Welcome to our monthly recap of the articles we published in June! This month, we rolled out an armada of articles to help you build—and lock down—code on the platforms you trust. Here are the June highlights.
Security for Kubernetes, Go, and beyond
Kubernetes is increasingly central to modern distributed and containerized development today, but it's a complex system that's difficult to secure. Ajmal Kohgadai and Andy Oram delivered a three-part series on Kubernetes security to help put your mind at ease:
- Kubernetes security risks that keep developers up at night
- 4 tips for achieving better security on Kubernetes
- Best practices for successful DevSecOps
Andy also rounded things out with a tour of 8 great open source Kubernetes security tools.
Red Hat Developer also took a look at security issues in the Go language. We provided a primer on cross-site scripting that explained how you can prevent this type of attack when building applications in Go; we also showed you how to make sure your Go applications on RHEL comply with the FIPS standard mandated for U.S. government contractors.
And finally, if you're dealing with good old-fashioned C, Serge Guelton and Siddhesh Poyarekar taught you how to use compiler flags to protect against stack-smashing attacks.
Dig deep into internals
Some of our most popular articles of this month really got into the nitty-gritty of code execution, compilation, and performance monitoring. Thanks to Red Hat Developer's experts, you learned how to:
- Use the GNU Debugger to debug stack frames and recursion, a common cause of programming errors.
- Use the Bunsen test suite to track down "flaky" tests that produce different outcomes when run repeatedly.
- Monitor the performance of BPF programs that themselves inspect other system activity.
- Reveal potential performance problems, down to individual lines of code, with SystemTap and one of its prewritten example scripts.
SaaS architectures
We continued a series that we began in May about building and deploying Software as a service (SaaS) applications, and these also proved to be a big hit with readers. This month, you learned how to:
- Convert an existing web application into a SaaS service.
- Develop a multi-cloud storage strategy to accommodate different environments where your SaaS service might be deployed.
Check out these articles and be on the lookout for future installments.
Instrument containerized Java applications with Cryostat
You probably have used Java Flight Recorder, an excellent tool for analyzing and understanding Java workloads. It comes in handy during development or while workloads run in production. Cryostat takes that further by bringing the same functionality to containers and Kubernetes. You can check out our roundup of what's new in Cryostat 2.1, the latest version of the tool. You can also learn how to install Cryostat using a Helm chart, which is suitable for demo purposes and simpler than using the Cryostat Operator.
June 2022 on Red Hat Developer
Here's the full lineup of articles published on Red Hat Developer so far this month:
- Integrate a Spring Boot application with Red Hat Data Grid
- Is your Go application FIPS compliant?
- Open source edge detection with OpenCV and Pachyderm
- Join the Red Hat team at OpenJS World 2022
- How to create Kafka consumers and producers in Java
- Use compiler flags for stack protection in GCC and Clang
- What's new in version 2.7 of the Red Hat build of Quarkus
- Kafka Monthly Digest: May 2022
- Thousands of PyPI and RubyGems RPMs now available for RHEL 9
- How to debug stack frames and recursion in GDB
- Eliminate downtime during OpenShift rolling updates
- 9 awesome updates in Cryostat 2.1
- Detecting nondeterministic test cases with Bunsen
- Get started with Red Hat OpenShift Connectors
- A quick way to translate physical addresses into virtual ones
- Kubernetes security risks that keep developers up at night
- Use OpenVINO to convert speech to text
- 4 tips for achieving better security on Kubernetes
- OpenSSL 3.0: Dealing with a Turkish locale bug
- Best practices for successful DevSecOps
- Learn about OpenShift command-line tools
- How to convert a web application to Software-as-a-Service
- Install Cryostat with the new Helm chart
- 8 open source Kubernetes security tools
- Distributed tracing with OpenTelemetry, Knative, and Quarkus
- Measuring BPF performance: Tips, tricks, and best practices
- Multi-cloud storage strategies for SaaS applications
- GPU enablement on MicroShift
- The road to JBoss EAP 8
- Use a SystemTap example script to trace kernel code operation
- Cross-site scripting: Explanation and prevention with Go
- How to add libraries to a Node.js container with S2I