Red Hat Enterprise Linux
Red Hat Enterprise Linux
  • 249
  • 350 134
Image mode for Red Hat Enterprise Linux
Image mode for Red Hat Enterprise Linux is a new deployment method that takes a container-native approach to deliver the OS as a bootc container image. It builds on the success of open source projects such as bootc, which manages the installation and updating of hosts in any part of the hybrid cloud, to create a deployment model that fits seamlessly into container-native workflows. This approach addresses challenges in managing Linux at scale, from pushing patches to disparate locations to disconnects between operations teams and the application development cycle.
Learn more: developers.redhat.com/products/rhel-image-mode/getting-started
Переглядів: 533

Відео

Upgrading with Confidence using RHEL Leapp and Red Hat Insights Pre-Upgrade Analysis
Переглядів 226Місяць тому
Embark on a journey of effortless evolution with RHEL leapp! In this quick exploration, we unveil the power of the in-place upgrade tool and its dynamic duo with Red Hat Insights Pre-Upgrade Analysis. Join us as we guide you through the strategic planning, real-time insights, and practical steps needed for a successful upgrade from Red Hat Enterprise Linux. From compatibility checks to task ana...
Streamlining Migrations with convert2rhel's Pre-Conversion Analysis
Переглядів 2432 місяці тому
Streamlining Migrations with convert2rhel's Pre-Conversion Analysis
Red Hat Enterprise Linux for ARM
Переглядів 4836 місяців тому
Red Hat Enterprise Linux for ARM
Sign up for the No-cost Developer Subscription for Red Hat Enterprise Linux
Переглядів 1,9 тис.6 місяців тому
Sign up for the No-cost Developer Subscription for Red Hat Enterprise Linux
Getting Started with a Red Hat Enterprise Linux Subscription on AWS
Переглядів 4896 місяців тому
Getting Started with a Red Hat Enterprise Linux Subscription on AWS
Building Security Compliant Images with Red Hat Enterprise Linux Image Builder
Переглядів 1,1 тис.7 місяців тому
Building Security Compliant Images with Red Hat Enterprise Linux Image Builder
Getting Started with Insights for RHEL
Переглядів 3048 місяців тому
Getting Started with Insights for RHEL
Deploying Red Hat Enterprise Linux on Microsoft Azure
Переглядів 7598 місяців тому
Deploying Red Hat Enterprise Linux on Microsoft Azure
Deploying Red Hat Enterprise Linux on AWS
Переглядів 5038 місяців тому
Deploying Red Hat Enterprise Linux on AWS
Deploying Red Hat Enterprise Linux on Google Cloud
Переглядів 3308 місяців тому
Deploying Red Hat Enterprise Linux on Google Cloud
Five Reasons to Choose Red Hat Enterprise Linux in the Cloud
Переглядів 3498 місяців тому
Five Reasons to Choose Red Hat Enterprise Linux in the Cloud
What's next for Red Hat Enterprise Linux?
Переглядів 5208 місяців тому
What's next for Red Hat Enterprise Linux?
Converting to Red Hat Enterprise Linux 7 on AWS
Переглядів 4508 місяців тому
Converting to Red Hat Enterprise Linux 7 on AWS
Prepare now for Red Hat Enterprise Linux 7 End of Maintenance
Переглядів 3548 місяців тому
Prepare now for Red Hat Enterprise Linux 7 End of Maintenance
Prepare now for Red Hat Enterprise Linux 7 End of Maintenance - Overview
Переглядів 1628 місяців тому
Prepare now for Red Hat Enterprise Linux 7 End of Maintenance - Overview
Simplify your cloud journey with Red Hat and Google Cloud
Переглядів 1448 місяців тому
Simplify your cloud journey with Red Hat and Google Cloud
CentOS Linux Management Compared to Red Hat Enterprise Linux
Переглядів 4859 місяців тому
CentOS Linux Management Compared to Red Hat Enterprise Linux
Convert from CentOS Linux 7 to Red Hat Enterprise Linux 7 with Convert2RHEL
Переглядів 3 тис.9 місяців тому
Convert from CentOS Linux 7 to Red Hat Enterprise Linux 7 with Convert2RHEL
Push your custom Red Hat Enterprise Linux image to Google Cloud Platform
Переглядів 3119 місяців тому
Push your custom Red Hat Enterprise Linux image to Google Cloud Platform
Push your custom Red Hat Enterprise Linux images to Microsoft Azure
Переглядів 7469 місяців тому
Push your custom Red Hat Enterprise Linux images to Microsoft Azure
Push your custom Red Hat Enterprise Linux image to Amazon Web Services
Переглядів 2859 місяців тому
Push your custom Red Hat Enterprise Linux image to Amazon Web Services
Choices Red Hat makes when building a Linux distribution
Переглядів 570Рік тому
Choices Red Hat makes when building a Linux distribution
Türk Telekom accelerates digital transformation with Red Hat Enterprise Linux
Переглядів 623Рік тому
Türk Telekom accelerates digital transformation with Red Hat Enterprise Linux
What is Linux, open source, and distributions?
Переглядів 359Рік тому
What is Linux, open source, and distributions?
What is the RHEL image builder service?
Переглядів 1,8 тис.Рік тому
What is the RHEL image builder service?
Detecting Malware on Red Hat Enterprise Linux
Переглядів 1,3 тис.Рік тому
Detecting Malware on Red Hat Enterprise Linux
Mitigating Vulnerabilities on Red Hat Enterprise Linux
Переглядів 1,1 тис.Рік тому
Mitigating Vulnerabilities on Red Hat Enterprise Linux
Red Hat Enterprise Linux: One platform. Unlimited potential.
Переглядів 6 тис.Рік тому
Red Hat Enterprise Linux: One platform. Unlimited potential.
Deploying GPU-Enabled Workloads on Red Hat Enterprise Linux for Workstation on AWS
Переглядів 407Рік тому
Deploying GPU-Enabled Workloads on Red Hat Enterprise Linux for Workstation on AWS

КОМЕНТАРІ

  • @ImranKhan-zu6qv
    @ImranKhan-zu6qv 2 дні тому

    Hi All, I have received disk error while deleting a partition. Warning: Re-reading the partition table failed with error 16: Device or resource busy. The kernel still uses the old table. The new table will be used at the next reboot or after you run partprobe(8) or kpartx(8) syncing disks. i have deleted sdx1 partition with out removing volume group vg1 which has mapped on rhel8 server, will it corrupt other sdx2, sdx3 partitions which are in other volume group vg2. How will it effect lvms on both volume groups.

    • @scottmcbrien6535
      @scottmcbrien6535 2 дні тому

      This is a normal error message to see when working with your system's primary disk. By default, the kernel reads the primary disk's partition table at boot, so the error is telling you that the kernel won't reflect the change you just made using your partitioning utility. You can also verify this by looking at the contents of /proc/partitions (the partitions currently recognized by the kernel). The solution is to use the command: partprobe This command will signal the kernel to re-read the disk's partition tables and after you run it, you should see the change reflected in /proc/partitions as well (so you know the kernel has the most recent partition table loaded).

    • @ImranKhan-zu6qv
      @ImranKhan-zu6qv 2 дні тому

      @@scottmcbrien6535 Will it effect lvms which are available in volume group vg1.

    • @scottmcbrien6535
      @scottmcbrien6535 2 дні тому

      @@ImranKhan-zu6qv This is a hard question to answer exactly because I don't know the setup of your machine. If sdx1 was not a member of any volume groups, it should not affect your LVM setup. If sdx1 was part of a volume group, or even created as a physical volume, you'll want to pvremove it prior to deleting the partition. If you already deleted the partition, use fdisk (or whatever partitioning utility you perfer) and add the partition back. pvremove it, then remove the partition.

  • @maikcat9723
    @maikcat9723 4 дні тому

    when 8.10 will be available for download?

    • @scottmcbrien6535
      @scottmcbrien6535 3 дні тому

      "soon". Keep an eye on the Red Hat announcements page: access.redhat.com/announcements That said, there are so many artifacts that are part of a RHEL release, that you'll likely see 8.10 bits being made available through the Red Hat CDN prior to the official release announcement (which is published once EVERY artifact [packages, golden images, virt images, and a variety of other stuff] is complete and verified).

  • @JeffPettorinoJeffP-SGSS
    @JeffPettorinoJeffP-SGSS 5 днів тому

    Great overview of all the new shiny in RHEL9! Thanks Eric! - 0xSheepdog

  • @queenannsrevenge100
    @queenannsrevenge100 5 днів тому

    I’m glad for this video, because anything that was not “AI EVERYWHERE, AI ALL THE TIME, AI! AI! AI!” Kind of got lost in the signal. 😃

  • @Nimitz_oceo
    @Nimitz_oceo 5 днів тому

    I followed every instructions, step by step and even disabled selinux, I’m still getting the error connection timed out. Is there any I am doing ?

    • @natelager4110
      @natelager4110 2 дні тому

      Hi there, which instructions are you following? The containerized wordpress, or the direct-on-rhel instructions?

    • @Nimitz_oceo
      @Nimitz_oceo 2 дні тому

      Thanks for getting back to me. I’m using the direct on rhel instructions.

    • @natelager4110
      @natelager4110 День тому

      @@Nimitz_oceo Well, in that case start by making sure you've got httpd enabled and started, and that the firewall isn't blocking 80/443. You can look for open ports with the ss tool. see if you can see httpd listening on 80 and/or 443. check firewall-cmd to see if firewalld is active and if so what ports it allows.

  • @robertmoore3643
    @robertmoore3643 6 днів тому

    I am curious what percentage of your customer base will use Insights. I understand you are pushing it because you want everyone to use it, but I work for a large aerospace company that has both commercial and govt. contracts. Exporting our system information to Red Hat is just not going to happen. I honestly can't see any company exporting this level of system data.

    • @scottmcbrien6535
      @scottmcbrien6535 5 днів тому

      Generally, if you attach a sos report to a support case, you're sending this level of information to Red Hat today, but on a much more individualized level. Like sos, Insights can have the type of data and amount of data sent reduced through your own configuration changes. I'd suggest starting with this article: www.redhat.com/en/technologies/management/insights/data-application-security There are further links from it to the more precise data as well as changing the configuration to remove data. As to "how many will use it?", don't know. However, things like vulnerability assessment are fast, accurate, and easy with it. Inventory and subscription reporting is easy with it. Even after customizing to remove a lot of the collected metadata, you could still get inventory and subscription use. But I think a lot of the other tools are handy as well. Especially in places like government where you're required to comply with security standards and the like, you can do this today using individual machine level reporting, but Insights aggregates it all to give a much broader population reporting. Of course it requires data to do that, but again, I think the benefit is having that more global management view critical to managing larger populations. The other, IMO more important, questions are what does Red Hat do with the data, is it stored in specific geographies (like we have a sovereign instance in govcloud), etc.

    • @robertmoore3643
      @robertmoore3643 5 днів тому

      Yeah, we don't do sos data either. I do agree the functionality being demonstrated is awesome. Can't argue that at all. But to your last point, where is that data going and how is it being managed. I can't see a company taking that risk ( on purpose).

  • @prateekgp7173
    @prateekgp7173 6 днів тому

    I totally appreciate and understand the complexity reduction and mitigating lots of potential risk during Migration which RHEL does 1!! Kudos 999999999 x89mGHk said that we all must agree.

  • @Ben_3113
    @Ben_3113 12 днів тому

    Is Satellite a requirement for Insights or can the insights agent talk directly back to Insights?

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux 12 днів тому

      Insights can be standalone (included with every RHEL subscription) or integrated with Satellite, if you have one. Or you can mix and match depending on whether your systems are subscribed to satellite or the Red Hat CDN.

    • @Ben_3113
      @Ben_3113 12 днів тому

      @@RedHatEnterpriseLinux Thank you

  • @irfanmohdali2008
    @irfanmohdali2008 14 днів тому

    its requested to write all commands used in the video in the description to be of more usefull

  • @muhammadshahzad6151
    @muhammadshahzad6151 16 днів тому

    Hello I have tried to implement SUID on a file and its on /root folder like test.sh and i made it simple to print hello message when it is executed like ./test.sh and permission on this file was rws r-x r-x. I tried to check to execute this file with regular user it said permission denied as per my understanding it had to execute this file because a SUID give a permission to any regular user to execute it.

    • @scottmcbrien6535
      @scottmcbrien6535 13 днів тому

      As far as I know, the SUID permission on a non-compiled binary file does not "switch the user ID" for the person running it. From your description, it sounds like it was the execute permission that gave your users the ability to execute the script. But there's an easy way to test this. Inside your SUID'd script, run the id command. id will print the user ID of the person running it. If the script is running with switched user ID, this should match the owner of test.sh. However, I suspect that you'll see the username of the person running the script, which would indicate it's not SUID'ing.

    • @muhammadshahzad6151
      @muhammadshahzad6151 11 днів тому

      @@scottmcbrien6535The permissions seem correct, and if the file "test.sh" resides in the /root directory, a regular user should be able to execute it with the given permissions. However, if a permission denied error is displayed, it's possible that there may be some other factors at play.

    • @scottmcbrien6535
      @scottmcbrien6535 6 днів тому

      @@muhammadshahzad6151 A regular user should not have access to /root, that should be a directory private to the root user (and is permissioned such by default). If you want regular users to be able to run it, maybe put it somewhere like /usr/local/bin. According to the permissions you listed above, user, group, and others have execute permissions, so if it's in a directory they can access, it appears to be executable by all users on the system. Because it's a shell script, the 'permission denied' error may be coming from something being done within the script, especially considering that SUID shouldn't work for regular users on this file as it's not a compiled, binary executable.

  • @queenannsrevenge100
    @queenannsrevenge100 17 днів тому

    Just as an aside, Pete mentioned the Kickstart templates in satellite; any in detail examples in a future episode, or even just mention of where to go for good examples at the end of an episode would be very welcome for me. I have dabbled with Kickstart templates and satellite, and not being super strong on Ruby, those things can be very difficult to understand the essential components, how to properly tweak them, etc.

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux 16 днів тому

      There are so many ways to deploy new images, no doubt. I believe this topic will be one we cover in some depth in the upcoming mini-series! - Eric

  • @christopherholmes9363
    @christopherholmes9363 18 днів тому

    Do we have a potential timeline for RHEL 8.10 getting NIAP certified? (Really want to get off 8.6)

    • @scottmcbrien6535
      @scottmcbrien6535 18 днів тому

      As 8.6 has only been recently-ish certified, it's going to be a while. 9.0 is certified as well, though if you're wanting to stay on RHEL8, you'll have to wait for NIST to make with the NIST things...

    • @christopherholmes9363
      @christopherholmes9363 18 днів тому

      @@scottmcbrien6535 I definitely thought wrong on that.. Yeah it was very recently approved for sure… Unfortunately, so few products (that I use) support REHL 9 that it makes it hard to jump to it.

  • @frankiebaltimore9851
    @frankiebaltimore9851 20 днів тому

    I got that vagrant vibe the first few minutes. Easy commands also.

    • @scottmcbrien6535
      @scottmcbrien6535 20 днів тому

      I don't know what this means? Vagrant is more akin to containers in how you manage and distribute them. As an introduction to managing VMs, yes, we like to keep it simple and approachable. But you can do a ton of complex stuff with the virtualization that natively comes with RHEL if you're willing to write some of your own tooling. When I worked for RH Training & Certification, we used it to manage all the in--classroom systems used by course attendees, including implementing features like snapshotting, rollback, and re-provisioning. Most of that was implemented using LVM and snapshots or merges as the backing storage to the VMs and adjusting the VM definition via dynamic edits and updates to the machine's XML definition. Similarly, you can add networks, NICs, CPUs, update memory, and a ton more either with XML definition updates (and committing those to the backend database) or with direct virsh commands.

  • @grahamcrawley2639
    @grahamcrawley2639 22 дні тому

    If you remove x from /usr/bin/chmod, reapply it with setfacl ?

    • @scottmcbrien6535
      @scottmcbrien6535 21 день тому

      Could potentially work, to grant back x to root who could then use chmod to change the mode of the file again. Personally I would re-install core-utils as my solution.

  • @grahamcrawley2639
    @grahamcrawley2639 22 дні тому

    So why did --- --- rwx not work, surely that gives everyone rwx permissions to the file ?

    • @scottmcbrien6535
      @scottmcbrien6535 21 день тому

      Because it's not really "everyone". When someone interacts with a file, the order of operations is: Is this the owner of the file? Then apply 'user' permissions If not, is this someone in the group that owns the file? Then apply 'group' permissions. The 'others' permissions apply to everyone who is neither the owner nor a group member of the group owner of the file. As a result 'everyone' is not really an accurate description of the people managed by the final field of permissions.

  • @queenannsrevenge100
    @queenannsrevenge100 22 дні тому

    I could see Nate showing up at Summit in a Red Three-piece suit, rockin’ the Red Fedora and sunglasses as “ZZ Nate” 😂

  • @muhammadshahzad6151
    @muhammadshahzad6151 23 дні тому

    tell some about SUID and how to assign a SUID as a root so other user can execute it by the permission of user root

    • @scottmcbrien6535
      @scottmcbrien6535 22 дні тому

      We'll be covering SUID, SGID, and STVX (and filesystem acls, and apparently umask [thanks Nate!]) in our next episode. That said, SUID binaries are generally frowned upon, in fact, most security standards have mounting filesytems with the nosuid mount option as part of their standard. A more modern approach to this problem is containerization. Podman runs rootless (meaning regular people can use it), but within the containers they make, they are offered 'root' shells. In reality, the container host processes still run as their unpriviledged accounts, however inside of their containerized environment, they're given full administrative control. So if someone needs to do something like ... run a webserver or bind a service to a port, they can do that within their container's environment using their containerized root authority. Why is SUID frowned upon? Because you have to account for EVERY.SINGLE.THING that person might do with that application being root. Lets say, for example, you put SUID on the vim executable, thinking that it would allow someone to edit files as root. It works! But it also allows them to use :!/bin/bash and now get a bash shell from which they can do any other activity on the system as root. 😞 The SUID programs that come with the system are very task driven and have been through a ton of hardening, code review, and time-in-use (like the /usr/bin/passwd program). You should be wary of new SUID programs or people asking for you to make other programs SUID.

  • @boubou40
    @boubou40 23 дні тому

    i will be here next week, i'm always struggling with special permissions and acls

  • @zaidisphotographers
    @zaidisphotographers 23 дні тому

    If the podman process was elaborated in detail, it would have been so much easier for Shefs and Artists.

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux 23 дні тому

      What part of the process were you interested in hearing more?

    • @zaidisphotographers
      @zaidisphotographers 23 дні тому

      @RedHatEnterpriseLinux The container. Interestingly matrix attachment with podman is unique.

  • @diggin4thepony
    @diggin4thepony 25 днів тому

    John & Eric, I love this series! Great demos!

  • @dawgalova
    @dawgalova 27 днів тому

    Does the leapp automstically upgrade amend/update what repositories the system is pointed toward? For example, 8 EUS onto 9?

    • @dawgalova
      @dawgalova 27 днів тому

      For reference, this is on Azure

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux 27 днів тому

      The good news is that RHEL is RHEL is RHEL. It doesn't matter if you are upgrading on Azure or on a VM. To answer your question, yes, Leapp will automatically update the system to poll the correct repositories. - Eric

  • @sharathsundar7722
    @sharathsundar7722 28 днів тому

    Hi If we are upgrading Linux machine using Leapp utility, the Linux machine has to be first subscribed ?

    • @scottmcbrien6535
      @scottmcbrien6535 27 днів тому

      Leapp supports disconnected upgrades. However, by default it's going to use the CDN or Satellite defined repositories. If you're trying to do a Leapp upgrade with your own repositories, that can also be done, but needs some additional effort. You could try using the uprade version's iso, like this kbase article shows: access.redhat.com/solutions/7017944

  • @lsdowdle
    @lsdowdle 29 днів тому

    Full-screen VNC session has been a long-time requested feature in cockpit-machines... but alas... it hasn't been implemented yet.

  • @shahidmehmood6718
    @shahidmehmood6718 Місяць тому

    I have facing this issue during inplace upgrade RHEL 7 to RHEL 8

  • @shahidmehmood6718
    @shahidmehmood6718 Місяць тому

    MountError: Mount operation with mode overlay from / to /var/lib/leapp/scratch/mounts/root_/system_overlay failed: Command ['mount', '-t', 'overlay', 'overlay2', '-o', 'lowerdir=/,upperdir=/var/lib/leapp/scratch/mounts/root_/upper,workdir=/var/lib/leapp/scratch/mounts/root_/work', '/var/lib/leapp/scratch/mounts/root_/system_overlay'] failed with exit code 32.

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      Looks like there's a kbase article with this error message: access.redhat.com/solutions/7004955

  • @shantanugadgil
    @shantanugadgil Місяць тому

    All was fine till podman pod ps... THEN came generate a YAML ... Ewwwwww. YAML is never the solution for anything. 😂

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      Ha, it seems to be the solution to everything, more and more.

    • @shantanugadgil
      @shantanugadgil Місяць тому

      @@RedHatEnterpriseLinux 🥺🥺🥺

    • @shantanugadgil
      @shantanugadgil Місяць тому

      @@RedHatEnterpriseLinux joke: you say "solution", I hear "we ... shall .... prevail .... (1984)"

  • @johnkaldachar
    @johnkaldachar Місяць тому

    I've created a virtual machine based on vmdk rhel9. On startup, it asks for a login and password. What is the standard password and login?

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      There is no standard login and password. The IT landscape is littered with people who built devices with defaults (and users who neglect to change them). In the ImageBuilder build process you can add users to your image, and set their credentials, or add sshkeys to the image, etc. That's how you know how to get into the image afterwards. If you don't want to rebuild the image, though you should just be able to add things to your existing blueprint, you could boot the VM into single user mode and assign a root password to it. You wouldn't want to do this for every machine made from the image though, so better to also fix it in the image.

  • @DawidKellerman
    @DawidKellerman Місяць тому

    Problem with shredding is if the dis died and was not encrypted...you can still pull the internals and view it...

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      Indeed! The specialty shops that specialize in data recovery often use this method, by moving the platters to different drive chassis. Personally, I take my disks apart and shred or destroy the platters prior to recycling them.

  • @astlerebello7984
    @astlerebello7984 Місяць тому

    i want to upgrade rhel7.9 to 9 so for that can is use leap tool completely offline

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      Two things on this: 1) While there are no technical limitations for upgrading from 7.9 to 9.latest, the leapp tool will only upgrade 1 major version at a time. This gives you the chance to verify that everything still works and there are no issues after upgrading to RHEL 8. Once you've validated your workloads (and hopefully taken another backup/snapshot), then you can proceed with the upgrade. 2) leapp does work offline! You just need to be able to source the packages for the next major version. This can be via #RedHatSatellite or the ISO. Thanks for the great question! - Eric

  • @cityofjoy8830
    @cityofjoy8830 Місяць тому

    Any tips on rhel 7 to 9 upgrade inaws

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      access.redhat.com/solutions/6970018 There's no direct 7->9 upgrade, you'd do a 7->8->9. This also is somewhat dependent on how closely you're living the 'cloud lifestyle'. If you're in the cattle management business, where you can just re-provision whenever you have an issue with an instance, I'd recommend crafting your workflow for 9, test your apps, etc. Then just start swapping out instances that were 7 for instances that are 9. If instead, you're using cloud as a scalable virtualization, where you do very much care for individual systems, an in-place upgrade on those systems is more appealing.

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      Great question!

  • @SlinkyD
    @SlinkyD Місяць тому

    I always turned it off since SE was introduced. All these years later and its still a cryptic pain. Even fresh installs.habe SEL notifications going off everywhere. And anything I needed to work, SEL was in the way, making things 100x difficult. So its always an instant disabling.

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      Thanks for watching! As mentioned on the show, in RHEL3 when it was first introduced and RHEL4, when it was first significantly documented, I get it. I didn't start using it until a couple of minor update releases into RHEL4. RHEL 5, it was generally usable. RHEL6+ I think it's generally invisible (largely thanks to the continued improvement to the ruleset in the targeted policy). Also as mentioned late in the show, RHEL9+, you don't want to 'disable' it. You could set the default config to permissive mode, but you'll still get all the alerts about violations in that mode. It just doesn't stop things from occurring that are outside the configured policy. Keep in mind though that folks like the Red Hat Product Security team, when rating CVEs using the modified vendor CVSS score will assume that SELinux is enabled when determining their score for a vulnerability. I think this is the vulnerability Nate and I mentioned re: runc on the show: access.redhat.com/security/vulnerabilities/RHSB-2021-004 With SELinux in enforcing mode, using the targeted policy, the attack vector was blocked for anything other than container_t type files that would be in-scope for a container running, but maybe would not be natively accessible inside of their containerized runtime without a symlink outside. (which is pretty edge-case). But, IMO, saying 'its too hard' could apply to so.many.things. Why not ever use host-base firewalls? Or file permissions? or networks with non-octet bounded network mask descriptions? or systemd configurations? We learn new, and sometimes challenging things because it's a better way to operate our systems, I think SELinux is one of those worth learning.

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      What types of applications are you running that would compete with the system defaults? - Eric

  • @franciscolopez2736
    @franciscolopez2736 Місяць тому

    great video!

  • @queenannsrevenge100
    @queenannsrevenge100 Місяць тому

    I am glad Red Hat finally moved to making SELinux harder to outright disable; I’ve told people for years that permissive is twice as good as disabling it, because they still get the logging that tells them when something suspicious is happening. Much like Shantanu said, my first two “why is something not working as it should” steps are temporarily setting SEL to passive and temp stopping fapolicy 😄

  • @scottmcbrien6535
    @scottmcbrien6535 Місяць тому

    So turns out finding SELinux content was much more difficult than I thought! However, This guide from Red Hat, Using SELinux: access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/using_selinux/index Seems much more use driven than the older Administering SELinux guide that was published with RHEL7. Additionally, there's this great analysis of how SELinux works to mitigate a CVE by Joe Brockmeier: www.redhat.com/en/blog/selinux-mitigates-container-vulnerability It walks through how SELinux functions with the lens of why the CVE is mitigated by SELinux, which exactly why we want to use it.

  • @MemeSaad86
    @MemeSaad86 Місяць тому

    What if I wanna use PAYG RHEL subscriptions from public cloud, how is satellite importing these subs?

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      The PAYG systems are by default registered to the cloud provider's Red Hat Update Infrastructure (RHUI), so you remove the RHUI config and repos and then register them to your satellite. Here is a kbase article on the process: access.redhat.com/solutions/3626061

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      Great conversation, thats Scott and Meme!

    • @MemeSaad86
      @MemeSaad86 Місяць тому

      Thank you, man. appreciate taking the time to answer. ​@scottmcbrien6535

    • @MemeSaad86
      @MemeSaad86 Місяць тому

      ​@RedHatEnterpriseLinux keep posting such content. They help!

  • @Trozpent
    @Trozpent Місяць тому

    Grats on 100+ shows (I'm still catching up from 2 years ago). I have a challenge/suggestion/request. I recently learnt to setup systemd unit files (mount and automount) for mounting my network shares, in this case cifs. then I got thinking, how can I show my boss how do this at enterprise level. So If I have my linux box authenticating users with Windows A/D, then want to mount a windows share in users home directory (say in a dir called Projects found under every user home), but it's really important to pass UID=1234 (used to control which directories they can access on the shares), where 1234 is different for each user, how can I support that while mounting via systemd? I could not understand how to use "Environment" variables to do this.

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      I don't know how you would do this with systemd, but you could configure autofs to automatically mount a CIFS shared directory upon a user login.

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      Great question! Thanks for sharing!

  • @Trozpent
    @Trozpent Місяць тому

    Also another question - Is tiered caching supported? I basically have this SSD sitting there doing nothing and thought I could give it a go as a tier cache (cache pool) before it commits to the spinning disks ?

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      Billy Holmes responded: Caching tiers are absolutely supported! Here's an example: stratis-storage.github.io/howto/#init-cache-initialize-cache-and-add-block-device-as-cache-device-typically-something-like-ssd

  • @Trozpent
    @Trozpent Місяць тому

    Loving all this stuff you guys are putting out. You don't advertise it enough around the Linux community :) As someone new to storage and virtualisation and looking at the the Homelab I'm playing with, is there a difference/preference between setup a physical RAID, vs the Software Raid. And does Stratis actually require a raid to be made first or can I just select multiple disks (HBA mode) and create a stratis layer directly over them, adding more disks as needed over time ? All this on Dev account on RHEL :)

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      @trozpent Stratis will create a pool out of block devices you provide it. If you send it a hardware RAID, cool. If you give it a software RAID, fine. But you can also give it individual devices. In this lab (www.redhat.com/en/interactive-labs/configure-system-storage-stratis ) we even use individual files in a filesystem to back the stratis pool. That said, there are certainly reasons why you would *not* want to use files in a filesystem to back your stratis pool. There are reasons one would choose a RAID device instead of individual disk devices. For files in file systems, you're now storing files on a filesystem in your stratis pool, which is then reflected in files on a filesystem, which is then stored on a disk. Not having direct access to hardware could slow things down [depending on the I/O and volume of I/O you're doing]. In the case of RAID, you get that physical representation of data across multiple disks to protect from an individual hardware failure. All that said, you can do what you want, but just because you *can* doesn't mean you *should*. 🙂

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux Місяць тому

      We are always looking for new places to share our content. Do you have any suggestions?

    • @JohnSmith-lk4xv
      @JohnSmith-lk4xv Місяць тому

      Does stratis do any redundancy itself, across individual block devices in a pool? Or is that something that has to be done manually? Just wondering about the complete workflow. For instance, in cockpit in an environment without hardware redundancy (I.e. no HW RAID), is it suggested to use mdraid or LVM-RAID first (and which one is preferred?), and then go to Stratis to create pools and go from there? I see a lot of demos mentioning "create pools with multiple block devices" but at the same time it's mentioned "stratis combines multiple technologies including mdadm...". I look at this and think there's some redundancy stuff happening when you just slap a bunch of disks together into a Stratis pool and could see some other folks think this too.

  • @JeffPettorinoJeffP-SGSS
    @JeffPettorinoJeffP-SGSS Місяць тому

    HATE this video format. My speakers weren't working. By the time I got them working the video was mostly over and I had NO WAY TO REWIND/RESTART. Just because some new format is popular and fancy does not mean it is useful or acceptable for training purposes. BAD UX/UI.

  • @timoliver211
    @timoliver211 Місяць тому

    Great video!!! Rich is the man!

  • @natelager4110
    @natelager4110 Місяць тому

    Oh, I watched... Thank you Eric. ;). Ive really enjoyed hosting. :D

  • @ErrolCasey
    @ErrolCasey Місяць тому

    congrats on your 100th episode

  • @munamohamed7160
    @munamohamed7160 Місяць тому

    Hi, please do a show on nginx :)

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      We did! At least some basics of configuring it: ua-cam.com/users/livelnXDf95Zubk This episode started with Apache, but then Eric covered the same content for NGINX!

  • @babusasidhar
    @babusasidhar Місяць тому

    What is the difference between RHEL Stratis and RHEL CEPH Storage ? where and when we should use this ?

    • @scottmcbrien6535
      @scottmcbrien6535 Місяць тому

      Stratis is storage device pooling technology to run on a single system. It is similar to Logical Volume Management (LVM), but it is less hierarchical than LVM. Essentially, you add your block devices to the pool of storage, then allocate out of that pool for devices to present to your system. Stratis will manage things like thin provisioning your storage device and grow it's in-use storage automatically as data starts to be stored on the device. Conversely, Ceph (now an IBM product) is not just the storage device mangement, but also includes the ability to manage devices across systems into a larger device supported on the backend by networking. Ceph also manages the filesystem components as well, where Stratis would rely on an XFS, ext4, or other filesystem to be put on the Stratis provided device. We have a hands-on lab to provide some experience with Stratis: www.redhat.com/en/interactive-labs/configure-system-storage-stratis

  • @JerryDeeWilliams
    @JerryDeeWilliams 2 місяці тому

    This is helpful. But the short doesn't let you go back and forth on the video and it is too small to be able to really see what is going on. I think shorts are a bad idea for this content.

    • @RedHatEnterpriseLinux
      @RedHatEnterpriseLinux 2 місяці тому

      Thank you for the feedback! We are actually releasing a few different types of shorts to see what works and what doesn't!

  • @andrewengland781
    @andrewengland781 2 місяці тому

    Thanks. Lots of great tips here that I wasn't aware of.