Red Hat Enterprise Linux Virtual Machines: Access to Random Numbers Made Easy

Having access to quality random numbers is essential for correct and secure operation of operating systems. Operating systems need random numbers from an entropy pool for a variety of tasks, like creating secure SSH or GPG/PGP keypairs, generating random PIDs for processes, generating TCP sequence numbers, and generating UUIDs.

With Red Hat Enterprise Linux 7 we introduced the virtio RNG (Random Number Generator) device that provides KVM virtual machines access to entropy from the host machine.  Red Hat Enterprise Virtualization starting version 3.5 also has exposed this feature.  We have since made improvements to Red Hat Enterprise Linux guests to make the feature easier and more straightforward to use.

A Brief Introduction to virtio and Paravirtualized Devices

virtio is the paravirtualized transport framework for KVM virtual machines. Using the virtio framework, new devices can be

Continue reading “Red Hat Enterprise Linux Virtual Machines: Access to Random Numbers Made Easy”

Red Hat Enterprise Linux Atomic Host Opens New Possibilities for Red Hat Storage Customers

Ready to adopt Red Hat Enterprise Linux Atomic Host? I recommend you visit the Red Hat Storage Blog to learn more about how Red Hat Storage with Ceph & Gluster are compelling storage options for containerized environments.

Red Hat Storage

By Sayan Saha, Sr. Manager, Product Management, Storage & Data Business, Red Hat.

This week Red Hat announced the general availability of Red Hat Enterprise Linux Atomic Host – a host environment optimized to run containerized applications with a minimal footprint. Red Hat Enterprise Linux Atomic Host simplifies maintenance using image-based update and rollback and includes orchestration toolsets such as kubernetes for managing containers across a cluster of hosts. The new Red Hat Enterprise Linux Atomic Host inherits the industry-leading hardware ecosystem, reliability, stability and security the industry has come to expect from Red Hat Enterprise Linux.

What this means for Red Hat Storage customers

This announcement is significant for Red Hat Storage customers on multiple fronts. Workloads running in containers require persistent storage for application code and data. Given the rapid growth in the number of containers within today’s IT shops, software-defined storage has an advantage over traditional storage…

View original post 432 more words

Welcome to the World, Red Hat Enterprise Linux Atomic Host

Today marks an exciting milestone for Red Hat as we share news of the general availability of Red Hat Enterprise Linux 7 Atomic Host, an operating system optimized for running the next generation of applications with Linux containers.

Based on the world’s leading enterprise Linux platform, Red Hat Enterprise Linux Atomic Host enables enterprises to embrace a Red Hat Enterprise Linux Atomic Hostcontainer-based architecture to take advantage of the benefits of development and deployment flexibility and simplified maintenance, without sacrificing performance, stability, security, or the value of Red Hat’s vast certified ecosystem.

An application architecture based on Linux containers requires not only the tools to build and run containers, but also an underlying foundation that is secure, reliable, enterprise-grade, with an established lifecycle designed to meet the ongoing requirements of the enterprise over the long term. The release of Red Hat Enterprise Linux Atomic Host supports Red Hat’s commitment to make Linux containers a stable and reliable component of enterprise IT across the open hybrid cloud.

Red Hat Enterprise Linux 7 Atomic Host provides many benefits, including

Continue reading “Welcome to the World, Red Hat Enterprise Linux Atomic Host”

Active Directory and Identity Management (IdM) Trusts – Exactly Where Are My Users?

As this is my sixth post on Identity Management I thought it would (first) be wise to explain (and link back to) my previous efforts.  My first post kicked off the series by outlining challenges associated with interoperability in the modern enterprise.  My second post explored  how the integration gap between Linux systems and Active Directory emerged, how it was formerly addressed, and what options are available now.  My third post outlined the set of criteria with which one is able to examine various integration options.  And my most recent entries, post four and five, reviewed options for direct and indirect integration, respectively.

Delving deeper into the world of indirect integration (i.e. utilizing a trust-based approach) – two of the biggest questions are often: “Where are my users?” and “Where does authentication actually happen?” As opposed to a solution that relies upon synchronization

Continue reading “Active Directory and Identity Management (IdM) Trusts – Exactly Where Are My Users?”

Top 3 Reasons to Run Container-Based Applications on Red Hat Enterprise Linux 7

As product manager for Red Hat Enterprise Linux 7, part of my job is to ensure that the latest version of our flagship product adheres to our promise of stability, reliability, and security.  In addition, as Red Hat Enterprise Linux 7 is Red Hat’s latest enterprise Linux platform, it also needs to incorporate new innovations in technology to help our customers gain business advantage, reduce costs, and increase efficiency without compromising their existing investments. With this in mind, the Red Hat Enterprise Linux team takes great care in evaluating new technology to ensure that it is introduced in a manner that is minimally intrusive (if at all) and is a natural fit for the platform. Support for Linux containers and the ability to host container-based applications are great examples of this and Red Hat Enterprise Linux 7 stands ready for the challenge.

Creating and operating application containers via process isolation is not a new concept. Red Hat Enterprise Linux 6 sowed the seeds for this way back in 2010 with the introduction of Control Groups (cgroups). Since that time there have been many exciting developments in this area with active participation from Red Hat. Building upon cgroups functionality, enhancements to the kernel combined with an easy-to-use container format (Docker) make now an opportune time to consider deploying container-based applications on Red Hat Enterprise Linux 7.

Here are the top three reasons to consider Red Hat Enterprise Linux 7 as the host for your container-based applications

Continue reading “Top 3 Reasons to Run Container-Based Applications on Red Hat Enterprise Linux 7”

Overview of Indirect Active Directory Integration Using Identity Management (IdM)

The main alternative to direct integration of Linux/UNIX systems into Active Directory (AD) environments is the indirect approach – where Linux systems are first connected to a central server and this server is then somehow connected to AD. This approach is not new. Over the years many environments have deployed LDAP servers to manage their Linux/UNIX systems (using this LDAP server) while users were stored in AD. To reconcile this issue and to enable users from AD to access Linux systems – users and their passwords were routinely synchronized from AD. While this approach is viable – it’s also quite limited and prone to error. In addition, there is little value in having a separate LDAP server. The only reason for such a setup is to have a separation of duties between Linux and Windows administrators. The net result is that the overhead is quite high while the value of such an approach is quite low.

When IdM (Identity Management in Red Hat Enterprise Linux based on FreeIPA technology) emerged, many environments were either considering direct integration or were “in-process” with respect to adoption. How, exactly, does IdM work? IdM provides

Continue reading “Overview of Indirect Active Directory Integration Using Identity Management (IdM)”

Overview of Direct Integration Options

As mentioned in my previous post there are multiple ways to connect a Linux system to Active Directory (AD) directly. With this in mind, let us review the following list of options…

  • The legacy integration option: this is a solution where (likely older) native Linux tools are used to connect to an LDAP server of your choice (e.g. AD).
  • The traditional integration option: this is a solution based on Samba winbind.
  • The third-party integration option: this is a solution based on (proprietary) commercial software.
  • The contemporary integration option: this is a solution based on SSSD.

Legacy Integration Option

In the case of the legacy integration option (see figure above), a Linux system is connected to AD using LDAP for identity lookup and LDAP or Kerberos for authentication. It pretty much solves the problem of basic user authentication. That said, such a solution has the following significant limitations:

Continue reading “Overview of Direct Integration Options”

What’s Moving in the World of POWER?

Linux permanently changed the landscape of the datacenter by creating a community approach to rapid innovation. Its introduction and widespread adoption have fueled a shift from closed to open systems, often times providing greater resiliency than other operating environments. Commodity x86 architectures are only one slice of a much larger market for reliable open source enterprise-class systems – and Linux has for many years been a cross-platform operating system. For example, did you know that Red Hat Enterprise Linux also runs on IBM’s Power Systems (POWER) and z Systems architectures? These options give IT organizations flexibility with respect to hardware for workloads and use cases ranging from big data analytics to cloud computing. Ensuring that Red Hat Enterprise Linux runs on IBM’s Power Systems and z Systems architectures gives our customers a broad range of application and deployment choices.

Red Hat Enterprise Linux for Power and Red Hat Enterprise Linux for System z are built

Continue reading “What’s Moving in the World of POWER?”

Red Hat Enterprise Linux: Powering the World’s First Big Data Benchmark Results with Cisco

Red Hat and Cisco have a long history of offering joint solutions that benefit our mutual customers and address a gamut of IT challenges, from server sprawl to cloud computing. Both companies consistently foster technological innovation and work towards breaking new ground in computing, including a history of driving world-record performance across a wide range of industry-standard benchmarks.

Industry standard performance benchmarking, driven by groups like TPC and SPEC, goes all the way back to 1988. Many of these benchmarks have driven the development of faster, cheaper, and more efficient computer technologies over the course of the past quarter century.

With over a hundred of benchmark records to its name, Red Hat Enterprise Linux is known to power some of the most

Continue reading “Red Hat Enterprise Linux: Powering the World’s First Big Data Benchmark Results with Cisco”

Closing the Integration Gap

This post is the second in a series of blog posts about integrating Linux systems into Active Directory environments. In the previous post we discussed dishwashers and, more seriously, some basic principles. In this post I will continue by exploring how the integration gap between Linux systems and Active Directory emerged, how it was formerly addressed, and what options are available now.

Let’s start with a bit of history… before the advent of Active Directory, Linux and UNIX systems had developed ways to connect to, and interact with, a central LDAP server for identity look-up and authentication purposes. These connections were basic, but as the environments were not overly complex (in comparison to modern equivalents) – they were good enough for the time. Then… AD was born.

Active Directory not only integrated several services (namely: LDAP, Kerberos, and DNS) under one hood, but it also

Continue reading “Closing the Integration Gap”