Using Metrics to Guide Container Adoption, Part I

Using Metrics to Guide Container Adoption, Part I

Earlier this year, I wrote about a new approach my team is pursuing to inform our Container Adoption Program. We are using software delivery metrics to help keep organizations aligned and focused, even when those organizations are engaging in multiple workstreams spanning infrastructure, release management, and application onboarding. I talked about starting with a set […]

Read More...

OpenShift 4: Image Builds

OpenShift 4: Image Builds

One of the key differentiators of Red Hat OpenShift as a Kubernetes distribution is the ability to build container images using the platform via first class APIs. This means there is no separate infrastructure or manual build processes required to create images that will be run on the platform. Instead, the same infrastructure can be […]

Read More...

Cloud-Native CI/CD with OpenShift Pipelines

Cloud-Native CI/CD with OpenShift Pipelines

With Red Hat OpenShift 4.1, we are proud to release the developer preview of OpenShift Pipelines to enable creation of cloud-native Kubernetes-style continuous integration and continuous delivery (CI/CD) pipelines based on the Tekton project.  Why OpenShift Pipelines? OpenShift has long provided an integrated CI/CD experience based on Jenkins which is actively used by a large […]

Read More...

How to backup, clone and migrate Persistent Volume Claims on OpenShift

How to backup, clone and migrate Persistent Volume Claims on OpenShift

I recently implemented a complete backup solution for our Red Hat OpenShift clusters. I wanted to share the challenges we faced in putting together the OpenShift backups, restores, hardware migrations, and cluster-cloning features we needed to preserve users’ Persistent Volume Claims (PVCs). At the moment, these features are not implemented directly in Kubernetes, and it […]

Read More...

How Volkswagen Tests Autonomous Cars with GPUs and OpenShift

How Volkswagen Tests Autonomous Cars with GPUs and OpenShift

  When Volkswagen AG arrived at the Red Hat Open Innovation Lab two years ago, the company was looking for a solution to help them build self-driving autonomous cars. The venerable German automaker had all the internal pieces required to build those cars and write that software, but sometimes the trouble with self-driving cars is […]

Read More...

Building IT Transformation Architecture with Red Hat OpenShift

Building IT Transformation Architecture with Red Hat OpenShift

In the era of mobile applications, business challenges to the enterprise IT organizations are more dynamic than ever. Many enterprises have difficulties responding in time because of the inherent complexity and risk of integrating emerging technologies into existing IT architectures. In this article, I will share my experience on how to utilize Red Hat OpenShift […]

Read More...

Pod Evictions based on Taints/Tolerations

Pod Evictions based on Taints/Tolerations

Red Hat OpenShift 4 is making an important and powerful change to the way pod evictions work. OpenShift has transitioned from using node conditions to using a Taint/Toleration based eviction process, which provides individual pods more control over how they are evicted. This new capability was added in Kubernetes 1.12 and enabled in OpenShift 4.1 […]

Read More...

Software Defined Storage: The Next Killer App for Cloud

Software Defined Storage: The Next Killer App for Cloud

  It’s never going to be possible to completely disconnect software from hardware. Indeed, hardware development is having a bit of a rebirth as young developers rediscover things like the 6502, homebrew computing, and 8-bit assembly languages. If this keeps going, in 20 years developers will reminisce fondly and build hobby projects in early IoT […]

Read More...

Requesting and installing Let’s Encrypt Certificates for OpenShift 4

Requesting and installing Let's Encrypt Certificates for OpenShift 4

Overview Red Hat OpenShift uses certificates to encrypt the communication with the Web Console as well as applications exposed as Routes. Without any further customization the install process will create self-signed certificates. While these work they usually trigger severe security warnings about unknown certificates in Web Browsers when accessing either the Web Console or any […]

Read More...