Crossplane v0.3 – accelerating support for more clouds and managed services

Crossplane v0.3 – accelerating support for more clouds and managed services

  • September 19, 2019
Table of Contents

Crossplane v0.3 – accelerating support for more clouds and managed services

New developer guide, CLI tooling and enhanced out-of-tree Infra Stacks (GCP, AWS, Azure) enables the community to add support for more cloud providers, managed Kubernetes offerings, and fully-managed cloud services that can be hosted in your cloud of choice. The momentum keeps rolling forward with Crossplane community engagement around extending Crossplane to add support for additional cloud providers, managed Kubernetes offerings, and managed cloud services (DBaaS, Big Data, and more). It’s a busy time for us

and we’re very excited to have such a collaborative community! Here are just a few stats since the v0.2 release that show how quickly things are moving: There are so many changes in this release, we can’t tell you about all of them in a single post. We’ll give you the highlights here and then follow up with separate posts over the coming weeks, including all the details in the latest version of the crossplane.io/docs!

In this release we have enhanced the Infrastructure Stacks for GCP, AWS, and Azure to use a refined set of best-practices codified in a new crossplane-runtime and moved them out-of-tree where they can be extended or adapted by the community with different release schedules.

Source: crossplane.io

Share :
comments powered by Disqus

Related Posts

Deprecated APIs Removed In Kubernetes 1.16

Deprecated APIs Removed In Kubernetes 1.16

As the Kubernetes API evolves, APIs are periodically reorganized or upgraded. When APIs evolve, the old API is deprecated and eventually removed. The 1.16 release will deprecate APIs for four services: None of these resources will be removed from Kubernetes or deprecated in any way.

Read More
How to detect Kubernetes vulnerability CVE-2019-11246 using Falco.

How to detect Kubernetes vulnerability CVE-2019-11246 using Falco.

A recent CNCF-sponsored Kubernetes security audit uncovered CVE-2019-11246, a high-severity vulnerability affecting the command-line kubectl tool. If exploited, it could lead to a directory traversal, allowing a malicious container to replace or create files on a user’s workstation. This vulnerability stemmed from an incomplete fix of a previously disclosed vulnerability (CVE-2019-1002101).

Read More