Language Selection

English French German Italian Portuguese Spanish

Red Hat and Fedora: OpenShift, Fedora 32 Cloud Test Day Tomorrow and Cockpit 215

Filed under
Red Hat
  • Creating an upstream to downstream pipeline

    When an engineer I work closely with first suggested we work on the Service Telemetry Framework docs upstream and then synchronize downstream, I was excited and enthusiastic but pretty clueless as to how to even begin.

    There are lots of advantages to single-sourcing your content: you and the engineers save time on working on one set of docs, quality of upstream docs should improve, and if a change occurs, you only have to update it in one place.

  • Customers realize Multi-Cloud benefits of OpenShift

    IDC further predicted that, "Through 2024, 75% of CIOs will reshape all IT resources, including budgets, assets, and talent, to support real-time resource allocation and enterprise agility, dramatically reducing fixed costs."

    The key to unlocking these business innovations is the open hybrid cloud model. Incorporating multiple hardware providers, hardware types, locations, devices, developers, services and billing models, the hybrid cloud model of application delivery enables developers to innovate around the globe, at the edge, with AI, at scale and with reliability.

  • OpenShift Commons Briefing: Workload Consistency During Ceph Updates and Adding New Storage Devices with Red Hat’s Sagy Volkovb

    This is the second briefing of the “All Things Data” series of OpenShift Commons briefings. Future briefings are Tuesdays at 8:00am PST, so reach out with any topics you’re interested in and remember to bookmark the OpenShift Commons Briefing calendar!

    In this second briefing for the “All Things Data” OpenShift Commons series, Red Hat’s Sagy Volkov gave a live demonstration of an OpenShift workload remaining online and running while Ceph storage updates and additions were being performed. This workload resilience and consistency during storage updates and additions is crucial to maintaining highly available applications in your OpenShift clusters.

  • Red Hat OpenShift Installation Process Experiences on IBM Z/LinuxONE

    OpenShift stands out as a leader with a security-focused, supported Kubernetes platform—including a foundation based on Red Hat Enterprise Linux.

    But we already knew all that, the game changer for OpenShift, is the release of OCP version 4.x: OpenShift 4 is powered by Kubernetes Operators and Red Hat’s commitment to full-stack security, so you can develop and scale big ideas for the enterprise.

    OpenShift started with distributed systems. It was eventually extended to IBM Power Systems, and now it is available on IBM Z. This creates a seamless user experience across major architectures such as x86, PPC and s390x!

  • Connect PHP 7 to Oracle Database using packages from Oracle Linux Yum Server

    We recently added PHP 7.4 to our repos on Oracle Linux yum server. These repos include also include the PHP OCI8 extenstion to connect your PHP applications to Oracle database.

    In this post I describe the steps to install PHP 7.4, PHP OCI8 and Oracle Instant Client on Oracle Linux to connect PHP to Oracle Database. For this blog post, I used a free Autonomous Database included in Oracle Cloud Free Tier.

  • Fedora Community Blog: Fedora 32 Cloud Test Day March 20th

    Now that the Fedora Beta is officially released, the Fedora Cloud SIG would like to get the community together this week to find and squash some bugs. We are organizing a test day for Friday, March 20th.

    For this event we’ll test Fedora Cloud Base content. See the Alternative Downloads Beta Page for links to the Beta Cloud Base Images. We have qcow, AMI, and ISO images ready for testing.

  • Cockpit 215

    Cockpit is the modern Linux admin interface. We release regularly. Here are the release notes from version 215.

The 20 Best Red Hat Linux Certifications and Courses in 2020

  • The 20 Best Red Hat Linux Certifications and Courses in 2020

    Linux has come a long way since its inception and now powers a majority of the web infrastructure. Linux admins are already in high-demand while new lucrative computer science jobs are opening every day. There are many well-reputed Linux certifications that will help you land your dream job in no time. Red Hat Linux certifications are one of the most prominent in this regard. You can easily prove your Linux credentials to employers if you have completed any Red Hat courses. Moreover, you don’t necessarily need to obtain certifications if you’re just sharpening skills. Simply complete some online courses that validate your knowledge in some way.

Comment viewing options

Select your preferred way to display the comments and click "Save settings" to activate your changes.

More in Tux Machines

Python Programming

  • Python 2.7.18rc1

    Python 2.7.18 release candidate 1 is a testing release for Python 2.7.18, the last release of Python 2.

  • Python 2.7.18 release candidate 1 available

    A first release candidate for Python 2.7.18 is now available for download. Python 2.7.18 will be the last release of the Python 2.7 series, and thus Python 2.

  • Python Software Foundation: Python Software Foundation Fellow Members for Q1 2020

    Congratulations! Thank you for your continued contributions. We have added you to our Fellow roster online. The above members have contributed to the Python ecosystem by teaching Python, creating education material, contributing to circuitpython, contributing to and maintaining packaging, organizing Python events and conferences, starting Python communities in their home countries, and overall being great mentors in our community. Each of them continues to help make Python more accessible around the world. To learn more about the new Fellow members, check out their links above. Let's continue to recognize Pythonistas all over the world for their impact on our community. The criteria for Fellow members is available online: https://www.python.org/psf/fellows/. If you would like to nominate someone to be a PSF Fellow, please send a description of their Python accomplishments and their email address to psf-fellow at python.org. We are accepting nominations for quarter 2 through May 20, 2020.

  • How to Make an Instagram Bot With Python and InstaPy

    What do SocialCaptain, Kicksta, Instavast, and many other companies have in common? They all help you reach a greater audience, gain more followers, and get more likes on Instagram while you hardly lift a finger. They do it all through automation, and people pay them a good deal of money for it. But you can do the same thing—for free—using InstaPy! In this tutorial, you’ll learn how to build a bot with Python and InstaPy, which automates your Instagram activities so that you gain more followers and likes with minimal manual input. Along the way, you’ll learn about browser automation with Selenium and the Page Object Pattern, which together serve as the basis for InstaPy.

  • Sending Encrypted Messages from JavaScript to Python via Blockchain

    Last year, I worked with the Capacity team on the Crypto stamp project, the first physical postage stamp with a unique digital twin, issued by the Austrian Postal Service (Österreichische Post AG). Those stamps are mainly intended as collectibles, but their physical "half" can be used as valid postage on packages or letters, and a QR code on that physical stamp links to a website presenting the digital collectible. Our job (at Capacity Blockchain Solutions) was to build that digital collectible, the website at crypto.post.at, and the back-end service delivering both public meta data and the back end for the website. I specifically did most of the work on the Ethereum Smart Contract for the digital collectible, a "non-fungible token" (NFT) using the ERC-721 standard (publicly visible), as well as the back-end REST service, which I implemented in Python (based on Flask and Web3.py). The coding for the website was done by colleagues, of course using JavaScript for the dynamic elements.

  • Unpacking in Python: Beyond Parallel Assignment

    Unpacking in Python refers to an operation that consists of assigning an iterable of values to a tuple (or list) of variables in a single assignment statement. As a complement, the term packing can be used when we collect several values in a single variable using the iterable unpacking operator, *. Historically, Python developers have generically referred to this kind of operation as tuple unpacking. However, since this Python feature has turned out to be quite useful and popular, it's been generalized to all kinds of iterables. Nowadays, a more modern and accurate term would be iterable unpacking. In this tutorial, we'll learn what iterable unpacking is and how we can take advantage of this Python feature to make our code more readable, maintainable, and pythonic. Additionally, we'll also cover some practical examples of how to use the iterable unpacking feature in the context of assignments operations, for loops, function definitions, and function calls.

  • Spin the table: Solution!

today's howtos

Security Leftovers

  • Security updates for Monday

    Security updates have been issued by Debian (firefox-esr, gnutls28, and libmtp), Fedora (cyrus-sasl, firefox, glibc, squid, and telnet), Gentoo (firefox), Mageia (dcraw, firefox, kernel, kernel-linus, librsvg, and python-nltk), openSUSE (firefox, haproxy, icu, and spamassassin), Red Hat (nodejs:10, openstack-manila, python-django, python-XStatic-jQuery, and telnet), Slackware (firefox), SUSE (bluez, exiv2, and libxslt), and Ubuntu (firefox).

  • Open Source Security Podcast: Episode 191 - Security scanners are all terrible

    Josh and Kurt talk about security scanners. They're all pretty bad today, but there are some things we can do to make them better. Step one is to understand the problem. Do you know why you're running the scanner and what the reports mean?

  • Misconfigured Docker API Ports Targeted by Kinsing Malware

    Security researchers observed an attack campaign that targeted misconfigured Docker API ports with samples of Kinsing malware. According to Aqua Security, the campaign began when it capitalized on an unprotected Docker API port to run a Ubuntu container. The command used for creating the Ubuntu container included a shell script “d.sh.” By means of its 600+ lines of code, the shell script began by disabling security measures, clearing logs and disabling other malware and cryptominer samples. It’s then that the command killed rival malicious Docker containers before loading its Kinsing payload.

  • L1d Cache Flush On Context Switch Moves Forward For Linux In Light Of Vulnerabilities

    A new patch series sent out just under one month ago was providing opt-in L1 data cache flushing on context switching. That work has now been revived again and now with documentation added it's clear that this work is being done in response to a recent CVE being made public. The patches originally sent out by an Amazon engineer characterized the work as for the "paranoid due to the recent snoop assisted data sampling vulnerabilities, to flush their L1D on being switched out. This protects their data from being snooped or leaked via side channels after the task has context switched out."

Galaxy Chromebook reviews

I can't imagine using something this fancy without wiping out the toy OS and installing Ubuntu Linux instead. One thing that struck me is that The Verge's full-column warning (partially embedded below) about the clickwrap contracts the user must agree to just to start the machine. These are commonplace with gadgets, but rarely in such great numbers or with such hostile presentation. The reviewer writes they were unable to read them. Tech companies have turned Linux into a transmission vector for adhesion contracts that are virtually impossible to read. To think, they used to complain that the GPL was a virus! Read more