Security

Featured image for Automate dependency analytics with GitHub Actions
Article

End-to-end field-level encryption for Apache Kafka Connect

Hans-Peter Grahsl

This article introduces end-to-end encryption for data integration scenarios built on top of Apache Kafka using Kafka Connect together with the open-source library Kryptonite for Kafka.

Featured image for: Value range propagation in GCC with Project Ranger.
Article

GCC's new fortification level: The gains and costs

Siddhesh Poyarekar

Discover the gains and costs of GCC’s enhanced runtime buffer overflow protection. Level 3 _FORTIFY_SOURCE preprocessor macro may detect more buffer overflows, but there’s a cost.

Reliability Nightmares share image(2000x1000)
E-book

Reliability Nightmares: The Coloring Book

Máirín Duffy +4

See site reliability engineering (SRE) principles in action and learn how to improve the operability of your code base with this developer coloring book.

ansible share image
Article

5 examples of security automation with Ansible

Jamie Beck +1

Discover how Red Hat Ansible Automation Platform provides better security by automating intrusion detection, edge security, firewalls, and more.

Featured image for Red Hat article roundup
Article

Red Hat Developer roundup: Best of August 2022

Heiker Medina

Find recent articles on observability, containerizing .NET applications, tips for building security into your Node.js development process, and more.

Featured image for Kubernetes topics.
Article

8 open source Kubernetes security tools

Andy Oram

See how a number of tools, like KubeLinter, kube-bench, and kube-hunter, can reveal problems in your Kubernetes configuration.

systemd Commands cheat sheet card image
Cheat Sheet

systemd Commands Cheat Sheet

Bob Reselman

Learn commands for the systemd service, which is found in Red Hat Enterprise Linux as well as other Linux distributions.