Red Hat Expands OpenShift Reach Across Hybrid Clouds - Container Journal

2022-06-27 08:47:33 By : Mr. Jack Yuan

Red Hat today extended the reach of its Kubernetes-based Red Hat OpenShift platform to address a range of capabilities from making it easier to deploy the platform at the network edge to providing extensions in the form of cloud services.

At the same time, Red Hat is adding cloud services to make it simpler to access to Red Hat OpenShift Service Registry, Red Hat OpenShift Connectors, Red Hat OpenShift Database Access, Red Hat OpenShift Data Science, Red Hat OpenShift Streams for Apache Kafka and Red Hat OpenShift API Management.

The updates to Red Hat OpenShift, announced at the Red Hat Summit 2022 conference, are part of a larger Red Hat Edge initiative that brings zero-touch provisioning to version 4.10 of the platform. A single instance of Red Hat Advanced Cluster Management hub cluster can be used to deploy and manage 2,000 single-node OpenShift clusters using zero-touch provisioning.

Red Hat is also providing centralized controls for the oversight and scaling of edge deployments along with support for rollback capabilities using the open source Podman tool for deploying containerized applications. In addition, Red Hat is providing support for version 4.10 of OpenShift Data Foundation container storage software as a technology preview to the single-node edition of Red Hat OpenShift.

Nick Barcet, senior director for technology strategy for Red Hat, says IT teams and OEMs can both use pre-configured instances of Red Hat OpenShift to provide, for example, faster delivery of radio access networks (RAN) for next-generation mobile networks or error detection capabilities for manufacturing facilities.

Red Hat OpenShift is at the core of a broader hybrid cloud computing strategy that Red Hat has been driving. As a subsidiary of IBM, Red Hat is leveraging Kubernetes to make it possible to build and deploy applications that run at the network edge, in on-premises IT environments and across multiple public clouds.

Today, most of those platforms are managed in isolation from one another but Red Hat is betting that, over time, IT organizations will look to centralize the management of highly distributed computing environments to reduce the total cost of IT. Each platform added to an IT environment increases the total cost of IT as more specialists are needed to build, deploy and manage applications across an extended enterprise.

It’s not clear how quickly IT teams are moving to embrace Kubernetes as the foundation upon which to build a hybrid cloud computing environment. But as the number of container applications deployed in production environments continues to expand, the operational benefits of Kubernetes become more evident. Naturally, it will take time for IT teams to master Kubernetes, but as platforms that leverage it become more available, Kubernetes clusters are becoming more accessible.

Regardless of the level of Kubernetes expertise, it’s clear that there are more concerns about the cost of IT than ever before as application workloads become more distributed. The issue is finding a way to manage all those applications that doesn’t necessarily require a massive expansion in the size of the IT teams trying to manage them.

Mike Vizard is a seasoned IT journalist with over 25 years of experience. He also contributed to IT Business Edge, Channel Insider, Baseline and a variety of other IT titles. Previously, Vizard was the editorial director for Ziff-Davis Enterprise as well as Editor-in-Chief for CRN and InfoWorld.

Mike Vizard has 1344 posts and counting. See all posts by Mike Vizard

Register today to join industry leaders from Techstrong, Microsoft, Atichson Technology, QUMU and Sumo Logic–along with our live, chat-enabled audience–as they discuss the journey from legacy to cloud-native architectures. The post Journey From Legacy to Cloud-Native Architectures appeared first on DevOps.com. [...]

Hard coding secrets–usernames, passwords, tokens, API keys and more–is a risky practice that’s been around for as long as developers have been writing code. This problem is far from solved. In fact, hardcoded secrets are increasing in prevalence due to modern microservice-based architectures in which comments and services need to authenticate with each other securely […] The post Effectively Tackling Hardcoded Secrets With a Secrets Management Maturity Model appeared first on DevOps.com. [...]

Kubernetes guardrails allow developers to work with Kubernetes securely, ensuring compliance and cost-effectiveness so their code can reach production without succumbing to common pitfalls. But where do you get started with Kubernetes guardrails? And why should you care? This talk will give an overview of why guardrails are important and explore common examples that your […] The post Kubernetes Guardrails and Why You Need Them appeared first on DevOps.com. [...]

Cloud-native architectures deliver speed, flexibility and faster innovation. But a considerable trade-off is an explosion of metrics data volume and cardinality that outpaces the growth of the business itself. A recent ESG study found that 71% of organizations feel their observability data is growing at a concerning rate. While the increasing cost of storage is […] The post Goldilocks and the 3 Levels of Cardinality: Getting it Just Right appeared first on DevOps.com. [...]

The webinar will feature a discussion of the key SQL Server release features and their implications for the enterprise, with a particular emphasis on MinIO technology, and include a demo showing how it works, how easy it is to deploy and what to expect from a performance perspective. The post Using External Tables to Store and Query Data on MinIO With SQL Server 2022 appeared first on DevOps.com. [...]

Join the CISO Talk Master Class live conversation. Part 6 brings all the elements into a cohesive, integrated strategy: continuous security strategy, leveraging frameworks, effective response strategies, growing next-gen security experts and communications that win and combat confusion. Join hosts Mitch Ashley and Mat Newfield and an elite panel of cybersecurity experts as they bring.. The post CISO Talk Master Class Episode: Catch Lightning in a Bottle – The Essentials: Bringing It All Together appeared first on Security Boulevard. [...]

Join us to learn how Bob has successfully worked with his development leaders to engineer software with security in mind along the pre-production software supply chain. Liav Caspi, CTO of Legit Security, will be joining Bob to share how new security methods and tools now enable teams to find security issues earlier in the development.. The post How to Shift Security Left: Best Practices From a Fortune 500 DevSecOps Leader appeared first on Security Boulevard. [...]

According to the 2022 Open Source Security and Risk Analysis (OSSRA) report, the overwhelming majority of software development organizations are leveraging open source to build their applications. However, the scale of use creates a growing management challenge. While development and risk management teams scramble to patch vulnerabilities, decipher complex license terms governing obligations associated with.. The post Applying the 2022 Open Source Findings to Software Supply Chain Risk Management appeared first on Security Boulevard. [...]

During this livestream, cybersecurity expert and president and CEO at BetterCyber Luciana Obregon will break down how you can lower RTO and RPO and create a reliable data recovery workflow. Modern backup data infrastructure must be immutable, isolated (air-gapped), scanned for and cleansed of malware and must be directly mounted (instant recovery). The post Finding the Ransomware Threat INSIDE Your Backups appeared first on Security Boulevard. [...]

Cybersecurity resilience is a priority for enterprises that have ramped up digital transformation and distributed workforces in the past few years. However, differences of opinion about the urgency of application security solutions can be detrimental to enterprises. According to the latest World Economic Forum research, “While 92% of business executives agree that cybersecurity resilience is.. The post Closing the Gap: Reducing Enterprise AppSec Risks Without Disrupting Deadlines appeared first on Security Boulevard. [...]