Thank you to everyone who attended Summit 2019 in Boston and engaged with Red Hat Services! Our wonderful customers, partners, and attendees fostered engaging conversations with our team. We appreciate each of you who sought us out in the Customer Success Zone and the Partner Success Lounge to ask thoughtful questions, learn more about enabling yourself to adopt Red Hat technologies, and participated in our events. For those who weren’t able to connect with us, here’s what you missed:
Continue reading “Red Hat Services at Summit 2019: Event Recap”
Like many others in the technology industry, I share a passion for artificial intelligence (AI). This year at OpenStack Summit in Berlin, I presented a talk around parallel AI training. OpenStack lends itself well to big data problems.
Continue reading “Welcome to the AI Thunderdome: Using OpenStack to accelerate AI training with Sahara, Spark, and Swift”
Security technical implementation guides (STIGs) provide a standardized set of security protocols for practically any system. From networks to servers and computers, STIGs are designed to enhance overall security and reduce vulnerabilities. But what happens when the guidelines vary across an enterprise? How do you apply these to a specific product without breaking it? Challenge accepted.
Continue reading “Steps for testing DISA STIG controls against Satellite 6”
Originally posted on She ITs and Giggles blog.
Most of us have been using PAM when authenticating without really thinking about it, but for the few of us that have actually tried to make sense of it, PAM is the partner that always says “no”, unless otherwise stated. It’s the bane of any sysadmin’s existence when it comes to making system x secure, and it becomes a major pain point on and off when I forget about the normal rules of engagement.
Continue reading “PAM – Pluggable Authentication Modules for Linux and how to edit the defaults”
Hello, my name is Christopher Tate and I want to show you how to set up virtualization and a virtual machine for DNS and Identity Management to open our OpenShift web console and routes to the network.
In my previous videos, I showed you how to install OpenShift with valid SSL certificates.
Hey Tate: Step by step securing OpenShift and routes with SSL certificates for development.
Continue reading “Hey Tate: Libvirt Virtualization and running ipa-server for DNS to resolve Openshift routes on the network”
I created this series of videos to show how to first, purchase a domain name for cheap, to use for valid SSL certificates and URLs for all your applications. I do this for learning and developing applications, not just for deploying to production. Then I show how to generate a free SSL certificate for secure, verified https connections to your sites. Then I show you how to run OpenShift locally, from the ground up, with SSL certificates for the web console, and all routes.
Continue reading “Hey Tate: Step by step securing OpenShift and routes with SSL certificates for development”
Next week in Vancouver, Canada thousands of OpenStack users will meet at the seventeenth annual OpenStack Summit. This year will expand beyond OpenStack to cover topics like CI/CD, container infrastructure, Edge Computing, HPC, Open Source communities, private, hybrid, and public cloud, and telecommunications.
Continue reading “Learn how to manage OpenStack with Ansible, this year at OpenStack Summit”
For Red Hat customers using Satellite 5 and its “System Groups” & “System Group Administrator” functionality, only specified users are allowed to manage certain groups of systems (system groups).
Continue reading “Mimic System Group Administrator Role with Active Directory as LDAP Authentication Backend”