Red Hat OpenShift Application Runtimes Released
December 05, 2017

Red Hat announced the general availability of Red Hat OpenShift Application Runtimes, enabling organizations to accelerate cloud-native app development with a curated set of frameworks and runtimes for prescriptively building and running microservices-based applications.

At the heart of digital transformation is the opportunity for organizations to reinvent themselves to better compete in a market marked by new competitors, communities, technologies and business strategies. Under these conditions, adaptability is key for survival, and cloud-native development solutions that harness the convergence of Linux containers, API management, service-based architectures, and DevOps automation are ideal for helping organizations respond to unpredictable change and outmaneuver competitors.

By providing a tightly integrated and fully supported offering for developing microservices in multiple languages and frameworks, Red Hat aims to balance developers' need for choice with the operational requirement for standardization and support – both for creating new applications and re-architecting existing ones. According to a September 2017 survey of Red Hat customers, a large majority of respondents (87 percent) indicated that they are using or considering multiple runtimes and frameworks for developing microservices, with 44 percent citing the preference for using the right tool for the right task.

Red Hat OpenShift Application Runtimes supports multiple runtimes, languages, frameworks and architectures, with the following key features and benefits:

- Simplified development: The offering reduces the complexity of developing cloud-native applications by integrating OpenShift Container Platform capabilities with multiple runtimes and frameworks, including wizard-based setup, service discovery, external configurations, and circuit breakers for fault tolerance.

- Strategic flexibility: Red Hat OpenShift Application Runtimes supports hybrid cloud configurations, helping avoid cloud provider lock-in. The distributed nature of cloud computing means that a “one size fits all” approach to runtimes and frameworks is becoming less effective for enterprise productivity. With this offering, developers gain the flexibility to build services for hybrid and multi-cloud applications and systems using their preferred tools.

- Speed of delivery: Due to its integration with Red Hat OpenShift Container Platform, Red Hat OpenShift Application Runtimes provides developers with a fully automated platform for provisioning, building and deploying applications and their components. It integrates with continuous integration and continuous delivery (CI/CD) tools like Git, Maven, and Jenkins. It also provides intuitive tooling to more securely streamline Kubernetes workflows and enable application load-balancing and auto-scaling capabilities with policy-based control and automation.

- Service Catalogue integration: Combined with the OpenShift service catalog, enterprise IT organizations can take full advantage of multi-cloud investments by integrating cloud-based services, for example those provided by the OpenShift and AWS service integration, and capabilities developed in-house on Red Hat OpenShift Application Runtimes and provide portability and consistency of stateful and stateless, microservices-based applications across IT footprints.

Certified and supported runtimes available with Red Hat OpenShift Application Runtimes include Java EE, WildFly Swarm, Eclipse MicroProfile, Eclipse Vert.x, Node.js, and Spring Boot.

Red Hat OpenShift Application Runtimes is now available.

The Latest

July 19, 2018

Despite 95 percent of CIOs expecting cyberthreats to increase over the next three years, only 65 percent of their organizations currently have a cybersecurity expert, according to a survey from Gartner. The survey also reveals that skills challenges continue to plague organizations that undergo digitalization, with digital security staffing shortages considered a top inhibitor to innovation ...

July 17, 2018

In my first blog in this series, I highlighted some of the main challenges teams face with trying to scale mainframe DevOps. To get past these hurdles, the key is to develop an incremental approach that enables teams to capture value along each step of the journey ...

July 16, 2018

The key to mainframe DevOps success is in quickly identifying and removing major bottlenecks in the application delivery lifecycle. Major challenges include collaboration between mainframe and distributed teams, lack of visibility into the impact of software changes, and limited resource flexibility with scaling out necessary testing initiatives. Now let's take a closer look at some of these key challenges and how IT departments can address them ...

July 11, 2018

How much are organizations investing in the shift to cloud native, how much is it getting them? ...

July 10, 2018

In the shift to cloud native, many organizations have adopted a configuration-as-code approach. This helps drive up application deployment velocity by letting developers and DevOps teams reconfigure their deployments as their needs arise. Other organizations, particularly the more regulated ones, still have security people owning these tools, but that creates increased pressure on the security organization to keep up. How much are organizations investing in this process, and how much is it getting them? ...

June 28, 2018

More than a third of companies that use serverless functions are not employing any application security best practices and are not using any tools or standard security methodologies to secure them, according to the State of Serverless Security survey, conducted by PureSec ...

June 27, 2018

The popularity of social media platforms and applications is spurring enterprises to adopt "social business" models to better engage with employees and customers and improve collaboration, according to a new study published by ISG ...

June 25, 2018

The previous chapter in this WhiteHat Security series discussed Codebase as the first step of the Twelve-Factor App and defined a security best practice approach for ensuring a secure source control system. Considering the importance of applying security in a modern DevOps world, this next chapter examines the security component of step two of the Twelve-Factor methodology. Here follows some actionable advice from the WhiteHat Security Addendum Checklist, which developers and ops engineers can follow during the SaaS build and operations stages ...

June 21, 2018

DevSecOps is quickly gaining support and traction, within and beyond information security teams. In fact, 70% of respondents believe their culture can embrace the change needed to fuse Security and DevOps, according to a new survey of 80 security professionals by Aqua Security ...

June 20, 2018

The larger the company size, the higher the proportion of low IT performers, according to the State of DevOps: Market Segmentation Report from Puppet, based on the 2017 State of DevOps Survey data ...

Share this