Can Not Keep Up with Application Demand

 

 

 

 

 

 

 

 

 

 

When application requests start piling up, OpenShift Enterprise by Red Hat® can help you keep up with demand. This Platform-as-a-Service (PaaS) lets developers deploy on their time, optimizes your compute resources, and frees you up to focus on the future.

Enable your developers with velocity and stability.

Learn more at :

http://www.openshift.com

http://www.redhat.com/en/technologies/platform-as-a-service

http://www.redhat.com/en/technologies/cloud-computing/openshift

Kind Regards

Frederic

Red Hat Satellite Overview

 

 

 

 

 

 

 

In 2014, Red Hat launched Red Hat® Satellite 6, a new version of its classic Red Hat Enterprise Linux® life-cycle management solution. It includes some of the best in open system-management technology and a flexible architecture to manage scale from bare-metal to virtualized environments, and in public and private clouds.

 

Red Hat® Satellite is a complete cloud system management product that manages the full life cycle of your Red Hat deployments across physical, virtual, and private clouds. Watch this demo to see how Red Hat Satellite delivers system provisioning, configuration management, software management, and subscription management—all while maintaining high scalability and security.

 

Kind Regards

Frederic

Wildfly Camel

 

 

 

This quick tutorial  takes you through the first steps of getting Camel into WildFly[1][2] and provides the initial pointers to get up and running.

This explanation is based on the wildfly-camel Project[5].

First step is to download wilfly 8.1.0.Final at the following link : http://download.jboss.org/wildfly/8.1.0.Final/wildfly-8.1.0.Final.zip

Second step is to download the WildFly Camel Patch at the following link : https://repository.jboss.org/nexus/content/groups/public-jboss/org/wildfly/camel/wildfly-camel-patch/2.0.0.CR1/wildfly-camel-patch-2.0.0.CR1.tar.gz

Third step is to install the Camel Subsystem by applying  the patch into the wildfly 8.1.0.Final directory

[fhornain@localhost Project]$ ls
wildfly-8.1.0.Final  wildfly-8.1.0.Final.zip  wildfly-camel-patch-2.0.0.CR1.tar
[fhornain@localhost Project]$ cd wildfly-8.1.0.Final
[fhornain@localhost wildfly-8.1.0.Final]$ tar -xvf ../wildfly-camel-patch-2.0.0.CR1.tar

Then you have to create few users in order to have access to the wildfly administrator console and hawtio administration console/

[fhornain@localhost wildfly-8.1.0.Final]$ bin/add-user.sh 

What type of user do you wish to add?
 a) Management User (mgmt-users.properties)
 b) Application User (application-users.properties)
(a): a              

Enter the details of the new user to add.
Using realm 'ManagementRealm' as discovered from the existing property files.
Username : fhornainWildfly
Password recommendations are listed below. To modify these restrictions edit the add-user.properties configuration file.
 - The password should not be one of the following restricted values {root, admin, administrator}
 - The password should contain at least 8 characters, 1 alphabetic character(s), 1 digit(s), 1 non-alphanumeric symbol(s)
 - The password should be different from the username
Password :
Re-enter Password :
What groups do you want this user to belong to? (Please enter a comma separated list, or leave blank for none)[  ]:
About to add user 'fhornainWildfly' for realm 'ManagementRealm'
Is this correct yes/no? yes
Added user 'fhornainWildfly' to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/standalone/configuration/mgmt-users.properties'
Added user 'fhornainWildfly' to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/domain/configuration/mgmt-users.properties'
Added user 'fhornainWildfly' with groups  to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/standalone/configuration/mgmt-groups.properties'
Added user 'fhornainWildfly' with groups  to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/domain/configuration/mgmt-groups.properties'
Is this new user going to be used for one AS process to connect to another AS process?
e.g. for a slave host controller connecting to the master or for a Remoting connection for server to server EJB calls.
yes/no? yes
To represent the user add the following to the server-identities definition <secret value="XXXXXXXXXXXXXXXXXXX" /></pre>
<pre>[fhornain@localhost wildfly-8.1.0.Final]$
[fhornain@localhost wildfly-8.1.0.Final]$
[fhornain@localhost wildfly-8.1.0.Final]$ bin/add-user.sh 

What type of user do you wish to add?
 a) Management User (mgmt-users.properties)
 b) Application User (application-users.properties)
(a): b

Enter the details of the new user to add.
Using realm 'ApplicationRealm' as discovered from the existing property files.
Username : fhornainHawtio
Password recommendations are listed below. To modify these restrictions edit the add-user.properties configuration file.
 - The password should not be one of the following restricted values {root, admin, administrator}
 - The password should contain at least 8 characters, 1 alphabetic character(s), 1 digit(s), 1 non-alphanumeric symbol(s)
 - The password should be different from the username
Password :
Re-enter Password :
What groups do you want this user to belong to? (Please enter a comma separated list, or leave blank for none)[  ]: admin
About to add user 'fhornainHawtio' for realm 'ApplicationRealm'
Is this correct yes/no? yes
Added user 'fhornainHawtio' to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/standalone/configuration/application-users.properties'
Added user 'fhornainHawtio' to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/domain/configuration/application-users.properties'
Added user 'fhornainHawtio' with groups admin to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/standalone/configuration/application-roles.properties'
Added user 'fhornainHawtio' with groups admin to file '/home/fhornain/OttoProject/YttyProject2/wildfly-8.1.0.Final/domain/configuration/application-roles.properties'
Is this new user going to be used for one AS process to connect to another AS process?
e.g. for a slave host controller connecting to the master or for a Remoting connection for server to server EJB calls.
yes/no? yes
To represent the user add the following to the server-identities definition <secret value="XXXXXXXXXXXXXXXXXXX" /></code></pre>
<pre>

Finally, you can start your wildfly 8.1.0.Final java application server with the following command :

</pre>
<pre>[fhornain@localhost wildfly-8.1.0.Final]$ <code>bin/standalone.sh -c standalone-camel.xml</code></pre>
<pre>

Then you can log on the wildfly admin console via the following URL :  http://localhost:9990/console/App.html

Wildfly admin console

 

 

 

 

 

 

 

Or you can log on the hawtio[8] console via the following URL : http://127.0.0.1:8080/hawtio/login

Hawtio Console

 

 

 

 

 

 

 

Then you can see the sample camel route created by default for you through hawtio console :

Camel route diagram

 

 

 

 

 

 

 

Camel Route Source

 

 

 

 

 

 

 

FYI, this Camel XML route sample is located in your “standalone-camel.xml” configuration file you used to start your wildfly application server few minutes ago.

 <subsystem xmlns="urn:jboss:domain:camel:1.0">
 <camelContext id="system-context-1">
 <![CDATA[
 <route>
 <from uri="direct:start"/>
 <transform>
 <simple>Hello #{body}</simple>
 </transform>
 </route>
 ]]>
 </camelContext>
 </subsystem>

In conclusion, you are now ready to create camel route on top of wildfly[2].

N.B. if you are looking for certified and supported enterprise solutions please consider Red Hat JBoss EAP[6] or Red Hat JBoss Fuse[7]

Kind Regards

Frederic

[1] Based on the definition written on Wikipedia :

WildFly, formerly known as JBoss AS, or simply JBoss, is an application server authored by JBoss, now developed by Red Hat. WildFly is written in Java, and implements the Java Platform, Enterprise Edition (Java EE) specification. It runs on multiple platforms. http://en.wikipedia.org/wiki/WildFly

[2] http://wildfly.org/

[3] Based on the definition written on Wikipedia :

Apache Camel is a rule-based routing and mediation engine that provides a Java object-based implementation of the Enterprise Integration Patterns using an API (or declarative Java Domain Specific Language) to configure routing and mediation rules. The domain-specific language means that Apache Camel can support type-safe smart completion of routing rules in an integrated development environment using regular Java code without large amounts of XML configuration files, though XML configuration inside Spring is also supported. http://en.wikipedia.org/wiki/Apache_Camel

[4] https://camel.apache.org/

[5] https://github.com/wildfly-extras

[6] http://www.redhat.com/en/technologies/jboss-middleware/application-platform

[7] http://www.redhat.com/en/technologies/jboss-middleware/fuse

[8] http://hawt.io/

Openshift Workshop

 

 

 

 

 

 

Following my previous post named : [Open Source Cloud Day] Openshift | PaaS Sessions

Presentation can be downloded at http://www.slideshare.net/fhornain/openshift-enterprise-v2-workshop-december-2014

Kind Regards

Frederic

Secure Virtualization

 

 

 

 

 

 

 

In the escalating battle against malicious attackers who want to compromise enterprise level systems, you need cost-effective solutions to stop potential threats — both inside and outside the walls of government offices. Red Hat delivers rigorous security controls to prevent unauthorized access to systems and data with Red Hat® Security-Enhanced Linux® (SELinux) and Red Hat sVirt for virtual and cloud environments.

For more information visit: http://www.red.ht/OpenSourceSecurity

[1] http://www.redhat.com/en/insights/security

Fedora 21

 

 

 

 

While each variant aims to meet specific user demands, all are built from a common base set of packages that includes the same Linux kernel, RPM, yum, systemd, and Anaconda. This small, stable set of components allows for a solid foundation upon which to base the Fedora 21 variants.

 

https://getfedora.org.

 

 

 

 

 

 

 

Download available at the following URL : https://getfedora.org.

 

 


cloud

 

 

 

 

Designed to handle the myriad of computing requirements across different cloud deployments, Fedora 21 Cloud provides images for use in private cloud environments, like OpenStack, and Amazon Machine Images (AMIs) for use on Amazon Web Services (AWS), as well as a base image to enable creation of Fedora containers. Key features of Fedora 21 Cloud include:

Modular Kernel Packaging for Cloud Compuing – To save space and reduce “bloat” in cloud computing deployments, the Fedora 21 Cloud kernel contains the minimum modules needed for running in a virtualized environment; coupled with other size reduction work, the Fedora 21 Cloud image is roughly 25 percent smaller than that of previous Fedora releases, enabling faster deployment and increasing available space for critical applications.

Atomic logo

 

 

 

 

 

Fedora Atomic Host[1] – Using tools and patterns made available through Project Atomic, Fedora 21 offers the first “Atomic” host for Fedora, which includes a minimal package set and an image composed with only the run-times and packages needed to serve as an optimized host for Linux containers. Fedora Atomic Host allows for ”atomic” updates as a single unit, simplifying update management and providing the ability to roll-back updates if necessary. Fedora Atomic Host also includes Kubernetes for container orchestration and Cockpit for container management.

 

 


server

 

 

 

 

The Fedora 21 Server variant offers a common base platform for running featured application stacks (produced, tested, and distributed by the Fedora Server Working Group), providing a flexible foundation for Web servers, file servers, database servers, and even Platform-as-a-Service (PaaS) deployments. Fedora 21 Server delivers:

New Management Features – Fedora 21 Server introduces three new technologies to handle the management and installation of discrete infrastructure services.

 

Rolekit provides a Role deployment and management toolkit that helps administrators to install and configure a specific server role.

Rolekit

 

 

 

 

 

 

 

A Rolekit graphical interface should be provided with the cockpit project – see below –  in Fedora 22.

 

cockpit

 

 

 

Cockpit[2] is a Web-based user interface for configuring, managing, and monitoring servers, accessible remotely via a Web browser.

cockpit screenshot storage

 

 

 

 

 

 

 

 

openlmi

 

 

 

 

 

OpenLMI[3] delivers a remote management system built on top of Distributed Management Taskforce – Common Information Model (DMTF-CIM), offering scripting management functions across machines, capabilities querying and system event monitoring.

 

freeipa

 

 

 

Domain Controller – One of the roles offered through Rolekit, Fedora 21 Server packages freeIPA’s integrated identity and authentication solution for Linux/UNIX networked environments; machines running Fedora 21 Server can now offer centralized authentication, authorization, and account information by storing user, group, host, and other object data necessary to manage network security.

freeipa screenshot

 

 

 

 

 

 

 

 


workstation

 

 

 

Fedora 21

 

 

 

 

 

 

 

 

Revitalizing the Linux desktop, Fedora Workstation provides a polished, targeted system designed to offer a smooth experience for general desktop use as well as software development, from independent Web developers to corporate coders. New features in Fedora 21 Workstation include:

Streamlined Software Installation – The Software installer, a cornerstone component to Fedora 21 Workstation, allows users to quickly and easily locate their applications. It provides a responsive and fast user experience, going hand-in-hand with a greatly improved number of featured Fedora applications included with Fedora 21 Workstation.

Wayland Support (Experimental) – Wayland, a powerful next-generation display server technology, is included in Fedora 21 Workstation as an experimental build, allowing developers to test and integrate their applications with Wayland’s new capabilities.

DevAssistant – A developer “helper,” DevAssistant automates the setup process for a large number of language runtimes and integrated development environments (IDEs); DevAssistant also integrates with Fedora Software Collections, offering access to multiple versions of different languages without worrying about system software conflicts.

Fedora 21 redefines the very nature of the Fedora distribution, so users seeking to try all of the new capabilities for themselves or looking for additional information on all of the new features, enhancements and tweaks, please visit https://getfedora.org.

[1] http://www.projectatomic.io/

[2] http://cockpit-project.org/

[3] http://www.openlmi.org/

[4] http://www.freeipa.org

Kind Regards

Frederic

RH SCAP + STIG
 
 
 
 
 
 
 
 
 
 
Protecting against today’s relentless and adaptive cyber threats requires continuous monitoring of your networks and systems, but providing the investment and support needed for continuous monitoring can strain security budgets already stretched thin.

Red Hat helps address this challenge through centralized security management, configuration scanning, and advanced remediation. With Red Hat’s® continuous monitoring capabilities, you can automatically scan Red Hat technology[1] for security gaps, vulnerabilities, and unauthorized changes in security configurations — and then remediate problems to restore security controls to your established security configuration.
 
 

 
 
For more information visit: http://www.red.ht/OpenSourceSecurity
 
 
BTW, STIG stands for “Security Technical Implementation Guide”.

[1] http://www.open-scap.org/page/Main_Page
open-scap
 
 
 
 
 
Ref :
 
http://www.redhat.com/en/insights/security
 

Kind Regards
Frederic

Red Hat Enterprise Linux 7 Atomic Host Beta

 





What can you expect from the Red Hat Enterprise Linux 7 Atomic Host Beta?[1]

Specifically Designed to Run Containers
Red Hat Enterprise Linux 7 Atomic Host Beta provides a streamlined host platform that is optimized to run application containers. The software components included in Red Hat Enterprise Linux 7 Atomic Host Beta, as well as the default system tunings, have been designed to enhance the performance, scalability and security of containers, giving you the optimal platform on which to deploy and run application containers.

The Confidence of Red Hat Enterprise Linux
Red Hat Enterprise Linux 7 Atomic Host Beta is built from Red Hat Enterprise Linux 7, enabling Red Hat Enterprise Linux 7 Atomic Host Beta to deliver open source innovation built on the stability and maturity of Red Hat Enterprise Linux. It also means that Red Hat Enterprise Linux 7 Atomic Host Beta inherits the hardware certifications of Red Hat Enterprise Linux 7, giving you a vast choice of certified hardware partners.

Atomic Updating and Rollback
Red Hat Enterprise Linux 7 Atomic Host Beta features a new update mechanism that operates in an image-like fashion. Based on rpm-ostree, updates are composed into “atomic” trees, which can be downloaded and deployed in a single step. The previous version of the operating system is retained, enabling you to easily rollback to an earlier state. This simplified upgrade and rollback capability reduces the time you spend “keeping the lights on.”

Container Orchestration
Through our collaboration with Google, Red Hat Enterprise Linux 7 Atomic Host Beta includes Kubernetes, a framework for managing clusters of containers. Kubernetes helps with horizontal scaling of multi-container deployments across a container host, and interconnecting multiple layers of the application stacks. This enables you to orchestrate services running in multiple containers into unified, large-scale business applications.

Secure Host by Default
Security is paramount when it comes to running applications. Containers alone do not contain, but you can more effectively isolate vulnerable containers with a secure host like Red Hat Enterprise Linux 7 Atomic Host Beta that implements a secure environment by default. First, applications are only run within containers, not directly on the host, creating a clear security boundary. Each container is then confined using a combination of SELinux in enforcing mode, control groups, and kernel namespaces. These technologies prevent a compromised container from affecting other containers or the host and are the same proven technologies that have been delivering military-grade security to Red Hat customers for more than 10 years.

Red Hat Enterprise Linux Container Images and Building Containers
Red Hat Enterprise Linux 7 Atomic Host Beta provides all of the required tools to build and run container images based on Red Hat Enterprise Linux, including Red Hat Enterprise Linux 6 and 7 container images as well as the docker services. This means that applications that run on Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7 can be deployed in a container on Red Hat Enterprise Linux 7 Atomic Host Beta, opening access to a vast ecosystem of certified applications. Additionally, Red Hat Enterprise Linux 7 Atomic Host Beta users will have access to the full breadth of their Red Hat subscriptions inside these containers, including the the popular programming language stacks and development tools delivered through Red Hat Software Collections..

Deploy Across the Open Hybrid Cloud
Red Hat Enterprise Linux 7 Atomic Host Beta extends container portability across the open hybrid cloud by enabling deployment on physical hardware; certified hypervisors, including Red Hat Enterprise Virtualization and VMware vSphere; private clouds such as Red Hat Enterprise Linux OpenStack Platform; and Amazon Web Services and Google Compute Platform public clouds. This ability to “deploy anywhere, deploy everywhere” enables you to choose the best platform for your container infrastructure.

RHEL 7 AH Beta is available here [2]

[1] http://www.redhat.com/en/about/blog/small-footprint-big-impact-red-hat-enterprise-linux-7-atomic-host-beta-now-available

[2] https://access.redhat.com/products/red-hat-enterprise-linux



Kind Regards
Frederic

https://insights.redhat.com/s/it-quotient/


SIMPLIFY THE EQUATION.
Building highly capable IT infrastructures and next-generation applications doesn’t have to be complicated. Take The IT Quotient assessment and answer key questions about the standardization, optimization and automation of your environment. Your IT Quotient is calculated instantly, pinpointing whether you’re tactical, strategic or visionary when it comes to managing IT. A detailed report also presents symptoms you likely face at your current level of maturity and provides useful recommendations on how to take IT to the next level.





Ref :
https://insights.redhat.com/s/it-quotient/

KR
Frederic

https://insights.redhat.com/s/private-cloud-blueprint
Thinking of implementing a private cloud for your organization? Make sure you build one that fits your needs.

With the Red Hat® private cloud blueprint, you can identify your primary drivers for introducing private cloud capabilities into your infrastructure and get recommended options ideally suited to your current environment.

Take the assessment and get your blueprint at https://insights.redhat.com/s/private-cloud-blueprint

KR
Frederic