Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Update ROADMAP.md #2696

Closed
wants to merge 2 commits into from
Closed
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
22 changes: 9 additions & 13 deletions ROADMAP.md
Original file line number Diff line number Diff line change
@@ -1,32 +1,28 @@
Roadmap
---
This represents the larger, bigger impact features and enhancements we have planned for K3s. There are many more tactical enhancements and fixes that can be found by perusing our [GitHub milestones](https://github.com/rancher/k3s/milestones).
This represents the larger, bigger impact features and enhancements we have planned for K3s. There are many more tactical enhancements and fixes that can be found by perusing our [GitHub milestones](https://github.com/k3s-io/k3s/milestones).


v1.19 - End of August 2020
v1.20 - December 2020
---
- Add support for config file based configuration
- Replace experimental embedded dqlite with embedded etcd
- Support ability to customize baked-in Helm charts
- Improve and refactor SELinux support
- Improve CentOS and RHEL 7 and 8 support

- Join CNCF (Woo hoo!)
- Migrate from rancher org to neutral k3s-io org
- Disentangle code and docs from Rancher Labs

v1.20 - December 2020
v1.21 - TBD
---
- Support a 2-node hot/cold HA model by leveraging etcd's learner node feature
- Embedded container image registry
- Introduce support for Cilium CNI
- Introduce `k3s build` feature for easier local image building
- Disentangle code and docs from Rancher Labs
- Reduce patch set K3s requires for Kubernetes
- Migrate to using upstream’s kubelet certificate rotation rather than our own custom logic
- Migrate to using the kubelet config file for configuring kubelets rather than command line args
- Upgrade to Traefik 2.x for ingress
- Use "staging" location for binaries as part of upgrades


Backlog
---
- Support a 2-node hot/cold HA model by leveraging etcd's learner node feature
- Embedded container image registry
- Windows support
- Introduce "Cloud Provider" builds that have CSI and CCM built-in for each provider
- Improve low-power support
Expand Down