Banking 2030: What can we expect?

This text takes a look at the next couple of years regarding the banking industry and its repercussions on the underlying IT, makes assumptions and then some theories how it might develop. So up front a disclaimer: I do not have a glass orb and therefore my guess is probably as good as anyone’s. Executive […]

Optimizing a systemd service for security

First of all: What is a systemd service ? systemd is an init system in the Linux world, similar but not identical to init or SysVinit init systems (see [8]). There has been much discussion about this, but in the end all major distributions have for some time now switched to systemd. Essentially, systemd moves […]

Using OpenTelemetry and Jaeger with Your Own Services/Application

In this blog I will guide you on How to use OpenTelemetry with a Quarkus application. How to display your OpenTeleemtry information on Jaeger UI. In this blog I will use distributed tracing to instrument my services to gather insights into my service architecture. I am using distributed tracing for monitoring, network profiling, and troubleshooting […]

Red Hat Advanced Cluster Security with OpenShift Pipelines and Slack Integration

Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]

Correct Estimates? A personal perspective

Motivation A while ago I paused an exchange on twitter. I have been in a strong disagreement with what was stated from Alex. To avoid being bullish on a short reply, it took some time to reply in due respect and also purposefully.  Nevertheless, I need to agree to some extend: There might be cases […]

“This space intentionally left blank”

We’ll be back next week…

Security aspects with OpenShift – an overview

Today more than ever availability and performance depend on resilience against increasingly frequent and powerful attacks on the confidentiality, availability and integrity of information and IT systems. It is not just that our systems are being threatened with continuous automated attacks, but also with highly sophisticated approaches, such as Advanced Persistent Threats (APTs), Ransomware, Side […]

Ansible Middleware : Automation of JBoss Web Server (JWS)

In a previous article, we discussed the importance of Ansible from a Middleware perspective and why making Middleware a first-class citizen in the Ansible ecosystem is crucial. In this post, we’ll explore the technical details of utilizing Ansible for automating a Middleware solution.  We’ll focus on one of the most used middleware software: Apache Tomcat. […]

“Oops, something is wrong with your GitOps application!”

GitOps – Operations by Pull Request GitOps, a natural evolution of the DevOps practice, has gained popularity ever since it was introduced by Weaveworks in 2017. The core idea of GitOps is to treat “everything” as code. What does it mean? You will need to describe the desired state of your system declaratively as code, […]

OpenShift absichern für die Gesundheitsbranche

For english content please see the blog post by Chris Jenkins at  https://www.redhat.com/en/blog/openshift-security-hardening-healthcare-industry which essentially presents the same information as this post. Because of the importance of the topic and the ask from our german-language customers we wanted to also present this information in german. “Security is not a product, it itself is a process” […]