By building containerized programs substantially a lot easier to manage at scale, Kubernetes has become a critical element of the container revolution. Here’s the newest.

Kubernetes 1.22, launched August 5, 2022, consists of the following new and up-to-date capabilities:

  • Server-facet Use is now typically readily available. This beforehand beta-only element makes it possible for objects on Kubernetes servers to be made and modified declaratively, by obtaining the developer describe their intent. Variations to an object are tracked on a subject-by-subject foundation, so that any makes an attempt to modify a subject modified and “owned” by someone else will be turned down. Server-facet Use is intended sooner or later to replace the original kubectl apply function because it presents a easier mechanism for controllers to make variations to their configurations.
  • External credential companies, readily available by way of plug-ins, are now out of beta.
  • Etcd, the default back-end storage for Kubernetes has been up-to-date to a new launch (3.5.) with bug fixes and new capabilities all-around log management.
  • QoS for memory means is readily available as a beta element. The cgroups v2 API can now be utilised to designate how memory is allotted and isolated for pods, building it a lot easier to deploy numerous programs that may well struggle each other for memory usage.
  • Better guidance for developing and working on Microsoft Windows. Some Kubernetes capabilities for Windows are continue to alpha—e.g., privileged containers—but it’s now doable to operate far more of the early-guidance Kubernetes capabilities on Windows by manually developing the Windows kubelet and kube-proxy binaries.

Other variations in Kubernetes 1.22:

  • Nodes can now operate on devices where by swap memory is activated if wanted. Kubernetes admins utilised to have to disable swap house before setting up Kubernetes. (Alpha element.)
  • Support for default, cluster-vast seccomp profiles is now readily available. (Alpha.)
  • kubeadm can now be operate as non-root if wanted, by working the control aircraft with lessen privileges. (Alpha.) All other Kubernetes node factors can be operate experimentally as a non-root consumer as perfectly.
  • Some APIs have been deprecated and changed, in individual the API for Ephemeral Containers (which was an alpha element to start off with and did not have a steady API).

Kubernetes 1.20, launched in December 2020, launched these main variations:

  • The Docker runtime is currently being deprecated. Nevertheless, this does not indicate Docker illustrations or photos or Dockerfiles never get the job done in Kubernetes any more. It just suggests Kubernetes will now use its individual Container Runtime Interface (CRI) product or service to execute containers rather of the Docker runtime. For most consumers this will have no important impact—e.g., any existing Docker illustrations or photos will get the job done wonderful. But some challenges may well final result when dealing with runtime resource boundaries, logging configurations, or how GPUs and other particular components interact with the runtime (anything to observe for individuals using Kubernetes for equipment mastering). The previous backlink presents facts on how to migrate workloads, if wanted, and what challenges to be conscious of.
  • Volume snapshot operations are now steady. This makes it possible for volume snapshots—images of the state of a storage volume—to be utilised in manufacturing. Kubernetes programs that depend on hugely precise state, these kinds of as illustrations or photos of databases documents, will be a lot easier to make and manage with this element lively.
  • Kubectl Debug is now in beta, allowing for widespread debug workflows to be carried out from inside of the kubectl command-line surroundings. 
  • API Priority and Fairness (APF) is now enabled by default, whilst continue to in beta. Incoming requests to kube-apiserver can be sorted by precedence concentrations, so that the administrator can specify which requests really should be glad most right away.
  • Approach PID Limiting is now in normal availability. This element guarantees that pods are unable to exhaust the number of system IDs readily available on a Linux host, or interfere with other pods by using up also a lot of processes.

Kubernetes 1.seventeen, launched in December 2019, launched the following critical new capabilities and revisions: 

  • Volume snapshots, launched in alpha in Kubernetes 1.twelve, are now promoted to beta. This element makes it possible for a volume in a cluster to be snapshotted at a presented second in time. Snapshots can be utilised to provision a new volume with info from the snapshot, or to roll back an existing volume to an earlier snapshotted variation. Volume snapshots make it doable to execute elaborate info-versioned or code-versioning functions inside of a cluster that weren’t beforehand doable.
  • Additional of the “in-tree” (bundled by default) storage plug-ins are now currently being moved to the Container Storage Interface (CSI) infrastructure. This suggests fewer direct dependencies on individuals drivers for the main variation of Kubernetes. Nevertheless, a cluster has to be explicitly up-to-date to guidance migrating the in-tree storage plug-ins, but a effective migration should not have any ill outcomes for a cluster.
  • The cloud service provider labels element, initially launched in beta back in Kubernetes 1.two, is now typically readily available. Nodes and volumes are labeled primarily based on the cloud service provider where by the Kubernetes cluster runs, as a way to describe to the rest of Kubernetes how individuals nodes and volumes really should be handled (e.g., by the scheduler). If you are using the earlier beta versions of the labels you, you really should improve them to their new counterparts to prevent problems.

Where to down load Kubernetes

You can down load the Kubernetes supply code from the releases web site of its formal GitHub repository. Kubernetes is also readily available by way of the improve system presented by the quite a few vendors that supply Kubernetes distributions.

What’s new in Kubernetes 1.16

Kubernetes 1.16, launched in September 2019, consists of the following new and revised capabilities:

  • Personalized resource definitions (CRDs), the prolonged-advisable mechanism for extending Kubernetes features launched in Kubernetes 1.7, are now officially a typically readily available element. CRDs have now been broadly utilised by third get-togethers. With the go to GA, a lot of optional-but-advisable behaviors are now essential by default to keep the APIs steady.
  • Numerous variations have been built to how volumes are handled. Main among the them is relocating the volume resizing API, identified in the Container Storage Interface (CSI), to beta.
  • Kubeadm now has alpha guidance for signing up for Windows employee nodes to an existing cluster. The prolonged-phrase goal here is to make Windows and Linux nodes the two 1st-course citizens in a cluster, rather of obtaining only a partial established of behaviors for Windows.
  • CSI plug-in guidance is now readily available in alpha for Windows nodes, so individuals devices can start off using the identical variety of storage plug-ins as Linux nodes.
  • A new element, Endpoint Slices, makes it possible for for increased scaling of clusters and far more versatility in managing community addresses. Endpoint Slices are now readily available as an alpha examination element.
  • The way metrics are handled proceeds a main overhaul with Kubernetes 1.16. Some metrics are currently being renamed or deprecated to provide them far more in line with Prometheus. The program is to clear away all deprecated metrics by Kubernetes 1.seventeen.
  • Eventually, Kubernetes 1.16 removes a number of deprecated API versions. 

What’s new in Kubernetes 1.fifteen

Kubernetes 1.fifteen, launched in late June 2019, presents the following new capabilities and enhancements:

  • Additional capabilities (at the moment in alpha and beta) for Personalized Resource Definitions, or CRDs. CRDs in Kubernetes are the basis of its extensibility technology, allowing for Kubernetes scenarios to be custom made without the need of falling out of conformance with upstream Kubernetes benchmarks. The new capabilities involve the means to transform CRDs involving versions (anything prolonged readily available for indigenous means), OpenAPI publishing for CRDs, default values for fields in OpenAPI-validated schemas for CRDs, and far more.
  • Indigenous significant availability (HA) in Kubernetes is now in beta. Setting up a cluster for HA continue to requires planning and forethought, but the prolonged-phrase goal is to make HA doable without the need of any third-celebration computer software.
  • Additional plug-ins that manage volumes have been migrated to use the Container Storage Interface (CSI), a regular way to manage storage for hosted containers. Among the the new capabilities launched in alpha for CSI are volume cloning, so that new persistent volumes can be primarily based on an existing a person.

Other variations in Kubernetes 1.fifteen involve:

  • Certification management now instantly rotates certificates before expiration.
  • A new framework for plug-ins that execute scheduling functions has entered alpha.

What’s new in Kubernetes 1.fourteen

Edition 1.fourteen of Kubernetes, launched in March 2019, consists of the following variations:

  • Microsoft Windows Server 2019 is now officially supported as a system for working the two Kubernetes employee nodes and container scheduling. This suggests complete Kubernetes clusters can operate on Windows solely, rather than obtaining a mix of Windows and Linux devices.
  • The plugin mechanism for Kubectl, the default Kubernetes command-line device, is now a steady element, permitting builders apply their individual Kubectl subcommands as standalone binaries.
  • Persistent neighborhood volumes are now a steady element. This allows domestically hooked up storage be utilised by Kubernetes for persistent volumes. Aside from supplying improved effectiveness than using community-hooked up storage, it also can make it a lot easier (and possibly cheaper) to stand up a cluster.
  • Approach ID limiting for Linux hosts is now a beta element. This stops any a person pod from using up also a lot of system IDs and thus leading to resource exhaustion on the host.

What’s new in Kubernetes 1.thirteen

Edition 1.thirteen of Kubernetes was launched in December 2018, with the following new and upgraded capabilities:

  • Kubeadm, a device developed to make it a lot easier to established up a Kubernetes cluster, is eventually readily available as a absolutely supported element. It walks an admin via the essentials of setting up nodes for manufacturing, signing up for them to the cluster, and making use of very best methods together the way. It also presents a way for infrastructure-orchestration tools (Puppet, Chef, Salt, etc.) to automate cluster setup.

  • The Container Storage Interface, or CSI, is now also readily available as a supported element. CSI makes it possible for extensions for Kubernetes’s volume layer, so that storage plugins can get the job done with Kubernetes without the need of obtaining to be built element of Kubernetes’s main code.

  • Kubernetes now makes use of CoreDNS as its default DNS server. CoreDNS will work as a drop-in substitution for other DNS servers, but was created to integrate with Kubernetes by way of plug-ins and integration with Kubernetes capabilities these kinds of as Prometheus checking metrics.

What’s new in Kubernetes 1.twelve

Produced in late September 2018, Kubernetes 1.twelve brings to normal availability the Kubelet TLS Bootstrap. The Kubelet TLS Bootstrap makes it possible for a Kubelet, or the principal agent that runs on each and every Kubernetes node, to be a part of a TLS-secured cluster instantly, by requesting a TLS shopper certificate via an API. By automating this system, Kubernetes makes it possible for clusters to be configured with increased safety by default.

Also new in Kubernetes 1.twelve is guidance for Microsoft Azure’s virtual equipment scale sets (VMSS), a way to established up a group of VMs that instantly ramp up or down on routine or to meet demand. Kubernetes’s cluster-autoscaling element now will work with VMSS.

Other new capabilities in Kubernetes 1.twelve:

  • Snapshot and restore features for volumes (alpha).
  • Personalized metrics for pod autoscaling (beta). This makes it possible for tailor made position situations or other metrics to be utilised when scaling a pod—for occasion, if means that are precise to a presented deployment of Kubernetes want to be tracked as element of the application’s management technique.
  • Vertical pod scaling (beta), which makes it possible for a pod’s resource boundaries to be varied across its life span, as a way to improved manage pods that have a significant price related with disposing of them. This is a prolonged-standing merchandise on a lot of wish lists for Kubernetes, because it makes it possible for for techniques to offer with pods whose behaviors are not easy to manage under the present scheduling technique.

What’s new in Kubernetes 1.eleven

Produced in early July 2018, Kubernetes 1.eleven adds IPVS, or IP Digital Server, to presents significant-effectiveness cluster load balancing using an in-kernel technology that is fewer advanced than the iptables program generally utilised for these kinds of factors. At some point, Kubernetes will use IPVS as the default load balancer, but for now it’s choose-in.

Personalized resource definitions, billed as a way to make tailor made configuration variations to Kubernetes without the need of breaking its standardizations, may perhaps now be versioned to enable for swish transitions from a person established of tailor made means to yet another above time. Also new are techniques to define “status” and “scale” subresources, which can integrate with checking and significant-availability frameworks in a cluster.

Other main variations involve: