The Wild: What it is and how to use it,
- 10 Kubernetes Security Context settings you should understand,
- Using Intel vGPUs with Kubevirt,
- Kubernetes Readiness Probes – Examples & Common Pitfalls,
- Introduction to Kubernetes Operators,
- Architecting Kubernetes clusters – choosing the best autoscaling strategy,
- Kubernetes architecture and what it means for security,
- Create Kubernetes federated clusters on AWS,
OpenShift:
- A free Red Hat Developer Subscription allows you to deploy an OpenShift cluster up to 16 nodes for more than 60 days (it’s not an evaluation version),
- Lessons Learned from Migrating 3,000 Apps From PCF to OpenShift (50min) / slides,
- Crane 1.5.0 Feature: Faster OpenShift app migrations with cached clients (4min),
- DevSecOps compliance: Make your auditor’s job easier!
- Operationalizing Kubeflow in OpenShift,
- Real-time debugging in Tekton pipelines,
- Installing OKD 4,
- Zero-Touch Declarative Rehosting of Legacy Monolith Applications to OpenShift Virtualization,
- OCP Disaster Recovery Part 2: Recovering an OpenShift 4 IPI cluster With the Loss of One Master Node,
- A Brief Introduction to Red Hat Advanced Cluster Security for Kubernetes,
- Troubleshooting OpenShift Bootstrap Failures,
- Ask an OpenShift Admin Office Hour – Subscription Comparison, Licensing & Entitlements,
- Customizing Virtual Machine Templates in OpenShift,
- How to update to newer Red Hat OpenShift 4 releases,
- How to install Kubeflow 1.2 on Red Hat OpenShift,
- Learn Quarkus faster with quick starts in the Developer Sandbox for Red Hat OpenShift,
- How to rock CI/CD with Azure DevOps and OpenShift in 6 easy steps,
- Gatekeeper Mutations,
- Network Policies: Controlling Cross-Project Communication on OpenShift,
- Discovering OpenShift Resources in Quarkus,
- Building Cloud Native Data Analytic Services for the Edge,
- Ask an OpenShift Admin Office Hour – Alertmanager configuration and customization,
- CVE-2021-30465 Mitigated by Default in OpenShift,
Containers:
- Container Scanning: How to Connect Snyk With Red Hat Quay,
- Top 20 Dockerfile best practices,
- Podman 3 and Docker Compose – How Does the Dockerless Compose Work? (3min),
- Using files and devices in Podman rootless containers,
- A guide to operating systems for Kubernetes,
- Using runc to explore the OCI Runtime Specification,
- Red Hat Universal Base Image and Docker Hub: Why should developers care?
- The worst so-called “best practice” for Docker,
- Reverse Engineering a Docker Image,
- DockerSlim: A tool to minify your Docker image,
- New container feature: Volatile overlay mounts,
- Running Testcontainers in OpenShift Pipelines With Docker-in-Docker,
- Buildpacks vs Dockerfiles,
Service Mesh:
RHEL:
- Visualizing performance in Red Hat Enterprise Linux 8.4 web console,
- Minutes for CentOS Board of Directors for 2021-05-12,
- Red Hat Satellite 6.9.2 has been released,
- Capture detailed analytics with the custom metrics policy in Red Hat 3scale API Management,
- Actionable threat intelligence for publicly known exploits for RHEL,
- Security automation for digital transformation,
- AlmaLinux OS 8.4 Stable Now Available,
- How to set up a Pacemaker cluster for high availability Linux,
- How to enhance Linux user security with Pluggable Authentication Module settings,
- Steps for converting from CentOS Linux with Convert2RHEL and Red Hat Satellite,
- Network-Bound Disk Encryption improvements in RHEL 8,
- Integrate Red Hat Fuse 7 on Apache Karaf with Red Hat AMQ 7,
- Red Hat Software Collections 3.7 and Red Hat Developer Toolset 10.1 now generally available,
Certifications:
Miscellaneous:
- Node.js Reference Architecture, Part 2: Logging in Node.js,
- Fedora Podcast is back,
- What is the Fedora 34 RAW Image. Part One,
- What is the Fedora 34 RAW Image. Part Two,
- Event-driven architecture: Understanding the essential benefits,
- Can we consider –editable a bad practice?
- Introducing AWS Application Cost Profiler, offering user-based cost data of shared AWS resources,
- The pros and cons of the Strangler architecture pattern,
- A practical view of the xargs command,
- How to create a better front-end developer experience,
- The pros and cons of the Saga architecture pattern,
- Simulating CloudEvents with AsyncAPI and Microcks,
- 7 Linux networking commands that every sysadmin should know.
Recent Comments