Posts for: #k3s

K3s Releases Latest Version: v1.29.1+k3s2

K3s Releases Latest Version: v1.29.1+k3s2

K3s, the lightweight, highly available, certified Kubernetes distribution, has released version v1.29.1+k3s2. This release is designed for production workloads in unattended, resource-constrained, remote locations, or inside IoT appliances. K3s is packaged as a single <70MB binary, reducing the dependencies and steps needed to install, run, and auto-update a production Kubernetes cluster.

The update to Kubernetes v1.29.1 brings several fixes and improvements. Some of the changes since v1.29.0+k3s1 include:

  • Bump Sonobuoy version
  • Bump actions/setup-go from 4 to 5
  • Update stable channel to v1.28.5+k3s1 and add v1.29 channel
  • Added support for env *_PROXY variables for agent loadbalancer
  • Add a retry around updating a secrets-encrypt node annotations
  • Silence SELinux warning on INSTALL_K3S_SKIP_SELINUX_RPM
  • Add ServiceLB support for PodHostIPs FeatureGate
  • Redirect error stream to null when checking nm-cloud systemd unit
  • Dockerfile.dapper: set $HOME properly
  • Add system-agent-installer-k3s step to GA release instructions
  • Fix install script checksum
  • and many more…

For a full list of changes, you can check the Kubernetes release notes.

This release also includes updates to various embedded components, such as Kubernetes v1.29.1, Kine v0.11.0, SQLite 3.42.0, etcd v3.5.9-k3s1, containerd v1.7.11-k3s2, runc v1.1.12-k3s1, Flannel v0.24.0, metrics-server v0.6.3, Traefik v2.10.5, CoreDNS v1.10.1, helm-controller v0.15.8, and local-path-provisioner v0.0.24.

K3s Unveils New Version: v1.29.0+k3s1

K3s Unveils New Version: v1.29.0+k3s1

K3s has released version v1.29.0+k3s1, an update to its lightweight, highly available Kubernetes distribution. This release includes several important changes and updates, including an upgrade to Kubernetes v1.29.0. However, before upgrading, users are advised to read the Urgent Upgrade Notes from Kubernetes.

There are two important changes to note in this release. The first is the removal of the experimental rotate-keys subcommand, due to changes in Kubernetes upstream for KMSv2. This subcommand may be added back in future releases. The second change is the removal of the multi-cluster-cidr flag, as support for this alpha feature has been completely removed from Kubernetes upstream.

Other notable changes in this release include fixing an overlapping address range, updating the stable channel to November 2023, adding runtime classes for wasm/nvidia/crun, and bumping containerd/runc to v1.7.10-k3s1/v1.1.10. Additionally, there are updates to containerd, removal of GA feature-gates, improvements to code coverage, and an update to flannel.

Embedded component versions in this release include Kubernetes v1.29.0, Kine v0.11.0, SQLite 3.42.0, Etcd v3.5.9-k3s1, Containerd v1.7.11-k3s2, Runc v1.1.10, Flannel v0.24.0, Metrics-server v0.6.3, Traefik v2.10.5, CoreDNS v1.10.1, Helm-controller v0.15.4, and Local-path-provisioner v0.0.24.

K3s Unveils New Version: v1.28.4+k3s1

K3s, a lightweight and highly available Kubernetes distribution, has released version v1.28.4+k3s1. This certified Kubernetes distribution is specifically designed for production workloads in resource-constrained and unattended environments, such as remote locations or IoT appliances. The new release updates Kubernetes to v1.28.4 and includes several fixes for various issues.

Some of the changes and improvements in this release include:

  • Update channels latest to v1.27.7+k3s2
  • Add etcd status condition for easy monitoring of etcd status from each node
  • Automatic discovery of WebAssembly runtimes
  • Improved dualStack log
  • Optimized Dockerfile for simplified installation and runtime
  • Addition of timezone info in the Docker image, enabling the use of spec.timeZone in CronJobs
  • Bumped kine to v0.11.0, resolving issues with postgres and NATS, improving watch channel performance, and enhancing compatibility
  • QoS-class resource configuration for containerd
  • Addition of agent flag disable-apiserver-lb to disable load balance proxy
  • Various bug fixes and improvements

For a full list of changes, please refer to the Kubernetes release notes.

The embedded component versions in this release are as follows:

  • Kubernetes v1.28.4
  • Kine v0.11.0
  • SQLite 3.42.0
  • Etcd v3.5.9-k3s1
  • Containerd v1.7.7-k3s1
  • Runc v1.1.8
  • Flannel v0.22.2
  • Metrics-server v0.6.3
  • Traefik v2.10.5
  • CoreDNS v1.10.1
  • Helm-controller v0.15.4
  • Local-path-provisioner v0.0.24

For more information and resources on K3s, you can visit the official documentation, join the Slack channel, or contribute to the project on GitHub.

K3s Unveils Latest Version v1.28.3+k3s2

K3s, a lightweight and highly available certified Kubernetes distribution, has released version v1.28.3+k3s2. This version is designed for production workloads in resource-constrained and remote locations, as well as inside IoT appliances. K3s comes as a single binary that is less than 70MB in size, making it easy to install, run, and auto-update a production Kubernetes cluster.

The latest release updates Kubernetes to version v1.28.3 and addresses several issues. Some of the changes since v1.28.3+k3s1 include:

  • Restoration of selinux context systemd unit file
  • Update of channel to v1.27.7+k3s1
  • Bump of Sonobuoy version
  • Bump of Trivy version
  • Fix for accessing outer scope .SystemdCgroup, which resolves issues with starting with nvidia-container-runtime
  • Upgrade of traefik chart to v25.0.0
  • Update of traefik to fix registry value
  • Improvement to not use iptables-save/iptables-restore if it will corrupt rules

The components and versions included in this release are as follows:

  • Kubernetes v1.28.3
  • Kine v0.10.3
  • SQLite 3.42.0
  • Etcd v3.5.9-k3s1
  • Containerd v1.7.7-k3s1
  • Runc v1.1.8
  • Flannel v0.22.2
  • Metrics-server v0.6.3
  • Traefik v2.10.5
  • CoreDNS v1.10.1
  • Helm-controller v0.15.4
  • Local-path-provisioner v0.0.24

For more information on the release and its features, refer to the Kubernetes release notes.

Overall, this new release of K3s brings important updates and fixes to enhance the performance and reliability of Kubernetes clusters in production environments.

Source: K3s

README Highlight Friday #38, 2023: K3s

In this week’s issue of README Highlight Friday, we are taking a look at K3s, a lightweight Kubernetes distribution that is production-ready, easy to install, and consumes half the memory of upstream Kubernetes. The binary size of K3s is less than 100 MB, making it a great choice for edge computing, IoT, CI/CD, development, ARM-based systems, and situations where a deep understanding of Kubernetes is not feasible.

K3s is fully conformant with Kubernetes and includes several changes to improve its performance and simplicity. It is packaged as a single binary and supports sqlite3 as the default storage backend, with options for etcd, MySQL, and PostgreSQL as well. K3s wraps Kubernetes and other components in a single launcher, making it secure by default with reasonable defaults for lightweight environments. It has minimal OS dependencies, requiring only a sane kernel and cgroup mounts.

The distribution bundles several technologies together, including Containerd and runc as container runtimes, Flannel for CNI, CoreDNS for DNS, Metrics Server for resource monitoring, Traefik for ingress, klipper-lb as an embedded service load balancer provider, kube-router for network policy, helm-controller for deploying helm manifests, Kine as a datastore shim, and local-path-provisioner for provisioning volumes using local storage. In addition, K3s includes host utilities such as iptables/nftables, ebtables, ethtool, and socat.

K3s simplifies Kubernetes operations by managing TLS certificates, the connection between worker and server nodes, and auto-deploying Kubernetes resources from local manifests in real-time. It also has plans to manage an embedded etcd cluster in the future.

K3s is not a fork of Kubernetes but a distribution that aims to remain as close to upstream Kubernetes as possible. It maintains a small set of patches, important to its use case and deployment model, while contributing changes back to upstream projects whenever possible.

The lightweight and smaller size of K3s is achieved by running many components inside a single process, reducing memory overhead. The binary size is further reduced by removing third-party storage drivers and cloud providers that can be replaced with out-of-tree alternatives like CSI and CCM.

K3s follows the release cadence of upstream Kubernetes, with patch releases being released within one week, and new minor releases within 30 days. The versioning of K3s corresponds to the version of upstream Kubernetes being released, with additional postfixes for making releases using the same version while remaining semver compliant.

For documentation and installation, users can visit the official docs site for complete information. K3s can be easily installed using the install.sh script, which downloads K3s and adds it as a service. The script also installs additional utilities such as kubectl, crictl, k3s-killall.sh, and k3s-uninstall.sh. Alternatively, users can manually download the K3s binary and run the server.

Contributions to K3s are welcome, and interested individuals can check out the contributing guide for more information. Security issues in K3s can be reported by sending an email to [email protected].

K3s Unveils New Version v1.28.2+k3s1

K3s, the lightweight Kubernetes distribution, has released version v1.28.2+k3s1. This update brings several improvements and bug fixes to the platform.

One of the key changes in this release is the update of Kubernetes to version v1.28.2. Some other notable changes in this release include the update of Kine to version v0.10.3, as well as updates to embedded components like containerd, stargz-snapshotter plugin, and more.

For a full list of changes and details on what’s new, users can refer to the Kubernetes release notes.

For more information, see release notes K3s.