Hybrid cloud blog

February 4, 2021

What is KubeLinter?

What is KubeLinter? The KubeLinter is an open-source command-line interface to identify misconfigurations in Kubernetes objects. KubeLinter offers the ability to integrate checks on Kubernetes YAML ...

Michael Foster

January 14, 2021

Implement Policy-based Governance Using Configuration Management of Red Hat Advanced Cluster Management for Kubernetes

Overview As outlined in the blog, Policy-based governance of Red Hat Advanced Cluster Management, Red Hat Advanced Cluster Management can be used to comply with enterprise and industry standards for ...

Jaya Ramanathan and Christian Stark

January 12, 2021

Introducing the Quarkus Helm Chart

Wouldn’t it be cool if OpenShift provided an out-of-the-box way to build and deploy Quarkus applications? Red Hat has provided just that in the form of a Quarkus Helm chart. This Helm chart makes it ...

Austin Dewey

December 2, 2020

How KubeLinter fits in the CNCF Ecosystem

The State of Kubernetes Security in 2020 There has been a significant shift in the Kubernetes community to security topics in the past year. According to the StackRox State of Container and ...

Michael Foster

August 20, 2020

The Hidden Dangers of Terminating Namespaces

One of the best features about OpenShift and Kubernetes is the ability to quickly and easily create and destroy resources. This scenario is ideal during phases of a Continuous Integration and ...

Andrew Block

August 5, 2020

Fine Grained IAM Roles for OpenShift Applications

Security is one of the key concerns for both infrastructure and application teams when operating in an OpenShift environment. Infrastructure teams need to be cognizant of the level of access for ...

Andrew Block

April 16, 2020

Red Hat OpenShift: Cluster Upgrades and Application Operator Updates

  This video blog explains how ClusterVersionOperators handles automated cluster version upgrades with the over-the-air (OTA) upgrade process. It also covers how the OLM managed application operators ...

Veer Muchandi

April 15, 2020

Machine Config and Machine Updates

  In this video we will explore the cluster installed during the last video, log into the cluster, configure an authentication provider. We will understand the structure of the cluster and the ...

Veer Muchandi

November 26, 2019

12 Kubernetes Configuration Best Practices

By now most of us have heard about the role human error plays in causing data breaches. Many security incidents that can be traced back to a misconfigured infrastructure or security setting. As ...

Ajmal Kohgadai