Blog
SPIFFE/SPIRE on Red Hat OpenShift
Zero trust is becoming a norm as organizations look to enhance the security posture of their workloads in cloud environments. A core principle of the zero trust approach is the ability to prove and verify identity for all - whether these entities are inside or outside...
Evaluating the performance of Large Language Models
In the field of natural language processing (NLP), large language models (LLMs) have become crucial for various applications. These models are widely adopted by enterprises, signaling a shift in how we use and gain insights from available data. However, putting these...
Istio ambient mode with Red Hat OpenShift
Istio ambient refers to a new mode for the Istio service mesh, the upstream project behind Red Hat OpenShift Service Mesh. This article provides an overview and some technical analysis of this emerging technology. Note that the ambient mode is currently in the alpha...
Sustainability at the Edge with Kepler
Recently, the sustainable-computing.io project, Kepler, was added as a Cloud Native Computing Foundation (CNCF) sandbox project. While deploying a tool dedicated to sustainability, the last thing we'd want is for the tool itself to consume unnecessary energy or...
Introducing Kepler: Efficient power monitoring for Kubernetes
Introduction Monitoring and optimizing power consumption is crucial for efficient resource management in Kubernetes environments. To address this need, a powerful tool called Kepler (Kubernetes-based Efficient Power Level Exporter) has emerged. Leveraging software...
Using eBPF in unprivileged Pods
Extended Berkeley Packet Filter (eBPF) presents an attractive technology that Kubernetes applications can take advantage of, either to accelerate their packet processing needs (as an in kernel Fast Path) or as part of various monitoring and telemetry projects....
Introducing Enterprise Contract
You may have heard of sigstore and its container image verification tool, cosign. This blog post introduces a policy-driven workflow, Enterprise Contract, built on those technologies. Note: Red Hat’s Emerging Technologies blog includes posts that discuss...
Going to Red Hat Summit? Here’s where to find Red Hat Research and Emerging Technologies
Engineers and researchers from the Red Hat Research and Emerging Technologies groups will feature recent work and a glimpse of where open source technology will go next at the upcoming Red Hat Summit, May 23-25. Interactive sessions, hands-on labs, and demos include...
Keylime’s durable attestation makes security auditable
Remote attestation answers the (slightly paraphrased) question: “It’s 3pm, do you know what the systems in your data center are doing?” Going with this premise, durable attestation answers a similar question about 3pm yesterday. In this article we describe the...
Optimizing development with the time to merge tool
Organizations are dedicating significant resources to produce and distribute top-quality software at a more accelerated pace due to the growing competition in the software market (source). To achieve this goal, they use practices such as Continuous Integration (CI),...