Blog
Managing disaster recovery with GitOps and Ceph RBD mirroring
In our previous blog, Managing application and data portability at scale with Rook-Ceph, we talked about some key features of Rook-Ceph mirroring and laid groundwork for future use case solutions and automation that could be enabled from this technology. This post...
Deploying a full-service 5G network on OpenShift
During the last Kubecon North America in San Diego, a cross-vendor team of engineers from Red Hat and several other companies rolled a half-rack of servers and a self-made Faraday cage onto the keynote stage and demoed live a full 5G/4G network connected to two...
Using machine learning and analytics to help developers
It was the talk title that caught my eye - “Developer Insights: ML and Analytics on src/”. I was intrigued. I had a few ideas of how machine learning techniques could be used on source code, but I was curious to see what the state of the art looked like now. I...
Size matters: how Fedora approaches minimization
As part of a modern IT environment, Linux distributions can look to optimizing their size to be better suited for container use. One of the ways this improvement can happen is through reducing the size of a distribution, a process known as minimization. A new tool is...
Managing application and data portability at scale with Rook-Ceph
One of the key requirements for Kubernetes in multi-cluster environments is the ability to migrate an application with all of its dependencies and resources from one cluster to another cluster. Application portability gives application owners and administrators the...
Kiali: An observability platform for Istio
Istio exists to make life easier for application developers working with Kubernetes. But what about making Istio easier? Well, that's Kiali's job. Read on to learn more about making Istio even more pleasant to use. Deploying and managing microservice applications is...
Current Trusted Execution Environment landscape
If you run software on someone’s servers, you have a problem. You can’t be sure your data and code aren’t being observed, or worse, tampered with -- trust is your only assurance. But there is hope, in the form of Trusted Execution Environments (TEEs) and a new open...
Scaling workload storage requirements across clusters
A number of multi-cloud orchestrators have promised to simplify deploying hundreds or thousands of high-availability services. But this comes with massive infrastructure requirements. How could we possibly manage the storage needs of a thousand stateful...
Prometheus anomaly detection
With an increase in the number of applications being deployed on Red Hat OpenShift, there is a strong need for application monitoring. A number of these applications are monitored via Prometheus metrics, resulting in an accumulation of a large number of time-series...
Sentiment analysis with machine learning
When developing a new technology, it really helps if you are also a user of that new tech. This has been an approach of Red Hat around artificial intelligence and machine learning -- develop openly on one hand, exchanging knowledge across the organization to use the...
