Language Selection

English French German Italian Portuguese Spanish

Red Hat and SUSE: Openshift, RHEL and Cloudwashing

Filed under
Red Hat
SUSE
  • Using Kubernetes Operators to Manage Let’s Encrypt SSL/TLS Certificates for Red Hat OpenShift Dedicated
  • No Downtime Upgrade for Red Hat Data Grid on Openshift

    In a blog post I wrote on the Red Hat Developer’s Blog, I wrote about multiple layers of security available while deploying Red Hat Data Grid on Red Hat Openshift. Another challenging problem I see for customer is performing a no downtime upgrade for Red Hat Data Grid images (published on Red Hat Container Catalog). That’s what we’re going to tackle in this post.

    If you’re new to it, Red Hat Data Grid is an in-memory, distributed, NoSQL datastore solution. With it, your applications can access, process, and analyze data at in-memory speed designed to deliver a superior user experience compared to traditional data stores like relational databases. In-memory Data Grids have a variety of use cases in today’s environments, such as fast data access for low-latency apps, storing objects (NoSQL) in a datastore, achieving linear scalability with data distribution/partitioning, and data high-availability across geographies.

  • World domination with cgroups in RHEL 8: welcome cgroups v2!

    One of the great things about open source development is that features can be designed and implemented organically and grow and change as needed. However, a drawback is that this methodology can sometimes lead to a hot mess and uncomfortable technical debt.

    In the case of cgroups v1, as the maintainer Tejun Heo admits, "design followed implementation," "different decisions were taken for different controllers," and "sometimes too much flexibility causes a hindrance."

    In short, not all of the controllers behave in the same manner and it is also completely possible to get yourself into very strange situations if you don’t carefully engineer your group hierarchy. Therefore, cgroups v2 was developed to simplify and standardize some of this.

    Let’s take a look at how the two versions are different. I’m going to show two different diagrams - controllers are in yellow blocks and cgroup directories have a grey background.

  • Cloud Strategies in Frankfurt
  • Are We Ready to Ditch the Data Center? [Ed: Perpetuating the myth that when you outsource all business functions to the Pentagon through its partners the servers just vanish and cease to exist]

    Over the past few decades, organizations have come to rely on their own data centers to run business applications, network their users together and for data storage. Initially, these data centers were largely hardware-centric.In the early days, a mainframe and terminals were the order of the day, before we moved onto the RISC/UNIX era, followed more recently by the server sprawl period of commodity X86 servers.
    But now, the whole concept of an organization-owned data center is going through a radical change. It started with virtualization, which separated the direct relationship between application software and the underlying hardware infrastructure. This helped improve server utilization, efficiency, and provisioning speed. The next step towards an even greater level of abstraction is the move to a software-defined infrastructure (SDI), including compute, storage and networking.

More in Tux Machines

DebConf19 invites you to Debian Open Day at the Federal University of Technology - Paraná (UTFPR), in Curitiba

DebConf, the annual conference for Debian contributors and users interested in improving the Debian operating system, will be held in Federal University of Technology - Paraná (UTFPR) in Curitiba, Brazil, from July 21 to 28, 2019. The conference is preceded by DebCamp from July 14 to 19, and the DebConf19 Open Day on July 20. The Open Day, Saturday, 20 July, is targeted at the general public. Events of interest to a wider audience will be offered, ranging from topics specific to Debian to the greater Free Software community and maker movement. The event is a perfect opportunity for interested users to meet the Debian community, for Debian to broaden its community, and for the DebConf sponsors to increase their visibility. Less purely technical than the main conference schedule, the events on Open Day will cover a large range of topics from social and cultural issues to workshops and introductions to Debian. Read more

Sparky Linux 5.8

Today we are looking at Sparky Linux 5.8. This point release of Sparky 5 comes with LXQt 0.14.1, Debian Buster, Linux Kernel 4.19 and uses about 350MB of ram when idling. Sparky Linux LXQt has become one of my favorites, as it has a modern feeling, with the latest of Qt and the stability of Debian, makes it one great combination. Enjoy! Read more Direct/video: Sparky Linux 5.8 Run Through Under an hour ago:

  • What?s next Sparky?

    As before, after releasing a new stable version of Sparky, there are a few changes to do. So… Sparky 4 “Tyche” is moved to oldstable line now. The latest 4.11 release is the last one of the 4 line, but it is still supported, the next 2 years about. Sparky 5 “Nibiru” just released, moving it from testing to stable line. The stable live/install media are available for i686, amd64 & armhf archs (the same as the older release).

Android Leftovers

Fedora and IBM/Red Hat: Network Security Toolkit (NST), Fedora CoreOS and Openwashing at OSCON

  • Network Security Toolkit (NST) 30 SVN 11210, which is Based on Fedora 30

    Network Security Toolkit (NST) is a Linux-based live operating system that provides a set of free and open-source computer security and networking tools to perform routine security and networking diagnostic and monitoring tasks. It is based on Fedora and NST has included comprehensive set of Open Source Network Security Tools, which is published in sectools.org website. It is offering an advanced Web User Interface (GUI) for system/network administrator, which allows them to configure many network and security applications. NST Team is pleased to announce the latest NST release of “NST 30 SVN:11210” on 1th July 2019.

  • Fedora announces the first preview release of Fedora CoreOS as an automatically updating Linux OS for containerized workloads

    Three days ago, Fedora announced the first preview release of the open-source project Fedora CoreOS as a secure and reliable host for computer clusters. It is specifically designed for running containerized workloads with automatic updates to the latest OS improvements, bug fixes, and security updates. It is secure, minimal, monolithic and is optimized for working with Kubernetes. The main goal of Fedora CoreOS is to be a reliable container host to run containerized workloads securely and at scale. It integrates Ignition from Container Linux technology and rpm-ostree and SELinux hardening from Project Atomic Host. Fedora CoreOS is expected to be a successor to Container Linux eventually. The Container Linux project will continue to be supported throughout 2019, leaving users with ample time to migrate and provide feedback. Fedora has also assured Container Linux users that continued support will be provided to them without any disruption. Fedora CoreOS will also become the successor to Fedora Atomic Host. The current plan is for Fedora Atomic Host to have at least a 29 version and 6 months of lifecycle.

  • IBM helps developers use open source and machine learning

    As artificial intelligence and machine learning become more widespread, it's essential that developers have access to the latest models and data sets. Today at the OSCON 2019 open source developer conference, IBM is announcing the launch of two new projects for developers.