Crossplane v0.3 – accelerating support for more clouds and managed services

Crossplane v0.3 – accelerating support for more clouds and managed services

  • September 19, 2019
Table of Contents

Crossplane v0.3 – accelerating support for more clouds and managed services

New developer guide, CLI tooling and enhanced out-of-tree Infra Stacks (GCP, AWS, Azure) enables the community to add support for more cloud providers, managed Kubernetes offerings, and fully-managed cloud services that can be hosted in your cloud of choice. The momentum keeps rolling forward with Crossplane community engagement around extending Crossplane to add support for additional cloud providers, managed Kubernetes offerings, and managed cloud services (DBaaS, Big Data, and more). It’s a busy time for us

and we’re very excited to have such a collaborative community! Here are just a few stats since the v0.2 release that show how quickly things are moving: There are so many changes in this release, we can’t tell you about all of them in a single post. We’ll give you the highlights here and then follow up with separate posts over the coming weeks, including all the details in the latest version of the crossplane.io/docs!

In this release we have enhanced the Infrastructure Stacks for GCP, AWS, and Azure to use a refined set of best-practices codified in a new crossplane-runtime and moved them out-of-tree where they can be extended or adapted by the community with different release schedules.

Source: crossplane.io

Share :
comments powered by Disqus

Related Posts

How to detect Kubernetes vulnerability CVE-2019-11246 using Falco.

How to detect Kubernetes vulnerability CVE-2019-11246 using Falco.

A recent CNCF-sponsored Kubernetes security audit uncovered CVE-2019-11246, a high-severity vulnerability affecting the command-line kubectl tool. If exploited, it could lead to a directory traversal, allowing a malicious container to replace or create files on a user’s workstation. This vulnerability stemmed from an incomplete fix of a previously disclosed vulnerability (CVE-2019-1002101).

Read More
Kubernetes pod autoscaler using custom metrics

Kubernetes pod autoscaler using custom metrics

In this post we are going to demonstrate how to deploy a Kubernetes autoscaler using a third party metrics provider. You will learn how to expose any custom metric directly through the Kubernetes API implementing an extension service. Dynamic scaling is not a new concept by any means, but implementing your own scaler is a rather complex and delicate task.

Read More
Announcing etcd 3.4

Announcing etcd 3.4

In particular, etcd experienced performance issues with a large number of concurrent read transactions even when there is no write (e.g. “read-only range request … took too long to execute”). Previously, the storage backend commit operation on pending writes blocks incoming read transactions, even when there was no pending write. Now, the commit does not block reads which improve long-running read transaction performance.

Read More