Note: The following post was authored by Alexander Duyck before leaving Red Hat earlier this month. While Alex will be missed, his work continues in the capable hands of the Networking Services team. To this end, I encourage you to “read on” and learn more about how we’ve turned up the heat on kernel networking with the beta release of Red Hat Enterprise Linux 7.2.
Over the last year I have been working at Red Hat as a part of the Linux Kernel Networking Services Team focused on improving the performance of the kernel networking data path. Prior to working at Red Hat I had worked at Intel as a driver maintainer for their server drivers including ixgbe. This has put me in a unique position to be able to provide tuning advice for both the network stack and the Intel device drivers. Last month, at LinuxCon North America, I gave a presentation that summarizes most of the work that has been done to improve network performance in the last year, and the performance gains as seen by comparing Red Hat Enterprise Linux 7.1 versus an early (alpha) release of Red Hat Enterprise Linux 7.2. The following is a recap of what I covered.
Continue reading “Pushing the Limits of Kernel Networking”
From news on the latest Red Hat product releases to essays on the hottest technologies – all authored by some of Red Hat’s best and brightest – the Red Hat Enterprise Linux Blog has been working to surface the information you need. As we worked our way towards two years of posting goodness – we’ve covered everything from kpatch to containers.
That said, we have yet to ask you, our loyal readership, what you want to hear next. So… for a change of pace, we’re asking you to “select your destiny”. How does one go about “selecting their destiny”? The answer is simple: by taking part in this straw poll.
We look forward to your selection!
We are pleased to announce the release of Red Hat Certificate System 9. Supported on Red Hat Enterprise Linux 7.1 and based on the open source PKI capabilities of the Dogtag Certificate System, Red Hat Certificate System 9 provides a robust and flexible set of features to support Certificate Life Cycle Management. It is able to issue, renew, suspend, revoke, archive/recover, and manage the single and dual-key X.509v3 certificates needed to handle strong authentication, single sign-on, and secure communications. Red Hat Certificate System 9 incorporates several new and enhanced features, including
Continue reading “Red Hat Certificate System 9 Now Available”
The format of container images is at the center of industry attention because it is so important to the adoption of containers. With the advent of the Open Container Initiative (OCI), it seems appropriate to compare container images to network protocols. Before TCP/IP became the defacto standard network protocol stack, each vendor was left to devise their own. Some leveraged IPX/SPX, while others standardized on AppleTalk. This made it difficult to create robust tooling. Much like network protocols, standardizing the bit level format of a container image, allows the industry to focus on higher level business problems, and more importantly, their respective solutions.
Continue reading “What is Deep Container Inspection (DCI) and Why is it Important?”
In March, we announced the general availability of Red Hat Enterprise Linux 7.1, the first update to our Red Hat Enterprise Linux 7 platform. In addition, we also announced the general availability of Red Hat Enterprise Linux Atomic Host, our first container-optimized host platform. Today, we are pleased to announce the beta availability of Red Hat Enterprise Linux 7.2.
Red Hat Enterprise Linux 7.2 beta includes a number of new features and enhancements – while continuing to provide the stability, reliability, and security required to meet the demands of both modern datacenters and next-generation IT environments.
Interested in learning more? For more information on the beta release of Red Hat Enterprise Linux 7.2 you can review the release notes in the Red Hat Customer Portal.
Ready to get started? If you’re an existing Red Hat customer (with an active Red Hat Enterprise Linux subscription), you can access and download Red Hat Enterprise Linux 7.2 beta via the Software & Download Center.
With the release of Red Hat Enterprise Linux 6.7, we’re happy to also announce general availability of Red Hat Access Insights, a new hosted service from Red Hat designed to help customers proactively identify and resolve issues that could impact business operations.
Given the complexity and scale of modern IT environments, we recognize that it can be increasingly complicated to monitor, maintain, and secure enterprise infrastructure. By tapping into Red Hat’s collective experience
Continue reading “Exploring Red Hat Access Insights”
The promise of Docker is that it simplifies application deployment, allows greater application density on hosts, and features a portable format that offers unparalleled flexibility over standard packaging. But one thing Docker doesn’t get you is the simplicity of `yum install foo` to install an application. Nor can Docker define or process a directed graph of container orchestration dependencies. We aim to change that.
Continue reading “Announcing “Yum + RPM for Containerized Applications” — Nulecule & Atomic App”
Today, we are pleased to announced the general availability of Red Hat Directory Server 10, the latest version of Red Hat’s open source, network-based registry server. Built on the technologies delivered by the 389 Directory Server project, Red Hat Directory Server offers a Lightweight Directory Access Protocol (LDAP)-compliant server that centralizes critical application information, simplifies user management and enhances security across an entire organization.
As a tool for building business applications, Red Hat Directory Server provides
Continue reading “Red Hat Directory Server 10 Now Generally Available”
Two-factor authentication, or 2FA, is not something new. It has existed for quite some time and in different forms. What is a ‘factor’? A factor is something you have, something you know, or something you are. For example, if we combine a PIN that you know, with your fingerprint, we get a 2FA based on biometrics. In practice, biometric solutions are not often used because it’s not especially difficult to steal someone’s fingerprint (…and it is quite hard to revoke or replace your finger). The more practical approach to two-factor authentication is to combine something you know, a PIN or password, with something you have.
Something you have often comes in form of
Continue reading “Identity Management and Two-Factor Authentication Using One-Time Passwords”
Identity Management (IdM) in Red Hat Enterprise Linux includes an optional Certificate Authority (CA) component. This CA is the same CA included with the Red Hat Certificate System (RHCS). If they’re the same, what is the relationship between IdM and RHCS? Is there a secret plan to replace one with another? This post reviews some of the details associated with each of the offerings and explores different use cases – indicating where you might choose to use one solution over the other.
Continue reading “Identity Management and Certificates”