Skip to main content
All posts tagged “Container Linux”

CoreOS etcd’s first commits happened some three and a half years ago, and a lot has changed since that initial version 0 of the etcd API. etcd version 3, introduced last summer, offers a streamlined, gRPC-based API and dramatic performance improvements over both competitive solutions and its own prior versions, while maintaining the distributed reliability and rolling upgrade capabilities that make etcd manageable in production.

Today we’re announcing a new training series from the engineers at CoreOS. Join us for classes on Kubernetes, containers, and CoreOS Linux. You can sign up today for public classes starting in September, or contact us to request a private class for your company.

International Friendship day

Sunday, August 7th is International Friendship Day. This got us thinking about how Facebook has been so successful in connecting the world by friends sharing information.

Today we are thrilled to announce that open source CoreOS Linux is available in China. The community … Read in English

Update 2 (May 19): Read the post-mortem blog post dissecting this vulnerability and the CoreOS response

Update 1 (May 16 04:28 PDT): 99% of affected hosts have been updated

This past weekend we shipped CoreOS 1,000. Each release version number is a count of the days since the CoreOS Epoch, July 1, 2013. Sunday’s release marks 1,000 days of CoreOS Linux.

We’re developing coreos-baremetal, a configuration distribution service and a set of guides for network-booting and configuring CoreOS Linux clusters on bare metal hardware. The project is at an early proof-of-concept stage, but the ultimate goal is to automate the creation of secure CoreOS Linux clusters in your data center.

This week Go 1.5.3 was released to address a security vulnerability. CoreOS Linux itself and the CoreOS products shipped with it are not affected by this issue. Users of etcd and dex on other operating systems should take action.

Official installation of Kubernetes on CoreOS and AWS

As we head into AWS re:Invent next week, we are making it one step easier to use Kubernetes on AWS.

At CoreOS, running containers securely is a number one priority. We recently landed a number of features that are helping make CoreOS Linux a trusted and even more secure place to run containers. As of the 808.0.0 release, CoreOS Linux is tightly integrated with SELinux to enforce fine-grained permissions for applications. Building on top of these permissions, our container runtime, rkt, has gained support for SVirt in addition to a default SELinux policy.

Subscribe to Container Linux