Crossplane v0.3 – accelerating support for more clouds and managed services

Crossplane v0.3 – accelerating support for more clouds and managed services

  • September 19, 2019
Table of Contents

Crossplane v0.3 – accelerating support for more clouds and managed services

New developer guide, CLI tooling and enhanced out-of-tree Infra Stacks (GCP, AWS, Azure) enables the community to add support for more cloud providers, managed Kubernetes offerings, and fully-managed cloud services that can be hosted in your cloud of choice. The momentum keeps rolling forward with Crossplane community engagement around extending Crossplane to add support for additional cloud providers, managed Kubernetes offerings, and managed cloud services (DBaaS, Big Data, and more). It’s a busy time for us

and we’re very excited to have such a collaborative community! Here are just a few stats since the v0.2 release that show how quickly things are moving: There are so many changes in this release, we can’t tell you about all of them in a single post. We’ll give you the highlights here and then follow up with separate posts over the coming weeks, including all the details in the latest version of the crossplane.io/docs!

In this release we have enhanced the Infrastructure Stacks for GCP, AWS, and Azure to use a refined set of best-practices codified in a new crossplane-runtime and moved them out-of-tree where they can be extended or adapted by the community with different release schedules.

Source: crossplane.io

Share :
comments powered by Disqus

Related Posts

How to detect Kubernetes vulnerability CVE-2019-11246 using Falco.

How to detect Kubernetes vulnerability CVE-2019-11246 using Falco.

A recent CNCF-sponsored Kubernetes security audit uncovered CVE-2019-11246, a high-severity vulnerability affecting the command-line kubectl tool. If exploited, it could lead to a directory traversal, allowing a malicious container to replace or create files on a user’s workstation. This vulnerability stemmed from an incomplete fix of a previously disclosed vulnerability (CVE-2019-1002101).

Read More
OPA Gatekeeper: Policy and Governance for Kubernetes

OPA Gatekeeper: Policy and Governance for Kubernetes

The Open Policy Agent Gatekeeper project can be leveraged to help enforce policies and strengthen governance in your Kubernetes environment. In this post, we will walk through the goals, history, and current state of the project. The following recordings from the Kubecon EU 2019 sessions are a great starting place in working with Gatekeeper: If your organization has been operating Kubernetes, you probably have been looking for ways to control what end-users can do on the cluster and ways to ensure that clusters are in compliance with company policies.

Read More
Kubernetes pod autoscaler using custom metrics

Kubernetes pod autoscaler using custom metrics

In this post we are going to demonstrate how to deploy a Kubernetes autoscaler using a third party metrics provider. You will learn how to expose any custom metric directly through the Kubernetes API implementing an extension service. Dynamic scaling is not a new concept by any means, but implementing your own scaler is a rather complex and delicate task.

Read More