This text takes a look at the next couple of years regarding the banking industry and its repercussions on the underlying IT, makes assumptions and then some theories how it might develop. So up front a disclaimer: I do not have a glass orb and therefore my guess is probably as good as anyone’s. Executive […]
First of all: What is a systemd service ? systemd is an init system in the Linux world, similar but not identical to init or SysVinit init systems (see [8]). There has been much discussion about this, but in the end all major distributions have for some time now switched to systemd. Essentially, systemd moves […]
In this blog I will guide you on How to use OpenTelemetry with a Quarkus application. How to display your OpenTeleemtry information on Jaeger UI. In this blog I will use distributed tracing to instrument my services to gather insights into my service architecture. I am using distributed tracing for monitoring, network profiling, and troubleshooting […]
Summary This article describes the installation of Red Hat Advanced Cluster Security (RHACS) using the Operator. It also covers the integration of Tekton Pipelines for the deployment of two different containers and the configuration of a Slack notification. A special feature here is that the installation and configuration is largely automated by scripts and can […]
Motivation A while ago I paused an exchange on twitter. I have been in a strong disagreement with what was stated from Alex. To avoid being bullish on a short reply, it took some time to reply in due respect and also purposefully. Nevertheless, I need to agree to some extend: There might be cases […]
We’ll be back next week…
Today more than ever availability and performance depend on resilience against increasingly frequent and powerful attacks on the confidentiality, availability and integrity of information and IT systems. It is not just that our systems are being threatened with continuous automated attacks, but also with highly sophisticated approaches, such as Advanced Persistent Threats (APTs), Ransomware, Side […]
In a previous article, we discussed the importance of Ansible from a Middleware perspective and why making Middleware a first-class citizen in the Ansible ecosystem is crucial. In this post, we’ll explore the technical details of utilizing Ansible for automating a Middleware solution. We’ll focus on one of the most used middleware software: Apache Tomcat. […]
GitOps – Operations by Pull Request GitOps, a natural evolution of the DevOps practice, has gained popularity ever since it was introduced by Weaveworks in 2017. The core idea of GitOps is to treat “everything” as code. What does it mean? You will need to describe the desired state of your system declaratively as code, […]
For english content please see the blog post by Chris Jenkins at https://www.redhat.com/en/blog/openshift-security-hardening-healthcare-industry which essentially presents the same information as this post. Because of the importance of the topic and the ask from our german-language customers we wanted to also present this information in german. “Security is not a product, it itself is a process” […]