Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

An error occurred while submitting your form. Please try again or file a bug report. Close

  1. Blog
  2. Article

Marco Ceppi
on 4 May 2017

Canonical’s support for Kubernetes 1.6.2 released


We’re proud to announce support for Kubernetes 1.6.2 in the Canonical Distribution of Kubernetes and the Kubernetes Charms. This is a pure upstream distribution of Kubernetes, built with operators in mind. It allows operators do deploy, manage, and operate Kubernetes on public clouds, on-premise (ie vSphere, OpenStack), bare metal, and developer laptops. Kubernetes 1.6.2 is a patch release comprised of mostly bugfixes.

Getting Started

Here’s the simplest way to get a Kubernetes 1.6.2 cluster up and running:

# linux
 sudo snap install conjure-up --classic
 conjure-up kubernetes

# macOS
 brew install conjure-up
 conjure-up kubernetes

During the installation conjure-up will ask you what cloud you want to deploy on and prompt you for the proper credentials. If you’re deploying to local containers (LXD) see these instructions for localhost-specific considerations.

For production grade deployments and cluster lifecycle management it is recommended to read the full Canonical Distribution of Kubernetes documentation.

How to upgrade

To upgrade an existing 1.5.x or 1.6.x cluster, follow the upgrade instructions in the docs. Following these instructions will upgrade the charm code and resources to the Kubernetes 1.6.2 release of the charms.

New Features

  • Support for Kubernetes v1.6.2.
  • Update kubernetes-e2e charm to use snaps – pr:45044
  • Add namespace-{list, create, delete} actions to the kubernetes-master layer – pr:44277
  • Add cifs-utils package to kubernetes-worker (required for Azure) – pr:45117, fixes:227
  • Document NodePort networking for CDK – pr:44863, fixes:259

Bug Fixes

  • Update outdated link in kubernetes-master readme – pr:44988
  • Faster juju status updates when charm config changes – pr:44959, fixes:263
  • Make new leader retrieve certs from old leader – pr:43620, fixes:43563
  • Append authentication tokens instead of overwriting – pr:43620, fixes:43519
  • Ensure kubernetes-worker juju layer registry action uses correct ingress controller option name – pr:44921, fixes:44920
  • Send dns details only after cdk-addons are configured – pr:44945, fixes:40386, fixes:262
  • Fix ceph-secret type to kubernetes.io/rbd – pr:44635
  • When multiple masters, make worker choose one at random instead of trying to use all – pr:44677, fixes:255
  • Prevent installation of upstream (possibly unsupported by k8s) docker – pr:44681
  • Add –delete-local-data option to pause action – pr:44391, fixes:44392
  • Handle etcd scale events properly – pr:44967, fixes:43461
  • Resolve juju vsphere hostname bug showing only a single node in a scaled node-pool – pr:44780, fixes:237

How to contact us

We’re normally found in these Slack channels and attend these sig meetings regularly:

Or via email: kuberentes@ubuntu.com

Operators are an important part of Kubernetes, we encourage you to participate with other members of the Kubernetes community!

We also monitor the Kubernetes mailing lists and other community channels, feel free to reach out to us. As always, PRs, recommendations, and bug reports are welcome!

Related posts


Canonical
30 September 2025

Canonical achieves ISO 27001 certification

Canonical announcements Article

The certification demonstrates alignment with cybersecurity standards that will further safeguard open source products and services for use in the most demanding enterprise environments. Canonical is proud to announce it has achieved the ISO/IEC 27001 certification for its Information Security Management System (ISMS), following an extens ...


Jehudi
29 September 2025

Fortifying security for Ubuntu on Azure with Metadata Security Protocol (MSP)

Cloud and server Article

Ubuntu now supports Azure’s Metadata Security Protocol (MSP), raising the baseline for VM security on Azure. MSP locks down IMDS and WireServer behind HMAC-signed, identity-aware requests enforced by the azure-proxy-agent (Canonical’s integration of Microsoft’s GPA) using eBPF interception and per-endpoint allowlists. It must be enabled f ...


Stephanie Domas
24 September 2025

Beyond ‘whack-a-mole’ and insecticide

Ubuntu Article

Designing a new, robust, sustainable, and truly holistic approach to cybersecurity Talk to any cybersecurity expert or IT security manager, and they’ll tell you they’re sick of alerts and issues. For a while now, the industry has slowly been realizing that there’s a better way to improve cybersecurity and resolve security issues in IT wit ...