Overview
This is a highly available instantiation of RKE2 Kubernetes and Rancher Manager running on top of SUSE Linux which has been configured to be over 95.5% compliant with the DISA STIG for both SUSE Linux Enterprise 15 and RKE2. Designed specifically for production use cases for US Federal Customers.
Please email aws@rancherfederal.com for private offer inquiries
Highlights
- Push-button install RKE2 Kubernetes and Rancher Manager in minutes
- DISA STIG for SUSE Linux Enterprise 15
- DISA STIG for RKE2
Details
Pricing
Dimension | Description | Cost/12 months |
---|---|---|
Node Count | Up to 20 nodes under management by Rancher | $77,000.00 |
Vendor refund policy
Refunds not supported.
Legal
Vendor terms and conditions
Content disclaimer
Delivery details
Rancher Manager and RKE2
This CloudFormation Template creates an RKE2 cluster of (3,5, or 7) all-in-one nodes on m5.xlarge machines to create a stable and perfomant platform. It then deploys Rancher Manager onto this cluster.
CloudFormation Template (CFT)
AWS CloudFormation templates are JSON or YAML-formatted text files that simplify provisioning and management on AWS. The templates describe the service or application architecture you want to deploy, and AWS CloudFormation uses those templates to provision and configure the required services (such as Amazon EC2 instances or Amazon RDS DB instances). The deployed application and associated resources are called a "stack."
Version release notes
Additional details
Usage instructions
Provisioning
- The Rancher Cluster Manager provisioner provides all dependencies for you to run a highly available implementation of Rancher on your AWS infrastructure, including:
- VPC
- Public Subnets
- Private Subnets
- Cluster ElasticLoadBalancers
- SecurityGroups (limiting traffic to only essential ports)
- LaunchTemplates
- AutoscalingGroups
- After configuring and deploying your CloudFormation stack, it can take up to 10 minutes for your Rancher cluster manager to be fully available.
Accessing Rancher
- If you are utilizing the Route 53 RecordSet capability of the CloudFormation template, make sure your Route 53 DNS server is routable from your local machine and navigate to the rancher hostname in a browser (ie. https://rancher.example.com )
- If not utilizing Route 53 the URL of your Rancher instance will use the DNS name given to your ELB. You can find this link in the Outputs tab of the CloudFormation stack.
Other Notes
- One IAM Role is required by the controlplane nodes to orchestrate provisioning order. This role, attached to every controlplane node, only has the ability to describe Autoscaling Groups and Autoscaling Instances.
- Each node's underlying EBS volume is encrypted by default.
- It is critical for you to store and protect your ClusterJoinToken parameter. This is vital for restoring cluster state and adding new nodes in the future.
Resources
Vendor resources
Support
Vendor support
To meet the unique requirements of the federal government mission, RGS employs mission-experienced engineers with years of architecting complex distributed systems across the commercial, civilian, DoD and intelligence communities. We empower your mission with industry-leading Linux and Kubernetes capabilities coupled with a world-class support model staffed by all US citizens utilizing data centers within the continental US. For more sensitive missions, we have support personnel, engineers, and architects with active clearances ready to meet your on-site support requirements.
Customers will receive credentials to the Rancher Government support portal. Additionally, customers can reach the support team at +1 844.RGS.7779
AWS infrastructure support
AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.