Guide to meeting Red Hat authors at Red Hat Summit 2018

 

Early this year the book Effective Business Process Management with JBoss BPM launched a free ebook on Red Hat Developers that you can download. Next week I’ll be at the Red Hat Summit 2018 conference in San Francisco, CA, at the Moscone Center speaking and presenting a hands-on lab.

The surprise event is that Red Hat authors will be spending time at the booth where we’ll be signing copies of our respective books. Look for me at the following times at the section labeled DevZone ready to give you and sign a copy of Effective Business Process Management with JBoss BPM:

  • Tuesday, 8 May: 12:00 – 13:00
  • Thursday, 10 May: 13:00 – 13:45

Should you not be able to make one of the times listed, just stop by for a copy of the book and find me somewhere in the halls, at a session or maybe at a baseball game down the street for a chat and signing. I’m pretty flexible and happy to meet someone interested in the book.

Continue reading “Guide to meeting Red Hat authors at Red Hat Summit 2018”

Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with RHEL

This year you’ve got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.

There are breakout sessionsbirds-of-a-feather sessionsmini sessionspanelsworkshops, and instructor led labs that you’re trying to juggle into your daily schedule. To help with these plans, let’s try to provide an overview of the labs in this series.

In this article let’s examine a track focusing only on Red Hat Enterprise Linux (RHEL). It’s a selection of labs where you’ll get hands-on with package management, OS security, dig into RHEL internals, build a RHEL image for the cloud and more.

The following hands-on labs are on the agenda, so let’s look at the details of each one.

Continue reading “Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with RHEL”

Ultimate Guide to Red Hat Summit 2018 Labs: Hands-on with Security

This year you’ve got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.

There are breakout sessionsbirds-of-a-feather sessionsmini sessionspanelsworkshops, and instructor led labs that you’re trying to juggle into your daily schedule. To help with these plans, let’s try to provide an overview of the labs in this series.

In this article, the focus narrows to security, where you can get hands-on with everything from cloud security, security compliance automation, developing secure solutions and digging in to container security.

The following hands-on labs are on the agenda, so let’s look at the details of each one.

 

Practical OpenSCAP

In this hands-on lab, we’ll review using OpenSCAP to perform automated security compliance for bare-metal machines, virtual machines, and containers. SCAP content customization lets you fit security policies to your use case.

– Evaluate targets using the command-line and GUI interface.

– Learn how to scale to small and large infrastructures using Red Hat Satellite 6.

– Explore new possibilities to generate Ansible Playbooks from security compliance content, then deploy at scale using Red Hat Ansible Tower.

 

Presenters: Martin Preisler, Red Hat, Watson Sato, Red Hat

 

A Practical Introduction to Container Security (3rd Ed.)

Linux containers provide convenient application packing and run time isolation in multi tenant environments. However, the security implications of running containerized applications is often taken for granted. For example, today it is very easy to pull container images from the Internet and run them in the enterprise without examining their content and authenticity.

In this lab, you’ll complete a series of low-level, hands-on exercises aimed at understanding the concepts, challenges, and best practises associated with deploying containers in a secure fashion. Topics include registry configuration, SELinux, capabilities, and SECCOMP profiles, along with image inspection, scanning, and signing. This third edition may be based on CRI-O, depending on Red Hat Enterprise Linux feature release time frames.

Presenters: Bob Kozdemba, Red Hat, Daniel Walsh, Red Hat, Aaron Weitekamp, Red Hat

 

OpenShift + single sign-on = Happy security teams and happy users

One username and password to rule them all.

In this lab, we’ll discuss and demonstrate single sign-on technologies and how to implement them using Red Hat products. We’ll take you through bringing up an OpenShift cluster in a development environment, installing Red Hat single sign-on on top of it, and then integrating that with a variety of example applications.


Presenters: Dustin Minnich, Red Hat, Josh Cain, Red Hat, Jared Blashka, Red Hat, Brian Atkisson, Red Hat

 

Defend yourself using built-in Red Hat Enterprise Linux security technologies

In this lab, you’ll learn about the built-in security technologies available to you in Red Hat Enterprise Linux.

You will use OpenSCAP to scan and remediate against vulnerabilities and configuration security baselines. You will then block possible attacks from vulnerabilities using Security-Enhanced Linux (SELinux) and use Network Bound Disk Encryption to securely decrypt your encrypted boot volumes unattended. You will also use USBGuard to implement basic white listing and black listing to define which USB devices are and are not authorized and how a USB device may interact with your system. Throughout your investigation of the security issues in your systems, you will utilize the improved audit logs and automate as many of your tasks as possible using Red Hat Ansible Automation. Finally, you will make multiple configuration changes to your systems across different versions of Red Hat Enterprise Linux running in your environment, in an automated fashion, using the Systems Roles feature.

Presenters: Lucy Kerner, Red Hat, Miroslav Grepl, Red Hat, Paul Moore, Red Hat, Martin Preisler, Red Hat, Peter Beniaris

 

Up and running with Red Hat identity management

Red Hat identity management (IdM) can play a central role in user authentication, authorization, and control. It can manage critical security components such as SSH keys, host-based access controls, and SELinux contexts—in a standalone environment or in a trust relationship with a Microsoft Active Directory domain controller.

In this lab, you’ll learn:

– Basic installation and configuration of IdM

– Configuration of an IdM replica – Joining of clients to the IdM domain

– Basic user and host management activities

– sudo setup

– SSH key management

Attendees will leave with a lab that can be repeated in their own environments and form the basics for a rudimentary environment.


Presenters: James Wildman, Red Hat, Chuck Mattern, Red Hat

 

Implementing proactive security and compliance automation

In this hands-on lab, we’ll show you how to automate security and compliance using a combination of Red Hat CloudForms, Red Hat Satellite, Red Hat Ansible Tower, Red Hat Insights, and OpenSCAP.

Specifically, you’ll do a series of exercises to show you how to:

– Use Red Hat CloudForms to create control policies.

– Use the data provided by Red Hat Insights for proactive security and automated risk management.

– Use Red Hat Ansible Tower for automated security remediations.

– Use Red Hat CloudForms as the central place for security and compliance automation.

– Automate security scans and remediations using the OpenSCAP integration with Red Hat Satellite and Red Hat Ansible Tower.

ultimate guide red hat summit labs-Use Red Hat CloudForms to manage the security of the container images running in your Openshift environment


Presenters: Lucy Kerner, Red Hat, William Nix, Red Hat, Kevin Morey, Red Hat, Patrick Rutledge, Red Hat, Nate Stephany, Red Hat

 

Stay tuned for more Red Hat Summit 2018 Labs and watch for more online under the tag #RHSummitLabs.

Red Hat Summit 2018 Labs: Linux is Containers

This year you’ve got a lot of decisions to make before you got to Red Hat Summit in San Francisco, CA from 8-10 May 2018.

There are breakout sessionsbirds-of-a-feather sessionsmini sessionspanelsworkshops, and instructor led labs that you’re trying to juggle into your daily schedule. To help with these plans, let’s try to provide an overview of the labs in this series.

Our first article is starting with a focus on Linux containers, where you can get hands-on with everything from container security, containerizing applications, developing container solutions and digging in to container internals.

The following hands-on labs are on the agenda, so let’s look at the details of each one.


Linux Container Internals: Part 1

Have you ever wondered how Linux containers work? How they really work, deep down inside? Questions like:

– How does sVirt/SELinux, SECCOMP, namespaces, and isolation really work?

– How does the Docker Daemon work?

– How does Kubernetes talk to the Docker Daemon?

– How are container images made?

In this lab, we’ll answer all of these questions and more. If you want a deep technical understanding of containers, this is the lab for you. It’s an engineering walk through the deep, dark internals of the container host, what’s packaged in the container image, and how container orchestration work. You’ll get the knowledge and confidence it takes to apply your current Linux technical knowledge to containers.

Presenters: Scott McCarty, Red Hat, John Osborne, Red Hat, Jamie Duncan, Red Hat

Linux Container Internals: Part 2

Have you ever wondered how Linux containers work? How they really work, deep down inside? Questions like:


– How does sVirt/SELinux, SECCOMP, namespaces, and isolation really work?

– How does the Docker Daemon work?

– How does Kubernetes talk to the Docker Daemon?

– How are container images made?


In this lab, we’ll answer all these questions and more. If you want a deep technical understanding of containers, this is the lab for you. It’s an engineering walk through the deep, dark internals of the container host, what’s packaged in the container image, and how container orchestration work. You’ll get the knowledge and confidence it takes to apply your current Linux technical knowledge to containers.

Presenters: Scott McCarty, Red Hat, John Osborne, Red Hat, Jamie Duncan, Red Hat

A Practical Introduction to Container Security (3rd Ed.)

Linux containers provide convenient application packing and run time isolation in multi tenant environments. However, the security implications of running containerized applications is often taken for granted. For example, today it is very easy to pull container images from the Internet and run them in the enterprise without examining their content and authenticity.

In this lab, you’ll complete a series of low-level, hands-on exercises aimed at understanding the concepts, challenges, and best practises associated with deploying containers in a secure fashion. Topics include registry configuration, SELinux, capabilities, and SECCOMP profiles, along with image inspection, scanning, and signing. This third edition may be based on CRI-O, depending on Red Hat Enterprise Linux feature release time frames.

Presenters: Bob Kozdemba, Red Hat, Inc., Daniel Walsh, Red Hat, Aaron Weitekamp, Red Hat

Containerizing applications – existing and new

In this hands-on lab, based on highly rated labs from Red Hat Summit 2016 and 2017, you’ll learn how to create containerized applications from scratch and from existing applications.

Learn how to build and test these applications in a Red Hat OpenShift environment, as well as deploy new containers to Red Hat Enterprise Linux Atomic Host. You’ll quickly develop a basic containerized application, migrate a simple popular application to a containerized version, and deploy your new applications to container host platforms. You’ll get a feel for the different container host platforms and learn how to choose the best one for your container needs. And finally, you’ll learn what to consider and what tools you can use when implementing a containerized microservices architecture.

Presenters: Langdon White, Red Hat, Scott Collier, Red Hat, Tommy Hughes, Red Hat, Dusty Mabe, Red Hat

Develop IoT solutions with containers and serverless patterns

The Internet of Things (IoT) is expected to generate a diverse range of data types that will need different mechanisms to process and trigger actions. Combined with other considerations, like total cost of ownership, required skill set, and operations, the back end solution may be composed of different architectures and patterns.

ultimate guide red hat summit labsIn this hands-on lab, you’ll learn how to build a containerized. intelligent IoT solution that can process different data types using the elasticity of a container platform, such as Red Hat OpenShift Container Platform, and serverless architectures to execute on-demand functions in response to IoT events. Using the qualities of each architectural style, developers can focus on writing code without worrying about provisioning and operating server resources, regardless of the scale. The methodologies exemplified within this lab can be used by companies looking to use their cloud computing infrastructure to build complex and robust IoT solutions.

Presenters: Ishu Verma, Red Hat, Andrew Block, Red Hat

Stay tuned for more Red Hat Summit 2018 Labs and watch for more online under the tag #RHSummitLabs.

Red Hat Booth Drawing at GSMA Mobile World Congress 2018 Official Rules

Red Hat Booth Drawing at GSMA Mobile World Congress 2018
Official Rules

 

NO PURCHASE NECESSARY TO ENTER OR TO WIN. A PURCHASE WILL NOT INCREASE YOUR ODDS OF WINNING. VOID WHERE PROHIBITED.

 

ENTRY IN THIS PROMOTION CONSTITUTES YOUR ACCEPTANCE OF THESE OFFICIAL RULES.

Continue reading “Red Hat Booth Drawing at GSMA Mobile World Congress 2018 Official Rules”

Red Hat Summit Alumni survey 2017 sweepstakes official rules

Red Hat Summit Alumni Survey 2017 Sweepstakes
Official Rules

NO PURCHASE NECESSARY TO ENTER OR TO WIN. A PURCHASE WILL NOT INCREASE YOUR ODDS OF WINNING. VOID WHERE PROHIBITED.

ENTRY IN THIS PROMOTION CONSTITUTES YOUR ACCEPTANCE OF THESE OFFICIAL RULES.

  1. Eligibility. The Red Hat Alumni Survey 2017 Sweepstakes (the “Promotion”) is open to legal residents of Australia (excluding the states of New South Wales and the Australian Capital Territory), Belgium, Canada (excluding Quebec), Germany, India, Japan, Malaysia, the Netherlands, New Zealand, Singapore, South Korea, Spain, Sweden, Thailand, the United Kingdom, or the United States, who are the age of majority in their jurisdiction of residence at the time of entry (“Participant”). Employees of Red Hat, Inc. and each of their respective affiliated companies, subsidiaries, advertising or promotional agencies, and other agents, and the immediate family members of, and any persons domiciled with, such employees are not eligible to enter. Government employees and contractors are not eligible to enter.

If you are entering as part of a company or on behalf of your employer, these rules are binding on you, individually, and/or your employer. If you are acting within the scope of your employment, as an employee, contractor, or agent of another party, you warrant that such party has full knowledge of your actions and has consented thereto, including your potential receipt of a prize. You further warrant that your actions do not violate your employer’s or company’s policies and procedures.

2.Entry. NO PURCHASE NECESSARY TO ENTER OR WIN. VOID WHERE PROHIBITED. The Promotion begins on December 14, 2017 at 10:00 a.m. Eastern Standard Time (“EST”) and all entries must be received by January 18, 2018  at 11:59 EST (the “Promotional Period”). Entry in the Promotion is completed by registering for the sweepstakes at https://goo.gl/forms/6O2bxyVfipwQKabv1 (“Entry”). You must complete all required information on the registration form to be eligible to enter. You may be asked to answer optional questions and/or register for future notices of online promotions, but you are not required to answer any optional questions or agree to receive future e-mails from Sponsor to be eligible for entry in the Promotion.

LIMIT – One (1) Entry per Participant. Subsequent Entries will be disqualified. All entries become the property of Sponsor and will not be acknowledged or returned. Only eligible Entries actually received by Sponsor within the Promotional Period will be included in the Prize Drawing. Use of automated entries or programs or entries submitted by third parties is prohibited and such entries will be disqualified. Sponsor will not be responsible for Entries that are in whole or part illegible, incomplete, damaged, altered, counterfeit, manipulated or obtained through fraud or lost, late, misdirected, mutilated, incomplete, or illegible entries or email, or for any computer related, online, telephonic, or technical malfunctions that may occur whether or not within Sponsor’s control and such Entries are void. In the event of a dispute, all online Entries will be deemed to have been submitted by the owner of the email account as submitted in the online event entry form. For these purposes, an email account holder shall mean the natural person assigned to such email account by the Internet access provider, online service provider or other organization responsible for assigning email addresses for the domain associated with such email account. Any questions regarding the number of Entries submitted or the owner of an email account shall be determined by Sponsor, in its sole discretion, and Sponsor reserves the right to disqualify any Entries by persons determined to be tampering with or abusing any aspect of the Promotion. Normal Internet, phone and usage charges imposed by your online or phone service may apply. Sponsor reserves the right, in its sole discretion, to disqualify any Entry not in compliance with these Official Rules.

3. Selection of Winner. On or about the week of January 22, 2018, Sponsor will conduct a random drawing to select one (1) potential winner from the pool of eligible Entries received by Sponsor during the Promotional Period. The potential winner will be notified by email (“Prize Notification”) on or about the week of January 22, 2018 using contact information provided by the Participant in his or her Entry. If the potential winner does not respond within three (3) days after the first attempt to contact him/her, or if the Prize Notification is returned as undeliverable, that potential winner will be deemed to have forfeited the prize, and Sponsor will select an alternate potential winner in his/her place at random from all remaining eligible Entries until all Prizes have been awarded.  Winning a prize is contingent upon fulfilling all requirements set forth in these Official Rules.  Noncompliance with the foregoing, failure to abide by these Official Rules, or return of the Prize Notification as non-deliverable may result in disqualification and naming of an alternate potential winner.  

4. Prizes and Odds. The Participants whose Entries are drawn at random will each receive one (1) full-conference pass to Red Hat Summit 2018 (“Prize”) valued at approximately $1100 (“ARV”).  The total ARV of all Prizes awarded is $1100. Travel, accommodations, and other related expenses are not included.

Prizes are subject to availability and Sponsor reserves the right to substitute a prize of equal or greater value. Odds of winning depend on the number of eligible Entries received.  The Prize may not be redeemed for cash value and may not be transferred or assigned, except by Sponsor.  The Prize consists of only those items specifically listed as part of the Prize. Instructions on how to redeem the Prize will sent to the Winner via email approximately one (1) to two (2) weeks after the drawing takes place. Sponsor will not replace any lost or stolen gifts.  Prize is awarded without warranty of any kind from Sponsor, express or implied, without limitation, except where this would be contrary to federal, state, provincial, or local laws or regulations. Expenses not specifically stated above, together with the reporting and payment of all applicable taxes, fees, duties, and/or surcharges, if any, arising out of, or resulting from, acceptance or use of the Prize, are the sole responsibility of the Winner. Restrictions, conditions, and limitations apply.

Any trademarks associated with the prizes awarded under this Promotion are registered or unregistered trademarks of their owners, who are not affiliated nor have endorsed this Promotion.  Prizes awarded under this Promotion may be subject to restrictions and licenses from their manufacturers and may require additional hardware, software, service, or maintenance to use. The prize recipient shall bear all responsibility for use of such prize in compliance with the conditions imposed by the manufacturer, and any additional costs associated with its use, service, or maintenance.

5. Condition of Participation. By entering the Promotion, Participants agree to be bound by these Official Rules and the decisions of the Sponsor, which shall be final and binding in all respects. Any attempt to deliberately damage the content or operation of this Award Contest is unlawful and subject to legal action by Sponsor or its agents. Sponsor reserves the right to disqualify persons found tampering with or otherwise abusing any aspect of this Promotion as solely determined by Sponsor.

Prize Winner may be asked to participate in publicity. Except where prohibited by law, the Winner’s acceptance of the Prize constitutes permission for Sponsor to use such Winner’s name, address (city and state only), statements, photograph, voice and/or likeness for any advertising and promotional purposes relating to the Promotion, in any media now known or hereafter devised, without further notice, compensation, consideration, review or consent and without regard to moral rights.

6. Compromise of Promotion.  In the event the Promotion is not capable of running as planned as the result of bugs, virus, non-authorized human intervention, tampering, technical failures, fraud, or other causes beyond the reasonable control of Sponsor that corrupts or impairs the administration, security, fairness, integrity or proper operation of the Promotion, Sponsor reserves the right in its sole discretion to cancel, suspend, modify or terminate the Promotion. Should the Promotion be terminated prior to the stated expiration date, Sponsor reserves the right to award prizes based on the entries received before the termination date.

7. Limitations of Liability. By entering the Promotion, Participant agrees that (1) any and all disputes, claims, and causes of action arising out of or in connection with the Promotion, or any prizes awarded, shall be resolved individually without resort to any form of class action, and Participant waives his or her right to a jury trial for such disputes, claims, and causes of action; (2) any claims, judgments and awards shall be limited to actual out-of-pocket costs incurred, including costs associated with entering the Promotion, but in no event attorneys’ fees; and (3) under no circumstances will any Participant be permitted to obtain any award for, and Participant hereby waives all rights to claim punitive, incidental or consequential damages and any and all rights to have damages multiplied or otherwise increased and any other damages, other than damages for actual out-of-pocket expenses. Sponsor assumes no responsibility for any error, omission, interruption, deletion, defect, or delay in operation or transmission; communications line failure; or theft, destruction of, alteration or unauthorized access to Promotion Entries. Sponsor is not responsible for any typographical or other error in the printing of the offer, administration of the Promotion, or in the announcement of the Winner.

8.  General Release. By entering the Promotion, Participants release and hold harmless Sponsor, any other promotional sponsors, and each of their respective affiliated companies, directors, officers, employees, representatives, partners and agents from any liability whatsoever for any claims, costs, injuries, losses or damages of any kind arising out of or in connection with the Promotion or with the acceptance, possession or use of any prize (including, without limitation, claims, costs, injuries, losses or damages related to personal injuries, death, damage to, loss or destruction of property, rights of publicity or privacy, defamation or portrayal in a false light).

9. Privacy. Participants will be asked to provide personal information to enter the Promotion, which will be transferred to servers located in the U.S. By entering the Promotion, you consent to transfer of your personal information and to the terms of the Sponsor’s privacy policy located at www.redhat.com/legal/privacy_statement.html. If you wish to opt out of receiving further communications from Sponsor or have other questions regarding Sponsor’s privacy policy, please contact Sponsor at Red Hat, Inc., 100 E Davie Street, Raleigh, NC 27601, Attn: Newsletters.

10. Governing Law. The Award Contest is subject to all federal, state, and local laws. The Award Contest and Official Terms are governed and interpreted by the laws of the State of North Carolina (U.S.), without regard to its conflict of law provisions.

11. Official Rules / List of Winners.  To obtain a copy of these Official Rules or the Winner List (available after January 27, 2017), please email your request to rh-summit@redhat.com no later than July 27, 2017.

12. Sponsor. Red Hat, Inc., located at 100 E Davie Street, Raleigh, NC 27601, USA, is the sponsor of the Promotion (“Sponsor”).