Security

Share graphics_1Reliability Nightmares
E-book

Reliability Nightmares: The Coloring Book

Máirín Duffy +4

See site reliability engineering (SRE) principles in action and learn how to improve the operability of your code base with this developer coloring book.

ansible share image
Article

5 examples of security automation with Ansible

Jamie Beck +1

Discover how Red Hat Ansible Automation Platform provides better security by automating intrusion detection, edge security, firewalls, and more.

Featured image for Red Hat article roundup
Article

Red Hat Developer roundup: Best of August 2022

Heiker Medina

Find recent articles on observability, containerizing .NET applications, tips for building security into your Node.js development process, and more.

Page Thumbnail
Page

Developer events

Online events and regional events held around the world with Red Hat's Developer Advocates.

Featured image for Kubernetes topics.
Article

8 open source Kubernetes security tools

Andy Oram

See how a number of tools, like KubeLinter, kube-bench, and kube-hunter, can reveal problems in your Kubernetes configuration.

Share graphics_system commands
Cheat Sheet

systemd Commands cheat sheet

Bob Reselman

Learn commands for the systemd service, which is found in Red Hat Enterprise Linux as well as other Linux distributions.

Featured image for: SCTP over UDP in the Linux kernel.
Article

Is your Go application FIPS compliant?

Antonio Cardace +1

You can compile Go code on Red Hat Enterprise Linux in such a way that it complies with U.S. Federal encryption standards. Find out how.

Featured image for Red Hat article roundup
Article

Red Hat Developer roundup: Best of April 2022

Red Hat Developer Editorial Team

A trip through Red Hat Developer's content for the month, with articles on GCC 12, Java in containers, Red Hat's SSO technology, and much more.

2020 Authentication Author Keycloak
Article

Deploy Keycloak single sign-on with Ansible

Romain Pelisse

Learn how to use Ansible to automate the installation and setup of Red Hat's single sign-on technology, which is based on Keycloak.

Quarkus + data grid
Article

SQL cache stores and more in Data Grid 8.3

Syed M Shaaf

Get started with new features in Red Hat Data Grid 8.3, including cross-site replication improvements, two new SQL cache stores, and Helm chart support.

Feature image for secure coding.
Article

Secure your Kubernetes deployments with eBPF

Sascha Grunert

Improve your Kubernetes apps' security with runtime checks on sensitive activities. Record seccomp profiles using the Security Profiles Operator and eBPF.