Rancher Labs Releases Rancher 2.0
May 02, 2018

Rancher Labs announced the general availability of Rancher 2.0, an open source Kubernetes management platform that allows organizations to deliver Kubernetes-as-a-Service to their employees and centrally manage all of their Kubernetes clusters, regardless of how the cluster was deployed, or where it is running.

Rancher 2.0 manages hosted Kubernetes services from Google (GKE), Amazon (EKS) and Azure (AKS), enforcing consistent security policies, and providing an intuitive user experience across any cluster. With Rancher 2.0, organizations can accelerate the adoption of Kubernetes and deploy applications consistently on any infrastructure.

“Rancher 2.0 is a major step forward in open source container management,” said Steve Hendrick, Research Director at EMA. “For those enterprises looking for a complete container management solution for hybrid environments, Rancher 2.0 is an ideal choice.”

Rancher 2.0 is built for organizations that are embracing containers, microservices and Kubernetes to accelerate development, improve application reliability and reduce infrastructure costs.

The platform consists of three core components:

- Rancher Kubernetes Engine, a Kubernetes distribution that can be deployed on any infrastructure, whether on premise or in the cloud.

- Unified Cluster Management, a centralized management engine that allows IT departments to configure and enforce consistent security and administrative policies on any Kubernetes cluster, whether it is already running, deployed by Rancher, or provisioned as a service from a cloud provider.

- Application Workload Management, an intuitive user interface for Kubernetes, combined with an application catalog, real-time monitoring and alerting, log aggregation, and integrated CI/CD pipelines.

Key benefits of Rancher 2.0 include:

- Rapid deployment of Kubernetes clusters: Rancher automates the process of creating Kubernetes clusters, and allows organizations to scale both the control plane and infrastructure easily from the API, CLI or web UI. Once clusters have been provisioned, administration can be delegated to admins and users throughout the organization, allowing teams to deploy, scale and manage clusters on any infrastructure.

- Management of cloud-hosted clusters: Every large cloud provider now offers Kubernetes as a managed service. These services are the easiest way to set-up Kubernetes, and require little ongoing maintenance because the cloud providers are responsible for operating and upgrading Kubernetes. Rancher 2.0 is the first platform to provide consistent, centralized management of these clusters, allowing organizations to apply standard security policies, centralize access control and gain visibility into every cluster deployed in their organization.

- Central IT visibility and control: As Kubernetes has rapidly gained adoption, clusters have begun to sprawl, and organizations are struggling to maintain consistent controls across a wide variety of different versions and configurations of Kubernetes. Rancher 2.0 provides IT administrators with centralized authentication, access control, monitoring, alerting and policy management for every Kubernetes cluster deployed on premise or in the cloud.

- Accelerated Kubernetes adoption among developers and DevOps teams: Rancher 2.0 includes an intuitive UI that makes it easy for users to deploy services on Kubernetes and get visibility into everything running on a cluster. Users are presented with common configuration options directly from the UI for defining scheduling rules, health checks, ingress controllers, secrets, storage and other key configuration choices. Advanced users can work directly with the full kubectl command line, as well as Rancher’s APIs and CLI.

In addition, the new platform manages application catalogs and allows users to access community contributed Helm charts, as well as Rancher-certified templates. Organizations can even import and manage private application catalogs and share them with specified users.

Rancher 2.0 is open source software and freely available to anyone.

“When we started development on Rancher 2.0, we set out to build a single platform that would manage Kubernetes everywhere, whether we deployed it or not,” said Sheng Liang, CEO and co-founder of Rancher Labs. “We are more confident than ever that containers and Kubernetes will enable a new era of application portability, and strongly believe Rancher 2.0 will accelerate the adoption of Kubernetes in many organizations.”

The Latest

August 16, 2018

There once was a time in software development where developers could design, build and then think about their software's security. However in today's highly connected, API-driven application environment, this approach is simply too risky as it exposes the software to vulnerabilities ...

August 15, 2018

Microservices are a hot topic in IT circles these days. The idea of a modular approach to system building – where you have numerous, smaller software services that talk to each other instead of monolithic components – has many benefits ...

August 13, 2018

Agile is expanding within the enterprise. Agile adoption is growing within organizations, both more broadly and deeply, according to the 12th annual State of Agile report from CollabNet VersionOne. A higher percentage of respondents this year report that "all or almost all" of their teams are agile, and that agile principles and practices are being adopted at higher levels in the organization ...

August 09, 2018

For the past 13 years, the Ponemon Institute has examined the cost associated with data breaches of less than 100,000 records, finding that the costs have steadily risen over the course of the study. The average cost of a data breach was $3.86 million in the 2018 study, compared to $3.50 million in 2014 – representing nearly 10 percent net increase over the past 5 years of the study ...

August 08, 2018

Hidden costs in data breaches – such as lost business, negative impact on reputation and employee time spent on recovery – are difficult and expensive to manage, according to the 2018 Cost of a Data Breach Study, sponsored by IBM Security and conducted by Ponemon Institute. The study found that the average cost of a data breach globally is $3.86 million ...

August 06, 2018

The previous chapter in this WhiteHat Security series discussed dependencies as the second step of the Twelve-Factor App. This next chapter examines the security component of step three of the Twelve-Factor methodology — storing configurations within the environment.

August 02, 2018

Results from new Forrester Consulting research reveal the 20 most important Agile and DevOps quality metrics that separate DevOps/Agile experts from their less advanced peers ...

July 31, 2018

Even organizations that understand the importance of cybersecurity in theory often stumble when it comes to marrying security initiatives with their development and operations processes. Most businesses agree that everyone should be responsible for security, but this principle is not being upheld on a day-to-day basis in many organizations. That’s bad news for everyone. Here are some best practices for implementing SecOps ...

July 30, 2018

While the technologies, processes, and cultural shifts of DevOps have improved the ability of software teams to deliver reliable work rapidly and effectively, security has not been a focal point in the transformation of cloud IT infrastructure. SecOps is a methodology that seeks to address this by operationalizing and hardening security throughout the software lifecycle ...

July 26, 2018

Organizations are shifting away from traditional, monolithic architectures, with three-quarters of survey respondents delivering at least some of their applications and more than one-third delivering most of their applications as microservices, according to the State of DevOps Observability Report from Scalyr ...

Share this