OpenShift blog

    September 8, 2020

    Guide to Kubernetes Security Context & Pod Security Policy (PSP)

    Securing pods, and the containers that run as part of them, is a critical aspect of protecting your Kubernetes environments. Among other reasons, pods and containers are the individual units of ...

    Wei Lien Dang

    September 8, 2020

    Visual Web Terminal - A Turbocharged Command Line for Kubernetes and OpenShift

    Do you ever get tired of typing kubectl and oc commands? Tired of cutting and pasting pieces of output to create new kubectl and oc commands? If you answered yes, take a look at the Visual Web ...

    Chris Ahl, Mark Anderson and Subbarao Meduri

    August 31, 2020

    Pushing the Limits of OpenShift 4.5 at Scale

    There is an increasing demand for running and managing cloud native applications on a platform that is able to handle the surge in traffic in a scalable and performant manner.  OpenShift is the go-to ...

    Naga Ravi Chaitanya Elluri

    August 27, 2020

    Reinforcing Cerberus: Guardian of OpenShift/Kubernetes Clusters

    Cerberus monitors OpenShift/Kubernetes cluster health and exposes a go/no-go signal consumable by other benchmark tools. Since introducing Cerberus in the first blog post (OpenShift Scale-CI: Part 4: ...

    Yashashree Suresh and Paige Rubendall

    August 25, 2020

    Kubernetes 1.19 Arrives

    Congratulations to the Kubernetes community on reaching Kubernetes 1.19. The community, a truly global one, has come together in these difficult times to produce yet another solid release.  1.19 ...

    Tushar Katarki

    August 13, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Discovery

    Part seven of our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – examines the technique known as Discovery. The tactics in this ...

    Wei Lien Dang

    August 5, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Credential Access

    Part six of our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – covers Credential Access, a set of activities intended for stealing ...

    Wei Lien Dang

    August 4, 2020

    How to Integrate Open Policy Agent with Red Hat Advanced Cluster Management for Kubernetes policy framework

    Overview Open Policy Agent (OPA) is a generic policy engine to help you to make decisions based on the policy you defined using a lightweight programming language called Rego. Red Hat Advanced ...

    Christian Stark & Yu Cao

    July 28, 2020

    A Guide to OpenShift and UIDs

    Introduction When designing a Containerfile/Dockerfile, there is an option to specify the User ID (UID) which will be used to execute the application inside the Container. When the container is ...

    William Caban Babilonia

    July 27, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Defense Evasion

    The fifth installment in our nine-part blog series – where we examine each of the nine MITRE ATT&CK tactics and techniques for Kubernetes – covers Defense Evasion, a grouping of techniques focused on ...

    Wei Lien Dang

    July 19, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Privilege Escalation

    Part four of our nine-part blog series on the various Kubernetes threat vectors and tactics covers Privilege Escalation, which encompasses techniques that enable an attacker to gain additional ...

    Wei Lien Dang

    July 14, 2020

    Protecting Kubernetes Against MITRE ATT&CK: Persistence

    This is part three of a nine-part blog series where we examine each of the nine Kubernetes threat vectors across 40 attack techniques and provide actionable advice to mitigate these threats.  Part ...

    Wei Lien Dang