Red Hat CodeReady Workspaces 2: New tools to speed Kubernetes development

We are pleased to announce the release of Red Hat CodeReady Workspaces 2.0. Based on Eclipse Che, its upstream project CodeReady Workspaces is a Red Hat OpenShift-native developer environment enabling cloud-native development for developer teams.

CodeReady Workspaces 2.0 is available now on OpenShift 3.11 and OpenShift 4.x.

This new version introduces:

  • Kubernetes-native developer sandboxes on OpenShift: Bring your Kubernetes application into your development environment, allowing you to code, build, test, and run as in production.
  • Integrated OpenShift experience: OpenShift plugin and integration into the OpenShift 4 Developer Console.
  • New editor and Visual Studio (VS) Code extensions compatibility: New browser-based editor, providing a fast desktop-like experience and compatibility with Visual Studio Code extensions.
  • Devfile, developer environment as code: Developer environments are codified with a devfile making them consistent, repeatable, and reproducible.
  • Centrally hosted on OpenShift with AirGap: Deploy on your OpenShift cluster, behind your firewall. AirGap capabilities. Easier to monitor and administer.

Continue reading “Red Hat CodeReady Workspaces 2: New tools to speed Kubernetes development”

Share

Set up Red Hat AMQ 7 custom certificates on OpenShift

Secure communication over a computer network is one of the most important requirements for a system, and yet it can be difficult to set up correctly. This example shows how to set up Red Hat AMQ 7 end-to-end TLS encryption using a custom X.509 certificate on the Red Hat OpenShift platform.

Prerequisites

You need to have the following in place before you can proceed with this example:

  • An OpenShift cluster up and running.
  • A custom X.509 certificate in PEM format (along with its chain).
  • An active Red Hat Customer Portal account.

Continue reading “Set up Red Hat AMQ 7 custom certificates on OpenShift”

Share

4 container usage takeaways from the 2019 Sysdig report

You probably already knew that most of the containers created by developers are disposable, but did you realize that half of them are only around for less than five minutes? That and other fascinating details are available in the latest annual container report from Sysdig, a container security and orchestration vendor.

This is the company’s third such report. The results are obtained from their own instrumentation collected from a five-day period last month of the more than 2 million containers used by their own customers. This means the results could be somewhat skewed toward more experienced container developers.

Continue reading “4 container usage takeaways from the 2019 Sysdig report”

Share

How to secure microservices with Red Hat Single Sign-On, Fuse, and 3scale

In this article, we’ll cover microservice security concepts by using protocols such as OpenID Connect with the support of Red Hat Single Sign-On and 3scale. Working with a microservice-based architecture, user identity, and access control in a distributed, in-depth form must be carefully designed. Here, the integration of these tools will be detailed, step-by-step, in a realistic view.

This article exemplifies the use of tools that can securely run your businesses, avoiding using homemade solutions, and protecting your services by using an API gateway, preventing your applications from being exposed to the public network. The use of an API gateway also provides additional access control, monetization, and analytics.

Continue reading “How to secure microservices with Red Hat Single Sign-On, Fuse, and 3scale”

Share

Verifying signatures of Red Hat container images

Security-conscious organizations are accustomed to using digital signatures to validate application content from the Internet. A common example is RPM package signing. Red Hat Enterprise Linux (RHEL) validates signatures of RPM packages by default.

In the container world, a similar paradigm should be adhered to. In fact, all container images from Red Hat have been digitally signed and have been for several years. Many users are not aware of this because early container tooling was not designed to support digital signatures.

In this article, I’ll demonstrate how to configure a container engine to validate signatures of container images from the Red Hat registries for increased security of your containerized applications.

Continue reading “Verifying signatures of Red Hat container images”

Share

3 steps toward improving container security

As developers increasingly make use of containers, securing them becomes more and more important. Gartner has named container security one of its top 10 concerns for this year in this report, which isn’t surprising given their popularity in producing lightweight and reusable code and lowering app dev costs.

In this article, I’ll look at the three basic steps involved in container security: securing the build environment, securing the underlying container hosts, and securing the actual content that runs inside each container. To be successful at mastering container security means paying attention to all three of these elements.

Continue reading “3 steps toward improving container security”

Share

New developer tools in Red Hat OpenShift 4.2

Today’s announcement of Red Hat OpenShift 4.2 represents a major release for developers working with OpenShift and Kubernetes.  There is a new application development-focused user interface, new tools, and plugins for container builds, CI/CD pipelines, and serverless architecture.

application topology view in openshift
Application topology view in developer perspective.

Continue reading “New developer tools in Red Hat OpenShift 4.2”

Share

What’s new in Red Hat Dependency Analytics

We are excited to announce a new release of Red Hat Dependency Analytics, a solution that enables developers to create better applications by evaluating and adding high-quality open source components, directly from their IDE.

Red Hat Dependency Analytics helps your development team avoid security and licensing issues when building your applications. It plugs into the developer’s IDE, automatically analyzes your software composition, and provides recommendations to address security holes and licensing problems that your team may be missing.

Without further ado, let’s jump into the new capabilities offered in this release. This release includes a new version of the IDE plugin and the server-side analysis service hosted by Red Hat.

Continue reading “What’s new in Red Hat Dependency Analytics”

Share