Credit: Ilze Lucero Red Hat has rolled out version 8.5 of its main-line branch of Red Hat Enterprise Linux (RHEL), which upgrades its support for containerization, predictive analytics, and multicloud. Red Hat Insight, the company’s predictive-analytics service—available through most RHEL subscriptions—now has more robust abilities in the areas of vulnerability identification, compliance, and remediation, the company said. Containerization is upgraded with RHEL 8.5 to make containerized applications easier to deploy and manage, according to Red Hat. The company introduced the ability to create containerized images faster through rootless use of the OverlayFS filesystem. OverlayFS is “union file system,” which allows users to overlay one file system over another, enabling multiple users or applications to access it at the same time. Containerized Podman deployments are now available for continuous integration/deployment systems, which means that the Docker-like command-line interface for containers is more readily available to let containerized apps run without their own daemon. RHEL 8.5 also supports native integration of cgroup2, which should mean better and more logical organization for the computing resources required by individual containers. It also supports container image-signature verification implemented by default, for improved security. Multicloud support got a facelift in RHEL 8.5 through the addition of new “system roles.” These are pre-built system configurations for RHEL deployments, designed to make it easier to support specific workloads without having to hand-create specific configurations each time. The new system roles include a database-focused role for Microsoft SQL Server, a VPN tunnel for reduced risk of misconfiguration in those environments, and a standardized Postfix role for easy deployment of mail servers. OpenJDK 17 and .NET Core 6 support have also been added, which should prove helpful for application developers, the company said. It also said that RHEL’s web-console core functionality has been upgraded for easier performance management and live kernel patching. The new version of RHEL is available now via the company’s customer portal. Now see Linux security: Cmd provides visibility, control over user activity Related content analysis BGP: What is border gateway protocol, and how does it work? BGP is how the autonomous networks that make up the internet share routing information to find the best route for IP traffic. CISA describes BGP as 'the most important part of the internet you’ve probably never heard of.' By Keith Shaw May 17, 2024 11 mins Routers Internet Network Security feature Red Hat seeks to be the platform for enterprise AI By Maria Korolov May 17, 2024 12 mins Linux Network Management Software news FCC proposes BGP security measures Protecting the Border Gateway Protocol is as important as protecting the border. By Gyana Swain May 17, 2024 4 mins Regulation Network Security brandpost Sponsored by Zscaler 5 Must-haves for your next DSPM solution Elevating cloud security: Navigating the data storm with DSPM By Kalie Radsmikham, Sr. Director of Product Marketing, Cloud Security May 16, 2024 7 mins Cloud Computing PODCASTS VIDEOS RESOURCES EVENTS NEWSLETTERS Newsletter Promo Module Test Description for newsletter promo module. Please enter a valid email address Subscribe