Browse Source

initial roadmap

Signed-off-by: Craig Jellick <craig@rancher.com>
pull/2133/head
Craig Jellick 4 years ago
parent
commit
186c441aa5
  1. 4
      README.md
  2. 34
      ROADMAP.md

4
README.md

@ -84,6 +84,10 @@ Both of these have out-of-tree alternatives in the form of [CSI](https://github.
We remove these to achieve a smaller binary size. They can be removed while remaining conformant because neither affect core Kubernetes functionality. They are also dependent on third-party cloud or data center technologies/services, which may not be available in many of K3s's usecases. We remove these to achieve a smaller binary size. They can be removed while remaining conformant because neither affect core Kubernetes functionality. They are also dependent on third-party cloud or data center technologies/services, which may not be available in many of K3s's usecases.
What's next?
---
Check out our [roadmap](ROADMAP.md) to see what we have planned moving forward.
Release cadence Release cadence
--- ---
K3s maintains pace with upstream Kubernetes releases. Our goal is to release patch releases on the same day as upstream and minor releases within a few days. K3s maintains pace with upstream Kubernetes releases. Our goal is to release patch releases on the same day as upstream and minor releases within a few days.

34
ROADMAP.md

@ -0,0 +1,34 @@
Roadmap
---
This represents the larger, bigger impact features and enhancements we have planned for K3s. There are many more tactical enhancements and fixes that can be found by perusing our [GitHub milestones](https://github.com/rancher/k3s/milestones).
v1.19 - End of August 2020
---
- Add support for config file based configuration
- Replace experimental embedded dqlite with embedded etcd
- Support ability to customize baked-in Helm charts
- Improve and refactor SELinux support
- Improve CentOS and RHEL 7 and 8 support
v1.20 - December 2020
---
- Disentangle code and docs from Rancher Labs
- Support a 2-node hot/cold HA model by leveraging etcd's learner node feature
- Introduce `k3s build` feature for easier local image building
- Reduce patch set K3s requires for Kubernetes
- Migrate to using upstream’s kubelet certificate rotation rather than our own custom logic
- Migrate to using the kubelet config file for configuring kubelets rather than command line args
- Upgrade to Traefik 2.x for ingress
- Use "staging" location for binaries as part of upgrades
Backlog
---
- Windows support
- Introduce "Cloud Provider" builds that have CSI and CCM built-in for each provider
- Improve low-power support
- Real-time operating system support
- Graduate encrypted networking support from experimental to GA
- Graduate network policy support from experimental to GA
Loading…
Cancel
Save