Containers

Kubectl: Developer tips for the Kubernetes command line

Kubectl: Developer tips for the Kubernetes command line

Kubectl, the Kubernetes command-line interface (CLI), has more capabilities than many developers realize. For example, did you know that kubectl can reach the Kubernetes API while running inside a cluster? You can also use kubectl to assume different user identities, to select a custom editor to run with the kubectl edit command, and more.

Continue reading Kubectl: Developer tips for the Kubernetes command line

Share
Transitioning from Docker to Podman

Transitioning from Docker to Podman

Podman is an excellent alternative to Docker containers when you need increased security, unique identifier (UID) separation using namespaces, and integration with systemd. In this article, I use real-world examples to show you how to install Podman, use its basic commands, and transition from the Docker command-line interface (CLI) to Podman. You’ll also see how to run an existing image with Podman and how to set up port forwarding.

Continue reading “Transitioning from Docker to Podman”

Share
Using Multus and DataVolume in KubeVirt

Using Multus and DataVolume in KubeVirt

KubeVirt is a cloud-native virtual machine management framework based on Kubernetes. KubeVirt orchestrates workloads running on virtual machines in the same way that Kubernetes does for containers. KubeVirt has many features for managing the network, storage, images, and the virtual machine itself. This article focuses on two mechanisms for configuring network and storage requirements: Multus-CNI and CDI DataVolumes. You will learn how to configure these KubeVirt features for use cases that require high performance, security, and scalability.

Continue reading Using Multus and DataVolume in KubeVirt

Share
Devfiles and Kubernetes cluster support in OpenShift Connector 0.2.0 extension for VS Code

Devfiles and Kubernetes cluster support in OpenShift Connector 0.2.0 extension for VS Code

We are pleased to announce that the new release of the OpenShift Connector extension for Visual Studio Code (VS Code) is now available. The 0.2.0 release offers new features for rapidly developing and deploying code on Kubernetes and Red Hat OpenShift clusters. OpenShift Connector now supports component deployment using devfiles, leveraging odo 2.0 command-line interface under the hood.

With this release, the extension now supports connecting to vanilla Kubernetes clusters and includes a new option for creating OpenShift 4 clusters locally via Red Hat CodeReady Containers (CRC). In this article, we introduce these new features and present the workflow for using CodeReady Containers with OpenShift Connector 0.2.0.

Install OpenShift Connector 0.2.0

  1. Install the OpenShift Connector plug-in directly from the Visual Studio Code Marketplace.
  2. Alternatively, select the Extensions view in VS Code by clicking on its square icon in the left-side taskbar. Search for the OpenShift Connector plug-in and click Install.
  3. Once you have installed the extension, the OpenShift icon will be added to the left-side activity bar and ready for use.

Continue reading “Devfiles and Kubernetes cluster support in OpenShift Connector 0.2.0 extension for VS Code”

Share
Jakarta EE: Multitenancy with JPA on WildFly, Part 2

Jakarta EE: Multitenancy with JPA on WildFly, Part 2

This is the second half of a two-part article about multitenancy with the Jakarta Persistence API (JPA) on WildFly. In Part 1, I showed you how to implement multitenancy using a database. In Part 2, I’ll show you how to implement multitenancy using a schema and the Jakarta Persistence API (JPA) on WildFly. You’ll learn how to implement JPA’s CurrentTenantIdentifierResolver and MultiTenantConnectionProvider interfaces, and how to use JPA’s persistence.xml file to configure the required classes based on these interfaces.

Continue reading Jakarta EE: Multitenancy with JPA on WildFly, Part 2

Share
Red Hat Enterprise Linux 8.3 supports faster service and workload delivery

Red Hat Enterprise Linux 8.3 supports faster service and workload delivery

Red Hat Enterprise Linux (RHEL) 8.3 was announced last week and is now generally available. We encourage Linux developers to download this update and give it a try. We also recommend updating both development and production systems to the new 8.3 release. This article is an overview of the developer highlights of RHEL 8.3, including new application streams for Node.js 14, Ruby 2.7, PHP 7.4, GCC Toolset 10, and more.

Continue reading Red Hat Enterprise Linux 8.3 supports faster service and workload delivery

Share
Open Liberty 20.0.0.11 brings Kerberos authentication and Thanos support in Grafana dashboards

Open Liberty 20.0.0.11 brings Kerberos authentication and Thanos support in Grafana dashboards

This article is a quick look at two exciting updates in the new Open Liberty 20.0.0.11 release. First, you can now use the Kerberos authentication protocol to secure Java Database Connectivity (JDBC) data sources. I’ll introduce the new kerberos configuration element in Open Liberty’s server.xml and show you how to use the Kerberos protocol to secure a data source.

Continue reading Open Liberty 20.0.0.11 brings Kerberos authentication and Thanos support in Grafana dashboards

Share
Adapting Docker and Kubernetes containers to run on Red Hat OpenShift Container Platform

Adapting Docker and Kubernetes containers to run on Red Hat OpenShift Container Platform

More and more companies are migrating their applications to the Red Hat OpenShift Container Platform (RHOCP). This enterprise-grade container platform is secure and comprehensive, based on industry standards including those related to Docker and Kubernetes. However, due to the tightened security restrictions, containers that run on Docker and Kubernetes might not run successfully on Red Hat OpenShift without modification.

Red Hat OpenShift Container Platform is a fully managed Red Hat OpenShift service that takes advantage of enterprise-ready scaling and security. It is directly integrated with Kubernetes and provides several models for application deployment. For example, OpenShift can mitigate the risk that processes running in a container might be given escalated privileges on the host machine, due to security vulnerabilities in the container engine. For this reason, containers are run using an arbitrarily assigned user ID.

In contrast, in Docker and Kubernetes containers are run either as the user specified by the USER directive in the Dockerfile, or as the root user if a USER directive is not specified. Containerized applications designed to run as the root user might not run as expected on OpenShift.

Continue reading “Adapting Docker and Kubernetes containers to run on Red Hat OpenShift Container Platform”

Share