What’s new in Kubernetes 1.22

By building containerized programs radically less complicated to regulate at scale, Kubernetes has develop into a crucial element of the container revolution. Here’s the most current.

Kubernetes 1.22, introduced August 5, 2022, contains the adhering to new and up-to-date capabilities:

  • Server-side Implement is now commonly obtainable. This formerly beta-only attribute allows objects on Kubernetes servers to be developed and modified declaratively, by owning the developer explain their intent. Alterations to an item are tracked on a subject-by-subject foundation, so that any tries to change a subject modified and “owned” by somebody else will be rejected. Server-side Implement is meant inevitably to exchange the primary kubectl apply functionality because it gives a more simple system for controllers to make variations to their configurations.
  • External credential providers, obtainable by way of plug-ins, are now out of beta.
  • Etcd, the default again-close storage for Kubernetes has been up-to-date to a new launch (three.5.) with bug fixes and new capabilities around log management.
  • QoS for memory means is obtainable as a beta attribute. The cgroups v2 API can now be made use of to designate how memory is allocated and isolated for pods, building it less complicated to deploy various programs that could possibly combat each individual other for memory usage.
  • Superior aid for establishing and functioning on Microsoft Home windows. Some Kubernetes capabilities for Home windows are nevertheless alpha—e.g., privileged containers—but it is now possible to run more of the early-aid Kubernetes capabilities on Home windows by manually constructing the Home windows kubelet and kube-proxy binaries.

Other variations in Kubernetes 1.22:

  • Nodes can now run on methods where by swap memory is activated if desired. Kubernetes admins made use of to have to disable swap area in advance of setting up Kubernetes. (Alpha attribute.)
  • Assist for default, cluster-large seccomp profiles is now obtainable. (Alpha.)
  • kubeadm can now be run as non-root if desired, by functioning the regulate aircraft with decrease privileges. (Alpha.) All other Kubernetes node factors can be run experimentally as a non-root person as perfectly.
  • Some APIs have been deprecated and transformed, in particular the API for Ephemeral Containers (which was an alpha attribute to commence with and did not have a secure API).

Kubernetes 1.20, introduced in December 2020, launched these key variations:

  • The Docker runtime is staying deprecated. However, this doesn’t necessarily mean Docker photographs or Dockerfiles really don’t get the job done in Kubernetes anymore. It just implies Kubernetes will now use its possess Container Runtime Interface (CRI) product or service to execute containers instead of the Docker runtime. For most users this will have no sizeable impact—e.g., any existing Docker photographs will get the job done great. But some troubles could possibly final result when dealing with runtime source restrictions, logging configurations, or how GPUs and other specific hardware interact with the runtime (a thing to take note for those using Kubernetes for machine finding out). The former hyperlink gives aspects on how to migrate workloads, if desired, and what troubles to be aware of.
  • Volume snapshot operations are now secure. This allows volume snapshots—images of the condition of a storage volume—to be made use of in output. Kubernetes programs that rely on highly unique condition, these types of as photographs of database information, will be less complicated to construct and sustain with this attribute lively.
  • Kubectl Debug is now in beta, letting frequent debug workflows to be conducted from inside the kubectl command-line setting. 
  • API Priority and Fairness (APF) is now enabled by default, despite the fact that nevertheless in beta. Incoming requests to kube-apiserver can be sorted by precedence degrees, so that the administrator can specify which requests should really be content most instantly.
  • Process PID Limiting is now in common availability. This attribute guarantees that pods can not exhaust the range of approach IDs obtainable on a Linux host, or interfere with other pods by using up much too a lot of procedures.

Kubernetes 1.17, introduced in December 2019, launched the adhering to crucial new capabilities and revisions: 

  • Volume snapshots, launched in alpha in Kubernetes 1.twelve, are now promoted to beta. This attribute allows a volume in a cluster to be snapshotted at a presented second in time. Snapshots can be made use of to provision a new volume with information from the snapshot, or to roll again an existing volume to an previously snapshotted edition. Volume snapshots make it possible to perform elaborate information-versioned or code-versioning functions inside a cluster that weren’t formerly possible.
  • Additional of the “in-tree” (involved by default) storage plug-ins are now staying moved to the Container Storage Interface (CSI) infrastructure. This implies considerably less direct dependencies on those drivers for the main edition of Kubernetes. However, a cluster has to be explicitly up-to-date to aid migrating the in-tree storage plug-ins, but a successful migration should not have any ill effects for a cluster.
  • The cloud provider labels attribute, originally launched in beta again in Kubernetes 1.two, is now commonly obtainable. Nodes and volumes are labeled dependent on the cloud provider where by the Kubernetes cluster runs, as a way to explain to the rest of Kubernetes how those nodes and volumes should really be managed (e.g., by the scheduler). If you are using the previously beta variations of the labels you, you should really up grade them to their new counterparts to steer clear of challenges.

Exactly where to obtain Kubernetes

You can obtain the Kubernetes resource code from the releases page of its official GitHub repository. Kubernetes is also obtainable by way of the up grade approach supplied by the many vendors that provide Kubernetes distributions.

What’s new in Kubernetes 1.sixteen

Kubernetes 1.sixteen, introduced in September 2019, contains the adhering to new and revised capabilities:

  • Tailor made source definitions (CRDs), the lengthy-advisable system for extending Kubernetes performance launched in Kubernetes 1.seven, are now formally a commonly obtainable attribute. CRDs have previously been broadly made use of by third functions. With the shift to GA, a lot of optional-but-advisable behaviors are now required by default to hold the APIs secure.
  • Several variations have been built to how volumes are managed. Chief among them is moving the volume resizing API, located in the Container Storage Interface (CSI), to beta.
  • Kubeadm now has alpha aid for joining Home windows worker nodes to an existing cluster. The lengthy-term intention listed here is to make Home windows and Linux nodes both equally initial-course citizens in a cluster, instead of owning only a partial set of behaviors for Home windows.
  • CSI plug-in aid is now obtainable in alpha for Home windows nodes, so those methods can start out using the very same selection of storage plug-ins as Linux nodes.
  • A new attribute, Endpoint Slices, allows for larger scaling of clusters and more versatility in handling network addresses. Endpoint Slices are now obtainable as an alpha test attribute.
  • The way metrics are managed continues a key overhaul with Kubernetes 1.sixteen. Some metrics are staying renamed or deprecated to bring them more in line with Prometheus. The strategy is to take out all deprecated metrics by Kubernetes 1.17.
  • Lastly, Kubernetes 1.16 removes a range of deprecated API variations. 

What’s new in Kubernetes 1.fifteen

Kubernetes 1.fifteen, introduced in late June 2019, gives the adhering to new capabilities and advancements:

  • Additional capabilities (now in alpha and beta) for Tailor made Useful resource Definitions, or CRDs. CRDs in Kubernetes are the basis of its extensibility know-how, letting Kubernetes situations to be customized without falling out of conformance with upstream Kubernetes specifications. The new capabilities involve the means to change CRDs between variations (a thing lengthy obtainable for native means), OpenAPI publishing for CRDs, default values for fields in OpenAPI-validated schemas for CRDs, and more.
  • Native superior availability (HA) in Kubernetes is now in beta. Placing up a cluster for HA nevertheless requires scheduling and forethought, but the lengthy-term intention is to make HA possible without any third-party computer software.
  • Additional plug-ins that regulate volumes have been migrated to use the Container Storage Interface (CSI), a dependable way to regulate storage for hosted containers. Among the new capabilities launched in alpha for CSI are volume cloning, so that new persistent volumes can be dependent on an existing 1.

Other variations in Kubernetes 1.fifteen involve:

  • Certification management now mechanically rotates certificates in advance of expiration.
  • A new framework for plug-ins that perform scheduling functions has entered alpha.

What’s new in Kubernetes 1.14

Version 1.14 of Kubernetes, introduced in March 2019, contains the adhering to variations:

  • Microsoft Home windows Server 2019 is now formally supported as a system for functioning both equally Kubernetes worker nodes and container scheduling. This implies complete Kubernetes clusters can run on Home windows completely, fairly than owning a combine of Home windows and Linux methods.
  • The plugin system for Kubectl, the default Kubernetes command-line instrument, is now a secure attribute, allowing builders apply their possess Kubectl subcommands as standalone binaries.
  • Persistent local volumes are now a secure attribute. This allows locally hooked up storage be made use of by Kubernetes for persistent volumes. Apart from giving better efficiency than using network-hooked up storage, it also can make it less complicated (and probably less costly) to stand up a cluster.
  • Process ID restricting for Linux hosts is now a beta attribute. This helps prevent any 1 pod from using up much too a lot of approach IDs and therefore leading to source exhaustion on the host.

What’s new in Kubernetes 1.13

Version 1.13 of Kubernetes was introduced in December 2018, with the adhering to new and upgraded capabilities:

  • Kubeadm, a instrument developed to make it less complicated to set up a Kubernetes cluster, is last but not least obtainable as a totally supported attribute. It walks an admin by the basic principles of setting up nodes for output, joining them to the cluster, and applying best methods together the way. It also gives a way for infrastructure-orchestration applications (Puppet, Chef, Salt, and so forth.) to automate cluster setup.

  • The Container Storage Interface, or CSI, is now also obtainable as a supported attribute. CSI allows extensions for Kubernetes’s volume layer, so that storage plugins can get the job done with Kubernetes without owning to be built element of Kubernetes’s main code.

  • Kubernetes now employs CoreDNS as its default DNS server. CoreDNS works as a drop-in replacement for other DNS servers, but was developed to integrate with Kubernetes by way of plug-ins and integration with Kubernetes capabilities these types of as Prometheus checking metrics.

What’s new in Kubernetes 1.twelve

Launched in late September 2018, Kubernetes 1.twelve delivers to common availability the Kubelet TLS Bootstrap. The Kubelet TLS Bootstrap allows a Kubelet, or the principal agent that runs on each individual Kubernetes node, to be part of a TLS-secured cluster mechanically, by requesting a TLS consumer certification by an API. By automating this approach, Kubernetes allows clusters to be configured with larger stability by default.

Also new in Kubernetes 1.twelve is aid for Microsoft Azure’s virtual machine scale sets (VMSS), a way to set up a team of VMs that mechanically ramp up or down on plan or to meet up with need. Kubernetes’s cluster-autoscaling attribute now works with VMSS.

Other new capabilities in Kubernetes 1.twelve:

  • Snapshot and restore performance for volumes (alpha).
  • Tailor made metrics for pod autoscaling (beta). This allows tailor made position situations or other metrics to be made use of when scaling a pod—for occasion, if means that are unique to a presented deployment of Kubernetes need to have to be tracked as element of the application’s management system.
  • Vertical pod scaling (beta), which allows a pod’s source restrictions to be diverse throughout its lifetime, as a way to better regulate pods that have a superior value affiliated with disposing of them. This is a lengthy-standing merchandise on a lot of want lists for Kubernetes, because it allows for techniques to deal with pods whose behaviors aren’t simple to regulate under the recent scheduling system.

What’s new in Kubernetes 1.11

Launched in early July 2018, Kubernetes 1.11 adds IPVS, or IP Virtual Server, to gives superior-efficiency cluster load balancing using an in-kernel know-how which is considerably less advanced than the iptables program normally made use of for these types of points. Inevitably, Kubernetes will use IPVS as the default load balancer, but for now it is decide-in.

Tailor made source definitions, billed as a way to make tailor made configuration variations to Kubernetes without breaking its standardizations, could now be versioned to make it possible for for graceful transitions from 1 set of tailor made means to another more than time. Also new are strategies to outline “status” and “scale” subresources, which can integrate with checking and superior-availability frameworks in a cluster.

Other key variations involve: