...
Synergy | Focus | Enterprise (Synergy + Focus) | |
---|---|---|---|
CPU cores (x86_64 processor with speed of 2.2 GHz or more) | 8 | 16 | 20 |
RAM | 32GB | 64GB | 80GB |
Free SDD disk space | 500GB | 600GB | 700GB |
OS | We recommend Ubuntu 20.04.4 LTS Server (Focal Fossa), but you can also use RHEL 8.6, CentOS 7.9 or Suse Linux 15.3. Root access to the server is required during deployment process and may be required for support tickets / troubleshooting.
| ||
Firewall |
| ||
K3s version support | 1.23, 1.24 |
...
Costs — K3s is 100% open source and there’s no need to pay for any expensive licenses.
Less setup overhead — a lot of time is saved when setting up a new environment because you don’t need to go through a lengthy process of acquiring extra licenses based on how many CPU cores you have. Also, K3s can be installed using only one command.
It supports many Linux distros — K3s supports popular Linux distributions including open source ones, it can also run both on-premise and in the cloud (AWS, Azure, GCP).
It’s fast and lightweight —K3s is packaged as a single <100MB binary and its lightweight architecture makes it faster than stock Kubernetes for the workloads that it runs.
Easy to update — Thanks to its reduced dependencies.
Batteries included — CRI, CNI, service load balancer, and ingress controller are included.
Smaller attack surface — Thanks to its small size and reduced amount of dependencies.
Certified — K3s is an official CNCF project that delivers a powerful certified Kubernetes distribution.
Flexible — you can run K3s using single-node or multi-node cluster setup.
Proxy settings
Info |
---|
Replace |
Note |
---|
The list settings below is are only valid for clusters that have Secure Modemode enabled. |
If the customer’s your proxy is configured to decrypt encrypted intercept/inspect HTTPS traffic on the fly, then make sure the following hosts are bypassed (not decryptedintercepted) by the proxy:
https://charts.master.k3s.getvisibility.com
https://rancher.$RESELLER_NAME
.k3s.getvisibility.com
https://api.master.k3s.getvisibility.com
The customer’s Your internal proxy should be configured to allow the following public urls to be accessible over port 443 (HTTPS):
Note: replace $RESELLER_NAME
with the name of the Rancher server which the customer will be connected to.
Code Block |
---|
https://assets.master.k3s.getvisibility.com (Custom K3s installation files) https://images.master.k3s.getvisibility.com (Private Docker registry) https://charts.master.k3s.getvisibility.com (Private Helm registry) https://prod-eu-west-1-starport-layer-bucket.s3.eu-west-1.amazonaws.com (Docker registry AWS CDN) https://rpm.rancher.io (Rancher RPM repo for configuring SELinux packages on RHEL or CentOS) https://api.master.k3s.getvisibility.com (Private API server) Plus one of the below: - for indirect customers: https://rancher.$RESELLER_NAME.k3s.getvisibility.com (Rancher/Fleet management server) - for direct customers: https://rancher.master.k3s.getvisibility.com (Rancher/Fleet management server) |
For more details on how to configure Rancher behind a proxy click here.