
Reliability Nightmares: The Coloring Book
See site reliability engineering (SRE) principles in action and learn how to improve the operability of your code base with this developer coloring book.
See site reliability engineering (SRE) principles in action and learn how to improve the operability of your code base with this developer coloring book.
Discover how Red Hat Ansible Automation Platform provides better security by automating intrusion detection, edge security, firewalls, and more.
Find recent articles on observability, containerizing .NET applications, tips for building security into your Node.js development process, and more.
Discover how to improve the security of your Software-as-a-Service deployment at the hardware, OS, container, Kubernetes cluster, and network levels.
Online events and regional events held around the world with Red Hat's Developer Advocates.
Dekorate simplifies the management of custom resources for cert-manager certificates in the cloud. Learn an easier way to generate cert-manager custom resources.
Security policies can be deployed through CI/CD and Red Hat Advanced Cluster Security for Kubernetes. Read on to learn how.
Security, code tracing, SaaS, and more: Get the Red Hat Developer highlights for the month.
Looking to understand the various cross-site scripting techniques used by attackers? Learn the details from developer experts including XSS prevention methods.
See how a number of tools, like KubeLinter, kube-bench, and kube-hunter, can reveal problems in your Kubernetes configuration.
Red Hat's report, 2022 State of Kubernetes security, offers recommendations for organizations' practices to increase protection.
A Red Hat survey revealed that security flaws are hindering innovation in Kubernetes container environments. DevSecOps is described as an emerging model.
Learn commands for the systemd service, which is found in Red Hat Enterprise Linux as well as other Linux distributions.
Smash-stacking attacks are common, but the GCC and Clang compilers have a number of flags that can help defend against them. Read on for more info.
You can compile Go code on Red Hat Enterprise Linux in such a way that it complies with U.S. Federal encryption standards. Find out how.
It is now easier to use Cryostat for monitoring Java applications on OpenShift. This article details changes to the login flow in Cryostat 2.1.
Use Red Hat's SSO with OpenLDAP to authorize producers and consumers for Kafka in Red Hat AMQ Streams
Red Hat's single sign-on technology can offer federated authentication through open source Kerberos. This article shows the steps to implementation.
A trip through Red Hat Developer's content for the month, with articles on GCC 12, Java in containers, Red Hat's SSO technology, and much more.
Learn how to configure a Quarkus Java application to authenticate with Red Hat's SSO on Red Hat Openshift or Red Hat Enterprise Linux.
Learn how to use Ansible to automate the installation and setup of Red Hat's single sign-on technology, which is based on Keycloak.
Download Getting GitOps, a practical guide to modern development with Kubernetes focused on application distribution via CI/CD and GitOps on Red Hat OpenShift.
Get started with new features in Red Hat Data Grid 8.3, including cross-site replication improvements, two new SQL cache stores, and Helm chart support.
Discover how Project Thoth solves dependency management issues and vulnerabilities in the Python ecosystem, making the resolution process cloud-based.
Improve your Kubernetes apps' security with runtime checks on sensitive activities. Record seccomp profiles using the Security Profiles Operator and eBPF.