Spotlight on SIG Node

In the world of container orchestration, Kubernetes reigns supreme, powering some of the most complex and dynamic applications across the globe. Behind the scenes, a network of Special Interest Groups (SIGs) drives Kubernetes’ innovation and stability. Today, I have the privilege of speaking with Matthias Bertschy, Gunju Kim, and Sergey Kanzhelev, members of SIG Node, Read more about Spotlight on SIG Node[…]

Upcoming Changes to the AWX Project

By Matthew Jones, Chief Architect, Ansible Automation at Red Hat Back in 2013, a small team of engineers worked for over a year to make the first commercial release of Ansible Tower (before we expanded and evolved to Ansible Automation Platform) and during that time we put down the foundation of an application that I’m Read more about Upcoming Changes to the AWX Project[…]

Completing the largest migration in Kubernetes history

Since as early as Kubernetes v1.7, the Kubernetes project has pursued the ambitious goal of removing built-in cloud provider integrations (KEP-2395). While these integrations were instrumental in Kubernetes’ early development and growth, their removal was driven by two key factors: the growing complexity of maintaining native support for every cloud provider across millions of lines Read more about Completing the largest migration in Kubernetes history[…]

From Code to Quill: Embark on a Legendary Kubernetes Quest with SIG Docs

You’ve likely heard the adage, “Contributing isn’t just about writing code”, whispered in forums or seen etched into the digital walls of open source communities. But what depth of truth lies within this ancient wisdom, especially in the vast, evolving world of Kubernetes? Today, contributing to open source extends far beyond the realm of coding. Read more about From Code to Quill: Embark on a Legendary Kubernetes Quest with SIG Docs[…]

Gateway API v1.1: Service mesh, GRPCRoute, and a whole lot more

Following the GA release of Gateway API last October, Kubernetes SIG Network is pleased to announce the v1.1 release of Gateway API. In this release, several features are graduating to Standard Channel (GA), notably including support for service mesh and GRPCRoute. We’re also introducing some new experimental features, including session persistence and client certificate verification. Read more about Gateway API v1.1: Service mesh, GRPCRoute, and a whole lot more[…]

Container Runtime Interface streaming explained

The Kubernetes Container Runtime Interface (CRI) acts as the main connection between the kubelet and the Container Runtime. Those runtimes have to provide a gRPC server which has to fulfill a Kubernetes defined Protocol Buffer interface. This API definition evolves over time, for example when contributors add new features or fields are going to become Read more about Container Runtime Interface streaming explained[…]

Kubernetes 1.30: Preventing unauthorized volume mode conversion moves to GA

With the release of Kubernetes 1.30, the feature to prevent the modification of the volume mode of a PersistentVolumeClaim that was created from an existing VolumeSnapshot in a Kubernetes cluster, has moved to GA! The problem The Volume Mode of a PersistentVolumeClaim refers to whether the underlying volume on the storage device is formatted into Read more about Kubernetes 1.30: Preventing unauthorized volume mode conversion moves to GA[…]

Kubernetes 1.30: Multi-Webhook and Modular Authorization Made Much Easier

With Kubernetes 1.30, we (SIG Auth) are moving Structured Authorization Configuration to beta. Today’s article is about authorization: deciding what someone can and cannot access. Check a previous article from yesterday to find about what’s new in Kubernetes v1.30 around authentication (finding out who’s performing a task, and checking that they are who they say Read more about Kubernetes 1.30: Multi-Webhook and Modular Authorization Made Much Easier[…]

Kubernetes 1.30: Structured Authentication Configuration Moves to Beta

With Kubernetes 1.30, we (SIG Auth) are moving Structured Authentication Configuration to beta. Today’s article is about authentication: finding out who’s performing a task, and checking that they are who they say they are. Check back in tomorrow to find about what’s new in Kubernetes v1.30 around authorization (deciding what someone can and can’t access). Read more about Kubernetes 1.30: Structured Authentication Configuration Moves to Beta[…]