Ever wondered what CloudForms can do for you in AWS? The next few blog posts will walk you through step by step how to upload the CloudForms image to AWS, how to assign the correct policies and roles and how to configure it correctly so it can discover your environment. Part 1 is dedicated to the import and configuration of the CloudForms image.
We’ve just built Gaprindashvili-2. This release contains security fixes, bug fixes, UI tweaks, and stabilization.
Quad Icons: Help Us Improve!
d-m-uwrite yet another one. When will this madness end? They are tempting the very threads of fate herself, letting
d-m-uget away with this twice in a row. Who knows what horrors will befall you this time. You shudder. If you are lucky, it will be only physical monsters, not the unearthly disturbances of time and dark and cold that have been evoked with such disasterous results previously. You had held out a smattering of hope that
d-m-u'sprose might be gentled the way that centuries of water smooth a pebble, but such hope is whisked away with the next thought: you never know, with these texts, if you will exist outside the inky blackness, cursed to only watch as the story dismally unfolds before your eyes, or if you will be a deeply unwilling participant, your agency slave to the whims of an unreliable, mercurial narrator.
In this article, we describe how High Availability (HA) works natively in Red Hat CloudForms. The mechanism uses PostgreSQL feature, and does not require external tools like Virtual IP (VIP), HAProxy, or Load Balancer. We will use a two-node active/passive architecture as an example to investigate what is happening when failover occurs.
tl;dr we found a memory leak in Ruby… and it mostly wasn’t our fault!
This video demonstrates how you can take manual tasks and processes and turn them into automation workflows. In this video we utilize Red Hat CloudForms and Ansible Tower to provide an underlying automation and orchestration framework to deliver automation to your IT organization.
First Mast Lonth
This blog post provides a high level overview of the ways ManageIQ Authentication can be configured. It also gives a brief summary of the steps used to configure them.