Skip to main content

To help make it easier to build Kubernetes applications, Red Hat and the Kubernetes open source community today share the Operator Framework – an open source toolkit designed to manage Kubernetes native applications, called Operators, in a more effective, automated, and scalable way.

The cloud native community is gathering in Copenhagen next week for KubeCon + CloudNativeCon Europe! Here’s your guide to the talks and events you won’t want to miss. Meet the Red Hat and CoreOS team members all week long, May 1-4 at booth D-E01.

Today, Red Hat is pleased to announce a new open source project, the Vault Operator. In keeping with earlier projects, including the etcd Operator and the Prometheus Operator, the Vault Operator aims to make it easier to install, manage, and maintain instances of HashiCorp Vault – a tool designed for storing, managing, and controlling access to secrets, such as tokens, passwords, certificates, and API keys – on Kubernetes clusters.

Today, the Open Container Initiative (OCI) announced a successful vote to start a new project called distribution-spec. This project is focused on working towards a specification for distribution of OCI container images. Red Hat has been involved with and supports this as a member of OCI, and Red Hat believes this will benefit the Linux container community at large as well as many of Red Hat’s products and projects.

Kubernetes 1.10 is here

 

Kubernetes, a leading open source project for automating deployment, scaling, and management of containerized applications, announced version 1.10 today. Among the key features of this release are support for the Container Storage Interface (CSI), API aggregation, a new mechanism for supporting hardware devices, and more.

It's also the first release since CoreOS joined Red Hat. CoreOS already had the opportunity to work closely with our new Red Hat colleagues through the Kubernetes community and we now have the opportunity to redouble our efforts to help forward Kubernetes as an open source and community-first project.

Today we are issuing patches for two newly disclosed security vulnerabilities affecting all versions of Tectonic and Kubernetes versions 1.3 through 1.10. The vulnerabilities have been assigned CVE-2017-1002101 and CVE-2017-1002102, respectively.

etcd logo

 

We're proud to announce that etcd v3.3.0 is now public! This release includes backend database improvements, data corruption checking, a new client that's more tolerant of network partitions, v2 API emulation, and many more changes.

Red Hat and CoreOS logos

 

CoreOS has agreed to become a part of the Red Hat family.

Red Hat and CoreOS’s relationship began many years ago as open source collaborators developing some of the key innovations in containers and distributed systems, making automated operations a reality. Since that time, we have both become leaders in the communities that are driving these innovations, including Kubernetes, the Open Container Initiative (OCI) and the Cloud Native Computing Foundation (CNCF). Today Red Hat announced it has signed a definitive agreement to acquire CoreOS. By joining Red Hat, I believe we will make these important technologies ubiquitous in business and the world.

The ability to autoscale workloads based on metrics such as CPU and memory usage is one of the most powerful features of Kubernetes. Of course, to enable this feature we first need a method of gathering and storing these metrics. Today this is most often accomplished using Heapster, but this method can be cumbersome and support from the various contributors to the project has been inconsistent – and in fact it may soon be phased out.

New releases of Container Linux addressing the Meltdown attack, caused by vulnerabilities in many modern processors, are now available in all three Container Linux release channels: Alpha 1649.0.0, Beta 1632.1.0, and Stable 1576.5.0. Updates are rolling out to the Alpha and Beta channels now, and should complete over the next 24-48 hours. By default, Container Linux will apply these updates automatically, but systems with non-default configurations should be manually updated as soon as possible.

Subscribe to CoreOS Blog