Questions related to DNS and service discovery regularly come up during deployments of Identity Management (IdM) in Red Hat Enterprise Linux in a trust configuration with Active Directory. This blog article will shed some light of this aspect of the integration.
We’re proud to announce that one of our partners, HPE, posted results to the SPECvirt_sc2013 benchmark that affirms the leadership position for Red Hat Virtualization (RHV) and the HPE ProLiant DL380 Gen10 Server. RHEL with KVM has held several performance records for 2, 4, and 8 socket results over the last few years and as of August 17, 2017, RHV now holds the 2 socket record.
Let’s imagine you’ve had many meetings, internal deliberations, workshops, and decided to put your “Continuous Integration/Continuous Development” environment on Red Hat OpenShift Container Platform (OCP). You’ve defined a problem, a strategy, and a solution. It’s now time to decide where in your datacenter to deploy it.
Most people don’t consider their average USB memory stick to be a security threat. In fact, in a social engineering experiment conducted in 2016 at the University of Illinois and detailed in this research paper, a group of researchers dropped 297 USB sticks outside in the parking lot, in the hallway, and classrooms. Of the 297 USB sticks dropped,
We’re pleased to announce that Red Hat Enterprise Linux Atomic Host 7.4 is now generally available. Red Hat Enterprise Linux Atomic Host is a lightweight, container-optimized version of Red Hat Enterprise Linux. Red Hat Enterprise Linux Atomic Host couples the flexible, modular capabilities of Linux containers with the reliability and security of Red Hat Enterprise Linux in a reduced footprint, to decrease the attack surface and provide only the packages needed to light up hardware and run containers. Here’s a look at some of the major changes in 7.4.
In Part 1, we created a working BIND container with local data storage. We can make changes on the local system that will get picked up in the running container. In this part, we’ll explore how we can manage the service from the host with
As a follow-up to my introduction of simple signing, I’m excited to announce that Red Hat is now serving signatures for Red Hat Container Catalog Images!
In May, Red Hat announced the Container Health Index, providing an aggregate safety rating for container images in our public registry. As part of our commitment to delivering trusted content, we are now serving signed images. This means that customers can now configure a Red Hat Enterprise Linux host to cryptographically verify that images have come from Red Hat when they are pulled onto the system. This is a significant step in advancing the security of container hosts, providing assurance of provenance and integrity and enabling non-repudiation. Non-repudiation simply means that the signer cannot deny their signature—a key security principle for digital transactions.
Last week, Intel launched the new family of Intel® Xeon® scalable processors with new features such as Intel Advanced Vector Extensions 512 (Intel AVX-512), which boost performance of computationally intensive tasks, a new Intel Mesh Architecture for reduced system latency, Intel QuickAssist Technology for hardware acceleration of cryptography and data compression operations and integrated high-speed fabric with Intel Omni-Path Architecture. According to Intel,
It has been over five years since the release of Red Hat Enterprise Virtualization 3.0. In just under 3 months (September 30) it will hit the end of it’s support lifecycle, and we will retire the 3.x version. At that same time, Red Hat Virtualization 4.0 will have been out for 13 months, and 4.1 for 5 months.