Operations | Monitoring | ITSM | DevOps | Cloud

Rancher

Telstra Ventures Invests in Rancher!

Today, we announced our $40M funding round led by Telstra Ventures. We have been working with Telstra as a customer for many years. When Telstra Ventures, who was familiar with Telstra’s success in using Rancher and Kubernetes, approached us for a potential funding round, it was a no-brainer. A leading telco like Telstra exemplifies Rancher’s vision to Run Kubernetes Everywhere.

Kubernetes Master Class: Deploy WordPress and MySQL without Data Loss

Applications such as WordPress or MySQL require the use of data persistence. It is common when deploying such applications to use a HostPath volume as it is agnostic from the platform. A HostPath volume shares the filesystem of the Host within the container making the data available between pod restarts. However, it ties the data to one node only, creating a single point of failure and restricting any kind of scalability. Kubernetes is not able to schedule the application in any other node even if it is unavailable. This leads to eventual data loss.

AI Meets Kubernetes: Install JupyterHub with Rancher

AI and Machine Learning are becoming critical differentiators in the technology landscape. By their nature, AI and ML are computation hungry workloads. They require best-in-class distributed computing environments to thrive. AI and ML present a perfect use case for Kubernetes, the distributed computing platform engineered at Google to run their massive workloads.

Transforming Telematics with Kubernetes and Rancher

Norwegian leader in fleet management, equipment and vehicle tracking, ABAX is one of Europe’s fastest-growing technology businesses. The company provides sophisticated fleet tracking, electronic mileage logs and equipment and vehicle control systems to more than 26,500 customers. ABAX manages over 250,000 active subscriptions that connect a variety of vehicles and industrial equipment subscriptions.

Kubernetes Master Class: Getting started with Pod Security Policies and best practices in Production

Kubernetes Pod Security Policies (PSPs) is an enforcement mechanism to ensure that Pods run only with the appropriate privileges and can solely access the appropriate resources. You can leverage them as a threat prevention mechanism by controlling Pod creation, and limiting the capabilities available to specific users, groups, or applications.

Running Containers in AWS with Rancher

This blog will examine how Rancher improves the life of DevOps teams already invested in AWS’s Elastic Kubernetes Service (EKS) but looking to run workloads on-prem, with other cloud providers or, increasingly, at the edge. By reading this blog you will also discover how Rancher helps you escape the undeniable attractions of a vendor monoculture while lowering costs and mitigating risk.

Kubernetes Drives Growth and Innovation in Financial Services

Founded in 2000, the Cardano Group is a privately-owned, purpose-built risk and investment specialist — and a financial pioneer. It is widely recognized as a market leader in the provisioning of specialized services to private-sector and collective pension programs in the United Kingdom and the Netherlands. Cardano has recently become the third largest retail pension provider in the UK after its recent acquisition of NOW: Pensions.

Enhancing Kubernetes Security with Pod Security Policies, Part 1

Kubernetes Pod Security Policies (PSPs) are a critical component of the Kubernetes security puzzle. Pod Security Policies are clusterwide resources that control security sensitive attributes of pod specification and are a mechanism to harden the security posture of your Kubernetes workloads. Kubernetes platform teams or cluster operators can leverage them to control pod creation and limit the capabilities available to specific users, groups or applications.

March 2020 Online Meetup: Automating K3s Cluster Upgrades

While developing K3s to run at the edge we had to change our assumptions about how to manage these clusters at scale. A key assumption in a data center is that you have stable network connectivity, but this may not be true at the edge. You may have unreliable cellular service or limited time during the day in which you can connect. In these environments, operations such as upgrading Kubernetes or patching an operating system require a different paradigm.

Kubernetes Master Class: How to implement Network Policy to secure your cluster

By default, pods are non-isolated; they accept traffic from any source. The Kubernetes solution to this security concern is Network Policy that lets developers control network access to their services. Rancher comes configured with Network Policy using Project Calico which can be used to secure your clusters. This class will describe a few use cases for network policy and a live demo implementing each use case.