Security

secure coding - simple
Article

Manage AI resource use with TokenRateLimitPolicy

Maximiliano Pizarro

Learn how to implement TokenRateLimitPolicy for LLM APIs. This approach to advanced rate limiting ensures fair use and better cost management in AI workflows.

Red Hat Developer Hub
Article

How the contextual SBOM pattern improves vulnerability management

Erik Mravec +1

Learn how Red Hat's contextual SBOM pattern solves the problem of understanding package provenance in container images by establishing relationships between container images and their parent and builder images within the software supply chain. Improve vulnerability management with this hierarchical view.

developer feature image
Article

Performance and load testing in Identity Management (IdM) systems using encrypted DNS (eDNS) and CoreDNS in OpenShift clusters

Josep Andreu Font +1

This blog post presents the performance analysis of Identity Management (IdM) when encrypted DNS (eDNS) is introduced in an Red Hat OpenShift 4.20 cluster. The post includes a detailed discussion on the architecture of the setup, tuning of IdM, and performance testing of the system under various scenarios. The results demonstrate that the system can sustain high throughput and low latency even with eDNS, making it a suitable choice for secure and high-performance DNS solutions.

Featured image for security.
Article

Deeper visibility in Red Hat Advanced Cluster Security

Sabina Aledort +1

Discover the new features in Red Hat Advanced Cluster Security that allow integrating component health and security data into Prometheus for better observability and alerting.

Red Hat Enterprise Linux 9 feature_image
Article

Secure Boot certificate changes in 2026: Guidance for RHEL environments

Pradeep Jagtap

Learn about the upcoming expiration of Microsoft's Secure Boot signing certificate and its implications for Red Hat Enterprise Linux systems. Get comprehensive answers, resources, and recommended actions to ensure system bootability and security.

Feature image for Red Hat OpenShift
Article

What's new for developers in OpenShift 4.21

Shannon Madden

Red Hat OpenShift 4.21 introduces AI-driven insights, automated security signing, and local development tools to help you build and deploy faster.

Red Hat Developer Hub image
Article

Performance and load testing in Identity Management (IdM) systems using encrypted DNS (eDNS)

Josep Andreu Font +1

This article compares the performance of UDP, TCP, and DoT for DNS traffic in an Identity Management (IdM) environment under sustained high load. We explore a stress scenario with a standard client generating over 1,000 DNS queries per second against an IdM DNS server, and assess the impact of encryption on DNS performance.

Featured image for: micropipenv: Installing Python dependencies in containerized applications.
Article

How to reduce false positives in security scans

Miro Hrončok

Learn about Fedora Rawhide testing a solution that embeds SBOM metadata directly into Python wheels, allowing scanners to recognize backported security fixes.