Operations | Monitoring | ITSM | DevOps | Cloud

Rancher

Kubernetes Master Class: Troubleshooting Kubernetes

Everything breaks at some point, wether it is infrastructure (DNS, network etc) or Kubernetes itself, something will break eventually. In this session we will walk through the master components of Kubernetes, how they interact and how to troubleshoot the most common issues with Kubernetes. What parameters to use, what commands to run, how to interpret output from logging or commands are things that we will show you.

Kubernetes Master Class - Disaster Recovery Strategies for Kubernetes

As Kubernetes matures, enterprises are increasingly using it to run mission-critical applications with strict business requirements for uptime and availability. As a result, it is important to consider how your Kubernetes applications can recover from the failure of a server, data center and even entire region. In this Kubernetes master class, we'll look at how to ensure business continuity for your most important applications running on Kubernetes.

Transport Layer Security Termination In Rancher 2.x, Part One

In this blog series, we’ll explore a few different ways that Rancher uses TLS certificates. TLS, or Transport Layer Security, is a cryptographic protocol used to secure network communication. It is the successor to the now-deprecated Secure Sockets Layer, or SSL. You can expect to walk away with an understanding of how TLS integrates into various Rancher components, and how you can prepare your environment to properly leverage TLS in Rancher.

Intro to Rio Online Training: The Application Deployment Engine for Kubernetes

Rio is an application deployment engine built on top of Kubernetes, Istio, Knative, and Prometheus. You can use it to build, test, deploy, scale, and version stateless apps on any standard Kubernetes cluster, which means that you can run your apps the way you want to without having to spend time wiring them together.

Kubernetes Master Class: How to harden your Kubernetes Clusters

As enterprises accelerate their adoption of containers and Kubernetes, they need to take necessary steps to protect such a critical part of their compute infrastructure. But not everyone has the same security needs, with developers and engineers often asking for different levels of granular control on specific configurations. This masterclass will help you navigate these conversations using Rancher’s current best practice security guidance. Topics to be covered will include:

Rancher vs. OpenShift - A Consultant's View

In any rapidly emerging market, consultants can be a great source for vendor-neutral insights, as they typically work with multiple technologies to help their customers make informed decisions. In that vein, Derya (Dorian) Sezen of kloia, a new-era consulting organization that provides services toward transition of legacy workloads to frontline technologies in Cloud, DevOps and Microservices, recently wrote a blog summarizing his experience with Rancher and Red Hat OpenShift.

January 2020 Online Meetup: Securing Your Production Grade Kubernetes Clusters Using Rancher

As DevOps teams deploy Kubernetes in production using Rancher, enterprises must focus on the runtime security and compliance requirements of their cloud-native platforms. Starting with Rancher 2.2, we published self-assessment and hardening guides to outline provisioning a cluster to comply with the CIS Kubernetes benchmark. Identifying gaps and pain points in the process, Rancher engineering added additional features to both Rancher and RKE to simplify the process.

Find Security Vulnerabilities in Kubernetes Clusters

Security is one of the most talked-about topics for Kubernetes users. Google “Kubernetes security” and you’ll find a huge number of articles, blogs and more. The reason is simple: you need to align your container and Kubernetes security with your organization’s existing security profile. Kubernetes has some strong security best practices for your cluster—authentication and authorization, encryption in secrets and objects in the etcd database—to name a few.