With this short video, we continue our series based on Red Hat Knowledge Base articles exploring how to take advantage of Ansible Automation inside Red Hat CloudForms. This post is a follow-up of our previous My First Ansible Service article.
As a summary, what we do in this video is to create a control policy that checks if the VM CPU or memory size has changed, and if so, resets the size to 1 CPU and 1GB automatically.
Continue reading “My First Ansible Control Action (Video)”
First let’s talk about Remote Session vs Remote Console, they are often confused.
- Remote Session – Provides the user a server session on the remote host. Multiple sessions can be established with same or different credentials.
- Remote Console (Also known as Remote Control) – Provides the actual console screen to the user, still a session but the systems local session. Only one console session can exist. Any credentials with rights to log on locally can obtain the system session. (Default in Windows is Deny)
Continue reading “Accessing Guest RDP and SSH via Custom Buttons”
This article positions key features employed by Red Hat CloudForms to secure the wealth of management operations it provides as a Cloud Management Platform (CMP).
Continue reading “Securing Management Operations”
I spent the last decade working with virtualization platforms and the certifications and accreditation’s that go along with them. During this time, I thought I understood what it meant to run an efficient data center. After six months of working with Red Hat CloudForms, a Cloud Management Platform (CMP), I now wonder what was I thinking. I encountered every one of the problems below, each are preventable with the right solution. Remember, we live in the 21st century–shouldn’t the software that we use act like it?
Continue reading “Ten Ways a Cloud Management Platform Makes your Virtualization Life Easier”
This video highlights the role-based access controls within Red Hat CloudForms and how they can be tied into Microsoft Active Directory, to leverage a company’s existing user and group structure. The goal of the video is to help customers understand how they can integrate CloudForms into their organizational structure with rather minimal setup.
Continue reading “Setting up Red Hat CloudForms with Microsoft Active Directory (Video)”
When talking to IT leaders about Red Hat CloudForms, we often point out the time and cost savings that CloudForms can have on their organization. While we have several customer success stories that highlight the various benefits of CloudForms to each organization, we wanted a more formal study of the business value that CloudForms could bring to an organization. To that end, Red Hat commissioned a study, conducted by IDC, to look at the business value of CloudForms. This blog post will highlight some of their findings, with IDC’s complete report available for review.
Continue reading “The Business Value of Red Hat CloudForms”
The recent discovery of a protocol flaw on Samba server (see CVE-2016-2118) raises once again the question of managing security and compliance of systems. How can we identify easily which systems are affected? And, how can we validate that these environments are correctly patched?
Continue reading “Are your systems affected by BADLOCK Security flaw?”
As you have probably noticed by now, the attack on OpenSSL known as DROWN – Decrypting RSA using Obsolete and Weakened eNcryption has recently been discovered. Red Hat Product Security have provided patches for OpenSSL and recommend to apply them to affected systems.
In this post, we will discuss how Red Hat CloudForms and ManageIQ can assist in identifying environments at risk of the DROWN OpenSSL cross-protocol vulnerability. In addition, CloudForms can audit your environments and validate that the patches have been applied.
How can Red Hat CloudForms help?
CloudForms provides a policy based compliance check which can be used to verify software and configuration of servers and validate security requirements. These policies are created as a combination of an event, a condition and an action, and use a scope (usually set to infrastructure or guests) to determine if the policy needs to run. Additional information on using policies can be found in the product documentation: Defining policies and profiles.
Continue reading “Managing Patching Compliance Using DROWN OpenSSL Vulnerability as an Example”
UPDATED : Video version of this blog…..found here… http://youtu.be/RDcIIyYK044
So this Shell-Shock stuff is hitting the press quite a bit!
Fncy finding out really quickly if your Red Hat Enterprise Linux 6.5 systems are patched correctly? Even if they are turned off right now? Wow that is clever not even the virtual infrastructure players can do that…I know…its cool. Here it is..
Continue reading “Shell-Shock – Bash Code Injection Vulnerability via Specially Crafted Environment Variables (CVE-2014-6271, CVE-2014-7169)”
So for the past few years Savon v1.1.0 has been the default GEM in the appliance. Heres a scoop! In future releases, and the upstream builds have Savon v2.
What does this mean? Well v2 has a slightly different syntax to its connections and function call. Here is a v2 SOAP example:
Continue reading “SOAP – SAVON v2 Syntax”