Kubernetes:
- Building a Production-Ready DevSecOps Pipeline on AWS (EKS + Jenkins + Trivy + SonarQube),
- Node-RED on Kubernetes & OpenClaw on Ubuntu 24.04 — Integration Guide,
OpenShift:
- Modernize virtual machines on Google Cloud with Red Hat OpenShift Virtualization,
- Integrate Claude Code with Red Hat AI Inference Server on OpenShift,
- Red Hat and Google Cloud Expand Collaboration to Accelerate Application Modernization and Cloud Migration with Red Hat OpenShift,
- Stop Guessing at Low-Latency: A Hands-On Guide to OpenShift Performance Optimization,
- Understanding Loki Rate Limits in OpenShift Logging,
- What’s new in Red Hat OpenShift Virtualization 4.21,
- From Drift to Enforcement: A Self-Healing Security and Compliance Engine for OpenShift,
- The Guide to OpenBao – Secrets Engines KV – Part 8,
- The Guide to OpenBao – Secrets Engines PKI – Part 9,
- OpenShift Role-Based Access Control (RBAC) Implementation and Management,
- Spending transaction monitor: Agentic AI for intelligent financial alerts,
- Fencing OpenShift Virtualization Workloads with Fence Agents Remediation (FAR) and a Redfish Emulator,
- Architecture Deep Dive — How ODF, Ceph, and OpenShift Virtualization Deliver Enterprise‑Grade VM Disaster Recovery,
- Setting Up Distributed Tracing in OpenShift with Tempo,
- Autonomous Multi-Agent Log Analysis on OpenShift: Deep Dive into Intelligent Troubleshooting,
- Scaling Without the Sting: Using In-Place Pod Resize to Solve the “Restart Tax” on OpenShift,
- Announcing Red Hat Advanced Cluster Security for Kubernetes 4.10,
- From network telemetry to operational intelligence,
- How to get raw device mapping with OpenShift Virtualization,
- Unlocking efficiency: A guide to operator cache configuration on Red Hat OpenShift and Kubernetes,
- Implement a multicluster event exporter for enterprise automation,
- Blast radius validation: Large and small Red Hat OpenShift nodes,
- Faster AI/ML container startup with additional storage in Red Hat OpenShift 4.22,
- Beyond guesswork: Generating accurate ingress firewall rules with oc commatrix,
- Red Hat build of Perses with the cluster observability operator,
- ARCADIANS Clone — Classic BBC Micro Game,
- Automating HashiCorp Vault Seal/Unseal with Kasten K10 Backup Hooks,
- Kasten Backup Alerter,
- Kasten Backup Summary Dashboard,
- Managed identity in Azure Red Hat OpenShift: Deploy in just a few clicks with the Azure portal,
- Distributed tracing for agentic workflows with OpenTelemetry,
- Running Karpathy’s autoresearch on Red Hat OpenShift AI: 198 experiments, zero intervention,
Containers:
- Keycloak 26 on Podman with Quadlets: Identity Management the systemd Way,
- Introducing the Red Hat Universal Base Image,
- Using containers to bring software engineering rigor to AI workloads,
- Bootable containers: Reduce friction with Red Hat Enterprise Linux image mode,
- Podman in Production: Quadlets, Secrets, Auto-Updates, and Docker Compatibility,
- Podman on FreeBSD: OCI Containers Without systemd,
Service Mesh:
RHEL:
- Reproducible builds in Project Hummingbird,
- Scale LLM fine-tuning with Training Hub and OpenShift AI,
- AIOps and MLOps made simple: Automating Vertex AI with Red Hat Ansible Automation Platform,
- Red Hat Enterprise Linux now supported for Microsoft SQL Server on Azure VMs with SQL IaaS Agent extension,
- Unsloth and Training Hub: Lightning-fast LoRA and QLoRA fine-tuning,
- Why customers are choosing Red Hat AI for real business outcomes,
- Red Hat AI tops MLPerf Inference v6.0 with vLLM on Qwen3-VL, Whisper, and GPT-OSS-120B,
- How to plan your RHEL lifecycle with AI,
- Enabling long-term stability: Introducing Red Hat Enterprise Linux Extended Life Cycle, Premium,
- Automating the modern network: A Q1 network automation recap,
- Take your automation to the next level with Ansible Content Collections for Windows, Splunk, AIOps, MCP, and more,
- Red Hat solutions for the hybrid SAP landscape,
- Refactoring at the speed of mission: An “agent mesh” approach to legacy system modernization with Red Hat AI,
- Part I: AI for scientific research: The power of small language models,
- Set up a CI framework using Red Hat Ansible Automation Platform, Podman, and Horreum,
Miscellaneous:
- AI security: Defending against prompt injection and unsafe actions,
- systemd v260 released,
- PyTorch Call Stack Deep Dive: Tracing Tensor Operations from Python to C++ Kernels,
- AI security: Identity and access control,
- 4 use cases for AI in cyber security,
- Vibes, specs, skills, and agents: The four pillars of AI coding,
- JBoss EAP XP 6.0: Achieving observability with OpenTelemetry,
- I Tested Local LLMs to Triage My Gmail. Here’s What Worked,
- Make a private CA with step-ca,
- Running LLMs dynamically, in production, on limited resources, is hard. We think there’s room for another approach…,
- Run Gemma 4 with Red Hat AI on Day 0: A step-by-step guide,
- Introduction to Linux interfaces for virtual networking,
- KV Caching Explained: Optimizing Transformer Inference Efficiency,
- How a Poisoned Security Scanner Became the Key to Backdooring LiteLLM,
- Harness engineering: Structured workflows for AI-assisted development.
Recent Comments