Security

Featured image for Automate dependency analytics with GitHub Actions
Article

End-to-end field-level encryption for Apache Kafka Connect

Hans-Peter Grahsl

This article introduces end-to-end encryption for data integration scenarios built on top of Apache Kafka using Kafka Connect together with the open-source library Kryptonite for Kafka.

Page Thumbnail
Page

Apache Kafka product ecosystem

Red Hat OpenShift Connectors, Red Hat OpenShift Streams for Apache Kafka, and Red Hat OpenShift Service Registry give you the tools you need for an open and highly integrated fully managed and hosted Apache Kafka product ecosystem.

Page Thumbnail
Page

Apache Kafka product ecosystem

Red Hat OpenShift Connectors, Red Hat OpenShift Streams for Apache Kafka, and Red Hat OpenShift Service Registry give you the tools you need for an open and highly integrated fully managed and hosted Apache Kafka product ecosystem.

Featured image for: Value range propagation in GCC with Project Ranger.
Article

GCC's new fortification level: The gains and costs

Siddhesh Poyarekar

Discover the gains and costs of GCC’s enhanced runtime buffer overflow protection. Level 3 _FORTIFY_SOURCE preprocessor macro may detect more buffer overflows, but there’s a cost.

Reliability Nightmares share image(2000x1000)
E-book

Reliability Nightmares: The Coloring Book

Máirín Duffy + 4

See site reliability engineering (SRE) principles in action and learn how to improve the operability of your code base with this developer coloring book.

ansible share image
Article

5 examples of security automation with Ansible

Jamie Beck + 1

Discover how Red Hat Ansible Automation Platform provides better security by automating intrusion detection, edge security, firewalls, and more.

Featured image for Red Hat article roundup
Article

Red Hat Developer roundup: Best of August 2022

Heiker Medina

Find recent articles on observability, containerizing .NET applications, tips for building security into your Node.js development process, and more.

Featured image for Kubernetes topics.
Article

8 open source Kubernetes security tools

Andy Oram

See how a number of tools, like KubeLinter, kube-bench, and kube-hunter, can reveal problems in your Kubernetes configuration.

systemd Commands cheat sheet card image
Cheat Sheet

systemd Commands Cheat Sheet

Bob Reselman

The systemd service runs on Linux to consolidate service configuration and application behavior: starting, stopping, and so forth. systemd is found in Red Hat Enterprise Linux as well as other Linux distributions.

Featured image for: SCTP over UDP in the Linux kernel.
Article

Is your Go application FIPS compliant?

Antonio Cardace + 1

You can compile Go code on Red Hat Enterprise Linux in such a way that it complies with U.S. Federal encryption standards. Find out how.