Avatar photo
By: Erico Mendonca

December 26, 2025 7:52 pm

264 views

PCI Passthrough Demystified: Setting up AMD GPUs in Harvester

If you’ve ever tried to set up GPU passthrough, you know the struggle.You edit the GRUB config, you isolate the IOMMU groups, you cross your fingers, and... you get a black screen. Or worse, the dreaded "Code 43."Setting up PCI passthrough is notoriously finicky, and doing it within a Hyper-Converged […]

Read More


Avatar photo
By: Vince Matev

December 15, 2025 9:15 am

322 views

Building the AI-Native Telco: SUSE Telco Cloud on Intel® Xeon® 6 SoC-based Supermicro systems

Guest blog post authored by: Michael Holzerland, EMEA Telco Lead at Supermicro Niall Power, Solutions Architect and Intel FlexRAN Software PLM at Intel   Telecommunications operators are transforming their networks to support 5G-Advanced, ORAN, massive MEC scale-out, and AI-driven automation. These transformations demand infrastructure that simultaneously delivers extreme packet-processing performance, deterministic low latency, integrated […]

Read More


Avatar photo
By: Troy Topnik

December 1, 2025 1:30 pm

442 views

Elastic Cloud on SUSE Rancher Kubernetes

Evolution of the Stack Elastic Stack (AKA ELK Stack) comprises tools like Elasticsearch, Kibana, APM Server, and others. Elastic Cloud on Kubernetes (ECK) is an evolution of the deployment of this suite of software. It automates the deployment, provisioning, management, and orchestration of the Elastic Stack components on Kubernetes clusters.  ECK simplifies the process […]

Read More


Avatar photo
By: Ted Jones

November 27, 2025 2:18 am

724 views

Drive Multi-Cloud Kubernetes Unification, Zero-Trust Security and Observability at Scale

The fragmentation inherent in managing heterogeneous public and private cloud Kubernetes clusters is the single largest drain on your cloud native budget and a primary source of systemic security risk. Relying on proprietary, vendor-specific tools creates an "autonomy gap" that slows strategic innovation. You can drive multi-cloud Kubernetes Unification and Security and full-stack visibility […]

Read More


Avatar photo
By: Meike Chabowski

November 5, 2025 4:49 pm

299 views

The Wait is Over: Explore the New Modular Docs for SUSE Linux Enterprise 16!

I’m sure you’ve read the recent exciting announcement about the general availability of SUSE Linux Enterprise 16 here on our SUSE Blog. And I assume that, a little while back, you saw the blog post about our big plan to move from "Monolithic Manuals to Modular Docs". We talked about leaving behind […]

Read More


Avatar photo
By: Meike Chabowski

November 5, 2025 11:06 am

528 views

NeuVector for Kubernetes Security and Compliance

This article was written by Hridyesh Singh Bisht, Technical Writer on the SUSE Documentation Team.         Modern Kubernetes environments evolve rapidly, containers start and stop within seconds, workloads scale dynamically, and network connections shift constantly. Traditional firewalls and intrusion prevention systems aren’t designed for this. NeuVector, the […]

Read More


Avatar photo
By: Gopala Krishnan A

October 14, 2025 1:37 pm

1,015 views

Migrating RKE to RKE2 Seamlessly with CloudCasa and SUSE

Streamlining Kubernetes Upgrades - Overcoming Migration Barriers with Automated Protection. Collaboratively authored by: Gopala Krishnan, Partner Solution Architect, SUSE Abraham George, Senior Support Engineer, SUSE Introduction In the rapidly evolving landscape of Kubernetes, organizations are constantly seeking ways to strengthen their infrastructure with enhanced security, resilience, and scalability. Rancher Kubernetes Engine (RKE) has served enterprises […]

Read More


Avatar photo
By: rob.culp@suse.com

September 15, 2025 2:00 pm

1,234 views

Combining Confidential Computing with Hardware Acceleration to enhance end-to-end value/benefit

SUSE's latest Technical Reference Document, "Confidential Computing with SUSE Linux Enterprise Base Container Images Using the IBM Hyper Protect Platform," guides organizations as they enhance data security with hardware-based cryptographic capabilities. While confidential computing protects data in use, the guide's additions detail how to leverage powerful hardware to further secure and accelerate sensitive […]

Read More


Avatar photo
By: Meike Chabowski

September 8, 2025 11:46 am

2,012 views