In Defense of the Pet Container, Part 3: Puppies, Kittens and… Containers

In our third and final installment (see: part one & part two), let’s take a look at some high-level use cases for Linux containers as well as finally (finally) defending what I like to call “pet” containers. From a general perspective, we see three repeated high-level use cases for containerizing applications:

  1. The fully orchestrated, multi-container application as you would create in OpenShift via the Red Hat Container Development Kit;
  2. Loosely orchestrated containers that don’t use advanced features like application templates and Kubernetes; and
  3. Pet containers.

Continue reading “In Defense of the Pet Container, Part 3: Puppies, Kittens and… Containers”

Thinking Through an Identity Management Deployment

As the number of production deployments of Identity Management (IdM) grows and as many more pilots and proof of concepts come into being, it becomes (more and more) important to talk about best practices. Every production deployment needs to deal with things like failover, scalability, and performance.  In turn, there are a few practical questions that need to be answered, namely:

  • How many replicas do I need?
  • How should these replicas be distributed between my datacenters?
  • How should these replicas be connected to each other?

The answer to these questions depends on

Continue reading “Thinking Through an Identity Management Deployment”

Configuring and Applying SCAP Policies During Installation

Over the past few decades we have seen great advancements in the IT industry.  In fact, the industry itself seems to be growing at an increasingly faster pace.  However, as the industry grows so to does its evil twin – the figurative sum of all threats to IT security.

On the bright side, along with a steady stream of ever-evolving security issues and threats, there has also been a great effort to mitigate and, when possible, entirely eliminate such threats.  This is accomplished by either fixing the bugs that allowed these issues and threats to exist (in the first place) or by fixing the configurations and protectionary mechanisms of systems so as to prevent attackers from finding success.

As 2015 has been no stranger to news stories about data leakages, various security flaws, and new types of malware – one could easily conclude that “the dark side” is winning this seemingly eternal race.

However, taking the complexity of today’s IT solutions into account

Continue reading “Configuring and Applying SCAP Policies During Installation”

Shaping the Performance of a Linux Distro: Inside Red Hat Enterprise Linux 7

Backstory

Red Hat’s Performance Engineering team is responsible for the performance of many of Red Hat’s products.  We cover existing products such as Red Hat Enterprise Linux, OpenStack Platform, OpenShift and Red Hat Enterprise Virtualization, as well as newer products like Ceph and CloudForms.

Although these days we contribute extensively to Red Hat’s cloud offerings, Red Hat Enterprise Linux remains a core responsibility as the building block for our ecosystem of customers and partners, plus much of Red Hat’s growing product portfolio.

Prior to beginning efforts on Red Hat Enterprise Linux 7 in earnest

Continue reading “Shaping the Performance of a Linux Distro: Inside Red Hat Enterprise Linux 7”

Red Hat Enterprise Linux: Powering the World’s First Big Data Benchmark Results with Cisco

Red Hat and Cisco have a long history of offering joint solutions that benefit our mutual customers and address a gamut of IT challenges, from server sprawl to cloud computing. Both companies consistently foster technological innovation and work towards breaking new ground in computing, including a history of driving world-record performance across a wide range of industry-standard benchmarks.

Industry standard performance benchmarking, driven by groups like TPC and SPEC, goes all the way back to 1988. Many of these benchmarks have driven the development of faster, cheaper, and more efficient computer technologies over the course of the past quarter century.

With over a hundred of benchmark records to its name, Red Hat Enterprise Linux is known to power some of the most

Continue reading “Red Hat Enterprise Linux: Powering the World’s First Big Data Benchmark Results with Cisco”

Final Red Hat Enterprise Linux 5 Beta Now Available

When Red Hat Enterprise Linux 5 was first introduced in 2007, it was done so with an expected seven year lifecycle. Five years later, in 2012, we saw the continued strong adoption of Red Hat Enterprise Linux 5 and decided to extend its seven year lifecycle to 10 years. Now, in 2014, the original retirement year for Red Hat Enterprise Linux 5, we still see an active, dedicated customer base that has come to value this long, predictable lifecycle in addition to the platform’s inherent security, stability, and reliability.

Today, we are pleased to announce beta availability of Red Hat Enterprise Linux 5.11. This release continues to provide system administrators with a secure, stable, and reliable platform for their organization’s enterprise applications.

Continue reading “Final Red Hat Enterprise Linux 5 Beta Now Available”