If you’re working with container images on Red Hat Enterprise Linux 7.1 or Red Hat Enterprise Linux Atomic Host, you might have noticed that the search and pull behavior of the included docker tool works slightly differently than it does if you’re working with that of the upstream project. This is intentional.
When we started the planning process for containers in RHEL 7.1, we had 3 goals in mind:
- Give control over the search path to the end-user administrator
- Enable a federated approach to search and discovery of docker-formatted container images
- Support the ability for Red Hat customers to consume container images and other content included as part of their Red Hat Subscription
The changes we implemented, which are documented on the Red Hat Customer Portal, affect three different areas of the tool:
Continue reading “Understanding the Changes to ‘docker search’ and ‘docker pull’ in Red Hat Enterprise Linux 7.1”
What if you could run your existing Red Hat Enterprise Linux 6 applications on Red Hat Enterprise Linux 7 without porting or making changes to your source code? Today, we are pleased to announce the immediate availability of the Red Hat Enterprise Linux 6 platform image, which allows for the creation of Red Hat Enterprise Linux 6-based application containers. Applications that have been developed, tested, and certified for Red Hat Enterprise Linux 6 systems can now be deployed as a container and run on Red Hat Enterprise Linux 7 as a container host.
This new platform image allows customers to
Continue reading “Containerize Red Hat Enterprise Linux 6 Applications to Run on Red Hat Enterprise Linux 7”
Last week, as Red Hat Enterprise Linux 7 was making waves, the Red Hat Developer Blog posted Part 1 of an interview with Gene Kim, award-winning CTO and co-author of “The Phoenix Project”, and Red Hat IT’s DevOps Enablement team.
If you’re interested in learning more about Red Hat’s newly formed DevOps Enablement team – Part 2 is now available!
In followup to last week’s announcement, the Red Hat Enterprise Linux 7 Release Candidate (RC) is now publicly available for testing.
Vital for helping Red Hat’s strategic partners facilitate full certification of their applications and systems with Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 7 RC is now accessible to all interested parties, from end users to enterprises, seeking to gain insight into how Red Hat redefines the enterprise operating system.
Continue reading “Now Available: Red Hat Enterprise Linux 7 Release Candidate”
Distributed Denial of Service (DDoS) attacks are becoming increasingly commonplace as business becomes more and more dependent on delivering services over the Internet. One of the most common types of DDoS attacks is the well-known SYN-flood attack. It is a basic end-host resource attack designed to bring your server to its knees. As a result, your server is unable to properly handle any new incoming connection requests.
Recently at DevConf.cz 2014, I gave a talk focusing on how you can survive TCP SYN-flooding attacks by implementing some recently developed kernel level Netfilter/iptables defense mechanisms. In this post I will provide a more condensed version of the talk highlighting how you can use these same techniques to protect your servers running Red Hat Enterprise Linux 7 Beta.
Continue reading “Mitigate TCP SYN Flood Attacks with Red Hat Enterprise Linux 7 Beta”
The installation software used in Red Hat Enterprise Linux has a long and storied history. Hewn from a stone found deep underground in Durham, North Carolina (during the early days of Red Hat Linux), the installer has grown from a simple single-platform tool to a complex multi-architecture / multi-interface application used to deploy Red Hat Enterprise Linux. After more than ten years with the original evolving code base, the installer engineering team decided to use the advent of a new release of Red Hat Enterprise Linux as the perfect opportunity to make a few significant changes to the installation software. We are excited about these changes and hope that users will find the new installer to be more versatile and easier to use. Here are some of the main improvements and enhancements that you will encounter when working with the new installer for Red Hat Enterprise Linux 7 Beta:
Continue reading “A New and Improved Installation Experience”
Ever since Red Hat Enterprise Linux added KVM Virtualization as a kernel-based hypervisor to run virtual machines (way back in Red Hat Enterprise Linux 5.4), the operating system took on a dual personality.
Red Hat Enterprise Linux became both a Virtualization host for high density virtual data centers / cloud service platforms, and a guest operating system running on third party hypervisors such as VMware vSphere and Microsoft Hyper-V. As the topic is sufficiently broad, I plan to split my discussion of virtualization into two posts.
Today’s post will discuss Red Hat Enterprise Linux 7 beta as a hypervisor using KVM Virtualization technology and it will highlight a few key enhancements that make Red Hat Enterprise Linux the operating system of choice for modern hybrid data centers. While the features that I will review are inherently those that I find to be the most exciting (note: I’m hoping you will find them to be exciting and useful as well), a complete list is available in the Red Hat Enterprise Linux 7 beta release notes.
Continue reading “KVM Virtualization: Refining the Virtual World with Red Hat Enterprise Linux 7 Beta”
It’s difficult to overestimate the importance of networking in today’s business environment. Since networking provides a central means for data exchange and collaboration, it is often a critical factor when it comes to determining an organization’s ultimate potential for success.
At Red Hat, we understand the importance of networking and the role it plays in maintaining business continuity. As such, we made networking one of the primary focus areas of development for Red Hat Enterprise Linux 7. Having incorporated numerous enhancements and performance optimizations into the Red Hat Enterprise Linux 7 beta – I’d like to take this opportunity to talk about “what’s new” with respect to improvements in network management, bandwidth, and security.
Continue reading “Network Management, Bandwidth, and Security”
It seems that the daily news is full of the fallout that results when companies fail to protect online identities. The ability to limit access to sensitive applications and information to the right people with the right credentials is critical to ensuring the overall security of your infrastructure; critical… but not always easy.
Until recently, options for centralized identity management for the Linux environment were limited. There was no turnkey domain controller-like solution for the Linux/UNIX environment. Some Linux shops integrated open source tools like Kerberos and DNS to create centralized Linux-based identity management, but this option could be time-consuming to develop and expensive to maintain. Others integrated Linux clients directly into Microsoft Active Directory, but this option limited their ability to take advantage of some useful native Linux functionality like sudo and automount.
Continue reading “Who Goes There? Identity Management in Red Hat Enterprise Linux 7 Beta”
In an effort to round out my post from this past Tuesday I’d like to share a little additional information on both Network File System (NFS) updates and enhancements to the GFS2 shared disk file system (…all, of course, in the context of the Red Hat Enterprise Linux 7 beta).
Continue reading “NFS & GFS2”