The rapid rise of Linux containers as an enterprise-ready technology in 2015, thanks in no small part to the technology provided by the Docker project, should come as no surprise: Linux containers offer a broad array of benefits to the enterprise, from greater application portability and scalability to the ability to fully leverage the benefits of composite applications.
But these benefits aside, Linux containers can, if IT security procedures are not followed, also cause serious harm to mission-critical operations. As Red Hat’s Lars Herrmann has pointed out, containers aren’t exactly transparent when it comes to seeing and understanding all of their internal code. This means that tools and technologies to actually see inside a container are critical to enterprises that want to deploy Linux containers in mission-critical scenarios.
Continue reading “Schrodinger’s Container: How Red Hat is Building a Better Linux Container Scanner”
Performance Co-Pilot (PCP) is an open source, distributed, metrics gathering and analysis system. In the latest release of Red Hat Enterprise Linux (i.e. 7.2), we’re not only shipping PCP 3.10.6, but a new browser based dashboard, Vector, which is built on top of PCP, and contributed by Netflix. Together, they can provide a comprehensive overview of a local, or remote machine.
In this tutorial, we’ll be utilizing two different machines to demonstrate
Continue reading “Getting Started: Using Performance Co-Pilot and Vector for Browser Based Metric Visualizations”
Information technology has changed every industry in the past 20 years, to the point that IT systems are no longer the domain of just the technologists. Business decision makers are actively involved in the planning, purchasing, and deployment of technologies today. And one of the critical issues for business executives is getting more timely information and greater value from enterprise systems.
Continue reading “High Performance Computing Everywhere for Financial Services (and Beyond)”
Given the recent massive spike in interest in Linux Containers, you could be forgiven for wondering, “Why now?”. It has been argued that the increasingly prevalent cloud computing model more closely resembles hosting providers than traditional enterprise IT, and that containers are a perfect match for this model.
Despite the sudden ubiquity of container technology, like so much in the world of open source software, containerization depends on a long series of previous innovations, especially in the operating system. “One cannot resist an idea whose time has come.” Containers are such an idea, one that has been a long time coming.
Continue reading “The History of Containers”
If you’re looking at running Linux containers, you should be heading to ContainerCon in Seattle next week. Co-located with LinuxCon and CloudOpen, ContainerCon is where leading contributors in Linux containers, the Linux kernel, and related projects will get together to educate the community on containers and related innovations.
Red Hatters are contributing to over 40 sessions on this year’s agenda, including a keynote from Red Hat VP of Engineering Matt Hicks. In “Revolutionizing Application Delivery with Linux and Containers,” Matt will focus on how Linux containers are changing the way that companies develop, consume and manage applications and will emphasize how open source communities and projects like Docker and Kubernetes are delivering this next wave of enterprise application architecture.
If you’re attending ContainerCon, check out Matt’s keynote and some of the sessions below:
Continue reading “See You at ContainerCon in Seattle”
Perhaps you’ve been charged with developing a container-based application infrastructure? If so, you most likely understand the value that containers can provide to your developers, architects, and operations team. In fact, you’ve likely been reading up on containers and are excited about exploring the technology in more detail. However, before diving head-first into a discussion about the architecture and deployment of containers in a production environment, there are three important things that developers, architects, and systems administrators, need to know
Continue reading “Architecting Containers Part 1: Why Understanding User Space vs. Kernel Space Matters”
What are user namespaces? Sticking with the apartment complex analogy, the numbering of users and groups have historically been the same in every container and in the underlying host, just like public channel 10 is generally the same in every unit in an apartment building.
But, imagine that people in different apartments are getting their television signal from different cable and satellite companies. Channel 10 is now different for for each person. It might be sports for one person, and news for another.
Historically, in the Linux kernel, there was a single data structure which held users and groups. Starting in kernel version 3.8
Continue reading “What’s Next for Containers? User Namespaces”
Today, we are pleased to announced the general availability of Red Hat Directory Server 10, the latest version of Red Hat’s open source, network-based registry server. Built on the technologies delivered by the 389 Directory Server project, Red Hat Directory Server offers a Lightweight Directory Access Protocol (LDAP)-compliant server that centralizes critical application information, simplifies user management and enhances security across an entire organization.
As a tool for building business applications, Red Hat Directory Server provides
Continue reading “Red Hat Directory Server 10 Now Generally Available”
In the identity management server space Red Hat has two offerings: Identity Management (IdM) in Red Hat Enterprise Linux and Red Hat Directory Server (RHDS). This article is dedicated to helping you understand why there are two solutions and how to chose the best one for your environment.
Before diving in too deep
Continue reading “Identity Management or Red Hat Directory Server – Which One Should I Use?”
In my last post I reviewed some of my observations from the RSA Security Conference. As mentioned, I enjoyed the opportunity to speak with conference attendees about Red Hat’s Identity Management (IdM) offerings. That said, I was quick to note that whether I’m out-and-about staffing an event or “back home” answering e-mails – one of the most frequently asked questions I receive goes something like this: “…I’m roughly familiar with both direct and indirect integration options… and I’ve read some of the respective ‘pros’ and ‘cons’… but I’m still not sure which approach to use… what should I do?” If you’ve ever asked a similar question – I have some good news – today’s post will help you to determine which option aligns best with your current (and future) needs.
Continue reading “Direct, or Indirect, that is the Question…”