You are viewing documentation for Kubernetes version: v1.30
Kubernetes v1.30 documentation is no longer actively maintained. The version you are currently viewing is a static snapshot. For up-to-date information, see the latest version.
Posts in 2023
-
Keeping Kubernetes Secure with Updated Go Versions
By Jordan Liggitt (Google) | Thursday, April 06, 2023 in Blog
The problem Since v1.19 (released in 2020), the Kubernetes project provides 12-14 months of patch releases for each minor version. This enables users to qualify and adopt Kubernetes versions in an annual upgrade cycle and receive security fixes for a …
-
Kubernetes Validating Admission Policies: A Practical Example
By Craig Box (ARMO), Ben Hirschberg (ARMO) | Thursday, March 30, 2023 in Blog
Admission control is an important part of the Kubernetes control plane, with several internal features depending on the ability to approve or change an API object as it is submitted to the server. It is also useful for an administrator to be able to …
-
Kubernetes Removals and Major Changes In v1.27
By Harshita Sao | Friday, March 17, 2023 in Blog
As Kubernetes develops and matures, features may be deprecated, removed, or replaced with better ones for the project's overall health. Based on the information available at this point in the v1.27 release process, which is still ongoing and can …
-
k8s.gcr.io Redirect to registry.k8s.io - What You Need to Know
By Bob Killen (Google), Davanum Srinivas (AWS), Chris Short (AWS), Frederico Muñoz (SAS Institute), Tim Bannister (The Scale Factory), Ricky Sadowski (AWS), Grace Nguyen (Expo), Mahamed Ali (Rackspace Technology), Mars Toktonaliev (independent), Laura Santamaria (Dell), Kat Cosgrove (Dell) | Friday, March 10, 2023 in Blog
On Monday, March 20th, the k8s.gcr.io registry will be redirected to the community owned registry, registry.k8s.io . TL;DR: What you need to know about this change On Monday, March 20th, traffic from the older k8s.gcr.io registry will be redirected …
-
Forensic container analysis
By Adrian Reber (Red Hat) | Friday, March 10, 2023 in Blog
In my previous article, Forensic container checkpointing in Kubernetes, I introduced checkpointing in Kubernetes and how it has to be setup and how it can be used. The name of the feature is Forensic container checkpointing, but I did not go into any …
-
Introducing KWOK: Kubernetes WithOut Kubelet
By Shiming Zhang (DaoCloud), Wei Huang (Apple), Yibo Zhuang (Apple) | Wednesday, March 01, 2023 in Blog
Have you ever wondered how to set up a cluster of thousands of nodes just in seconds, how to simulate real nodes with a low resource footprint, and how to test your Kubernetes controller at scale without spending much on infrastructure? If you …
-
Free Katacoda Kubernetes Tutorials Are Shutting Down
By Natali Vlatko (SIG Docs Co-Chair for Kubernetes) | Tuesday, February 14, 2023 in Blog
Katacoda, the popular learning platform from O’Reilly that has been helping people learn all about Java, Docker, Kubernetes, Python, Go, C++, and more, shut down for public use in June 2022. However, tutorials specifically for Kubernetes, linked from …
-
k8s.gcr.io Image Registry Will Be Frozen From the 3rd of April 2023
By Mahamed Ali (Rackspace Technology) | Monday, February 06, 2023 in Blog
The Kubernetes project runs a community-owned image registry called registry.k8s.io to host its container images. On the 3rd of April 2023, the old registry k8s.gcr.io will be frozen and no further images for Kubernetes and related subprojects will …
-
Spotlight on SIG Instrumentation
By Imran Noor Mohamed (Delivery Hero) | Friday, February 03, 2023 in Blog
Observability requires the right data at the right time for the right consumer (human or piece of software) to make the right decision. In the context of Kubernetes, having best practices for cluster observability across all Kubernetes components is …
-
Consider All Microservices Vulnerable — And Monitor Their Behavior
By David Hadas (IBM Research Labs) | Friday, January 20, 2023 in Blog
This post warns Devops from a false sense of security. Following security best practices when developing and configuring microservices do not result in non-vulnerable microservices. The post shows that although all deployed microservices are …