Migrating existing Red Hat Enterprise Linux installations to new major versions

Many Red Hat Enterprise Linux 5 and 6 customers will soon consider migrating to Red Hat Enterprise Linux 7. Red Hat now offers tools for engineers to evaluate migration options and plan their upgrades accordingly. In this session, you’ll see those tools in action during a live demo of an upgrade.

Next-generation high availability Linux clustering

High availability application clustering has changed significantly in Linux since the release of Red Hat Enterprise Linux 6. In this session, you’ll learn about new clustering technologies in Red Hat Enterprise Linux 7 beta. Topics covered will include:

  • Cluster definition, management, and fencing.
  • Pacemaker and Corosync, the technologies driving clustering.
  • Clustered file systems (GFS-2) migration to a separate project.
  • Integrating a clustered file system into a high availability cluster.
  • Setting up web farm quickly with pacemaker.
  • Load balancing with Red Hat Enterprise Linux 7 beta.

The new world of NFS

The footprint of the Linux network file system implementation has changed over the years. NFSv4, pNFS, Label NFS, FedFS, and Secure NFS are constantly evolving.

In this session, you’ll learn about these technologies, including where they are in their current evolution process and stability, on both the server and client. Take part in an open discussion about the current Red Hat Enterprise Linux NFS offerings, with the goal of understanding how Red Hat Enterprise Linux NFS can be improved.

Security in Red Hat Enterprise Linux 7 beta

In this session you’ll learn about security improvements in Red Hat Enterprise Linux 7 beta, including:

  • Security improvements in systemd, journald, gssproxy, and Linux containers.
  • Security improvements in IPA, OpenScap, sssd, Kerberos, sshd.
  • New encryption algorithms.
  • Enhanced SELinux features.
  • GCC hardening applied.
  • kvm/sVirt improvements.
  • Kernel changes.
  • New boot features.
  • Usability changes that take advantage of security features.
  • Integration with Active Directory improvements.
  • Using systemd to make your services more secure.
  • New confined domains.
  • Labeled NFS and GlusterFS.
  • Preventing apps from using ptrace on each other.
  • Tightened SELinux policy to allow creation of only specific files.
  • SELinux usability improvements, including:
    • Correct labeling by default improvement.
    • Better troubleshooting through integration between setroubleshoot and journald.
    • New application-centric SELinux GUI.
    • Introduction of new dbus interface for management.
    • Improved SELinux man pages, policy generation tools.
    • File labeling database speed improvement.

Administer production servers effectively with OpenLMI

Linux systems often come with powerful capabilities—and steep learning curves—for system administrators. Despite progress toward automating and standardizing system management, there is still a need to customize some systems. SysAdmins need to configure complex local storage and networks with multiple NICs, manage users (both locally and using MS Active Directory or IPA), install software, manage system services, get hardware configuration, and perform a wide range of detailed tasks against a specific server.

In this session, you’ll learn how OpenLMI,the Linux Management Infrastructure program, delivers remote administration of production servers, ranging from high-end enterprise servers with complex network and storage configurations to virtual guests. We’ll discuss how OpenLMI:

  • Supports physical servers and directly manipulates storage, network, and system hardware
  • Manages and monitors virtual machine guests.
  • Includes a framework that provides a standardized remote API for system management that is built on top of existing tools and utilities.
  • Provides fine-grained control of running systems, complementing the installation, entitlement, and patching capabilities of Red Hat Satellite Server.
  • Page 2 of 2
  • <
  • 1
  • 2