![](/rails/active_storage/blobs/redirect/eyJfcmFpbHMiOnsibWVzc2FnZSI6IkJBaHBBbWNKIiwiZXhwIjpudWxsLCJwdXIiOiJibG9iX2lkIn19--f86cb0bcaed0afec4437c6e46ab9b324fc8cece1/logo-square.png)
Zero Trust vSphere Provisioning from Rancheran idea by wjimenez Currently, when Rancher tries to provision a Kubernetes cluster on vSphere, it needs to initiate API calls to the vSphere endpoint. In a hybrid cloud environment this often means that the Rancher server is not in the same network as the vSphere endpoint. Therefore inbound access is required to be added to a firewall so Rancher can reach the vSphere system. This naturally poses a security concern and creates administrative burden on our users who have to go through a security review to get this approved. |
|
Rancher & Gardener: Stronger Togetheran idea by mlnoga Project Description |
Near-zero downtime upgrades for stateful services with Rancheran idea by mlnoga Project Description |
Rancher Releasesa project by jpayne Project Description |
Rancher and cf-on-k8san idea by mgrifalconi Project DescriptionCloud Foundry For Kubernetes (cf-for-k8s) blends the popular CF developer API with Kubernetes, Istio, and other open source technologies. The project aims to improve developer productivity for organizations using Kubernetes. cf-for-k8s can be installed atop any conformant environment in minutes. |