Update content/en/blog/_posts/2020-08-25-kubernetes-release-1.19.md
Co-authored-by: Bob Killen <killen.bob@gmail.com>pull/23405/head
parent
12b114559d
commit
e8d7bf0dcf
|
@ -39,7 +39,7 @@ In terms of moving the Ingress API towards GA, the API itself has been available
|
|||
Structured Logging
|
||||
Current logging in the Kubernetes control plane doesn’t guarantee any uniform structure for log messages and references to Kubernetes objects in those logs. This makes parsing, processing, storing, querying and analyzing logs hard and forces administrators and developers to rely on ad-hoc solutions in most cases based on some regular expressions. Due to those problems any analytical solution based on those logs is hard to implement and maintain.
|
||||
New klog methods
|
||||
To enforce a new log message structure we want to introduce new methods to the klog library which will provide a more structured interface for formatting log messages compared to current methods based on fmt format strings. For each format method (Infof, Errorf) we will add a matching structured method (InfoS, ErrorS). Each of those methods accept log messages as a first argument and a list of key-values pairs as a variadic second argument. This approach allows incremental adoption of structured logging without converting ALL of kubernetes to a new API at one time.
|
||||
To enforce a new log message structure we want to introduce new methods to the klog library which will provide a more structured interface for formatting log messages compared to current methods based on fmt format strings. For each format method (`Infof`, `Errorf`) we will add a matching structured method (`InfoS`, `ErrorS`). Each of those methods accept log messages as a first argument and a list of key-values pairs as a variadic second argument. This approach allows incremental adoption of structured logging without converting ALL of kubernetes to a new API at one time.
|
||||
Kubelet Client TLS Certificate Rotation
|
||||
|
||||
Currently, a kubelet has a certificate/key pair that authenticates the kubelet to the kube-apiserver. The certificate is supplied to the kubelet when it is first booted, via an out of cluster mechanism. This enhancement covers a process for obtaining the initial cert/key pair and rotating it as expiration of the certificate approaches.
|
||||
|
|
Loading…
Reference in New Issue