By SUSE
How would you rate your experience with SUSE Rancher?
Access Control
Allows administrators to control access to specific containers or datasets.
Network Isolation
Separates containers based on their specific network and connections.
File Isolation
Isolates containers based on components of the file systems and their state.
Packaging
Groups containers or applications without altering the container contents.
Container Networking
Defines container connections, balances loads, and organizes routes.
Orchestration
Runs applications through connected clusters.
Developer Toolkit
Provides tools for developers to build software and edit container contents.
Architecture
Creates integrations and allows management of connected contains.
Datacenter
Integrates data with container contents and applications.
Virtualization
Virtualizes operating systems and nests virtualizations within contained environment.
Local processing
Executes compute functions on local devices to remain consistently available and allows users to complete tasks reliably.
Edge Analytics
Generates data related to device and application usage and performance.
Edge Data Storage
Stores device and application data locally to minimize potential for vulnerabilities and exposure.
Edge Application Management
Provides administration features for deploying live applications on edge devices.
Process Control
The ability for administrators to update or change processes, configurations, workflows, and securitty mechanisms.
Interoperability
Connects to external systems and applications as needed to complete team workflows.
Interface
Offers simple, intuitive interface for designing IoT applications with little or no coding.
Access Controls
Configure user access and account permissions for edge device and application access.
Containerization
Allows users to manage, orchestrate, and deploy containers on local devices.
Performance and Stability
Maintains an efficient, reliable data flow with established sources.
Device Performance
Track the individual performance of connected devices.
Scalability
Expands functionality while maintaining balanced loads. Serves growing demand without reducing functionality.
Auto-Remediation for Nodes & Clusters
Detects unhealthy states and automatically remediate nodes or cluster components based on defined policies.
Resource & Cost Visibility
Surfaces usage and allocation insights (e.g., by cluster/namespace/team) to support capacity planning and accountability.
Backup & Restore for Cluster Resources
Back up and restore Kubernetes resources and platform configurations to support recovery and migration.
Automated Cluster Provisioning & Onboarding
Provisions new clusters and import existing clusters using standardized workflows and providers.
Multi-Cluster Fleet Management
Centralizes visibility and administration of multiple Kubernetes clusters across environments from a single control plane.
Cluster Templates & Blueprints
Applies reusable templates/blueprints for cluster configuration, add-ons, and organizational standards.
Compliance Reporting & History
Tracks compliance status over time and generate reports for audits and internal controls.
Standards Guardrails for Cluster Config
Enforces organizational guardrails and baselines for cluster configuration to reduce drift and misconfiguration.
Audit Logging & Forensics
Records administrative and platform events centrally to support investigations and compliance requirements.
CI/CD Toolchain Integrations
Integrates with CI/CD systems to automate workload promotion and environment changes.
GitOps-Based Config & Deployment
Syncs cluster configuration and application deployments from Git repositories using declarative workflows.
Policy-Based Access Controls
Applies access policies (e.g., by group, cluster, namespace, or resource type) to constrain actions and reduce privilege sprawl.
Enterprise SSO Integration
Integrates with enterprise identity providers to authenticate users centrally.
Multi-Tenancy & Team Isolation
Segment clusters and resources for multiple teams with tenant boundaries and delegated administration.
Centralized RBAC Across Clusters
Enforces role-based access consistently across clusters, namespaces, and projects from the management plane.