| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | f07879916d7c4c7f8059ff9fd3c0006ce9bceb540874e183268a2bf2936df2632c4a3878a613cf2d695a80796e6c3eb52de5e3d83a73c91cb9a0bb5627091bae |
| kubernetes-src.tar.gz | a37a7927224785625e9863c1e2dcbc88943593d003b8d126fee63770e6b8eff122004d0f80e1301de34e8a2d6ce208ec6fa55cad3bbe8631b92e5469f45bd00d |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 22da1d2a217a8de91c1a8c393d17eb5ca81e243a1a3e509f3a40fb91d623670ace4ee87a09218a184aaa2eec4ca9c5478b992b8c6f136c568767d6e9dea493bf |
| kubernetes-client-darwin-arm64.tar.gz | cbc0cafecae18a50f98aaa8b508b1808a50b7a477638dc8699830a9dae7ffa83641f9fdb9f53616b32ebc8df84835fc847ea252c5ebe647c7d3462029a63b7a0 |
| kubernetes-client-linux-386.tar.gz | f7ace756a3b6c56f2620d0ea6236fb94328c0a928094e4be7fbb78990a5771e8628bd93eac34017f3c33505c0248e8a64f933724a5fec6b322cf54dc30901985 |
| kubernetes-client-linux-amd64.tar.gz | 6ff15bed6030c47e2ce90723500f08fa9968413f5b858456d4395bc67ab529b0b523ad0521e03be37664965e2fa588680aa0a5180054bc5cb3bafeef1497029b |
| kubernetes-client-linux-arm.tar.gz | bafe1ca945c41ae671029d5398e564bac0753400ee3a50dc0b4979284c0a905e8c77575d8b64b303e9c776d09c919d27f1f99847390d4e2e1c43be826a8dc1a4 |
| kubernetes-client-linux-arm64.tar.gz | f3bca520625eaf6e6dd9af4cc709ff20bfce4da298a03e0be8835013a95fe0d6a25693d7702a4739c9477f9d49d2492d739718245ff91716fff90f60279ff376 |
| kubernetes-client-linux-ppc64le.tar.gz | e6ea574272cefe9fd6e8eea2bddd89e1d67d0cb560089813e7429f3fb6d98be0c6601f33c8a0b2364d3becfb93c0904c171096ed6cafc4071e08851566d70d82 |
| kubernetes-client-linux-s390x.tar.gz | b67dd572d84382e3f713d56bfb371de379807dca52cc4a1e082d6f4720a12770354ef2c9eac93bfc73bc0ea5f4be293db3b6c03328b94a797c2da17b9c40d9f3 |
| kubernetes-client-windows-386.tar.gz | 0cf4b665f46e36616452916d744367b0ae2238098705b32de79559d06ea551173ab95190a26e87bebc03e67a75dc6a65699be3ef3db12aef82f32b66fd5afb0e |
| kubernetes-client-windows-amd64.tar.gz | 69cbe2b3942ba7d9c66e99f819adca94a9c7b420ad72cfd74407954c23ad70a4e7e76296824c4899f88232cabffe08d364c96af83bdaa538f29fa1303bcda2fa |
| kubernetes-client-windows-arm64.tar.gz | 44b0d1a7904bc2bf754abecb9b43a9efdc7cf700ab18f2564d95d98b4e38fe6d91f066943db7105baea964f86d77ade3b1acd57c7aaf1cdf689660f0d4422960 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 651a8bf34acb6d61c39cc67ae23d9ef18204f95b309561d31f49da26c0c6a1b7585e7d7c2ac2f1522b2c326470a4e1ec9aa0dcf3bb1f66e1a41e6a2286e0aa5f |
| kubernetes-server-linux-arm64.tar.gz | 7f1f58b05c923d860f2daa6d31906faf834584b1560f4eda01ba5499338d07a7f183030ab625557b1f5df50a5f0ea30d97d487e2571c85260e5b88fc3519cd43 |
| kubernetes-server-linux-ppc64le.tar.gz | 3ca2af4a7d68c0d84ef65e69190daeb2392946c87c6b8e84ff8d5cf917c979f0778fc00040d4b471e71b8474ca57ac8fdf786f006260d4403b53f59a203a48f1 |
| kubernetes-server-linux-s390x.tar.gz | dfa172456f98210e614a9a538b9027ba211cc19f6eec22a42d5e89ce12d7f5e7e58dfd3229bb974ecba31ffafdf1a5361aef18b9610a45614a181918d87500db |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 8057197e9354e2e0f48aab18c0ce87e4ea39c1682cfd4c491c2bc83f8881787b09cb0c9b9f4d7bef8fbe53cc4056f5381745dbfde7f7474bb76a2358b8b3953e |
| kubernetes-node-linux-arm64.tar.gz | 70d086c71f6258b1667bcb1efe60c15810b5b76848fdf26781c5a90efb8a78030e9ffb230bb0fd52d994f02b13c0b558c8e8ad3a42b601a0f9440a71cf91be2d |
| kubernetes-node-linux-ppc64le.tar.gz | 2740f6ac0dfeebbe4ba8804b43ec5968997d9137de9a9432861c3e71e614cb84b309da31bde3554f896f829a570c21b833f0af241659ad326fa753a80f185ec4 |
| kubernetes-node-linux-s390x.tar.gz | 9877d5a6cc84569efe30256ba5e8095f38bfa0b11c28892499a12b577b467b516880a33022d88f65263c7ffa2a9a3687ef52cb85fa611e95b14ae0c5b7a79c5c |
| kubernetes-node-windows-amd64.tar.gz | 66b264de5e810bff31c4cf7cc575c3c57fed491fa4e21de7035dad76127e17d5fc88aff9f65277adf0826b255bf9b983f61c91bff2f8386d950f87509db6ec6b |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
- Stopped accepting component configuration for
kube-proxyandkubeletduringkubeadm upgrade plan --config. This was a legacy behavior that was not well supported for upgrades and could be used only at the plan stage to determine if the configuration for these components stored in the cluster needs manual version migration. In the future,kubeadmwill attempt alternative component config migration approaches. (#120788, @chendave) [sig/cluster-lifecycle] kubeadm: a separate "super-admin.conf" file is now deployed. The User inadmin.confis now bound to a new RBAC Groupkubeadm:cluster-adminsthat hascluster-adminClusterRoleaccess. The User insuper-admin.confis now bound to thesystem:mastersbuilt-in super-powers / break-glass Group that can bypass RBAC. Before this change, the defaultadmin.confwas bound tosystem:mastersGroup, which was undesired. Executingkubeadm init phase kubeconfig allor justkubeadm initwill now generate the newsuper-admin.conffile. The cluster admin can then decide to keep the file present on a node host or move it to a safe location.kubadm certs renewwill renew the certificate insuper-admin.confto one year if the file exists; if it does not exist a "MISSING" note will be printed.kubeadm upgrade applyfor this release will migrate this particular node to the two file setup. Subsequent kubeadm releases will continue to optionally renew the certificate insuper-admin.confif the file exists on disk and if renew on upgrade is not disabled.kubeadm join --control-planewill now generate only anadmin.conffile that has the less privileged User. (#121305, @neolit123) [sig/cluster-lifecycle]
- Creation of new
CronJobobjects containingTZorCRON_TZin.spec.schedule, accidentally enabled inv1.22, is now disallowed. Use the.spec.timeZonefield instead, supported inv1.25+clusters in default configurations. See https://kubernetes.io/docs/concepts/workloads/controllers/cron-jobs/#unsupported-timezone-specification for more information. (#116252, @soltysh) [sig/apps] - Removed the networking
alphaAPIClusterCIDR. (#121229, @aojea) [sig/network,sig/apps,sig/cli,sig/testing,sig/cloud-provider]
- '
kube-apiserver: adds--authentication-configflag for readingAuthenticationConfigurationfiles.--authentication-configflag is mutually exclusive with the existing--oidc-*flags.' (#119142, @aramase) [sig/api-machinery,sig/auth,sig/testing] - '
kube-schedulercomponent config (KubeSchedulerConfiguration)kubescheduler.config.k8s.io/v1beta3is removed inv1.29. Migratedkube-schedulerconfiguration files tokubescheduler.config.k8s.io/v1.' (#119994, @SataQiu) [sig/scheduling,sig/testing] - A new sleep action for the
PreStoplifecycle hook was added, allowing containers to pause for a specified duration before termination. (#119026, @AxeZhan) [sig/node,sig/api-machinery,sig/apps,sig/testing] - Added CEL expressions to
v1alpha1 AuthenticationConfiguration. (#121078, @aramase) [sig/api-machinery,sig/auth,sig/testing] - Added Windows support for InPlace Pod Vertical Scaling feature. (#112599, @fabi200123) [SIG Autoscaling, Node, Scalability, Scheduling and Windows] [sig/scalability,sig/scheduling,sig/node,sig/autoscaling,sig/windows]
- Added
ImageMaximumGCAgefield to Kubelet configuration, which allows a user to set the maximum age an image is unused before it's garbage collected. (#121275, @haircommander) [sig/node,sig/api-machinery] - Added
UserNamespacesPodSecurityStandardsfeature gate to enable user namespace support for Pod Security Standards. Enabling this feature will modify all Pod Security Standard rules to allow setting:spec[.*].securityContext.[runAsNonRoot,runAsUser]. This feature gate should only be enabled if all nodes in the cluster support the user namespace feature and have it enabled. The feature gate will not graduate or be enabled by default in future Kubernetes releases. (#118760, @saschagrunert) [SIG API Machinery, Auth, Node and Release] [sig/node,sig/api-machinery,sig/auth,sig/release] - Added
optionalOldSelftox-kubernetes-validationsto support ratcheting CRD schema constraints. (#121034, @alexzielenski) [sig/api-machinery] - Added a new
ServiceCIDRtype that allows to dynamically configure the cluster range used to allocateService ClusterIPsaddresses. (#116516, @aojea) [sig/network,sig/api-machinery,sig/auth,sig/apps,sig/cli,sig/testing] - Added a new
ipModefield to the.statusof Services wheretypeis set toLoadBalancer. The new field is behind theLoadBalancerIPModefeature gate. (#119937, @RyanAoh) [SIG API Machinery, Apps, Cloud Provider, Network and Testing] [sig/network,sig/api-machinery,sig/apps,sig/testing,sig/cloud-provider] - Added options for configuring
nf_conntrack_udp_timeout, andnf_conntrack_udp_timeout_streamvariables of netfilter conntrack subsystem. (#120808, @aroradaman) [sig/network,sig/api-machinery] - Added support for CEL expressions to
v1alpha1 AuthorizationConfigurationwebhookmatchConditions. (#121223, @ritazh) [sig/api-machinery,sig/auth] - Added support for projecting
certificates.k8s.io/v1alpha1ClusterTrustBundle objects into pods. (#113374, @ahmedtd) [sig/storage,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/testing] - Added the
DisableNodeKubeProxyVersionfeature gate. IfDisableNodeKubeProxyVersionis enabled, thekubeProxyVersionfield is not set. (#120954, @HirazawaUi) [sig/node,sig/api-machinery,sig/apps] - Fixed a bug where CEL expressions in CRD validation rules would incorrectly compute a high estimated cost for functions that return strings, lists or maps. The incorrect cost was evident when the result of a function was used in subsequent operations. (#119800, @jpbetz) [SIG API Machinery, Auth and Cloud Provider] [sig/api-machinery,sig/auth,sig/cloud-provider]
- Fixed the API comments for the Job
Readyfield in status. (#121765, @mimowo) [sig/api-machinery,sig/apps] - Fixed the API comments for the
FailIndexJob pod failure policy action. (#121764, @mimowo) [sig/api-machinery,sig/apps] - Go API: the
ResourceRequirementsstruct was replaced withVolumeResourceRequirementsfor use with volumes. (#118653, @pohly) [sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/testing] - Graduated
Job BackoffLimitPerIndexfeature tobeta. (#121356, @mimowo) [sig/apps] - Marked the
onPodConditionsfield as optional inJob's pod failure policy. (#120204, @mimowo) [sig/api-machinery,sig/apps] - Promoted
PodReadyToStartContainerscondition tobeta. (#119659, @kannon92) [sig/node,sig/testing] - The
flowcontrol.apiserver.k8s.io/v1beta3FlowSchemaandPriorityLevelConfigurationAPIs has been promoted toflowcontrol.apiserver.k8s.io/v1, with the following changes: PriorityLevelConfiguration: the.spec.limited.nominalConcurrencySharesfield defaults to30only if the field is omitted (v1beta3 also defaulted an explicit0value to30). Specifying an explicit0value is not allowed in thev1version in v1.29 to ensure compatibility withv1.28API servers. Inv1.30, explicit0values will be allowed in this field in thev1API. Theflowcontrol.apiserver.k8s.io/v1beta3APIs are deprecated and will no longer be served in v1.32. All existing objects are available via thev1APIs. Transition clients and manifests to use thev1APIs before upgrading tov1.32. (#121089, @tkashem) [sig/api-machinery,sig/testing]- The
kube-proxycommand-line documentation was updated to clarify that--bind-addressdoes not actually have anything to do with binding to an address, and you probably don't actually want to be using it. (#120274, @danwinship) [sig/network] - The
kube-schedulerselectorSpreadplugin has been removed, please use thepodTopologySpreadplugin instead. (#117720, @kerthcet) [sig/scheduling] - The
matchLabelKeys/mismatchLabelKeysfeature is introduced to the hard/softPodAffinity/PodAntiAffinity. (#116065, @sanposhiho) [sig/scheduling,sig/api-machinery,sig/apps,sig/testing,sig/cloud-provider] - When updating a CRD, per-expression cost limit check are now skipped for
x-kubernetes-validationsrules of versions that are not mutated. (#121460, @jiahuif) [sig/api-machinery] CSINodeExpandSecretfeature has been promoted toGAin this release and is enabled by default. The CSI drivers can make use of thesecretRefvalues passed inNodeExpansionrequest optionally sent by the CSI Client from this release onwards. (#121303, @humblec) [sig/storage,sig/api-machinery,sig/apps]NodeStageVolumecalls will now be retried if the CSI node driver is not running. (#120330, @rohitssingh) [sig/storage,sig/apps,sig/testing]PersistentVolumeLastPhaseTransitionTimeis now beta and enabled by default. (#120627, @RomanBednar) [sig/storage]ValidatingAdmissionPolicytype checking now supports CRDs and API extensions types. (#119109, @jiahuif) [sig/api-machinery,sig/auth,sig/apps,sig/testing]kube-apiserver: added--authorization-configflag for reading a configuration file containing anapiserver.config.k8s.io/v1alpha1 AuthorizationConfigurationobject. The--authorization-configflag is mutually exclusive with--authorization-modesand--authorization-webhook-*flags. ThealphaStructuredAuthorizationConfigurationfeature flag must be enabled for--authorization-configto be specified. (#120154, @palnabarun) [sig/api-machinery,sig/auth,sig/testing]kube-proxynow has a new nftables-based mode, available by running
kube-proxy --feature-gates NFTablesProxyMode=true --proxy-mode nftables
This is currently an alpha-level feature and while it probably will not eat your data, it may nibble at it a bit. (It passes e2e testing but has not yet seen real-world use.)
At this point it should be functionally mostly identical to the iptables
mode, except that it does not (and will not) support Service NodePorts on
127.0.0.1. (Also note that there are currently no command-line arguments
for the nftables-specific config; you will need to use a config file if
you want to set the equivalent of any of the --iptables-xxx options.)
As this code is still very new, it has not been heavily optimized yet; while it is expected to eventually have better performance than the iptables backend, very little performance testing has been done so far. (#121046, @danwinship) [sig/network,sig/api-machinery]
kube-proxy: Added an option/flag for configuring thenf_conntrack_tcp_be_liberalsysctl (in the kernel's netfilter conntrack subsystem). When enabled,kube-proxywill not install theDROPrule for invalid conntrack states, which currently breaks users of asymmetric routing. (#120354, @aroradaman) [sig/network,sig/api-machinery]
- '
kubeadm: added validation to verify that theCertificateKeyis a valid hex encoded AES key.' (#120064, @SataQiu) [sig/cluster-lifecycle] - A customizable
OrderedScoreFuncs()function was introduced. Out-of-tree plugins that used the scheduler's preemption interface could implement this function for custom preemption preferences or return nil to keep the current behavior. (#121867, @lianghao208) [sig/scheduling] - Added
apiextensions_apiserver_update_ratcheting_timemetric for tracking time taken during requests by featureCRDValidationRatcheting. (#121462, @alexzielenski) [sig/api-machinery] - Added
apiserver_envelope_encryption_dek_cache_filledto measure number of records in data encryption key (DEK) cache. (#119878, @ritazh) [sig/api-machinery,sig/auth] - Added
apiserver_watch_list_duration_secondsmetrics which will measure response latency distribution in seconds for watchlist requests broken by group, version, resource and scope. (#120490, @p0lyn0mial) [sig/api-machinery,sig/instrumentation] - Added
job_pods_creation_totalmetrics for tracking Pods created by the Job controller labeled by events which triggered the Pod creation. (#121481, @dejanzele) [sig/apps,sig/testing] - Added
kubectl node drainhelper callbacksOnPodDeletionOrEvictionStartedandOnPodDeletionOrEvictionFailed; people extendingkubectlcan use these new callbacks for more granularity. Deprecated theOnPodDeletedOrEvictednode drain helper callback. (#117502, @adilGhaffarDev) [sig/cli] - Added a new
--init-onlycommand line flag tokube-proxy. Setting the flag makeskube-proxyperform its initial configuration that requires privileged mode, and then exit. The--init-onlymode is intended to be executed in a privileged init container, so that the main container may run with a strictersecurityContext. (#120864, @uablrek) [SIG Network and Scalability] [sig/network,sig/scalability] - Added a new scheduler metric,
pod_scheduling_sli_duration_seconds, and started the deprecation forpod_scheduling_duration_seconds. (#119049, @helayoty) [sig/scheduling,sig/instrumentation,sig/testing] - Added a return value to
QueueingHintto indicate an error. IfQueueingHintreturns an error, the scheduler logs it and treats the event as aQueueAfterBackoffso that the Pod won't be stuck in the unschedulable pod pool. (#119290, @carlory) [sig/scheduling,sig/node,sig/testing] - Added apiserver identity to the following metrics:
apiserver_envelope_encryption_key_id_hash_total,apiserver_envelope_encryption_key_id_hash_last_timestamp_seconds,apiserver_envelope_encryption_key_id_hash_status_last_timestamp_seconds,apiserver_encryption_config_controller_automatic_reload_failures_total,apiserver_encryption_config_controller_automatic_reload_success_total,apiserver_encryption_config_controller_automatic_reload_last_timestamp_seconds.
Fixed bug to surface events for the following metrics: apiserver_encryption_config_controller_automatic_reload_failures_total, apiserver_encryption_config_controller_automatic_reload_last_timestamp_seconds, apiserver_encryption_config_controller_automatic_reload_success_total. (#120438, @ritazh) [sig/api-machinery,sig/auth,sig/instrumentation,sig/testing]
- Added container filesystem to the
ImageFsInfoResponse. (#120914, @kannon92) [sig/node,sig/testing] - Added multiplication functionality to
Quantity. (#117411, @tenzen-y) [sig/api-machinery] - Added new feature gate called
RuntimeClassInImageCriApito addresskubeletchanges needed for KEP 4216. Noteable changes:
- Populate new
RuntimeHandlerfield in CRI'sImageSpecstruct during image pulls from container runtimes. - Pass
runtimeHandlerfield inRemoveImage()call to container runtime inkubelet's image garbage collection. (#121456, @kiashok) [sig/node,sig/windows]
- Added support for split image filesystem in kubelet. (#120616, @kannon92) [sig/node,sig/testing]
- Bumped
cel-gotov0.17.7and introduced setextlibrary with new options. (#121577, @cici37) [sig/api-machinery,sig/auth,sig/cloud-provider] - Bumped
distroless-iptablesto0.3.2based on Go1.21.1. (#120527, @cpanato) [sig/testing] - Bumped
distroless-iptablesto0.3.3based on Go1.21.2. (#121073, @cpanato) [sig/testing] - Bumped
distroless-iptablesto0.4.1based on Go1.21.3. (#121216, @cpanato) [sig/testing] - Bumped distroless-iptables to 0.4.1 based on Go
1.21.3. (#121871, @cpanato) [sig/testing] - CEL can now correctly handle a CRD
openAPIV3Schemathat has neitherPropertiesnorAdditionalProperties. (#121459, @jiahuif) [sig/api-machinery,sig/testing] - CEL cost estimator no longer treats enums as unbounded strings when determining its length. Instead, the length is set to the longest possible enum value. (#121085, @jiahuif) [SIG API Machinery] [sig/api-machinery]
- CRI: image pull per runtime class is now supported. (#121121, @kiashok) [sig/node,sig/windows]
- Certain
requestBodyparameters in the OpenAPIv3are now correctly marked as required. (#120735, @Jefftree) [sig/network,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/architecture,sig/cloud-provider] - Changed
kubectl helpto display basic details for subcommands from plugins. (#116752, @xvzf) [sig/cli] - Changed the
KMSv2KDFfeature gate to be enabled by default. (#120433, @enj) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] - Client-side apply will now use OpenAPI
v3by default. (#120707, @Jefftree) [sig/api-machinery,sig/cli] - Decoding etcd's response now respects the timeout context. (#121614, @HirazawaUi) [sig/api-machinery]
- Decoupled
TaintManagerfromNodeLifeCycleController(KEP-3902). (#119208, @atosatto) [sig/scheduling,sig/node,sig/api-machinery,sig/apps,sig/instrumentation,sig/testing] - Enabled traces for KMSv2 encrypt/decrypt operations. (#121095, @aramase) [sig/api-machinery,sig/auth,sig/instrumentation,sig/testing,sig/architecture]
- Fixed
kube-proxypanicking on exit when theNodeobject changed itsPodCIDR. (#120375, @pegasas) [sig/network] - Fixed bugs in handling of server-side apply, create, and update API requests for objects containing duplicate items in keyed lists.
- A
createorupdateAPI request with duplicate items in a keyed list no longer wipes out managedFields. Examples include env var entries with the same name, or port entries with the same containerPort in a pod spec. - A server-side apply request that makes unrelated changes to an object which has duplicate items in a keyed list no longer fails, and leaves the existing duplicate items as-is.
- A server-side apply request that changes an object which has duplicate items in a keyed list, and modifies the duplicated item removes the duplicates and replaces them with the single item contained in the server-side apply request. (#121575, @apelisse) [sig/network,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/testing,sig/architecture,sig/cloud-provider]
- Fixed overriding default
KubeletConfigfields in drop-in configs if not set. (#121193, @sohankunkerkar) [sig/node,sig/testing] - Graduated API List chunking (aka pagination) feature to
stable. (#119503, @wojtek-t) [sig/api-machinery,sig/testing,sig/cloud-provider] - Graduated the
ReadWriteOncePodfeature gate toGA. (#121077, @chrishenzie) [sig/scheduling,sig/storage,sig/node,sig/apps,sig/testing] - Graduated the following kubelet resource metrics to general availability:
container_cpu_usage_seconds_totalcontainer_memory_working_set_bytescontainer_start_time_secondsnode_cpu_usage_seconds_totalnode_memory_working_set_bytespod_cpu_usage_seconds_totalpod_memory_working_set_bytesresource_scrape_error
Deprecated (renamed) scrape_error in favor of resource_scrape_error (#116897, @Richabanker) [SIG Architecture, Instrumentation, Node and Testing] [sig/node,sig/instrumentation,sig/testing,sig/architecture]
- Implemented API for streaming for the
etcdstore implementation. WhensendInitialEvents ListOptionis set together withwatch=true, it begins the watch stream with synthetic init events followed by a syntheticBookmark, after which the server continues streaming events. (#119557, @p0lyn0mial) [sig/api-machinery] - Improved memory usage of
kube-schedulerby dropping the.metadata.managedFieldsfield thatkube-schedulerdoesn't require. (#119556, @linxiulei) [sig/scheduling] - In a scheduler with
Permitplugins, when a Pod is rejected duringWaitOnPermit, the scheduler records the plugin. The scheduler will use the record to honor cluster events and queueinghints registeredfor the plugin, to inform whether to retry the pod. (#119785, @sanposhiho) [sig/scheduling,sig/testing] - In-tree cloud providers are now switched off by default. Please use
DisableCloudProvidersandDisableKubeletCloudCredentialProviderfeature flags if you still need this functionality. (#117503, @dims) [sig/api-machinery,sig/testing,sig/cloud-provider] - Introduced new apiserver metric
apiserver_flowcontrol_current_inqueue_seats. This metric is analogous toapiserver_flowcontrol_current_inqueue_requests, but tracks the total number of seats, as each request can take more than one seat. (#119385, @andrewsykim) [sig/api-machinery] - Introduced the
job_finished_indexes_totalmetric for theBackoffLimitPerIndexfeature. (#121292, @mimowo) [sig/apps,sig/testing] - Kubeadm: supported updating certificate organization during
kubeadm certs renewoperation. (#121841, @SataQiu) [sig/cluster-lifecycle] - Kubernetes is now built with Go
1.21.0. (#118996, @cpanato) [sig/testing,sig/release] - Kubernetes is now built with Go
1.21.1. (#120493, @cpanato) [sig/testing,sig/release] - Kubernetes is now built with Go
1.21.2. (#121021, @cpanato) [sig/testing,sig/release] - Kubernetes is now built with Go
1.21.4. (#121808, @cpanato) [sig/network,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/testing,sig/release,sig/architecture,sig/cloud-provider] - Kubernetes is now built with Go
v1.21.3. (#121149, @cpanato) [sig/testing,sig/release] - List of metric labels can now be configured by supplying a manifest using the
--allow-metric-labels-manifestflag. (#118299, @rexagod) [sig/instrumentation,sig/architecture] - Listed the pods using
<PVC>as an ephemeral storage volume in "Used by:" part of the output ofkubectl describe pvc <PVC>command. (#120427, @MaGaroo) [sig/cli] - Migrated the
nodevolumelimitsscheduler plugin to use contextual logging. (#116884, @mengjiao-liu) [sig/scheduling,sig/storage,sig/node,sig/instrumentation,sig/testing] - Migrated the
volumebinding scheduler pluginsto use contextual logging. (#116803, @mengjiao-liu) [sig/scheduling,sig/storage,sig/instrumentation] - Priority and Fairness feature is now
stable, the feature gate will be removed inv1.31. (#121638, @tkashem) [sig/api-machinery,sig/testing] - Promoted
PodHostIPscondition tobeta. (#120257, @wzshiming) [sig/network,sig/node,sig/testing] - Promoted
PodHostIPscondition tobeta. (#121477, @wzshiming) [sig/network,sig/testing] - Promoted
PodReplacementPolicytobeta. (#121491, @dejanzele) [sig/apps,sig/testing] - Promoted
ServiceNodePortStaticSubrangeto stable and lock to default. (#120233, @xuzhenglun) [sig/network] - Promoted plugin subcommand resolution feature to
beta. (#120663, @ardaguclu) [sig/cli,sig/testing] - Removed
/livezlivezchecks for KMS v1 and v2 to ensure KMS health does not causekube-apiserverrestart. KMS health checks are still in place as a healthz and readiness checks. (#120583, @ritazh) [sig/api-machinery,sig/auth,sig/testing] - Restartable init containers resource in pod autoscaler are now calculated. (#120001, @qingwave) [sig/autoscaling,sig/apps]
- Sidecar termination is now serialized and each sidecar container will receive a
SIGTERMafter all main containers and later starting sidecar containers have terminated. (#120620, @tzneal) [sig/node,sig/testing] - The CRD validation rule with feature gate
CustomResourceValidationExpressionswas promoted toGA. (#121373, @cici37) [sig/api-machinery,sig/testing] - The KMSv2 features with feature gates
KMSv2andKMSv2KDFare promoted toGA. TheKMSv1feature gate is now disabled by default. (#121485, @ritazh) [sig/api-machinery,sig/auth,sig/testing] - The
--interactiveflag inkubectl deleteis now visible to all users by default. (#120416, @ardaguclu) [sig/cli,sig/testing] - The
CloudDualStackNodeIPsfeature is nowbeta, meaning that when using an external cloud provider that has been updated to support the feature, you can pass comma-separated dual-stack--node-ipstokubeletand have the cloud provider take both IPs into account. (#120275, @danwinship) [sig/network,sig/api-machinery,sig/cloud-provider] - The
Dockerfilefor the kubectl image has been updated with the addition of a specific base image and essential utilities (bash and jq). (#119592, @rayandas) [sig/node,sig/cli,sig/testing,sig/release] - The
SidecarContainersfeature has graduated tobetaand is enabled by default. (#121579, @gjkim42) [sig/node] - The
kube-apiserverwill now expose four new metrics to inform about errors on the clusterIP and nodePort allocation logic. (#120843, @aojea) [sig/network,sig/instrumentation] - The
volume_zoneplugin will considerbetalabels asGAlabels during the scheduling process. Therefore, if the values of the labels are the same, PVs withbetalabels can also be scheduled to nodes withGAlabels. (#118923, @AxeZhan) [sig/scheduling] - Updated the generic apiserver library to produce an error if a new API server is configured with support for a data format other than JSON, YAML, or Protobuf. (#121325, @benluddy) [SIG API Machinery] [sig/api-machinery]
- Use of secret-based service account tokens now adds an
authentication.k8s.io/legacy-token-autogenerated-secretorauthentication.k8s.io/legacy-token-manual-secretaudit annotation containing the name of the secret used. (#118598, @yuanchen8911) [SIG Auth, Instrumentation and Testing] [sig/auth,sig/instrumentation,sig/testing] --sync-frequencywill not affect the update interval of volumes that useConfigMapsorSecretswhen theconfigMapAndSecretChangeDetectionStrategyis set toCache. The update interval is only affected bynode.alpha.kubernetes.io/ttlnode annotation." (#120255, @likakuli) [sig/node]CRDValidationRatcheting: added support for ratchetingx-kubernetes-validationsin schema. (#121016, @alexzielenski) [sig/api-machinery]DevicePluginCDIDevicesfeature has been graduated tobetaand enabled by default in the kubelet. (#121254, @bart0sh) [sig/node]ValidatingAdmissionPolicynow preserves types of composition variables, and raises type-related errors early. (#121001, @jiahuif) [sig/api-machinery,sig/testing]cluster/gce: added webhook to replacePersistentVolumeLabeladmission controller. (#121628, @andrewsykim) [sig/cloud-provider]dra: the scheduler plugin now avoids additional scheduling attempts in some cases by falling back to SSA after a conflict. (#120534, @pohly) [sig/scheduling,sig/node,sig/testing]etcd: image is now based onv3.5.9. (#121567, @mzaian) [sig/api-machinery]kube-apiserveradded:alphasupport (guarded by theServiceAccountTokenJTIfeature gate) for adding ajti(JWT ID) claim to service account tokens it issues, adding anauthentication.kubernetes.io/credential-idaudit annotation in audit logs when the tokens are issued, andauthentication.kubernetes.io/credential-identry in the extra user info when the token is used to authenticate.alphasupport (guarded by theServiceAccountTokenPodNodeInfofeature gate) for including the node name (and uid, if the node exists) as additional claims in service account tokens it issues which are bound to pods, andauthentication.kubernetes.io/node-nameandauthentication.kubernetes.io/node-uidextra user info when the token is used to authenticate.alphasupport (guarded by theServiceAccountTokenNodeBindingfeature gate) for allowingTokenRequeststhat bind tokens directly to nodes, and (guarded by the ServiceAccountTokenNodeBindingValidation feature gate) for validating the node name and uid still exist when the token is used. (#120780, @munnerz) [sig/api-machinery,sig/auth,sig/apps,sig/cli,sig/testing]kube-controller-manager: TheLegacyServiceAccountTokenCleanUpfeature gate is nowbetaand enabled by default. When enabled, legacy auto-generated service account token secrets are auto-labeled with akubernetes.io/legacy-token-invalid-sincelabel if the credentials have not been used in the time specified by--legacy-service-account-token-clean-up-period(defaulting to one year), and are referenced from the.secretslist of a ServiceAccount object, and are not referenced from pods. This label causes the authentication layer to reject use of the credentials. After being labeled as invalid, if the time specified by--legacy-service-account-token-clean-up-period(defaulting to one year) passes without the credential being used, the secret is automatically deleted. Secrets labeled as invalid which have not been auto-deleted yet can be re-activated by removing thekubernetes.io/legacy-token-invalid-sincelabel. (#120682, @yt2985) [sig/auth,sig/apps,sig/testing]kube-proxywill only install theDROPrules for invalidconntrackstates if thenf_conntrack_tcp_be_liberalis not set. (#120412, @aojea) [sig/network]kube-schedulerimplemented scheduling hints for theNodeUnschedulableplugin. The scheduling hints allow the scheduler to only retry scheduling aPodthat was previously rejected by theNodeSchedulableplugin if a newNodeor aNodeupdate sets.spec.unschedulableto false. (#119396, @wackxu) [sig/scheduling]kube-schedulerimplements scheduling hints for theNodeAffinityplugin. The scheduling hints allow the scheduler to only retry scheduling aPodthat was previously rejected by theNodeAffinityplugin if a newNodeor aNodeupdate matches thePod's node affinity. (#119155, @carlory) [sig/scheduling]kubeadm: promoted feature gateEtcdLearnerModetobeta. Learner mode for joiningetcdmembers is now enabled by default. (#120228, @pacoxu) [sig/cluster-lifecycle]kubeadm: turned on feature gateMergeCLIArgumentsWithConfigto merge the config from flag and config file, otherwise, if the flag--ignore-preflight-errorsis set from the CLI, then the value from config file will be ignored. (#119946, @chendave) [sig/cluster-lifecycle]kubeadm: will now allow deploying a kubelet that is 3 versions older than the version ofkubeadm(N-3). This aligns with the recent change made by SIG Architecture that extends the support skew between the control plane and kubelets. Tolerate this new kubelet skew for the commandsinit,joinandupgrade. Note that if thekubeadmuser applies a control plane version that is older than thekubeadmversion (N-1 maximum) then the skew between the kubelet and control plane would become a maximum of N-2. (#120825, @pacoxu) [sig/cluster-lifecycle]kubelet, when using--cloud-provider=external, will now initialize the node addresses with the value of--node-ip, if it exists, or waits for the cloud provider to assign the addresses. (#121028, @aojea) [sig/node,sig/cloud-provider]kubeletallows pods to use thenet.ipv4.tcp_fin_timeout, “net.ipv4.tcp_keepalive_intvl” and “net.ipv4.tcp_keepalive_probes“ sysctl by default; Pod Security Admission allows this sysctl inv1.29+versions of the baseline and restricted policies. (#121240, @HirazawaUi) [sig/node,sig/auth]kubeletnow allows pods to use thenet.ipv4.tcp_keepalive_timesysctl by default and the minimal kernel version is 4.5; Pod Security Admission allows this sysctl inv1.29+versions of the baseline and restricted policies. (#118846, @cyclinder) [sig/network,sig/node,sig/auth]kubeletnow emits a metric for end-to-end pod startup latency, including image pull. (#121041, @ruiwen-zhao) [sig/node]kubeletnow exposes latency metrics of different stages of the node startup. (#118568, @qiutongs) [sig/scalability,sig/node,sig/instrumentation]
- Added descriptions and examples for the situation of using
kubectl rollout restartwithout specifying a particular deployment. (#120118, @Ithrael) [sig/cli] - When the kubelet fails to assign CPUs to a Pod because there less available CPUs than the Pod requests, the error message changed from
not enough cpus available to satisfy requesttonot enough cpus available to satisfy request: <num_requested> requested, only <num_available> available. (#121059, @matte21) [sig/node]
- Added mock framework support for unit tests for Windows in
kubeproxy. (#120105, @princepereira) [sig/network,sig/windows] - DRA: when the scheduler had to deallocate a claim after a node became unsuitable for a pod, it might have needed more attempts than really necessary. This was fixed by first disabling allocations. (#120428, @pohly) [sig/scheduling,sig/node]
- E2e framework: retrying after intermittent
apiserverfailures was fixed inWaitForPodsResponding(#120559, @pohly) [sig/testing] - KCM specific args can be passed with
/clusterscript, without affecting CCM. New variable name:KUBE_CONTROLLER_MANAGER_TEST_ARGS. (#120524, @jprzychodzen) [SIG Cloud Provider] [sig/cloud-provider] k8s.io/dynamic-resource-allocation: DRA drivers updating to this release are compatible with Kubernetesv1.27andv1.28. (#120868, @pohly) [sig/node]
- '
kubeadm: printing the default component configs forresetandjoinis now unsupported.' (#119346, @chendave) [sig/cluster-lifecycle] - '
kubeadm: removedsystem:mastersorganization frometcd/healthcheck-clientcertificate.' (#119859, @SataQiu) [sig/cluster-lifecycle] - Added
CAP_NET_RAWto netadmin debug profile and removed privileges when debugging nodes. (#118647, @mochizuki875) [sig/cli,sig/testing] - Added a check on a user attempting to create a static pod via the
kubeletwithout specifying a name. They will now get a visible validation error. (#119522, @YTGhost) [sig/node] - Added a redundant process to remove tracking finalizers from Pods that belong to Jobs. The process kicks in after the control plane marks a Job as finished. (#119944, @Sharpz7) [sig/apps]
- Added more accurate requeueing in scheduling queue for Pods rejected by the temporal failure (e.g., temporal failure on
kube-apiserver). (#119105, @sanposhiho) [sig/scheduling,sig/testing] - Allowed specifying
ExternalTrafficPolicyforServiceswithExternalIPs. (#119150, @tnqn) [sig/network,sig/api-machinery,sig/apps,sig/cli,sig/testing,sig/release,sig/cloud-provider] - Changed kubelet logs from
errortoinfofor uncached partitions when using CRI stats provider. (#100448, @saschagrunert) [sig/node] - Empty values are no longer assigned to undefined resources (CPU or memory) when storing the resources allocated to the pod in checkpoint. (#117615, @aheng-ch) [sig/node]
- Fixed CEL estimated cost of
replace()to handle a zero length replacement string correctly. Previously this would cause the estimated cost to be higher than it should be. (#120097, @jpbetz) [SIG API Machinery] [sig/api-machinery] - Fixed OpenAPI v3 not being cleaned up after deleting
APIServices. (#120108, @tnqn) [sig/api-machinery,sig/testing] - Fixed 121094 by re-introducing the readiness predicate for
externalTrafficPolicy: Localservices. (#121116, @alexanderConstantinescu) [sig/network,sig/cloud-provider] - Fixed
kubectl eventsnot filtering events byGroupVersionfor resources with a full name. (#120119, @Ithrael) [sig/cli,sig/testing] - Fixed
systemLogQueryservice name matching. (#120678, @rothgar) [sig/node] - Fixed a
1.27scheduling regression thatPostFilterplugin may not function if previousPreFilterplugins returnSkip. (#119769, @Huang-Wei) [sig/scheduling,sig/testing] - Fixed a
v1.26regression scheduling bug by ensuring that preemption is skipped when aPreFilterplugin returnsUnschedulableAndUnresolvable. (#119778, @sanposhiho) [sig/scheduling,sig/testing] - Fixed a
v1.28.0regression wherekube-controller-managercan crash whenStatefulSetwithParallelpolicy and PVC labels are scaled up. (#121142, @aleksandra-malinowska) [sig/apps] - Fixed a
v1.28regression around restarting init containers in the right order relative to normal containers. (#120281, @gjkim42) [sig/node,sig/testing] - Fixed a
v1.28regression handling negative index json patches. (#120327, @liggitt) [sig/network,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/architecture,sig/cloud-provider] - Fixed a
v1.28regression in scheduler: a pod with concurrent events could incorrectly get moved to the unschedulable queue where it could get stuck until the next periodic purging after 5 minutes, if there was no other event for it. (#120413, @pohly) [sig/scheduling] - Fixed a bug around restarting init containers in the right order relative to normal containers with
SidecarContainersfeature enabled. (#120269, @gjkim42) [sig/node,sig/testing] - Fixed a bug in the cronjob controller where already created jobs might be missing from the status. (#120649, @andrewsykim) [sig/apps]
- Fixed a bug where
Servicesusing finalizers may hold ontoClusterIPand/orNodePortallocated resources for longer than expected if the finalizer is removed using the status subresource. (#120623, @aojea) [sig/network,sig/testing] - Fixed a bug where an API group's path was not unregistered from the API server's root paths when the group was deleted. (#121283, @tnqn) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing]
- Fixed a bug where containers would not start on
cgroupv2systems whereswapis disabled. (#120784, @elezar) [sig/node] - Fixed a bug where the CPU set allocated to an init container, with containerRestartPolicy of
Always, were erroneously reused by a regular container. (#119447, @gjkim42) [SIG Node and Testing] [sig/node,sig/testing] - Fixed a bug where the device resources allocated to an init container, with
containerRestartPolicyofAlways, were erroneously reused by a regular container. (#120461, @gjkim42) [sig/node,sig/testing] - Fixed a bug where the memory resources allocated to an init container, with containerRestartPolicy of
Always, were erroneously reused by a regular container. (#120715, @gjkim42) [SIG Node] [sig/node] - Fixed a concurrent map access in
TopologyCache'sHasPopulatedHintsmethod. (#118189, @Miciah) [sig/network,sig/apps] - Fixed a regression (
CLIENTSET_PKG: unbound variable) when invoking deprecatedgenerate-groups.shscript. (#120877, @soltysh) [sig/api-machinery] - Fixed a regression in
kube-proxywhere it might refuse to start if given single-stackIPv6configuration options on a node that has bothIPv4andIPv6IPs. (#121008, @danwinship) [sig/network] - Fixed a regression in default configurations, which enabled
PodDisruptionConditionsby default, that prevented the control plane's pod garbage collector from deleting pods that contained duplicated field keys (environmental variables with repeated keys or container ports). (#121103, @mimowo) [sig/scheduling,sig/node,sig/auth,sig/apps,sig/testing] - Fixed a regression in the default
v1.27configurations inkube-apiserver: fixed theAggregatedDiscoveryEndpointfeature (betainv1.27+) to successfully fetch discovery information from aggregated API servers that do not checkAcceptheaders when serving the/apisendpoint. (#119870, @Jefftree) [sig/api-machinery] - Fixed a regression in the kubelet's behavior while creating a container when the
EventedPLEGfeature gate is enabled. (#120942, @sairameshv) [sig/node] - Fixed a regression since
v1.27.0in the scheduler framework when running score plugins. TheskippedScorePluginsnumber might be greater thanenabledScorePlugins, so when initializing a slice thecap(len(skippedScorePlugins) - len(enabledScorePlugins))is negative, which is not allowed. (#121632, @kerthcet) [sig/scheduling] - Fixed a situation when, sometimes, the scheduler incorrectly placed a pod in the
unschedulablequeue instead of thebackoffqueue. This happened when some plugin previously declared the pod asunschedulableand then in a later attempt encounters some other error. Scheduling of that pod then got delayed by up to five minutes, after which periodic flushing moved the pod back into theactivequeue. (#120334, @pohly) [sig/scheduling] - Fixed an issue related to not draining all the pods in a namespace when an empty selector, i.e., "{}," is specified in a Pod Disruption Budget (PDB). (#119732, @sairameshv) [sig/apps]
- Fixed an issue where
StatefulSetmight not restart a pod after eviction or node failure. (#120398, @aleksandra-malinowska) [sig/apps] - Fixed an issue where a
CronJobcould fail to clean up Jobs when theResourceQuotaforJobshad been reached. (#119776, @ASverdlov) [sig/apps] - Fixed an issue where a
StatefulSetmight not restart a pod after eviction or node failure. (#121389, @aleksandra-malinowska) [sig/apps,sig/testing] - Fixed an issue with the
garbagecollectioncontroller registering duplicate event handlers if discovery requests failed. (#117992, @liggitt) [sig/api-machinery,sig/apps] - Fixed attaching volumes after detach errors. Now volumes that failed to detach are not treated as attached. Kubernetes will make sure they are fully attached before they can be used by pods. (#120595, @jsafrane) [sig/storage,sig/apps]
- Fixed bug that kubelet resource metric
container_start_time_secondshad timestamp equal to container start time. (#120518, @saschagrunert) [SIG Instrumentation, Node and Testing] [sig/node,sig/instrumentation,sig/testing] - Fixed inconsistency in the calculation of number of nodes that have an image, which affect the scoring in the
ImageLocalityplugin. (#116938, @olderTaoist) [sig/scheduling] - Fixed issue with incremental id generation for
loadbalancerandendpointinkubeproxymock test framework. (#120723, @princepereira) [sig/network,sig/windows] - Fixed panic in Job controller when
podRecreationPolicy: Failedis used, and the number of terminating pods exceeds parallelism. (#121147, @kannon92) [sig/apps] - Fixed regression with adding aggregated
APIservicespanicking and affected health check introduced in releasev1.28.0. (#120814, @Jefftree) [sig/api-machinery,sig/testing] - Fixed some invalid and unimportant log calls. (#121249, @pohly) [SIG Cloud Provider, Cluster Lifecycle and Testing] [sig/cluster-lifecycle,sig/testing,sig/cloud-provider]
- Fixed stale SMB mount issue when SMB file share is deleted and then unmounted. (#121851, @andyzhangx) [sig/storage]
- Fixed the bug where images that were pinned by the container runtime could be garbage collected by
kubelet. (#119986, @ruiwen-zhao) [sig/node] - Fixed the bug where kubelet couldn't output logs after log file rotated when
kubectl logs POD_NAME -fis running. (#115702, @xyz-li) [sig/node] - Fixed the calculation of the requeue time in the cronjob controller, resulting in proper handling of failed/stuck jobs. (#121327, @soltysh) [sig/apps]
- Fixed the issue where pod with ordinal number lower than the rolling partitioning number was being deleted. It was coming up with updated image. (#120731, @adilGhaffarDev) [sig/apps,sig/testing]
- Fixed tracking of terminating Pods in the Job status. The field was not updated unless there were other changes to apply. (#121342, @dejanzele) [sig/apps,sig/testing]
- Forbidden sysctls for pod sharing the respective namespaces with the host are now checked when creating or updating pods without such sysctls. (#118705, @pacoxu) [sig/node,sig/apps]
- If a watch with the
progressNotifyoption set is to be created, and the registry hasn't provided anewFunc, return an error. (#120212, @p0lyn0mial) [SIG API Machinery] [sig/api-machinery] - Improved handling of jsonpath expressions for
kubectl wait --for. It is now possible to use simple filter expressions which match on a field's content. (#118748, @andreaskaris) [sig/cli,sig/testing] - In the
wait.PollUntilContextTimeoutfunction, ifimmediateis true, the condition will now be invoked before waiting, guaranteeing that the condition is invoked at least once and then wait a interval before executing again. (#119762, @AxeZhan) [sig/api-machinery] - Incorporating feedback on PR #119341 (#120087, @divyasri537) [SIG API Machinery] [sig/api-machinery,sig/api-machinery]
- KCCM: fixed transient node addition and removal caused by #121090 while syncing load balancers on large clusters with a lot of churn. (#121091, @alexanderConstantinescu) [sig/network,sig/network,sig/testing,sig/cloud-provider]
- Kubeadm: changed the "system:masters" Group in the apiserver-kubelet-client.crt certificate Subject to be "kubeadm:cluster-admins" which is a less privileged Group. (#121837, @neolit123) [sig/cluster-lifecycle]
- Metric buckets for
pod_start_duration_secondswere changed to{0.5, 1, 2, 3, 4, 5, 6, 8, 10, 20, 30, 45, 60, 120, 180, 240, 300, 360, 480, 600, 900, 1200, 1800, 2700, 3600}. (#120680, @ruiwen-zhao) [sig/node,sig/instrumentation] - Mitigated http/2 DOS vulnerabilities for
CVE-2023-44487andCVE-2023-39325for the API server when the client is unauthenticated. The mitigation may be disabled by setting theUnauthenticatedHTTP2DOSMitigationfeature gate tofalse(it is enabled by default). An API server fronted by an L7 load balancer that already mitigates these http/2 attacks may choose to disable the kube-apiserver mitigation to avoid disrupting load balancer -> kube-apiserver connections if http/2 requests from multiple clients share the same backend connection. An API server on a private network may opt to disable the kube-apiserver mitigation to prevent performance regressions for unauthenticated clients. Authenticated requests rely on the fix in golang.org/x/netv0.17.0alone. https://issue.k8s.io/121197 tracks further mitigation of http/2 attacks by authenticated clients. (#121120, @enj) [sig/api-machinery] - No-op and GC related updates to cluster trust bundles no longer require attest authorization when the
ClusterTrustBundleAttestplugin is enabled. (#120779, @enj) [sig/auth] - Registered metric
apiserver_request_body_size_bytesto track the size distribution of requests byresourceandverb. (#120474, @YaoC) [SIG API Machinery and Instrumentation] [sig/api-machinery,sig/instrumentation] - Revised the logic for
DaemonSetrolling update to exclude nodes if scheduling constraints are not met. This eliminates the problem of rolling updates to aDaemonSetgetting stuck around tolerations. (#119317, @mochizuki875) [sig/apps,sig/testing] - Scheduler: in 1.29 pre-releases, enabling contextual logging slowed down pod scheduling. (#121715, @pohly) [SIG Instrumentation and Scheduling] [sig/scheduling,sig/instrumentation]
- Service Controller: will now update load balancer hosts after node's
ProviderIDis updated. (#120492, @cezarygerard) [sig/network,sig/cloud-provider] - Setting the
status.loadBalancerof a Service whosespec.typeis notLoadBalancerwas previously allowed, but any update to themetadataorspecwould wipe that field. Setting this field is no longer permitted unlessspec.typeisLoadBalancer. In the very unlikely event that this has unexpected impact, you can enable theAllowServiceLBStatusOnNonLBfeature gate, which will restore the previous behavior. If you do need to set this, please file an issue with the Kubernetes project to help contributors understand why you need it. (#119789, @thockin) [sig/apps,sig/testing] - The
--bind-addressparameter in kube-proxy is misleading, no port is opened with this address. Instead it is translated internally to "nodeIP". The nodeIPs for both families are now taken from the Node object if--bind-addressis unspecified or set to the "any" address (0.0.0.0 or ::). It is recommended to leave--bind-addressunspecified, and in particular avoid to set it to localhost (127.0.0.1 or ::1) (#119525, @uablrek) [SIG Network and Scalability] [sig/network,sig/scalability] - Updated
kube-openapito remove invalid defaults: OpenAPI spec no longer includes default of{}for certain fields where it did not make sense. (#120757, @alexzielenski) [sig/network,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/architecture,sig/cloud-provider] - Updated the CRI-O socket path, so users who configure kubelet to use a location like
/run/crio/crio.sockdon't see strange behaviour from CRI stats provider. (#118704, @dgl) [sig/node] - Volume attach or publish operation will not fail at
kubeletif target path directory already exists on the node. (#119735, @akankshapanse) [sig/storage] cluster-bootstrap: improved the security of the functions responsible for generation and validation of bootstrap tokens. (#120400, @neolit123) [sig/cluster-lifecycle,sig/security]etcd: updated tov3.5.10. (#121566, @mzaian) [sig/api-machinery,sig/cluster-lifecycle,sig/testing,sig/cloud-provider,sig/etcd]k8s.io/dynamic-resource-allocation/controller:UnsuitableNodescan now handle a mix of allocated and unallocated claims correctly. (#120338, @pohly) [sig/node]k8s.io/dynamic-resource-allocation/controller:ResourceClaimParametersandResourceClassParametersvalidation errors are now visible onResourceClaim,ResourceClassandPod. (#121065, @byako) [sig/node]k8s.io/dynamic-resource-allocation: can now handle aselectednode which isn't listed aspotentialnode. (#120871, @pohly) [sig/node]kube-proxynow reports its health more accurately in dual-stack clusters when there are problems with only one IP family. (#118146, @aroradaman) [sig/network,sig/windows]kubeadm: Fixed the bug where it always did CRI detection when--configwas passed, even if it is not required by the subcommand. (#120828, @SataQiu) [sig/cluster-lifecycle]kubeadm: fixednilpointer whenetcdmember is already removed. (#119753, @pacoxu) [sig/cluster-lifecycle]kubeadm: fixed the bug where--image-repositoryflag is missing for some init phase sub-commands. (#120072, @SataQiu) [sig/cluster-lifecycle]kubeadm: improved the logic that checks whether asystemdservice exists. (#120514, @fengxsong) [sig/cluster-lifecycle]kubeadm: will now use universal deserializer to decode static pod. (#120549, @pacoxu) [sig/cluster-lifecycle]kubectl prune v2: Switched annotation fromcontains-group-resourcestocontains-group-kinds, because this is what we defined in the KEP and is clearer to end-users. Although the functionality is inalpha, we will recognize the prior annotation. This migration support will be removed inbeta/GA. (#118942, @justinsb) [sig/cli]kubectlwill not print events if--show-events=falseargument is passed to describe PVC subcommand. (#120380, @MaGaroo) [sig/cli]scheduler: Fixed missing fieldapiVersionfrom events reported by the taint manager. (#114095, @aimuz) [sig/scheduling,sig/node,sig/apps]
- Added automatic download of the CNI binary in
local-up-cluster.sh, facilitating local debugging. (#120312, @HirazawaUi) [sig/network,sig/node] - Added context to
caches populatedlog messages. (#119796, @sttts) [sig/api-machinery] - Changed behavior of
kube-proxyby allowing to setsysctlvalues lower than the existing one. (#120448, @aroradaman) [sig/network] - Cleaned up
kube-apiserverHTTP logs for impersonated requests. (#119795, @sttts) [sig/api-machinery] - Deprecated the
--cloud-providerand--cloud-configCLI parameters in kube-apiserver. These parameters will be removed in a future release. (#120903, @dims) [SIG API Machinery] [sig/api-machinery] - Dynamic resource allocation: will now avoid creating a new gRPC connection for every call of prepare/unprepare resource(s). (#118619, @TommyStarK) [sig/node]
- E2E storage tests: setting test tags like
[Slow]via theDriverInfo.FeatureTagfield is no longer supported. (#121391, @pohly) [sig/storage,sig/testing] - Fixed an issue where the
vspherecloud provider would not trust a certificate if: - The issuer of the certificate was unknown (
x509.UnknownAuthorityError) - The requested name did not match the set of authorized names (
x509.HostnameError) - The error surfaced after attempting a connection contained one of the substrings: "certificate is not trusted" or "certificate signed by unknown authority". (#120736, @MadhavJivrajani) [sig/architecture,sig/cloud-provider]
- Fixed bug where
Adding GroupVersionlog line was constantly repeated without any group version changes. (#119825, @Jefftree) [sig/api-machinery] - Generated
ResourceClaimnames are now more readable because of an additional hyphen before the random suffix (<pod name>-<claim name>-<random suffix>). (#120336, @pohly) [sig/node,sig/apps] - Graduated
JobReadyPodstostable. The feature gate can no longer be disabled. (#121302, @stuton) [sig/apps,sig/testing] - Improved memory usage of
kube-controller-managerby dropping the.metadata.managedFieldsfield thatkube-controller-managerdoesn't require. (#118455, @linxiulei) [sig/api-machinery,sig/cloud-provider] - Lower and upper case feature flag values are now allowed, but the name still has to match. (#121441, @soltysh) [sig/cli]
- Makefile and scripts now respect
GOTOOLCHAINand otherwise ensure./.go-versionis used. (#120279, @BenTheElder) [sig/release] - Migrated the remainder of the scheduler to use contextual logging. (#120933, @mengjiao-liu) [SIG Instrumentation, Scheduling and Testing] [sig/scheduling,sig/instrumentation,sig/testing]
- Optimized
NodeUnschedulableFilter to avoid unnecessary calculations. (#119399, @wackxu) [sig/scheduling] - Previous versions of Kubernetes on Google Cloud required that workloads (e.g. Deployments, DaemonSets, etc.) which used
PersistentDiskvolumes were using them in read-only mode. This validation provided very little value at relatively host implementation cost, and will no longer be validated. If this is a problem for a specific use-case, please set theSkipReadOnlyValidationGCEgate to false to re-enable the validation, and file a Kubernetes bug with details. (#121083, @thockin) [sig/apps] - Previously, the pod name and namespace were eliminated in the event log message. This PR attempts to add the preemptor pod UID in the preemption event message logs for easier debugging and safer transparency. (#119971, @kwakubiney) [SIG Scheduling] [sig/scheduling]
- Promoted to conformance a test that verified that
Servicesonly forward traffic on the port and protocol specified. (#120069, @aojea) [sig/network,sig/testing,sig/architecture] - Removed
GAfeature gate aboutCSIMigrationvSphere. (#121291, @bzsuni) [sig/storage,sig/node,sig/api-machinery] - Removed
GAfeature gate aboutProbeTerminationGracePeriod. (#121257, @bzsuni) [sig/node,sig/testing] - Removed
GAfeature gate forJobTrackingWithFinalizersinv1.28. (#119100, @bzsuni) [sig/apps] - Removed
GAed feature gateTopologyManager. (#121252, @tukwila) [sig/node] - Removed
GAed feature gatesOpenAPIV3. (#121255, @tukwila) [sig/api-machinery,sig/testing] - Removed
GAed feature gatesSeccompDefault. (#121246, @tukwila) [sig/node] - Removed ephemeral container legacy server support for the server versions prior to
1.22. (#119537, @ardaguclu) [sig/cli] - Removed the
CronJobTimeZonefeature gate (the feature is stable and always enabled) - Removed the
JobMutableNodeSchedulingDirectivesfeature gate (the feature is stable and always enabled) - Removed the
LegacyServiceAccountTokenNoAutoGenerationfeature gate (the feature is stable and always enabled) (#120192, @SataQiu) [SIG Apps, Auth and Scheduling] [sig/scheduling,sig/auth,sig/apps] - Removed the
DownwardAPIHugePagesfeature gate (the feature is stable and always enabled) (#120249, @pacoxu) [SIG Apps and Node] [sig/node,sig/apps] - Removed the
GRPCContainerProbefeature gate (the feature is stable and always enabled). (#120248, @pacoxu) [sig/node,sig/api-machinery,sig/cli] - Renamed
apiserver_request_body_sizesmetric toapiserver_request_body_size_bytes. (#120503, @dgrisonnet) [sig/api-machinery] - Set the resolution for the
job_controller_job_sync_duration_secondsmetric from4msto1min. (#120577, @alculquicondor) [sig/apps,sig/instrumentation] - The
horizontalpodautoscalingandclusterrole-aggregationcontrollers now assume theautoscaling/v1andrbac.authorization.k8s.io/v1APIs are available. If you disable those APIs and do not want to run those controllers, exclude them by passing--controllers=-horizontalpodautoscalingor--controllers=-clusterrole-aggregationtokube-controller-manager. (#117977, @liggitt) [SIG API Machinery and Cloud Provider] [sig/api-machinery,sig/cloud-provider] - The metrics controlled by the
ComponentSLIsfeature-gate and served at/metrics/slisare now GA and unconditionally enabled. The feature-gate will be removed inv1.31. (#120574, @logicalhan) [sig/network,sig/scheduling,sig/node,sig/api-machinery,sig/instrumentation,sig/architecture,sig/cloud-provider] - Updated CNI plugins to
v1.3.0. (#119969, @saschagrunert) [sig/node,sig/testing,sig/cloud-provider] - Updated
cri-toolstov1.28.0. (#119933, @saschagrunert) [sig/cloud-provider] - Updated
distroless-iptablesto useregistry.k8s.io/build-image/distroless-iptables:v0.3.1. (#120352, @saschagrunert) [sig/testing,sig/release] - Updated runc to
1.1.10. (#121739, @ty-dc) [sig/node,sig/architecture] - Upgraded
corednstov1.11.1. (#120116, @tukwila) [sig/cluster-lifecycle,sig/cloud-provider] EnqueueExtensionsfrom plugins other thanPreEnqueue,PreFilter,Filter,ReserveandPermitare now ignored. It reduces the number of kinds of cluster events the scheduler needs to subscribe/handle. (#121571, @sanposhiho) [sig/scheduling]GetPodQOS(pod *core.Pod)function now returns the stored value fromPodStatus.QOSClass, if set. To compute/evaluate the value ofQOSClassfrom scratch,ComputePodQOS(pod*core.Pod)must be used. (#119665, @vinaykul) [sig/scheduling,sig/node,sig/api-machinery,sig/apps,sig/cli,sig/testing]RetroactiveDefaultStorageClassfeature gate that graduated to GA inv1.28and was unconditionally enabled has been removed inv1.29. (#120861, @RomanBednar) [sig/storage]Statefulsetnow waits for new replicas in tests when removing.start.ordinal. (#119761, @soltysh) [sig/apps,sig/testing]ValidatingAdmissionPolicyandValidatingAdmissionPolicyBindingobjects are persisted inetcdusing thev1beta1version. Either remove alpha objects, or disable the alphaValidatingAdmissionPolicyfeature in av1.27server before upgrading to av1.28server with the beta feature and API enabled. (#120018, @liggitt) [sig/api-machinery,sig/testing]client-go:k8s.io/client-go/toolsevents and record packages now have new APIs for specifying a context and logger. (#120729, @pohly) [sig/api-machinery,sig/instrumentation]kube-controller-managerhelp now includes controllers behind a feature gate in--controllersflag. (#120371, @atiratree) [sig/api-machinery]kubeadm: removedsystem:mastersorganization fromapiserver-etcd-clientcertificate. (#120521, @SataQiu) [sig/cluster-lifecycle]kubeadm: removed leftover disclaimer that could be seen in thekubeadm init phase certscommand help screen, since the "certs" phase of "init" is no longer alpha. (#121172, @SataQiu) [sig/cluster-lifecycle]kubeadm: updated warning message when swap space is detected. When swap is active on Linux,kubeadmexplains that swap is supported for cgroup v2 only and is beta but disabled by default. (#120198, @pacoxu) [sig/cluster-lifecycle]kubectlwill not support the/swagger-2.0.0.pb-v1endpoint that has been long deprecated. (#119410, @Jefftree) [sig/api-machinery]scheduler: handling of unschedulable pods because aResourceClassis missing is a bit more efficient and no longer relies on periodic retries. (#120213, @pohly) [sig/scheduling,sig/node,sig/testing]