Linux

Keycloak architecture diagram
Article

A deep dive into Keycloak

Stian Thorgersen +1

In this DevNation Tech Talk, we take a deep dive into Keycloak to handle open source identity and access management with modern applications and services.

SELinux Coloring Book_Tile card
E-book

SELinux Coloring Book

Dan Walsh

Learn the basics of SELinux, including type enforcement, Multi-Category Security (MCS) Enforcement, and Multi-Level Security (MLS) Enforcement, with the help of some friendly cats and dogs!

Debugging GraalVM-native images using gdb
Article

Debugging GraalVM-native images using gdb

Andrew Dinn

Discover how GraalVM adding DWARF debug information to its Linux images enables effective source-level Java-native image debugging through gdb.

Commit to excellence: Java in containers
Article

Commit to excellence: Java in containers

Markus Eisele (@myfear) +1

This video walks you through the "why" and "how" of Java in containers, from image sizes to the development and deployment processes.

Stack clash mitigation in GCC, Part 3
Article

Stack clash mitigation in GCC, Part 3

Jeff Law

Discover the design principles and performance improvements behind GCC's code generation strategies for defending against stack clash attacks.

Use Node.js 14
Article

Use Node.js 14 on Red Hat OpenShift

Lucas Holmquist

Red Hat will release a Universal Base Image for Node.js 14 for Red Hat OpenShift and Red Hat Enterprise Linux, but this article gets you started today.

Figure 12. The external public IPv4 address is listed.
Article

Using Ansible to automate Google Cloud Platform

Sreejith Anujan

Learn how to seamlessly automate Google Cloud Platform resources using the new auto-generated Ansible modules and your Red Hat Ansible Tower credentials.