Skip to main content
  1. Blog
  2. Article

Tim Van Steenburgh
on 7 September 2017

Canonical Distribution of Kubernetes: Development Summary (9/7/2017)


This article originally appeared on Tim Van Steenburgh’s blog

September 1st concluded our most recent development sprint on the Canonical Distribution of Kubernetes (CDK). Here are some highlights:

Canal Bundle

Our new Canal bundle is available for testing. We’ve been fixing a few issuesand expect to release the Canal bundle to the stable channel tomorrow.

If you need network policy support in your cluster, take it for a test drive on AWS with:

juju deploy cs:~containers/canonical-kubernetes-canal --channel edge

Once deployed, you can test network policy support by following the instructions on the Calico website.

RBAC and s390x

Our main focus was on finishing the Calico/Canal support, but progress continues on RBAC and s390x. We added a bunch of new tests for RBAC, and are working on building/publishing the last few pieces we need for an s390x cluster (nginx-ingress-controller image and an e2e snap).

1.7.4

We tested and released our latest round of charm bug fixes along with snaps for the 1.7.4 upstream binaries. If you were already on 1.7.0, you got upgraded automatically, and 1.7.4 is the new default for new clusters.

If you’d like to follow along more closely with CDK development, you can do so in the following places:

If you’re interested in hacking on CDK, be sure to check out the latest blogby our friend Kos!

Until next time!

Related posts


Massimiliano Gori
31 March 2026

How to manage Ubuntu fleets using on-premises Active Directory and ADSys

Cloud and server Article

The “hybrid fleet” is today’s reality: organizations diversify operating systems while Microsoft Active Directory (AD) remains the dominant identity “source of truth.” IT administrators must ensure Linux machines, like Ubuntu desktops and servers, behave as first-class citizens in this environment. Efficient Linux management demands unifi ...


David Beamonte
30 March 2026

Simplify bare metal operations for sovereign clouds

MAAS Article

The way enterprises are thinking about their infrastructure has changed.  Digital sovereignty of all kinds – data sovereignty, operational sovereignty, and software sovereignty – have begun to dominate the infrastructure discussion. Today, these abstract terms have become practical concerns for platform teams. Changing regulations, geopol ...


Massimiliano Gori
30 March 2026

How to Harden Ubuntu SSH: From static keys to cloud identity

Cloud and server Article

30 years after its introduction, Secure Shell (SSH) remains the ubiquitous gateway for administration, making it a primary target for brute force attacks and lateral movement within enterprise environments. For system administrators and security architects operating under the weight of regulatory frameworks like SOC2, HIPAA, and PCI-DSS, ...