Performance

Building resilient event-driven architectures with Apache Kafka
Article

Dynamic Kafka controller quorum

Federico Valeri +1

This article explores use cases for the dynamic quorum configuration in Kafka that allows KRaft clusters to scale controller nodes without downtime.

Featured image for Red Hat Enterprise Linux.
Article

Limitations of frame pointer unwinding

Serhei Makarov

Explore 3 limitations of using frame pointers for stack unwinding and profiling in Linux that are often overlooked, plus possible future alternatives.

Vulnerability analysis of Golang applications and more with Red Hat CodeReady Dependency Analytics v0.3.2
Article

Register allocation in the Go compiler

Vladimir Makarov

Dive into register allocation in the Go compiler, including the register allocator's components, how it works, and its advantages and disadvantages.

Featured image for Red Hat Enterprise Linux.
Article

Making SystemTap instrumentation easier with tapsets

William Cohen

Use existing SystemTap tapsets to make your SystemTap scripts more concise and more portable. Write your own tapsets to allow yourself and others to reuse SystemTap code across multiple instrumentation scripts.

A code editor with four icons symbolizing DevOps, developers, a gear, and a cluster.
Article

Network observability on demand

Julien Pinsonneau

Learn how to use the Network Observability CLI (oc netobserv) to implement on-demand network observability on OpenShift without installing any operators.

Configure a Jupyter notebook to use GPUs for AI/ML modeling
Article

What is GPU programming?

Kenny Ge

The first of a four-part series on introductory GPU programming, this article provides a basic overview of the GPU programming model.

Article Thumbnail
Article

Managing Sensitive Assets Within Image Mode for Red Hat Enterprise Linux

Andrew Block

Aside from naming and versioning, managing sensitive assets, like credentials, is one of the more challenging aspects in technology. So, why is it so difficult? Well, to start off. What may be considered a sensitive asset to one individual or organization may not be the same as another. Also, given that there are so many different ways that sensitive assets can be managed, there is no universally accepted method available.
The challenges that encompass how sensitive assets are handled also apply to image mode, a new method that enables building and deploying Operating Systems using similar tools and approaches as any other traditional container. In this article, we will discuss the types of sensitive assets that apply to image mode for RHEL specifically and how to design appropriate workflows to incorporate secure practices within all phases, from build and deployment to runtime.