AKS support for Kubernetes release 1.20 is now generally available. Kubernetes 1.20 delivers a total of 42 enhancements in various stages of maturity. These include capabilities such as CSI Volume Snapshot graduating to stable, Kubectl Debug to Beta, and introduction of new capabilities such as Graceful Node Shutdown in Alpha. Learn more about Kubernetes release 1.20…
Read More →Author: learn2skills
VPC Traffic Mirroring is an AWS feature used to copy network traffic from the elastic network interface of an EC2 instance to a target for analysis. This makes a variety of network-based monitoring and analytics solutions possible on AWS. By capturing the raw packet data required for content inspection, VPC Traffic Mirroring enables agentless methods for…
Read More →In this blog we will look at using service principals with AzCopy and Azure CLI to connect to storage accounts and manage blob data. An Azure service principal is an identity created for use with applications, hosted services, and automated tools to access Azure resources. This access is restricted by the roles assigned to the…
Read More →This blog post was co-authored by Jessie Jia, Senior Program Manager The Internet is the new corporate network and the fabric that connects users, devices, and data to applications of all types. It is foundational to how organizations run their businesses, engage their customers, conduct commerce, operate their supply chain, and enable their employees to work from anywhere. However, while the Internet is highly scalable and ever expanding, it…
Read More →With the new Azure Firewall Premium now in public preview, you can now perform the following new capabilities: Transport Layer Security (TLS) Inspection: Azure Firewall Premium decrypts outbound traffic, performs the required value-added security functions and re-encrypt the traffic which is sent to the original destination. Intrusion Detection and Prevention System (IDPS): Azure Firewall Premium…
Read More →The internet runs on the Border Gateway Protocol (BGP). A network or autonomous system (AS) is bound to trust, accept, and propagate the routes advertised by its peers without questioning its provenance. That is the strength of BGP and allows the internet to update quickly and heal failures. But it is also its weakness—the path…
Read More →Deploying new applications and workloads can require big changes to your network. Read what the Enterprise Strategy Group found during their technical validation of AWS Transit Gateway. This report, Simplifying Global Network Architecture, dives into the tradeoffs and benefits of building networks with AWS Transit Gateway. It details their findings from technical validation with three customers using AWS…
Read More →Azure Bastion and VNet peering can be used together. When VNet peering is configured, you don’t have to deploy Azure Bastion in each peered VNet. This means if you have an Azure Bastion host configured in one virtual network (VNet), it can be used to connect to VMs deployed in a peered VNet without deploying…
Read More →Virtual private network (VPN) technology has changed immensely since the publication of the original Guide to IPsec VPNs (SP 800-77) in 2005. The guide was recently reworked and modernized, and Red Hat engineers lent a hand to updating this important document. The updated document takes into consideration the evolution of cryptography, software and hardware capabilities,…
Read More →Once upon a time, the term “product documentation” conjured images of ring-bound tomes several thousand pages long that would get shipped to users alongside the latest offering. In the days before the internet, this wasn’t just the best option available; it was the only option. It was big, it was slow, and it was expensive,…
Read More →Seeing a demo of Session Recording in Red Hat Enterprise Linux 8 was an eye-opener for me because it may change the way we manage systems. Let’s take a look at what you can do with session recording and where it comes in handy for troubleshooting. Session recording can help system administrators track and trace…
Read More →We’ve all been in situations where something works on one system, but not another, and we’re not sure why. Perhaps your boss is asking “Why does this work in the test environment, but not production?” and you need an answer as soon as possible. In the past when this has happened, I would open SSH…
Read More →This month marks the five year anniversary since Red Hat acquired Ansible, and since then, much has changed in the IT automation world. IT organizations have always faced continual pressure to support rapid innovation at-scale, but 2020 has been an especially challenging year. Organizations required solutions that delivered fast responses to changing business requirements, and automation…
Read More →Application allowlisting is the practice of specifying an index of approved applications or executable files that are permitted to run on a system by a specific user. This is often used on a multi-user system or some kind of a shared hosting server, where multiple users exist and they have to be given limited permissions, so…
Read More →In this article, we focus on advanced troubleshooting scenarios with middlebox appliances and SD-WAN in a global network on AWS. Middlebox appliances and SD-WAN A customer building a global network may wish to implement traffic inspection with their own network security appliances. Frequently this requirement is achieved through introduction of a transparent, middlebox appliance. AWS…
Read More →Red Hat Enterprise Linux (RHEL) version 7.5 introduced the “boom” utility for managing LVM snapshot and image boot entries. This new functionality could be very helpful for system administrators, especially those responsible for RHEL servers running directly on physical hardware, where booting from snapshots has previously been more difficult. This post will cover the…
Read More →When we unveiled Red Hat Enterprise Linux 8 at Red Hat Summit 2019, our primary focus was to deliver innovation while keeping enterprise IT’s needs for production reliability and operational compatibility front-and-center. With this launch came a predictable, six month release cadence for minor releases which continues today with Red Hat Enterprise Linux 8.3 beta. With global…
Read More →We are excited to announce that Azure Load Balancer customers now have instant access to a packaged solution for health monitoring and configuration analysis. Built as part of Azure Monitor for Networks, customers now have topological maps for all their Load Balancer configurations and health dashboards for their Standard Load Balancers preconfigured with relevant metrics. Through this, you…
Read More →In this final entry for the container security series, we’ll look at network traffic control for containers running in Red Hat OpenShift. In a Multi-Level Security (MLS) environment, you will want to be able to ensure that containers in different security levels can only talk to pods in the same security level. For instance, a…
Read More →In Red Hat Enterprise Linux 8.1, we added new container features including full support for rootless Podman, Podman Play/generate Kube, and container images for the Golang toolset (“A minor release with major new container capabilities“). Red Hat Enterprise Linux 8.2 hits the ground with an even bigger set of features. Here’s a quick summary: Update…
Read More →Today we’re announcing the general availability of Azure Spot Virtual Machines (VMs). Azure Spot VMs provide access to unused Azure compute capacity at deep discounts. Spot pricing is available on single VMs in addition to VM scale sets (VMSS). This enables you to deploy a broader variety of workloads on Azure while enjoying access to discounted pricing…
Read More →Red Hat Enterprise Linux (RHEL) 8.2 will be GA soon, and brings new features and improvements to existing ones across the board. RHEL 8.2 includes installation enhancements and a better in place upgrade experience, to resource management for optimizing workloads on large systems, to new container tools to improve use of RHEL and the Red…
Read More →Introduction Capturing and querying Amazon EKS and Kubernetes (K8s) cluster traffic is an important skill to possess. It is especially useful during incident-response and when troubleshooting networking issues surrounding nodes, pods, or services in your cluster. Amazon makes it easier to perform capture and query tasks with Amazon VPC Flow Logs and Amazon Athena. Administrators can use Amazon VPC Flow Logs to capture detailed information…
Read More →When choosing an operating system for running database workloads like Microsoft SQL Server, Red Hat Enterprise Linux (RHEL) offers several unique advantages. But why is this the case? When it comes to picking a database for your mission-critical application, performance is a crucial decision factor. In fact, delivering low latency, and high-throughput application responses comes…
Read More →Today marks the general availability of new Azure disk sizes, including 4, 8, and 16 GiB on both Premium and Standard SSDs, as well as bursting support on Azure Premium SSD Disks. To provide the best performance and cost balance for your production workloads, we are making significant improvements to our portfolio of Azure Premium…
Read More →