Update 2024 blog to include author in front-matter
parent
254925b709
commit
c4266f0372
|
@ -3,10 +3,10 @@ layout: blog
|
|||
title: "Kubernetes 1.30: Preventing unauthorized volume mode conversion moves to GA"
|
||||
date: 2024-04-30
|
||||
slug: prevent-unauthorized-volume-mode-conversion-ga
|
||||
author: >
|
||||
Raunak Pradip Shah (Mirantis)
|
||||
---
|
||||
|
||||
**Author:** Raunak Pradip Shah (Mirantis)
|
||||
|
||||
With the release of Kubernetes 1.30, the feature to prevent the modification of the volume mode
|
||||
of a [PersistentVolumeClaim](/docs/concepts/storage/persistent-volumes/) that was created from
|
||||
an existing VolumeSnapshot in a Kubernetes cluster, has moved to GA!
|
||||
|
|
|
@ -3,10 +3,12 @@ layout: blog
|
|||
title: "Kubernetes 1.30: Beta Support For Pods With User Namespaces"
|
||||
date: 2024-04-22
|
||||
slug: userns-beta
|
||||
author: >
|
||||
Rodrigo Campos Catelin (Microsoft),
|
||||
Giuseppe Scrivano (Red Hat),
|
||||
Sascha Grunert (Red Hat)
|
||||
---
|
||||
|
||||
**Authors:** Rodrigo Campos Catelin (Microsoft), Giuseppe Scrivano (Red Hat), Sascha Grunert (Red Hat)
|
||||
|
||||
Linux provides different namespaces to isolate processes from each other. For
|
||||
example, a typical Kubernetes pod runs within a network namespace to isolate the
|
||||
network identity and a PID namespace to isolate the processes.
|
||||
|
|
|
@ -3,10 +3,10 @@ layout: blog
|
|||
title: 'Kubernetes 1.30: Read-only volume mounts can be finally literally read-only'
|
||||
date: 2024-04-23
|
||||
slug: recursive-read-only-mounts
|
||||
author: >
|
||||
Akihiro Suda (NTT)
|
||||
---
|
||||
|
||||
**Author:** Akihiro Suda (NTT)
|
||||
|
||||
Read-only volume mounts have been a feature of Kubernetes since the beginning.
|
||||
Surprisingly, read-only mounts are not completely read-only under certain conditions on Linux.
|
||||
As of the v1.30 release, they can be made completely read-only,
|
||||
|
|
|
@ -3,10 +3,10 @@ layout: blog
|
|||
title: "Kubernetes 1.30: Validating Admission Policy Is Generally Available"
|
||||
slug: validating-admission-policy-ga
|
||||
date: 2024-04-24
|
||||
author: >
|
||||
Jiahui Feng (Google)
|
||||
---
|
||||
|
||||
**Author:** Jiahui Feng (Google)
|
||||
|
||||
On behalf of the Kubernetes project, I am excited to announce that ValidatingAdmissionPolicy has reached
|
||||
**general availability**
|
||||
as part of Kubernetes 1.30 release. If you have not yet read about this new declarative alternative to
|
||||
|
|
|
@ -3,10 +3,10 @@ layout: blog
|
|||
title: "Kubernetes 1.30: Structured Authentication Configuration Moves to Beta"
|
||||
date: 2024-04-25
|
||||
slug: structured-authentication-moves-to-beta
|
||||
author: >
|
||||
[Anish Ramasekar](https://github.com/aramase) (Microsoft)
|
||||
---
|
||||
|
||||
**Author:** [Anish Ramasekar](https://github.com/aramase) (Microsoft)
|
||||
|
||||
With Kubernetes 1.30, we (SIG Auth) are moving Structured Authentication Configuration to beta.
|
||||
|
||||
Today's article is about _authentication_: finding out who's performing a task, and checking
|
||||
|
|
|
@ -3,13 +3,13 @@ layout: blog
|
|||
title: 'Kubernetes 1.30: Multi-Webhook and Modular Authorization Made Much Easier'
|
||||
date: 2024-04-26
|
||||
slug: multi-webhook-and-modular-authorization-made-much-easier
|
||||
author: >
|
||||
[Rita Zhang](https://github.com/ritazh) (Microsoft),
|
||||
[Jordan Liggitt](https://github.com/liggitt) (Google),
|
||||
[Nabarun Pal](https://github.com/palnabarun) (VMware),
|
||||
[Leigh Capili](https://github.com/stealthybox) (VMware)
|
||||
---
|
||||
|
||||
**Authors:** [Rita Zhang](https://github.com/ritazh) (Microsoft), [Jordan
|
||||
Liggitt](https://github.com/liggitt) (Google), [Nabarun
|
||||
Pal](https://github.com/palnabarun) (VMware), [Leigh
|
||||
Capili](https://github.com/stealthybox) (VMware)
|
||||
|
||||
With Kubernetes 1.30, we (SIG Auth) are moving Structured Authorization
|
||||
Configuration to beta.
|
||||
|
||||
|
|
Loading…
Reference in New Issue