Over the past few decades we have seen great advancements in the IT industry. In fact, the industry itself seems to be growing at an increasingly faster pace. However, as the industry grows so to does its evil twin – the figurative sum of all threats to IT security.
On the bright side, along with a steady stream of ever-evolving security issues and threats, there has also been a great effort to mitigate and, when possible, entirely eliminate such threats. This is accomplished by either fixing the bugs that allowed these issues and threats to exist (in the first place) or by fixing the configurations and protectionary mechanisms of systems so as to prevent attackers from finding success.
As 2015 has been no stranger to news stories about data leakages, various security flaws, and new types of malware – one could easily conclude that “the dark side” is winning this seemingly eternal race.
However, taking the complexity of today’s IT solutions into account
Continue reading “Configuring and Applying SCAP Policies During Installation”
The ocean of data coursing through your business can be a blessing or a curse.
If you can use your data to spot opportunities as they appear, it can mean the difference between success and failure. Unfortunately for many companies, key performance indicators and other metrics reporting can involve long waits due to complex legacy systems burdened by large data volumes. The result can be standard reports that take hours or even days—and an inability to deliver custom reports.
How do these companies compensate for slow, inflexible reporting systems? Many end up relying on spreadsheets and manual labor to consolidate information from disparate systems. Is this timely or an efficient use of company manpower? Usually not.
In today’s 24/7, digital world, real-time analytics
Continue reading “Business Intelligence for the Real-Time Enterprise”
The Linux networking stack has many features that are essential for IoT (Internet of Things) and data center networking, such as filtering, connection tracking, memory management, VLANs, overlay, and process isolation. These features come with a small overhead of latency and throughput for tiny packets at line rate.
DPDK (Data Plane Development Kit) allows access to the hardware directly from applications, bypassing the Linux networking stack. This reduces latency and allows more packets to be processed. However, many features that Linux provides are not available with DPDK.
What if there was a way to have ultra low latency and high throughput for some traffic, and full feature-set from Linux networking, all at the same time? This “utopia” is now possible with Queue Splitting (Bifurcated Driver).
Continue reading “Getting the Best of Both Worlds with Queue Splitting (Bifurcated Driver)”
Note: The following post was authored by Alexander Duyck before leaving Red Hat earlier this month. While Alex will be missed, his work continues in the capable hands of the Networking Services team. To this end, I encourage you to “read on” and learn more about how we’ve turned up the heat on kernel networking with the beta release of Red Hat Enterprise Linux 7.2.
Over the last year I have been working at Red Hat as a part of the Linux Kernel Networking Services Team focused on improving the performance of the kernel networking data path. Prior to working at Red Hat I had worked at Intel as a driver maintainer for their server drivers including ixgbe. This has put me in a unique position to be able to provide tuning advice for both the network stack and the Intel device drivers. Last month, at LinuxCon North America, I gave a presentation that summarizes most of the work that has been done to improve network performance in the last year, and the performance gains as seen by comparing Red Hat Enterprise Linux 7.1 versus an early (alpha) release of Red Hat Enterprise Linux 7.2. The following is a recap of what I covered.
Continue reading “Pushing the Limits of Kernel Networking”
From news on the latest Red Hat product releases to essays on the hottest technologies – all authored by some of Red Hat’s best and brightest – the Red Hat Enterprise Linux Blog has been working to surface the information you need. As we worked our way towards two years of posting goodness – we’ve covered everything from kpatch to containers.
That said, we have yet to ask you, our loyal readership, what you want to hear next. So… for a change of pace, we’re asking you to “select your destiny”. How does one go about “selecting their destiny”? The answer is simple: by taking part in this straw poll.
We look forward to your selection!
We are pleased to announce the release of Red Hat Certificate System 9. Supported on Red Hat Enterprise Linux 7.1 and based on the open source PKI capabilities of the Dogtag Certificate System, Red Hat Certificate System 9 provides a robust and flexible set of features to support Certificate Life Cycle Management. It is able to issue, renew, suspend, revoke, archive/recover, and manage the single and dual-key X.509v3 certificates needed to handle strong authentication, single sign-on, and secure communications. Red Hat Certificate System 9 incorporates several new and enhanced features, including
Continue reading “Red Hat Certificate System 9 Now Available”
The format of container images is at the center of industry attention because it is so important to the adoption of containers. With the advent of the Open Container Initiative (OCI), it seems appropriate to compare container images to network protocols. Before TCP/IP became the defacto standard network protocol stack, each vendor was left to devise their own. Some leveraged IPX/SPX, while others standardized on AppleTalk. This made it difficult to create robust tooling. Much like network protocols, standardizing the bit level format of a container image, allows the industry to focus on higher level business problems, and more importantly, their respective solutions.
Continue reading “What is Deep Container Inspection (DCI) and Why is it Important?”
In March, we announced the general availability of Red Hat Enterprise Linux 7.1, the first update to our Red Hat Enterprise Linux 7 platform. In addition, we also announced the general availability of Red Hat Enterprise Linux Atomic Host, our first container-optimized host platform. Today, we are pleased to announce the beta availability of Red Hat Enterprise Linux 7.2.
Red Hat Enterprise Linux 7.2 beta includes a number of new features and enhancements – while continuing to provide the stability, reliability, and security required to meet the demands of both modern datacenters and next-generation IT environments.
Interested in learning more? For more information on the beta release of Red Hat Enterprise Linux 7.2 you can review the release notes in the Red Hat Customer Portal.
Ready to get started? If you’re an existing Red Hat customer (with an active Red Hat Enterprise Linux subscription), you can access and download Red Hat Enterprise Linux 7.2 beta via the Software & Download Center.
With the release of Red Hat Enterprise Linux 6.7, we’re happy to also announce general availability of Red Hat Access Insights, a new hosted service from Red Hat designed to help customers proactively identify and resolve issues that could impact business operations.
Given the complexity and scale of modern IT environments, we recognize that it can be increasingly complicated to monitor, maintain, and secure enterprise infrastructure. By tapping into Red Hat’s collective experience
Continue reading “Exploring Red Hat Access Insights”
The promise of Docker is that it simplifies application deployment, allows greater application density on hosts, and features a portable format that offers unparalleled flexibility over standard packaging. But one thing Docker doesn’t get you is the simplicity of `yum install foo` to install an application. Nor can Docker define or process a directed graph of container orchestration dependencies. We aim to change that.
Continue reading “Announcing “Yum + RPM for Containerized Applications” — Nulecule & Atomic App”