Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Tim Van Steenburgh
on 7 September 2017

Canonical Distribution of Kubernetes: Development Summary (9/7/2017)


This article originally appeared on Tim Van Steenburgh’s blog

September 1st concluded our most recent development sprint on the Canonical Distribution of Kubernetes (CDK). Here are some highlights:

Canal Bundle

Our new Canal bundle is available for testing. We’ve been fixing a few issuesand expect to release the Canal bundle to the stable channel tomorrow.

If you need network policy support in your cluster, take it for a test drive on AWS with:

juju deploy cs:~containers/canonical-kubernetes-canal --channel edge

Once deployed, you can test network policy support by following the instructions on the Calico website.

RBAC and s390x

Our main focus was on finishing the Calico/Canal support, but progress continues on RBAC and s390x. We added a bunch of new tests for RBAC, and are working on building/publishing the last few pieces we need for an s390x cluster (nginx-ingress-controller image and an e2e snap).

1.7.4

We tested and released our latest round of charm bug fixes along with snaps for the 1.7.4 upstream binaries. If you were already on 1.7.0, you got upgraded automatically, and 1.7.4 is the new default for new clusters.

If you’d like to follow along more closely with CDK development, you can do so in the following places:

If you’re interested in hacking on CDK, be sure to check out the latest blogby our friend Kos!

Until next time!

Related posts


Michelle Anne Tabirao
13 December 2024

How does OpenSearch work?

Data Platform Article

How does opensearch work? OpenSearch is an open-source search and analytics suite. Developers build solutions for search and more! ...


Michelle Anne Tabirao
13 December 2024

What is RAG?

AI Article

RAG explained: is a technique that enhances generative AI models by utilizing external knowledge sources such as documents and extensive databases. ...


Matthew de Klerk
12 December 2024

What is vulnerability management?

Security Article

Vulnerability management is the holistic process of identifying and handling security risks in an organization’s networks, systems and devices. Vulnerability management serves an overarching strategy that describes and outlines the many individual efforts and steps taken to reduce cyber incident risk to acceptable levels and improve overa ...