OpenShift blog

    June 3, 2021

    CVE-2021-30465 Mitigated by Default in OpenShift

    The ultimate goal of almost every hacker is to go up. To step up. To grab root, and use it to go higher or lower on the stack, depending upon your perspective. That first foothold is the key element ...

    Alex Handy

    May 27, 2021

    A Brief Introduction to Red Hat Advanced Cluster Security for Kubernetes

    We recently announced the release of a new edition of Red Hat OpenShift called OpenShift Platform Plus, which includes Red Hat Advanced Cluster Security for Kubernetes (powered by StackRox). In this ...

    Ajmal Kohgadai

    May 24, 2021

    Container Scanning: How to Connect Snyk With Red Hat Quay

    This is a guest post written by Jim Armstrong of Snyk. Containers are the building blocks of modern applications, so securing them is crucial for today’s enterprises. Scanning images directly within ...

    Alex Handy

    May 20, 2021

    Building an Air-Gap Friendly Operator

    In my last post I covered what you need to consider to build ‘air-gap friendly’ Operators - Operators that deploy and run cleanly in environments with no internet access of any kind. In this post I ...

    Adam Goossens

    May 19, 2021

    How to Use HashiCorp Vault and Argo CD for GitOps on OpenShift

    To allow for more secure GitOps practices, sensitive data should should never be stored in Git. This presents a bit of a conundrum for GitOps, we need the secrets in Git... but we do not want to ...

    Phil Moses

    May 13, 2021

    SSO Integration for the OpenShift GitOps Operator

    This is a demo-heavy blog. Readers of this blog will get an idea about why SSO is important, how OpenShift handles authN/authZ and a step-by-step guide on using Red Hat Single Sign-On(RHSSO) to log ...

    Dewan Ahmed and Abhishek Veeramalla

    May 6, 2021

    How to Configure LDAP Sync With CronJobs in OpenShift

    On the OpenShift platform, both roles and cluster roles can be assigned to users and / or groups. However, assigning these roles quickly becomes unfeasible in an environment with many users. ...

    Zanoni Maciel

    April 26, 2021

    How to Configure Okta as An Identity Provider for OpenShift

    Prerequisites Okta provides several paid offerings to customers. You can review them on the Okta page. In this tutorial, I am using a developer account with the Okta platform. You can get a trial ...

    Pravin Mali

    April 5, 2021

    Using Login.gov to Authenticate Against OpenShift Clusters

    In this article, we will walk through how to integrate Red Hat Single Sign-on (RH-SSO) with Login.gov as an identity provider for authenticating against OpenShift clusters. This configuration will ...

    Patrick Carney

    April 1, 2021

    Achieving Accurate Vulnerability and Compliance Scanning for OpenShift Images and Containers

    This is a guest post written by NeuVector's Glen Kosaka NeuVector partners with Red Hat to ensure accurate, consistent image vulnerability and compliance scanning results from build to ship to run. ...

    Alex Handy

    March 25, 2021

    DevSecOps is the Way: Monthly OpenShift Security Series

    Starting March 2021 the Red Hat Security Ecosystem team is happy to announce our monthly OpenShift series, “DevSecOps is the Way” In this series you will learn how Red Hat weaves together DevOps and ...

    Dave Meurer

    March 25, 2021

    A Guide to Running your Application in the OpenShift Service Mesh

    What’s there to think about?   This post is a "checklist" of items that you should consider before you start to integrate your application into OpenShift Service Mesh (OSSM).  This is the checklist I ...

    Steve Bylo