Posts in 2023

  • Keeping Kubernetes Secure with Updated Go Versions

    By Jordan Liggitt (Google) | Thursday, April 06, 2023 in Blog

    The problem Since v1.19 (released in 2020), the Kubernetes project provides 12-14 months of patch releases for each minor version. This enables users to qualify and adopt Kubernetes versions in an annual upgrade cycle and receive security fixes for a …

    Read more

  • Kubernetes Validating Admission Policies: A Practical Example

    By Craig Box (ARMO), Ben Hirschberg (ARMO) | Thursday, March 30, 2023 in Blog

    Admission control is an important part of the Kubernetes control plane, with several internal features depending on the ability to approve or change an API object as it is submitted to the server. It is also useful for an administrator to be able to …

    Read more

  • Kubernetes Removals and Major Changes In v1.27

    By Harshita Sao | Friday, March 17, 2023 in Blog

    As Kubernetes develops and matures, features may be deprecated, removed, or replaced with better ones for the project's overall health. Based on the information available at this point in the v1.27 release process, which is still ongoing and can …

    Read more

  • k8s.gcr.io Redirect to registry.k8s.io - What You Need to Know

    By Bob Killen (Google), Davanum Srinivas (AWS), Chris Short (AWS), Frederico Muñoz (SAS Institute), Tim Bannister (The Scale Factory), Ricky Sadowski (AWS), Grace Nguyen (Expo), Mahamed Ali (Rackspace Technology), Mars Toktonaliev (independent), Laura Santamaria (Dell), Kat Cosgrove (Dell) | Friday, March 10, 2023 in Blog

    On Monday, March 20th, the k8s.gcr.io registry will be redirected to the community owned registry, registry.k8s.io . TL;DR: What you need to know about this change On Monday, March 20th, traffic from the older k8s.gcr.io registry will be redirected …

    Read more

  • Forensic container analysis

    By Adrian Reber (Red Hat) | Friday, March 10, 2023 in Blog

    In my previous article, Forensic container checkpointing in Kubernetes, I introduced checkpointing in Kubernetes and how it has to be setup and how it can be used. The name of the feature is Forensic container checkpointing, but I did not go into any …

    Read more

  • Introducing KWOK: Kubernetes WithOut Kubelet

    By Shiming Zhang (DaoCloud), Wei Huang (Apple), Yibo Zhuang (Apple) | Wednesday, March 01, 2023 in Blog

    Have you ever wondered how to set up a cluster of thousands of nodes just in seconds, how to simulate real nodes with a low resource footprint, and how to test your Kubernetes controller at scale without spending much on infrastructure? If you …

    Read more

  • Free Katacoda Kubernetes Tutorials Are Shutting Down

    By Natali Vlatko (SIG Docs Co-Chair for Kubernetes) | Tuesday, February 14, 2023 in Blog

    Katacoda, the popular learning platform from O’Reilly that has been helping people learn all about Java, Docker, Kubernetes, Python, Go, C++, and more, shut down for public use in June 2022. However, tutorials specifically for Kubernetes, linked from …

    Read more

  • k8s.gcr.io Image Registry Will Be Frozen From the 3rd of April 2023

    By Mahamed Ali (Rackspace Technology) | Monday, February 06, 2023 in Blog

    The Kubernetes project runs a community-owned image registry called registry.k8s.io to host its container images. On the 3rd of April 2023, the old registry k8s.gcr.io will be frozen and no further images for Kubernetes and related subprojects will …

    Read more

  • Spotlight on SIG Instrumentation

    By Imran Noor Mohamed (Delivery Hero) | Friday, February 03, 2023 in Blog

    Observability requires the right data at the right time for the right consumer (human or piece of software) to make the right decision. In the context of Kubernetes, having best practices for cluster observability across all Kubernetes components is …

    Read more

  • Consider All Microservices Vulnerable — And Monitor Their Behavior

    By David Hadas (IBM Research Labs) | Friday, January 20, 2023 in Blog

    This post warns Devops from a false sense of security. Following security best practices when developing and configuring microservices do not result in non-vulnerable microservices. The post shows that although all deployed microservices are …

    Read more