Keptn v1 reached EOL December 22, 2023. For more information see

Keptn 0.7.0

Keptn 0.7 improves the core use cases of continuous delivery and automated operations by providing enhanced stage control in the delivery workflow and by allowing the integration of custom remediation (aka. action) providers. Internally, Keptn has been hardened by restricting its permissions to the set of required ones, and it does not install Istio nor NGINX during the setup process.

The six key announcements of Keptn 0.7:

🚀 Delivery Assistant - SPEC 26: To better support the continuous delivery workflow of production-like use cases, Keptn 0.7 introduces the concept of manual deployment approvals for certain stages and it improves stage visibility in the Keptn Bridge.

🌟 Continuous Delivery with Helm 3 (instead of Helm 2): Keptn 0.7 moves away from using Helm 2 for deploying services; instead Helm 3 is used. As a result, Tiller - a core component of Helm 2 - is gone.

Closed-loop Remediation with custom Integration - KEP 09 | SPEC 31: Keptn 0.7 lifts the automation of remediation workflows and the integration of custom remediation (aka. action) providers to the next level. A level where multiple remediation actions per problem type can be configured and the effect of each remediation action is validated based on the SLO/SLI validation Keptn offers. Consequently, fast feedback on executed remediation actions is given, providing better visibility into entire remediation scenarios. Please find a detailed blog post about this use case here.

🎉 Improved automation support with API extensions - KEP 10: Keptn 0.7 brings internally-used API endpoints to the Keptn public API. Thus, read operations as implemented in GET endpoints are publicly available and can be leveraged to get status information for projects, stages, and services.

🔒 Hardening of Keptn: The hardened of Keptn 0.7 in terms of its permissions on a K8s cluster has been improved by defining the role-based access control (RBAC) of each service.

Removed Istio and NGINX - KEP 18: Keptn 0.7 does not install Istio nor an NGNIX Ingress controller during the Keptn install process. Instead, the default Kubernetes service types NodePort or LoadBalancer are used for exposing Keptn to an external IP. In case, the Kubernetes service types ClusterIP is chosen, it is required to manually install an Ingress or to go with port-forwarding to access the Keptn API/Bridge; documentation is provided here.

Last but not least, many thanks to the community for the rich discussions around Keptn 0.7, the submitted Keptn Enhancement Proposals, and the implementation work!

Keptn Specification

Implemented Keptn spec version: 0.1.4

New Features

  • Kubernetes 1.14 - 1.18 support #1777
  • Keptn on K3s support #1896
  • Hardening: Use K8s service account with a restricted set of permissions instead of cluster-admin #1862
  • Hardening: Added Kubernetes recommended labels to the Keptn installation #1996
  • Installer: Removed Istio and NGNIX from installer #1960
  • OpenShift: keptn uninstall command mistakenly recommended to delete several OpenShift namespaces #1781
  • Expose /event endpoint from mongodb-datastore to the public Keptn API #1791
  • Change Keptn API and Keptn Bridge path on ingress from subdomain to suffix #1994
  • Retrieve metadata of Keptn installation #1843
  • Keptn Configure Bridge: Do not expose the service, nor apply Istio/NGINX manifests #1962
  • Polished the user output and checked links #2042
  • Removed --scheme=http when using Keptn CLI with HTTP instead of HTTPs #1948
  • keptn onboard service is aborted when is not installed #2047
  • keptn install removed anything related to Istio and NGINX #1961
  • keptn install only differentiates between Kubernetes and Openshift in the --platform flag #1967
  • Keptn generate support-archive should have a separate check for ingress options #1941
  • Show warning when creating a project without Git upstream #1840
  • Allow specifying an upstream Git for existing projects #1517
  • Allow user to send an approval event to the provided stage and to approve a deployment using the CLI #1749
  • Removed fixed host header api.keptn in CLI commands #1797
  • Implemented delivery assistant for approving a deployment #1835
  • Implemented get projects, services, stages, and metadata #1624
  • Enforce username and password when configuring Keptn Bridge #1893
  • Improved the output of Keptn CLI for troubleshooting #1928
  • Aligned version check in CLI according to implementation in Bridge #1930
  • configuration-service:

    • Manage open remediation workflows in the materialized view #1848
    • Allow retrieving all open approval events for a specific project, stage, and service #1757
  • gatekeeper-service:

    • React on an approval.finished event to send configuration.changed event for the current stage #1737
    • Read approval_strategy and send event based on configured strategy and evaluation result #1658
  • helm-service:

    • Introduce a new ConfigMap for INGRESS_HOSTNAME_SUFFIX #1963
    • Gateway in generated VirtualServices is configurable via environment variable #1986
  • jmeter-service:

    • Properly handle errors from configuration-service #1480
  • mongodb-service:

    • Manage open approval events in a collection #1756
    • Moved MongoDB credentials into a Kubernetes secret #1528
    • Increased MongoDB datastore volume size #1900
  • remediation-service:

    • Extracted featuretoggle action from remediation-service into unleash-service #1816
    • Moved functionality of scaler to helm-service #1817
    • Moved posting Dynatrace problem comments to dynatrace-service #1818
    • React on and process pre-defined workflow: trigger action, wait, evaluate, continue remediation or send a remediation.finished #1849
  • Update UI look-and-feel #1974
  • Splitted UI into Environment and Services view #1698
  • Environment view: Click on stage shows stage information and currently deployed services in a panel on the right-side #1699
  • Environment view: Displays that a service is out-of-sync in stage overview and detail info #1700
  • Environment view: Introduced buttons to approve/decline a deployment of a service that is out-of-sync #1701
  • Environment view: Shows status information in stages when stage is empty (no service deployed) #1860
  • Changed horizontal axis of the bar chart from a timeline to fixed distances #1668
  • Get HeatMap of evaluation-done event including a deep link into Bridge #1677
  • Provide a “COPY JSON” button on the Bridge #1794
  • Improved JSON payload visualization #1420
  • Use the public API for query list of projects, stages, and services instead of connecting directly to configuration-service #1657
  • Notify user of new available Keptn Bridge in UI #1547
  • Filter events in the list of root events #1342
  • Unit tests for Bridge #1486
  • Fixed issue of evaluations without SLO that resulted in a broken HeatMap #2081

Fixed Issues

  • Project with two stages broke after lighthouse run at second stage #1695
  • After keptn configure domain an already exposed bridge was no longer accessible #1752
  • Eventbroker-go crashed with out-of-memory #1901
  • MongoDB performed incomplete read of message header #1907
  • MongoDB failed to start with certain PVs #1519
  • Keptn CLI used wrong Kubernetes Context/Profile #1942
  • Git-upstream fails when doing a keptn update project and changing files in the repo #2125
  • Delivery assistant is not passing labels from previous events #2137
  • OpenShift: Start of api-gateway-nginx failed with permission denied error #1951

Development Process / Testing

  • Integration tests for verifying the implementation of KEP 18 #1965
  • Integration tests for the use-case of scaling a ReplicaSet based on a Prometheus alert #1847
  • Platform/integration test for manual approval use-case #1750
  • Platform/integration test for self-healing use-case #1846
  • Improve integration test for quality gates use-case #1591

Addressed Vulnerability Bulletins

Good to know / Known Limitations

  • Upgrade from 0.6.2 to 0.7: Keptn 0.7 uses Helm 3 while previous Keptn releases rely on Helm 2. To upgrade your Helm releases from Helm 2 to 3, two options are provided:
    1. Job without Helm 3 Upgrade: This option is needed when the cluster contains Helm releases not managed by Keptn. If this job is executed, it is necessary to manually convert the releases from Helm 2 to 3 as explained on
    2. Job with Helm 3 Upgrade: Full automation of Helm upgrade for installations were just Keptn is installed. If this job is executed, all Helm releases on the cluster are converted from Helm 2 to 3 and Tiller will be removed.