Language Selection

English French German Italian Portuguese Spanish

Red Hat

Fedora 30 Elections Results

Filed under
Red Hat

The Fedora 30 election cycle has concluded. Here are the results for each election. Congratulations to the winning candidates, and thank you all candidates for running in this election!

Read more

Red Hat: Fedora BoF at Red Hat Summit, Volume Cloning Alpha for Kubernetes, Dell/EMC

Filed under
Red Hat
  • Fedora BoF at Red Hat Summit

    Every year, Red Hat holds a conference for customers, partners, and open source contributors — Red Hat Summit.This year’s was last month, in Boston, Massachusetts, and of course Fedora was there. We had our booth in the “Community Central” area of the expo floor, and ran a birds-of-a-feather (BoF) session for open discussion with community members. I was joined by Brian Exelbierd, Ben Cotton, Adam Šamalík, and a dozen members of the Fedora community.

    We used a “lean coffee” format to drive the topics, letting the attendees propose and vote on what we discussed. (It’s basically the same format we use for Fedora Council’s open floor meetings, but in person rather than via IRC.) I expected a lot of questions about the new features of Fedora 30, which was released eight days before. But the community members who came to the BoF seemed pretty well-informed on this. Instead, the most-voted topic was Fedora Modularity.

  • Introducing Volume Cloning Alpha for Kubernetes

    Kubernetes v1.15 introduces alpha support for volume cloning. This feature allows you to create new volumes using the contents of existing volumes in the user’s namespace using the Kubernetes API.

  • How Dell EMC and Red Hat work together on joint solutions

    From virtualization and cloud to enterprise IT optimization and performance, Red Hat and Dell EMC deliver open, cost-effective and highly reliable solutions. Our jointly designed and architected solutions blend the best of Red Hat technology with Dell EMC’s customer-driven innovation to create solutions and services that address real-world needs.

Red Hat and SUSE Leftovers

Filed under
Red Hat
SUSE
  • How a service mesh helps manage distributed microservices

    A service mesh brings security, resiliency, and visibility to service communications, so developers don’t have to

  • RHEL 8: 'the foundation for digital transformation'
  • 7 infrastructure performance and scaling tools you should be using

    Sysadmins, site reliability engineers (SREs), and cloud operators all too often struggle to feel confident in their infrastructure as it scales up. Also too often, they think the only way to solve their challenges is to write a tool for in-house use. Fortunately, there are options. There are many open source tools available to test an infrastructure's performance. Here are my favorites.

  • Future of CRDs: Structural Schemas

    Authors: Stefan Schimanski (Red Hat)

    CustomResourceDefinitions were introduced roughly two years ago as the primary way to extend the Kubernetes API with custom resources. From the beginning they stored arbitrary JSON data, with the exception that kind, apiVersion and metadata had to follow the Kubernetes API conventions. In Kubernetes 1.8 CRDs gained the ability to define an optional OpenAPI v3 based validation schema.

    By the nature of OpenAPI specifications though—only describing what must be there, not what shouldn’t, and by being potentially incomplete specifications—the Kubernetes API server never knew the complete structure of CustomResource instances. As a consequence, kube-apiserver—until today—stores all JSON data received in an API request (if it validates against the OpenAPI spec). This especially includes anything that is not specified in the OpenAPI schema.

  • Redis 5 now available on Red Hat Enterprise Linux 7

    Red Hat Software Collections supply the latest, stable versions of development tools for Red Hat Enterprise Linux via two release trains per year. As part of the latest Software Collections 3.3 release, we are pleased to announce that Redis 5 is now generally available and supported on RHEL 7.

    The new Red Hat Software Collection includes Redis 5.0.3. Redis 5 is an open source in-memory data structure store, used as a database, cache and/or message broker. This version provides multiple enhancements and bug fixes over version 3.2 distributed with an earlier Red Hat Software Collections release. Most notably, the redis-trib cluster management tool has been implemented in the Redis command-line interface.

    The primary addition in Redis 5 is Streams—a new log-like data structure for storing multiple fields and string value with automatic sequencing. For detailed changes in Redis, see the upstream release notes for version 4.0 and version 5.0.

  • Mentoring new system administrators

    While this article is geared toward senior system administrators taking a more active role in the development of newer team members, those readers who are new might find interest in a different view of the world of working with newer systems administrators.

    As a system administrator who has been in the role for a long time, it’s easy to shake a proverbial cane at those newer team members who bother you with inane questions lacking the technical detail needed to provide a complete answer. It would be so easy to gruffly utter a few words to get them to go away, or point out the lack of specificity of the question in such a way as to make them feel so small that they won't talk to you again. I’ve been there, and—being frank—done exactly that.

    I was recently reading a discussion forum where there was an administrator who appeared inexperienced and, apparently, all on his or her own to figure things out. That caused me to think back to my first system administration job, and realize how thankful I am that when I started, I had someone senior who was willing to invest time in helping me become better. This better didn’t come in the form of drilling me with commands or syntax, but with a more Socratic method to help me develop skills that I use almost every day.

    When I first started with the group, whenever I hit an issue, I would go down to Chris’ office with my notepad and pencil and ask him about the problem (sometimes multiple times a day). After about a week of this, I came into his office, as usual, to ask about a system call or something. He didn’t look at me and put his hand up, signaling me to stop.

    After he finished whatever it was he was working on, he turned to me and said, “What research have you done about this question? Man pages? Google searches? -h output?”

    I said, “No, I just came down here to ask you.”

  • SUSE now member of iRODS, Sponsor of User Group Meeting

    This month, SUSE became a member of the iRODS (integrated Rule-Oriented Data System) consortium which is an open source data management software used by research organizations and government agencies worldwide.

    [...]

    iRODS UGM will host 25+ presentations from the user community and the core development team, including use case presentations, live demonstrations, and open discussions about requested iRODS features. They anticipate an audience of 150 participants representing dozens of academic, government, and commercial institutions.

CentOS 7 and RHEL 7 Get Important Linux Kernel Update to Patch SACK Panic Flaws

Filed under
Red Hat
Security

The new Linux kernel security updates patch an integer overflow flaw (CVE-2019-11477) discovered by Jonathan Looney in Linux kernel's networking subsystem processed TCP Selective Acknowledgment (SACK) segments, which could allow a remote attacker to cause a so-called SACK Panic attack (denial of service) by sending malicious sequences of SACK segments on a TCP connection that has a small TCP MSS value.

"While processing SACK segments, the Linux kernel's socket buffer (SKB) data structure becomes fragmented," reads Red Hat's security advisory. "Each fragment is about TCP maximum segment size (MSS) bytes. To efficiently process SACK blocks, the Linux kernel merges multiple fragmented SKBs into one, potentially overflowing the variable holding the number of segments."

Read more

Making Fedora 30

Filed under
Red Hat

Although Fedora 29 released on October 30, 2018, work on Fedora 30 began long before that. The first change proposal was submitted in late August. By my count, contributors made nine separate change proposals for Fedora 30 before Fedora 29 shipped.

Some of these proposals come early because they have a big impact, like mass removal of Python 2 packages. By the time the proposal deadline arrived in early January, the community had submitted 50 change proposals.

Read more

Red Hat's last quarterly report?

Filed under
Red Hat

Soon, IBM will complete its acquisition of Red Hat for $34-billion. But, Red Hat's not resting on its laurels waiting. The company announced its financial results for the first quarter of fiscal year 2020 ended May 31, 2019. With first quarter total revenue of $934 million, up 15 percent year-over-year in USD, or 18 percent in constant currency, Red Hat did quite well.

Still, Wall Street expected Red Hat to report net income of $162.4 million, or 87 cents a share, on sales of $931.6 million after the market closes on Thursday, based on a FactSet survey of 14 analysts. In reality, Red Hat GAAP net income for the quarter was $141 million, or $0.76 diluted earnings per share. Non-GAAP adjusted net income for the quarter was $186 million, or $1.00 diluted EPS.

Not bad. Not bad at all.

Read more

Fedora 30 test on laptop with Nvidia - Back in 2010

Filed under
Red Hat
Hardware
Reviews

I think the results are obvious, and they speak for themselves. Alas, it would seem that if you want to use Fedora with a setup like the above, then you'll be either very lucky or you're going to face a torrent of problems. But then, Linux has always been, to use a somewhat stupid analogy, like saying you should only drive your car on Mondays on roads that have green sidewalks, and then you will be fine. The whole not-our-problem, use hardware that's "friendly" is nonsense, because people don't have infinite money, choice or expertise, especially since alternative operating systems offer all they need, plus a full range of hardware freedom.

My Fedora 30 test on the G50 was decent - that's a simple Intel graphics box - but even that one used to have millions of problems with Linux - Fedora wouldn't boot until I'd done a BIOS update, and for three years, almost every distro had network disconnect problems. On this box, we're seeing more of what I showed you in the Fedora 29 test. Fedora and Nvidia graphics are not a good fit. Add to that my home dir import woes, the performance woes, the Wireless woes, you get the picture. Feels like we've gone back many years into the past. I'd actually prefer if distros WARNED that the device is not certified or approved or expected to work and refuse to install, than install and then throw a whole bucket of hissy. I will still run an in-vivo upgrade on the Lenovo machine, because that's what I promised to do, but this is a big, big disappointment.

Read more

Red Hat and SUSE Leftovers

Filed under
Red Hat
SUSE
  • Are DevOps certifications valuable? 10 pros and cons
  • Kubernetes 1.15: Enabling the Workloads

    The last mile for any enterprise IT system is the application. In order to enable those applications to function properly, an entire ecosystem of services, APIs, databases and edge servers must exist. As Carl Sagan once said, “If you wish to make an apple pie from scratch, you must first invent the universe.”

    To create that IT universe, however, we must have control over its elements. In the Kubernetes universe, the individual solar systems and planets are now Operators, and the fundamental laws of that universe have solidified to the point where civilizations can grow and take root.

    Discarding the metaphor, we can see this in the introduction of Object Count Quota Support For Custom Resources. In English, this enables administrators to count and limit the number of Kubernetes resources across the broader ecosystem in a given cluster. This means services like Knative, Istio, and even Operators like the CrunchyData PostgreSQL Operator, the MongoDB Operator or the Redis Operator can be controlled via quota using the same mechanisms that standard Kubernetes resources have enjoyed for many releases.

    That’s great for developers, who can now be limited by certain expectations. It would not benefit the cluster for a bad bit of code to create 30 new PostgreSQL clusters because someone forgot to add a “;” at the end of a line. Call them “guardrails” that protect against unbounded object growth in your etcd database.

  • Red Hat named HPE’s Partner of the Year at HPE Discover 2019

    For more than 19 years, Red Hat has collaborated with HPE to develop, deliver and support trusted solutions that can create value and fuel transformation for customers. Our work together has grown over these nearly two decades and our solutions now include Linux, containers and telecommunications technologies, to name just a few. As a testament to our collaboration, HPE has named Red Hat the Technology Partner of the Year 2019 for Hybrid Cloud Solutions.

  • Demystifying Containers – Part II: Container Runtimes

    This series of blog posts and corresponding talks aims to provide you with a pragmatic view on containers from a historic perspective. Together we will discover modern cloud architectures layer by layer, which means we will start at the Linux Kernel level and end up at writing our own secure cloud native applications.
    Simple examples paired with the historic background will guide you from the beginning with a minimal Linux environment up to crafting secure containers, which fit perfectly into todays’ and futures’ orchestration world. In the end it should be much easier to understand how features within the Linux kernel, container tools, runtimes, software defined networks and orchestration software like Kubernetes are designed and how they work under the hood.

  • Edge > Core > Cloud: Transform the Way You Want

    For more than 25 years, SUSE has been very successful in delivering enterprise-grade Linux to our customers. And as IT infrastructure has shifted and evolved, so have we. For instance, we enabled and supported the move to software-defined data centers as virtualization and containerization technologies became more prevalent and data growth demanded a new approach.

  • SUSE OpenStack Cloud Technology Preview Takes Flight

    We are pleased to announce that as of today we are making a technology preview of a containerized version of SUSE OpenStack Cloud available that will demonstrate a future direction for our product. The lifecycle management for this technology preview is based on an upstream OpenStack project called Airship, which SUSE has been using and contributing to for some time. This follows our open / open policy of upstream first and community involvement.

Red Hat Enterprise Linux 8 GNOME and display server changes

Filed under
Red Hat
GNOME

Red Hat Enterprise Linux 8 contains some important changes regarding the GNOME graphical interface and the default display server. If you are using a graphical desktop in RHEL 8, the most visible change will be that, by default, the GNOME Shell interface is used. This interface has a different appearance and operation compared to GNOME Classic, the default graphical interface in RHEL 7.

Here, we will cover an overview of the GNOME Shell interface in RHEL 8, and also how to switch to the GNOME Classic interface that is similar to the default interface on RHEL 7. We will also cover the new default display server, Wayland, and how to switch the display server to X.org X11 if needed. Another notable change in RHEL 8 is that the KDE Plasma interface has been removed.

Read more

Red Hat welcomes Oracle to the oVirt community

Filed under
Red Hat
Server

On behalf of the oVirt community, its contributors and Red Hat, we welcome Oracle to the oVirt community. oVirt is the open source component that enables management of the Linux Kernel Virtual Machine (KVM), the hypervisor for virtualized environments running on the Linux kernel.

At Red Hat, we believe that upstream collaboration drives innovation, even among competitors. To this end, Red Hat has a 10+ year tenure of thought leadership, contributions and collaboration in the oVirt and KVM communities. Our development and release processes are designed to ensure that Red Hat contributions to these communities are pushed upstream so the benefits gained from our efforts are available to the community at large and available for any and all to draw from.

Read more

Also: IBM-Powered Supercomputers Lead Semi-Annual Rankings

Syndicate content

More in Tux Machines

Official x86 Zhaoxin Processor Support Is Coming With Linux 5.3

Zhaoxin is the company producing Chinese x86 CPUs created by a joint venture between VIA and the Shanghai government. The current Zhaoxin ZX CPUs are based on VIA's Isaiah design and making use of VIA's x86 license. With the Linux 5.3 kernel will be better support for these Chinese desktop x86 CPUs. Future designs of the Zhaoxin processors call for 7nm manufacturing, PCI Express 4.0, DDR5, and other features to put it on parity with modern Intel and AMD CPUs. It remains to be seen how well that will work out, but certainly seems to be moving along in the desktop/consumer space for Chinese-built x86 CPUs while in the server space there's the Hygon Dhyana EPYC-based processors filling the space for Chinese servers. Read more

Security Leftovers

  • OpenSSH adds protection against Spectre, Meltdown, RAMBleed

    OpenSSH, a widely used suite of programs for secure (SSH protocol-based) remote login, has been equipped with protection against side-channel attacks that could allow attackers to extract private keys from memory.

  • How to take the pain out of patching Linux and Windows systems at scale

    Patching can be manually intensive and time-consuming, requiring large amounts of coordination and processes. Tony Green gives the best tips.

  • Removal of IBRS mitigation for Spectre Variant2

    As the Meltdown and Spectre attacks were published begin of January 2018, several mitigations were planned and implemented for Spectre Variant 2.

  • Go and FIPS 140-2 on Red Hat Enterprise Linux

    Red Hat provides the Go programming language to Red Hat Enterprise Linux customers via the go-toolset package. If this package is new to you, and you want to learn more, check out some of the previous articles that have been written for some background. The go-toolset package is currently shipping Go version 1.11.x, with Red Hat planning to ship 1.12.x in Fall 2019. Currently, the go-toolset package only provides the Go toolchain (e.g., the compiler and associated tools like gofmt); however, we are looking into adding other tools to provide a more complete and full-featured Go development environment. In this article, I will talk about some of the improvements, changes, and exciting new features for go-toolset that we have been working on. These changes bring many upstream improvements and CVE fixes, as well as new features that we have been developing internally alongside upstream.

  • Check your password security with Have I Been Pwned? and pass

    Password security involves a broad set of practices, and not all of them are appropriate or possible for everyone. Therefore, the best strategy is to develop a threat model by thinking through your most significant risks—who and what you are protecting against—then model your security approach on the activities that are most effective against those specific threats. The Electronic Frontier Foundation (EFF) has a great series on threat modeling that I encourage everyone to read. In my threat model, I am very concerned about the security of my passwords against (among other things) dictionary attacks, in which an attacker uses a list of likely or known passwords to try to break into a system. One way to stop dictionary attacks is to have your service provider rate-limit or deny login attempts after a certain number of failures. Another way is not to use passwords in the "known passwords" dataset.

SUSE: Release of SUSE CaaS Platform, SUSE Enterprise Storage, SUSE Linux Enterprise 15 Service Pack 1 and More

  • SUSE CaaS Platform 4.0 Beta 3 is out!

    SUSE CaaS Platform 4.0 is built on top of SLE 15 SP1 and requires either the JeOS version shipped from the product repositories or a regular SLE 15 SP1 installation. Please note that SLE 15 SP1 is now officially out! Check out the official announcement for more information. Thus you should not use a SLES 15 SP1 environment with the SLE Beta Registration Code anymore. Because the SLE Beta Registration Code has expired now, but you can either use your regular SLE Registration Code or use a Trial.

  • SUSE Enterprise Storage 6 Now Available

    With the current increase in data creation, increased costs and flat to lower budgets, IT organizations are looking for ways to deploy highly scalable and resilient storage solutions that manage data growth and complexity, reduce costs and seamlessly adapt to changing demands. Today we are pleased to announce the general availability of SUSE Enterprise Storage 6, the latest release of the award-winning SUSE software-defined storage solution designed to meet the demands of the data explosion.

  • What’s New for SUSE Linux Enterprise Server for Arm 15 SP1

    Happy Birthday! It’s been 1 year since we introduced the world’s first multimodal OS supporting 64-bit Arm systems (AArch64 architecture), SUSE Linux Enterprise Server for Arm 15. Enterprise early adopters and developers of Ceph-based storage and industrial automation systems can gain faster time to market for innovative Arm-based server and Internet of Things (IoT) solutions. SUSE Linux Enterprise Server for Arm is tested with a broad set of Arm System-on-a-Chip (SoC) processors, enabling enterprise-class security and greater reliability. And with your choice of Standard or Premium Support subscriptions you can get the latest security patches and fixes, and spend less time on problem resolution as compared to maintaining your own Linux distribution.

  • Are you ready for the world’s first Multimodal Operating System

    Today, SUSE releases SUSE Linux Enterprise 15 Service Pack 1, marking the one-year anniversary since we launched the world’s first multimodal OS. SUSE Linux Enterprise 15 SP1 advances the multimodal OS model by enhancing the core tenets of common code base, modularity and community development while hardening business-critical attributes such as data security, reduced downtime and optimized workloads.

  • The future of OpenStack?

    Before we can answer these questions, let’s take a look at its past to give some context. Since its original release in 2010 as a joint venture by Rackspace and NASA, and its subsequent spin-off into a separate open source foundation in 2012, OpenStack has seen growth and hype that was almost unparalleled. I was fortunate enough to attend the Paris OpenStack Summit in 2014, where Mark Collier was famously driven onto stage for a keynote in one of the BMW electric sports cars. The event was huge and was packed with attendees and sponsors – almost every large technology company you can think of was there. Marketing budget had clearly been splurged in a big way on this event with lots of pizazz and fancy swag to be had from the various vendor booths. Cycle forward 4 years to the next OpenStack Summit I attended – Vancouver in May 2018. This was a very different affair – most of the tech behemoths were no longer sponsoring, and while there were some nice pieces of swag for attendees to take home, it was clear that marketing budgets had been reduced as the hype had decreased. There were less attendees, less expensive giveaways, but that ever-present buzz of open source collaboration that has always been a part of OpenStack was still there. Users were still sharing their stories, and developers and engineers were sharing their learnings with each other, just on a slightly smaller scale.

  • SUSE Academic Program to be present at 2019 UCISA SSG Conference

    Engaging with the community has always been important for SUSE and this is no different for our Academic Program. That is why next week, the SUSE Academic Program is excited to attend and participate in a three day event hosted by one of the most respected networks in UK education.

Glen Barber: Statement regarding employment change and roles in the [FreeBSD] Project

Dear FreeBSD community:

As I have a highly-visible role within the community, I want to share
some news.  I have decided the time has come to move on from my role
with the FreeBSD Foundation, this Friday being my last day.  I have
accepted a position within a prominent company that uses and produces
products based on FreeBSD.

My new employer has included provisions within my job description that
allow me to continue supporting the FreeBSD Project in my current
roles, including Release Engineering.

There are no planned immediate changes with how this pertains to my
roles within the Project and the various teams of which I am a member.

FreeBSD 11.3 and 12.1 will continue as previously scheduled, with no
impact as a result of this change.

I want to thank everyone at the FreeBSD Foundation for providing the
opportunity to serve the FreeBSD Project in my various roles, and their
support for my decision.

I look forward to continue supporting the FreeBSD Project in my various
roles moving forward.

Glen
Read more Also: FreeBSD's Release Engineering Lead Departs The Foundation