Continental Innovates with Rancher and Kubernetes
Kubernetes applications are increasingly making their way to the edge and embedded computing. Storage will quickly follow as the applications that rely on this edge infrastructure become more advanced and naturally carry more state. Longhorn is a cloud native persistent storage technology that has been quickly evolving as stateful applications in Kubernetes increase. An enhancement in its latest version 1.1 is quite applicable to this topic: native ARM64 support.
Amazon has announced Amazon EKS Distro (EKS-D), a Kubernetes distribution based on and used by Amazon EKS. As an Amazon EKS Distro launch partner, Rancher Labs has added experimental support in Rancher’s RKE2 Kubernetes distribution to allow users to leverage 3rd party Kubernetes components.
Many companies still struggle to find a way to abstract the complexity of Kubernetes away from developers. This often results in custom-tailored platforms that limit the potential of Kubernetes and add a maintainence burden. Combining DevSpace, Rancher and loft gives developers direct access to Kubernetes while making the interaction with it as easy as possible by running just a single command.
Inventx’ financial and insurance customers are adopting microservices and moving to cloud-native through a full-stack DevOps platform based on Rancher.
Learn about the integration of Citrix ADC as an Istio ingress gateway and sidecar proxy in Istio service mesh deployed on Rancher.
Learn about the components of a disaster recovery scenario and how to implement them safely in a Kubernetes environment.
Learn how to deploy open source Ingress controller Ambassador on K3s.
Learn how to use HAProxy as your Ingress Controller with Rancher. We explore features including zero downtime reloads, performance and observability
Deploy a PHP application on Kubernetes with custom OPcache and PHP-FPM configurations to improve performance. You’ll use Rancher to deploy a PHP application using custom environment variables to dynamically configure OPcache and PHP-FPM.
Manage a Rancher cluster deployment using GitLab for CI/CD, Terraform for Infrastructure as Code and the Rancher2 provider.
Albert Heijn, the largest grocery brand in the Netherlands, works with Rancher to achieve 80 percent reduction in management hours and testing time
Citrix Ingress Controller is an emerging enterprise-grade ingress controller for load balancing microservices in the Kubernetes environment. In this article, we will discuss different deployment modes for Citrix Ingress Controller and deploy it via the Rancher catalog.
Optoro, the world’s leading returns optimization platform, has pioneered a reverse logistics model to keep returned goods out of landfills. With Rancher and Kubernetes, Optoro is driving greater scale, efficiency and sustainability.
Use Rancher to deploy Kubernetes clusters on Microsoft Azure, with Terraform or from the GUI
DIMOCO is an international mobile payments innovator. See how why Rancher is central to their infrastructure transformation around Kubernetes and how they have cut development time by 80 percent.
Learn how to set up custom alerts with Rancher and Prometheus Alertmanager to find problems in your Kubernetes clusters before there's an outage.
A common challenge in deploying Kubernetes is gaining the necessary visibility into the cluster environment to effectively monitor and troubleshoot networking and security issues. Discover best practices for better cluster visibility to avoid downtime troubleshooting.
The Folding@home project allows you to donate unused compute resources to support research for COVID-19. Join the fight! We’ve published the app in the Rancher catalog so you can easily donate unused compute resources from your Kubernetes clusters in Rancher.
Kubernetes Pod Security Policies are critical for Kubernetes security. See how to harden your Kubernetes security posture using a Pod Security Policy in your Rancher environment and tools from Sysdig.
Kubernetes Pod Security Policies are critical for Kubernetes security. See how to harden your Kubernetes security posture using a Pod Security Policy in your Rancher environment.
Security is one of the most talked-about topics for Kubernetes users. Google “Kubernetes security” and you’ll find a huge number of articles, blogs and more. The reason is simple: you need to align your container and Kubernetes security with your organization’s existing security profile.
-- Kubernetes has some strong security best practices for your cluster—authentication and authorization, encryption in secrets and objects in the etcd database—to name a few.
The k3s project was started by Darren Shepherd, Chief Architect at Rancher 7 months ago and has already become one of the most popular Kubernetes options on the CNCF Landscape by number of GitHub stars.
-- To put this into context, k3s is more popular than OpenShift by IBM/Red Hat and only Rancher Kubernetes itself is more popular than k3s. Now stars are indicative of interest and popularity only and that should be noted.
Support for relational databases is a growing focus for Kubernetes users, and the release of Windows Server 2019 is expanding options for .NET applications and SQL Server. SQL Server workloads, however, often rely on Active Directory and Windows Auth, and storage arrays, which will not be supported by SQL Server containers on Windows Server 2019. Fortunately, a new Rancher Labs partner, Windocks, offers new options for SQL Server on Kubernetes and Rancher.
K3s and Traefik partner to speed up cloud native applications deployment.
Today we announced releases v2.1.6 and v2.0.11 to address two security vulnerabilities recently discovered in Rancher. The first vulnerability allows users in the Default project of a cluster to escalate privileges to that of a cluster admin through a service account. The second vulnerability allows members to have continued access to create, update, read, and delete namespaces in a project after they have been removed from it. You can view the official CVEs here CVE-2018-20321 and here CVE-2019-6287.