This year you’ve got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.
There are breakout sessions, birds-of-a-feather sessions, mini sessions, panels, workshops, and instructor led labs that you’re trying to juggle into your daily schedule. To help with these plans, let’s try to provide an overview of the labs in this series.
Our first article is starting with a focus on Linux containers, where you can get hands-on with everything from container security, containerizing applications, developing container solutions and digging in to container internals.
The following hands-on labs are on the agenda, so let’s look at the details of each one.
Continue reading “Guide to Red Hat Summit 2018 Linux Container Labs”
In the previous blog, we talked about the concepts behind virtual data optimizer (VDO) and how to configure it with Red Hat Enterprise Linux (RHEL) 7.5 Beta. In the last step, we created a VDO volume.
In this blog we are going to experiment and observe real world savings on storage. For the experiment, I am not going to use any artificially generated workload but, rather, we’ll follow the simplest way by introducing some data on the disk and then multiplying the same data on the disk with a different name. This simple exercise can ensure that we are adding redundant data to disk to trigger deduplication.
Continue reading “Determining the Space Savings of Virtual Data Optimizer (VDO) in RHEL 7.5 Beta”
In the Red Hat Enterprise Linux 7.5 Beta, we introduced virtual data optimizer (VDO). VDO is a kernel module that can save disk space and reduce replication bandwidth. VDO sits on top of any block storage device and provides zero-block elimination, deduplication of redundant blocks, and data compression. These are the key phases of the data reduction process that allows VDO to reduce data footprint on storage. VDO applies these phases inline and on-the-fly. Now, lets see what happens in each process (download the beta yourself and try):
Continue reading “Understanding the Concepts Behind Virtual Data Optimizer (VDO) in RHEL 7.5 Beta”
Microsoft loves Linux. But this wasn’t always the case as host Saron Yitbarek will share in episodes 1 and 2 of Command Line Heroes, an original podcast from Red Hat airing January 16th, about the OS wars for the desktop and then the datacenter.
Yet, today, here we are talking about Microsoft’s embrace of Linux. Nothing showcases this new approach forward than the growing relationship between Microsoft and Red Hat. In this post we’re going to explore one aspect of that relationship–Microsoft SQL Server 2017 on Red Hat® Enterprise Linux®, Microsoft’s reference Linux platform. By using Ansible playbooks and roles to quickly deploy SQL Server, we get to take the best of these tools for a spin.
Continue reading “How to Install SQL Server 2017 on Red Hat Enterprise Linux with Ansible”
We’ve published a new guide to help you select the right container hosts and images for you container workloads – whether it’s a single container running on a single host, or thousands of workloads running in a Kubernetes/OpenShift environment. Why? Because people don’t know what they don’t know and we are here to help.
Like “The Cloud” before it, a lot of promises are being made about what capabilities containers might deliver – does anybody remember the promises of cloud bursting? No, not that cloud bursting, this cloud bursting 🙂
Continue reading “Container Images and Hosts: Selecting the Right Components”
For many organizations, IT modernization begins with the operating system. In the last few years, migrating workloads to Linux from RISC systems has accelerated as organizations seek to take advantage of the potential price/performance advantage of x86 blade hardware solutions. However, as open source becomes more pervasive, many enterprises are realizing additional benefits. Not only can enterprises reduce (or in some cases eliminate) their reliance on legacy systems by
Continue reading “It’s time to modernize: Your UNIX alternative with Red Hat Enterprise Linux and Microsoft Azure”
While performance benchmarks are often application or industry specific they can also provide useful insights that are widely applicable. Risk analytics applications used in financial services industries have performance characteristics similar to many technical computing applications. These applications are large, compute intensive, and take full advantage of parallel processing and compute accelerators.
STAC®, the Securities Technology Analysis Center LLC (www.STACresearch.com), provides technology research and testing tools including
Continue reading “Red Hat and Partners Deliver New Performance Records on Prominent Risk Analytics Benchmark”
In our first post of discussing Red Hat’s multi-architecture strategy, we focused on the disruptive nature of enabling new and rapidly-evolving architectures and how this enablement necessitates a different set of product requirements to fulfill our vision of providing a consistent and familiar experience to our customers across multiple hardware architectures. While we have been working with many original equipment manufacturers (OEMs) on x86_64-based servers for years, we have seen interest from our customer base in delivering parity across multiple architectures, including IBM Power Little Endian (ppc64le) and ARMv8-A (aarch64).
So what exactly are we doing with our partners to make this
Continue reading “Keeping Pace with Multiple Architectures (Part 2)”
Enrolling a client system into Identity Management (IdM) can be done with a single command, namely: ipa-client-install. This command will configure SSSD, Kerberos, Certmonger and other elements of the system to work with IdM. The important result is that the system will get an identity and key so that it can securely connect to IdM and perform its operations. However, to get the identity and key, the system should
Continue reading “Understanding Identity Management Client Enrollment Workflows”
In this article I want to talk about a runC container which I want to migrate around the world while clients stay connected to the application.
In my previous Checkpoint/Restore In Userspace (CRIU) articles I introduced CRIU (From Checkpoint/Restore to Container Migration) and in the follow-up I gave an example how to use it in combination with containers (Container Live Migration Using runC and CRIU). Recently Christian Horn published an additional article about CRIU which is also a good starting point.
In my container I am running Xonotic. Xonotic calls itself ‘The Free and Fast Arena Shooter’. The part that is running in the container is the server part of the game to which multiple clients can connect to play together. In this article the client is running on my local system while the server and its container is live migrated around the world.
This article also gives detailed background information about
Continue reading “Container Migration Around The World”