Balance innovation and agility with security and compliance
risks using a 3-step process across all cloud infrastructure.
Step up business agility without compromising
security or compliance
Everything you need to become a Kubernetes expert.
Always for free!
Everything you need to know about Magalix
culture and much more
Kubernetes 1.15 got out today! that's the 2nd Kuberentes release of 2019. I thought of sharing some highlights from this release.
In short, this release's highlights are:
Major improvements were around bringing CSI feature parity with in-tree functionality, such as resizing inline volumes. You can now also clone volumes (alpha feature) by specifying another PVC as a DataSource when provisioning a new volume, given that the underlying storage system supports this functionality.
A lot of investments were done in kubeadm, which moved to v1beta2 from v1beta1 btw. You can now use kubeadm to provision and maintain high availability (HA) by using the familiar kubeadm init and kubeadm join commands.
Certificate management had great attention and now you can rotate all your certifications on upgrades before they expire during control plane upgrade.
The main focus in this release on CRDs data and behavior consistency. OpenAPI based validation schema will now require eachto be validated against a structural schema. Itbasically enforces non-polymorphic and complete typing of each field in a CustomResource. Non-structural schema will work as is, but any serious CRD application is urged to migrate to structural schemas in the foreseeable future.
Other notable improvements to CRDs
This release is targeting some advanced features such CRDs and the convenience of running highly available & resilient Kubernetes clusters. I encourage you to check the release notes for a complete list of notable features and fixes.
If you are still getting started with Kubernetes, check this cool curation of The Best Kubernetes Tutorials
Protect your cloud infrastructure by understanding the key vulnerability areas according to the shared responsibility model.
Know more about the 4 main types of “leaks” that commonly occur with cloud asset management, and some useful strategies to address them.
With the NIST cybersecurity framework implemented using policy-as-code, companies can strengthen their security processes. Learn more.