Skip to main content
  1. Blog
  2. Article

Canonical
on 28 July 2017

The Canonical Distribution of Kubernetes: Development Summary #4


This blog was originally posted by Tim Van Steenburgh

July 21st concluded our most recent development sprint on the Canonical Distribution of Kubernetes (CDK). Here’s a look at what we did.

Fixes and Improvements

Check out the full list on GitHub. Here are some notables:

  • Made load balancer port configurable
  • Changed default --service-cluster-ip-range to a /16 CIDR to allow more NodePort IP addresses
  • Fixed etcd snapshot action
  • Increased default worker node constraints to 4 cpu, 4GB RAM

Testing

  • Added a test to ensure dashboard is operational after deploy
  • Added a test for the built-in microbot example
  • Added a Jenkins job to test master charms with stable snaps. When this is green it means we can release whatever new fixes/features we have queued up in the charms, giving us the confidence to do more frequent releases.

Features

  • Calico spike. We want to provide a CDK + Calico deployment option that works on any cloud, just like our CDK + Flannel option. We’ve decided to go with a Calico-on-Flannel (Canal) approach initially. Canal combines the network policy enforcement of Calico with the ease-of-deployment of Flannel. Work begins in the current sprint!
  • RBAC spike. We mapped out the work necessary for enabling RBAC via charm config. Work begins in the current sprint!
  • Updated the canonical-kubernetes-elastic bundle. This bundle has been added to our Jenkins build process and updated with the latest 1.7 charms.

If you’d like to follow along more closely with CDK development, you can do so in the following places:

Until next time!

Related posts


Abdelrahman Hosny
21 May 2026

Developing web apps with local LLM inference

AI Article

I’ve yet to meet a developer that enjoys working with metered AI APIs. The need to pay for every API call in development works in direct opposition to the ethos of rapid iteration, and it’s easy for the costs to get out of hand. That’s why Canonical has created a different approach to building AI-powered ...


Luci Stanescu
21 May 2026

PinTheft Linux kernel vulnerability mitigation

Ubuntu Article

A local privilege escalation (LPE) security vulnerability in the Linux kernel, codename “PinTheft,” was publicly disclosed on May 19, 2026. The vulnerability was fixed in the mainline Linux kernel tree. A proof-of-concept exploit was published along with public disclosure. The vulnerability does not have a CVE ID assigned at the moment; o ...


Massimiliano Gori
21 May 2026

Canonical announces fully Managed Kubeflow AI operations platform on the Microsoft Azure Marketplace

AI Machine Learning

Canonical has announced the general availability of Managed Kubeflow on the Microsoft Azure Marketplace. This fully managed MLOps platform allows enterprise AI teams to deploy a production-ready environment in under an hour, eliminating infrastructure maintenance. ...