@@ -70,22 +70,22 @@ Linux node swap support in Kubernetes.
70
70
### Support user namespaces in pods ([ KEP-127] ( https://kep.k8s.io/127 ) )
71
71
72
72
[ User namespaces] ( /docs/concepts/workloads/pods/user-namespaces ) is a Linux-only feature that better
73
- isolates pods to prevent or mitigate several CVEs rated high/critical, including the just-published
74
- [ CVE-2024 -21626] ( https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv ) . In
75
- Kubernetes 1.30, support for user namespaces is migrating to beta, and now supports pods with and
76
- without volumes, custom UID/GID ranges and more!
73
+ isolates pods to prevent or mitigate several CVEs rated high/critical, including
74
+ [ CVE-2024 -21626] ( https://github.com/opencontainers/runc/security/advisories/GHSA-xr7r-f8xq-vfvv ) ,
75
+ published in January 2024. In Kubernetes 1.30, support for user namespaces is migrating to beta and
76
+ now supports pods with and without volumes, custom UID/GID ranges, and more!
77
77
78
78
### Structured authorization configuration ([ KEP-3221] ( https://kep.k8s.io/3221 ) )
79
79
80
- The Structured Authorization Configuration feature is moving to beta and will be enabled by default.
81
- This
82
- [ feature ] ( https://github.com/kubernetes/enhancements/tree/master/keps/sig-auth/3221-structured-authorization-configuration )
83
- enables the creation of authorization chains with multiple webhooks with well-defined parameters
84
- that validate requests in a particular order and allows fine-grained control – such as explicit Deny
85
- on failures. The configuration file approach even allows you to specify
86
- [ CEL ] ( /docs/reference/using-api/cel/ ) rules to pre-filter requests before they are dispatched to
87
- webhooks, helping you to prevent unnecessary invocations. The API server also automatically reloads
88
- the authorizer chain when the configuration file is modified.
80
+ Support for [ structured authorization
81
+ configuration ] ( /docs/reference/access-authn-authz/authorization/#configuring-the-api-server-using-an-authorization-config-file ) .)
82
+ is moving to beta and will be enabled by default. This feature enables the creation of
83
+ authorization chains with multiple webhooks with well-defined parameters that validate requests in a
84
+ particular order and allows fine-grained control – such as explicit Deny on failures. The
85
+ configuration file approach even allows you to specify [ CEL ] ( /docs/reference/using-api/cel/ ) rules
86
+ to pre-filter requests before they are dispatched to webhooks, helping you to prevent unnecessary
87
+ invocations. The API server also automatically reloads the authorizer chain when the configuration
88
+ file is modified.
89
89
90
90
You must specify the path to that authorization configuration using the ` --authorization-config `
91
91
command line argument. If you want to keep using command line flags instead of a
@@ -100,9 +100,11 @@ docs](/docs/reference/access-authn-authz/authorization/#configuring-the-api-serv
100
100
101
101
### Container resource based pod autoscaling ([ KEP-1610] ( https://kep.k8s.io/1610 ) )
102
102
103
- HPA ContainerResource type metric graduates to stable in v1.30. It allows you to configure
104
- Autoscaling based on resource usage of individual containers. See [ our previous
105
- blog] ( /blog/2023/05/02/hpa-container-resource-metric/ ) for further details.
103
+ Horizontal pod autoscaling based on ` ContainerResource ` metrics will graduate to stable in v1.30.
104
+ This new behavior for HorizontalPodAutoscaler allows you to configure automatic scaling based on the
105
+ resource usage for individual containers, rather than the aggregate resource use over a Pod. See our
106
+ [ previous article] ( 2023/05/02/hpa-container-resource-metric/ ) for further details, or read
107
+ [ container resource metrics] ( /docs/tasks/run-application/horizontal-pod-autoscale/#container-resource-metrics ) .
106
108
107
109
### CEL for admission control ([ KEP-3488] ( https://kep.k8s.io/3488 ) )
108
110
0 commit comments