Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

  1. Blog
  2. Article

Canonical
on 28 July 2017

The Canonical Distribution of Kubernetes: Development Summary #4


This blog was originally posted by Tim Van Steenburgh

July 21st concluded our most recent development sprint on the Canonical Distribution of Kubernetes (CDK). Here’s a look at what we did.

Fixes and Improvements

Check out the full list on GitHub. Here are some notables:

  • Made load balancer port configurable
  • Changed default --service-cluster-ip-range to a /16 CIDR to allow more NodePort IP addresses
  • Fixed etcd snapshot action
  • Increased default worker node constraints to 4 cpu, 4GB RAM

Testing

  • Added a test to ensure dashboard is operational after deploy
  • Added a test for the built-in microbot example
  • Added a Jenkins job to test master charms with stable snaps. When this is green it means we can release whatever new fixes/features we have queued up in the charms, giving us the confidence to do more frequent releases.

Features

  • Calico spike. We want to provide a CDK + Calico deployment option that works on any cloud, just like our CDK + Flannel option. We’ve decided to go with a Calico-on-Flannel (Canal) approach initially. Canal combines the network policy enforcement of Calico with the ease-of-deployment of Flannel. Work begins in the current sprint!
  • RBAC spike. We mapped out the work necessary for enabling RBAC via charm config. Work begins in the current sprint!
  • Updated the canonical-kubernetes-elastic bundle. This bundle has been added to our Jenkins build process and updated with the latest 1.7 charms.

If you’d like to follow along more closely with CDK development, you can do so in the following places:

Until next time!

Related posts


Rawand Benour
5 June 2025

What if your container images were security-maintained at the source?

Ubuntu Article

Software supply chain security has become a top concern for developers, DevOps engineers, and IT leaders. High-profile breaches and dependency compromises have shown that open source components can introduce risk if not properly vetted and maintained. Although containerization has become commonplace in contemporary development and deploym ...


Octavio Galland
30 May 2025

Apport local information disclosure vulnerability fixes available

Ubuntu Article

Qualys discovered two vulnerabilities in various Linux distributions which allow a local attacker with permission to create user namespaces to leak core dumps for processes of suid executables. These affect both apport, the Ubuntu default core dump handler (CVE-2025-5054), and systemd-coredump, the default core dump handler in Red Hat Ent ...


Nkeiruka Whenu
28 May 2025

The 2025 Frankfurt Engineering Sprint: What did you miss?

Community Article

If you have ever wondered what goes on when your friends say that they’re going on a “Business trip” abroad, then allow me to spill the beans 🫘. Let’s recap what you may have missed from Canonical’s Frankfurt Engineering Sprint this May, shall we? My name is Nkeiruka, and I work as a Software Engineer ...