Developer Economics Survey Now Open – Share Your Voice

We’re proud to be supporting the new developer survey run by our friends at VisionMobile!

The survey features questions on topics like programming languages, platforms, app categories, tool categories, revenue models, IoT verticals – and, of course – tools.

Whether you’re looking to share your thoughts with the dev community, find out something new, contribute to the leading developer research – or win a great prize – this is the survey for you!

The survey will take around 15 minutes to complete. It features questions on the languages and tools you use, the customers you’re targeting, and asks your opinion on some of the software and services that you use. You can talk about what’s fantastic or frustrating about the tools you’re using, what you’re building, why, and where you go to find out how.

Participants can win one of the tens of prizes available, including an iPhone 6s, an Xperia Z5, a Nexus 6P, and more. VisionMobile will also share the survey findings with you, and show you how your answers compare you to other developers in your country.

Start here: http://vmob.me/DE3Q16RedHat

 

Red Hat Identity Manager: Part 2 – Enterprise PKI Made Easy

This is the second installment in a series about using Red Hat Identity Management (IdM) on Red Hat Enterprise Linux and Fedora (using the upstream FreeIPA project).

As described in part 1, IdM makes it very easy to build an enterprise-grade identity management solution, including a full enterprise PKI solution providing complete x509 certificate life cycle management.

Most organizations start with a simple self-signed Certificate Authority (CA) certificate, perhaps generated using OpenSSL; with a little configuration and a few commands, one can build a self-signed root CA and begin issuing server certificates. However, as the organization grows, this model quickly leads to scaling problems. This article will discuss how to handle some of these scenarios to avoid problematic security issues.

Continue reading “Red Hat Identity Manager: Part 2 – Enterprise PKI Made Easy”

.NET Entity Framework Core 1.0 RC2

As .NET Core matures into a production-ready software product, more and more information is becoming available regarding what to expect. While the changes haven’t been too big to understand, there are breaking changes and they do require that developers get some education before forging ahead.

That applies to Entity Framework Core 1.0 (EF Core) as much as any other component of what is broadly termed “.NET Core”. Granted, EF Core is not a part of .NET Core — and neither is ASP.NET, nor MVC — but all the parts work together and are moving forward. In other words, you need to learn about the .NET Framework and ASP.NET and MVC and EF Core — not to mention your ongoing education with the today’s newest JavaScript framework — if you wish to remain a leading web developer.

Continue reading “.NET Entity Framework Core 1.0 RC2”

Three easy steps to get started with Software Collections on RHEL

How would you like a development environment on Red Hat Enterprise Linux (RHEL) set up in less than a minute? Having multiple versions of software installed at the same time? Is there a simpler and faster way than manually searching for and then installing separate packages?

The answer to all three questions is: Red Hat Software Collections (RHSCL). This technology has been around for a few years, but not everyone is familiar with it. This article is reveals its potential and ease of use.

Software Collections give you the power to build, install, and use multiple versions of software on the same system without affecting system-wide installed packages. Each collection is delivered as a group of RPMs (packages).

Continue reading “Three easy steps to get started with Software Collections on RHEL”

Configuring NGINX to log HTTP POST data on Linux / RHEL

NGINX is a powerful web server that can easily handle high volumes of HTTP traffic. Each time NGINX handles a connection, a log entry is generated to store some information this connection like remote IP address, response size and status code, etc. The complete set of logged information with more details can be found here.

In some cases, you may be more interested in storing the body of requests, specifically POST requests. Lucky, the NGINX ecosystem is rich, and includes quite a few handy modules. One such module is the Echo module, which provides useful functionality for things like: echo, time, and sleep commands.

In our use case, to log a request body, what we need is to use the echo_read_request_body command and the $request_body variable (contains the request body of the Echo module). However, this module is not distributed with NGINX by default, and to be able to use it we have to build NGINX from its source code by building it with the source code of the Echo module included. 

Continue reading “Configuring NGINX to log HTTP POST data on Linux / RHEL”

Creating a custom atomic scan plug-in

In my previous article where I introduced atomic scan, I largely talked about using atomic to scan your containers and images for CVE Vulnerabilities. I also discussed how atomic scan had been architected to a plug-in approached so that you can implement your own scanners.  The plug-ins do not have to focus on vulnerabilities, it could be as simple a scanner that collects information about containers and images.

In this blog, I will walk through how you can create your own custom scanner within the atomic plug-in framework.

Continue reading “Creating a custom atomic scan plug-in”