Avatar photo
By: Andrés Valero

April 26, 2024 4:23 pm

47 views

Avatar photo
By: Andrés Valero

April 26, 2024 4:23 pm

38 views

What’s New in SUSE ATIP 3.0?

Introducing ATIP SUSE Adaptive Telco Infrastructure Platform (ATIP) 3.0 represents a significant advancement in telco-optimized edge computing solutions. Designed to empower telecom companies in modernizing their networks, ATIP provides a robust platform for innovation and accelerated deployment of containerized network functions (CNFs) in a cloud-native environment.   Addressing Telco Challenges Telecommunications is a […]

Read More


Avatar photo
By: Martina Ilieva

April 25, 2024 2:24 pm

112 views

Synergy Unleashed: the Dynamic Collaboration of SUSE and Krumware in Platform Engineering

SUSE GUEST BLOG AUTHORED BY: Colin Griffin, Founder and CEO at Krumware   The cloud-native landscape has forever changed the way organizations develop, implement, and manage software systems. Now, more than ever, organizations have the flexibility to control their own clouds, but with great freedom comes great responsibility and complexity.  Krumware has […]

Read More


Avatar photo
By: Terry Smith

April 16, 2024 9:12 pm

474 views

Unlock the Easiest Path to HA SQL Server in Kubernetes

DH2i’s DxEnterprise with Rancher Prime by SUSE provides an ideal, infrastructure-agnostic, streamlined, high availability solution empowering enterprises to achieve unprecedented resilience, scalability, and security for their business-critical, Microsoft SQL Server landscapes. ~ Terry Smith SUSE GUEST BLOG ARTICLE AUTHORED BY: Don Boxley, Jr., co-founder and CEO of DH2i   There is no denying […]

Read More


Avatar photo
By: Kevin Ayres

April 16, 2024 2:57 pm

648 views

SUSE’s Container Security Platform Now Listed in Amazon EKS Best Practices: A Big Step for Container Security

Thanks to our collaboration with AWS and work from Dominik Wombacher, we're thrilled to announce that SUSE's Container Security Platform, NeuVector Prime, is now recognized in the official Amazon EKS Best Practices documentation across six key security areas: Runtime Security Pod Security Network Security Image Security Incident Response and Forensics Regulatory Compliance   This […]

Read More


Avatar photo
By: eich@suse.com

April 15, 2024 11:06 am

571 views

Install your HPC Cluster with Warewulf

Preface In High Performance Computing (HPC), computing tasks are usually distributed among many compute threads which are spread across multiples cores, sockets and machines (nodes). These threads are tightly coupled together. Therefore, compute clusters consist of a number of largely identical machines that need to be managed to maintain a well-defined and identical setup across […]

Read More


Avatar photo
By: Glen Kosaka

April 3, 2024 1:56 pm

1,388 views

How NeuVector Can Protect Against the XZ Backdoor Attack CVE-2024-3094 in Kubernetes Environments

Security researcher Andres Freund reported to Debian that the xz/liblzma library had been backdoored. As a result, CVE-2024-3094 was published with a critical CVSS score of 10. This vulnerability stems from a supply chain compromise on versions 5.6.0 and 5.6.1 of XZ Utils. XZ Utils is data compression software included in […]

Read More


Avatar photo
By: Marcus Meissner

March 29, 2024 5:33 pm

5,558 views

SUSE addresses supply chain attack against xz compression library

SUSE received notification of a supply chain attack against the "xz" compression tool and "liblzma5" library. Background Security Researcher Andres Freund reported to Debian that the xz / liblzma library had been backdoored. This backdoor was introduced in the upstream github xz project with release 5.6.0 in February 2024. For the […]

Read More


Avatar photo
By: Sanjeet Kumar Jha

March 28, 2024 9:59 am

929 views

SLES for SAP maintenance procedure for Scale-Out Perf-Opt HANA cluster

This blog post cover specific maintenance scenarios for scale-out performance optimized HANA cluster. It illustrates the procedures that are defined in man page SAPHanaSR_maintenance_examples which are applicable for Scale-out topology. We are going to cover the following three scenarios: HANA takeover procedures HANA maintenance (or linux OS maintenance when a reboot of the node is […]

Read More