| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 133a1ea99881ac8988b1931908506b8b02e0533c6c6521b67152c00e0ba5c124870a3a5050887827a7d1b1b8cc4b1da9e2b07f76684975585d0947e5d234faa5 |
| kubernetes-src.tar.gz | 2fa409c71ce0f98dc540baa0e5058f751ee982cf0b9dfe4d3ed5eea1331586e7a464a631909889f9c0758d364643718a336816343136b603ef59bdf43c7a30d7 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 20b6c4f9327f4d0b5873429595e2b7bdfec6269e9a39dee69e28ff9f3fd168611f56f378b867c35edc605dac23227b0d95083fdbc676c04f5d8d1142ceff829c |
| kubernetes-client-darwin-arm64.tar.gz | c48d5efa26f8313f535a173201c38896fa9147fd46a7d3a085c70dcbb16391a894d4c4f09ecb6d1d7ed081a7d3fdd8f71afadd0253a55808addb383680ef89b7 |
| kubernetes-client-linux-386.tar.gz | efc91631134a8cdd543d4e9cf429928b0b7abe2f6212f05ea82ad62830caef74aa4b9b090b45d583912de280e13af87b8b20c0d3fc6fbc43b5c99beb5a9ff8db |
| kubernetes-client-linux-amd64.tar.gz | aa5e3a41986e23ad6910eb86e68eb10217db60978dadc88370c669cb9c9e10d1431133cc8f7401b4e9843e0d15120c867f2803121e690ac7c74ee85eabbc13b5 |
| kubernetes-client-linux-arm.tar.gz | aeafc3d539a400e2e1a32ed501aca7e265ed817d0d56acf62f306c26c2be0beac6af88b6478a26df865105a2c13f2006cc1e062189f4b6885814133090228e86 |
| kubernetes-client-linux-arm64.tar.gz | 24158910deed9d09e99e5fb358bd9758de509f344bfb0b1482b2426e26c1e52f7f97657438fa698b51da10c7444699f7addae58ee67b23f38eb175df0e17661a |
| kubernetes-client-linux-ppc64le.tar.gz | b30f3966ab6d2b723956cd400e73a685ea6431230eb1994bbb995af163f6ba7abbda79834dab3f0fc0a6b4a9c9af3582f07689e100841ea012015070cac9cd80 |
| kubernetes-client-linux-s390x.tar.gz | b543accac845a9a8d1fccc62e43d44479247f9ed65d7db7e2fcf0004ee02c7eaf9d10ab977040bf77f4f5171974a1d4d8a1852d93668b1f593ad5f957ba84952 |
| kubernetes-client-windows-386.tar.gz | 2f60547e2e8800df61c57adfb862031e81ba27cba3edeaf483aa8616820561c6ed9b87778b4e81be14545dcaa35bef9d80c817972039357f8e594a6f4edeeb13 |
| kubernetes-client-windows-amd64.tar.gz | a528fdec4aa426f0b72ff96f39727842e6561f4c49e273e6f007934f42ab2992fd75a8fa43c9ae7d9f3345091228d43bc03e3bdf3696d36a56b4fb49d20a6e9d |
| kubernetes-client-windows-arm64.tar.gz | 467dcadaa8b48d45caa0a5aca5669317fd501689e4a90219c701adb5e9f46ce66085dd3800321e2377c775992180d76aae2e2b84a4f7bb50f997198def0dd8e6 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | a9ec9abe6a803d55d56753e1be8549223cd34ebcbec26536cbdc277c5f17a28c4942329e1df01a2bd067b60a0c1c2901e240d5014e9ce445400239bd488582af |
| kubernetes-server-linux-arm64.tar.gz | d05fd68c31f30b1853aa927200ce99fc1e7e67b39803be7508c5591b57e74f3496bcd8b50b84afeabd293f41bc647ea4bcb0bf85a7be5b49e8d2604214e5ccda |
| kubernetes-server-linux-ppc64le.tar.gz | 173d638506736cfd0bd8ffe7719447895068ed3f3c8a20405548f0db6689bcd63a4f226f6b19e35e7696801c338d9071f2f93392c8ec6316617303350cb44cff |
| kubernetes-server-linux-s390x.tar.gz | 80fd0c55c3c1cdbdd47faf9bfcf2f89d36c56bb91c0281c126e8ba84ad36c527f1861646f54dc4258ba6fae0fb8ee23674ed41f811a08758da3fe1337f723748 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 93ae93af2d39bf00747b66f365781c64880b4ca235031a7ecae7a9d017e04df7ca925f8c005b1da49447cf64cb3f1ecc790db460e60cd1f98f34aae1434ad103 |
| kubernetes-node-linux-arm64.tar.gz | 33216af73a02919579985be5d5372ecb305b6fb2013297f3ea36b357d3cf4bce2a07a612e188b76c752aabbe23bdc726645f348f5db43b12893fc80ac65711f3 |
| kubernetes-node-linux-ppc64le.tar.gz | 781df3a7785435ed365949850ef3c4555e3531826907d75e2edf102cdef8950176c17c8dc8ad97077908b12895eb2cf2796e27418252cb790a7876484270d33a |
| kubernetes-node-linux-s390x.tar.gz | 133c8c011e3f0c6094262efa2cd053e96facdfdb603f90eb51b9ee085c082ac82bcd53863cc517f7ae9e219265f8e66e94e4fbdc21ee01b79b72c993792dde5c |
| kubernetes-node-windows-amd64.tar.gz | e5f6dbd19106b4f4d125d048f1351be2b6a06a79622ece31c24a2a27c03268474a42a1b0b85b1de46423a66c0ee9e1060e9bcee709ae1668c7a650b5575ccc76 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
- For metrics
apiserver_cache_list_fetched_objects_total,apiserver_cache_list_returned_objects_total,apiserver_cache_list_totalreplaceresource_prefixlabel with APIgroupandresourcelabels. For metricsetcd_request_duration_seconds,etcd_requests_totalandetcd_request_errors_totalreplacetypelabel with APIresourceandgrouplabel. For metricapiserver_selfrequest_totaladd a APIgrouplabel. For metricsapiserver_watch_events_sizesandapiserver_watch_events_totalreplace APIkindlabel withresourcelabel. For metricsapiserver_request_body_size_bytes,apiserver_storage_events_received_total,apiserver_storage_list_evaluated_objects_total,apiserver_storage_list_fetched_objects_total,apiserver_storage_list_returned_objects_total,apiserver_storage_list_total,apiserver_watch_cache_events_dispatched_total,apiserver_watch_cache_events_received_total,apiserver_watch_cache_initializations_total,apiserver_watch_cache_resource_version,watch_cache_capacity,apiserver_init_events_total,apiserver_terminated_watchers_total,watch_cache_capacity_increase_total,watch_cache_capacity_decrease_total,apiserver_watch_cache_read_wait_seconds,apiserver_watch_cache_consistent_read_total,apiserver_storage_consistency_checks_total,etcd_bookmark_counts,storage_decode_errors_totalextract the API group fromresourcelabel and put it in newgrouplabel. (#131845, @serathius) [SIG API Machinery, Etcd, Instrumentation and Testing] [sig/api-machinery,sig/instrumentation,sig/testing,sig/etcd] - Kubelet: removed the deprecated flag
--cloud-configfrom the command line. (#130161, @carlory) [SIG Cloud Provider, Node and Scalability] [sig/scalability,sig/node,sig/cloud-provider] - Static pods that reference API objects were denied admission by the kubelet so that static pods would not be silently running even after the mirror pod creation failed. (#131837, @sreeram-venkitesh) [SIG Auth, Node and Testing] [sig/node,sig/auth,sig/testing]
- The Scheduling Framework exposed
NodeInfosto the PreFilter plugins. The PreFilter plugins now accepted theNodeInfolist from the arguments. (#130720, @saintube) [SIG Node, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing]
- Apimachinery: Deprecated
MessageCountMapandCreateAggregateFromMessageCountMap. (#132376, @tico88612) [sig/api-machinery] - DRA kubelet: gRPC API graduated to v1, v1beta1 was deprecated starting in 1.34. Updating DRA drivers to the
k8s.io/dynamic-resource-allocation/kubeletpluginhelper from 1.34 added support for both API versions. (#132700, @pohly) [SIG Node and Testing] [sig/node,sig/testing] - Deprecated the
preferencesfield in kubeconfig in favor ofkuberc. (#131741, @soltysh) [SIG API Machinery, CLI, Cluster Lifecycle and Testing] [sig/api-machinery,sig/cluster-lifecycle,sig/cli,sig/testing] - Kubeadm: Consistently prefixed errors with error: when printing them. (#132080, @neolit123) [sig/cluster-lifecycle]
- Kubeadm: Exposed only the non-deprecated klog flags (-v and -vmodule), in line with KEP https://features.k8s.io/2845. (#131647, @carsontham) [sig/cluster-lifecycle]
- [cloud-provider] Respected the
exclude-from-external-load-balancers=falselabel. (#131085, @kayrus) [SIG Cloud Provider and Network] [sig/network,sig/cloud-provider]
- Added
omitemptyandopttag to the APIv1beta2AdminAccess type in theDeviceRequestAllocationResultstruct. (#132338, @PatrickLaabs) [sig/auth] - Added a
runtime.ApplyConfigurationinterface implemented by all generated apply configuration types. (#132194, @alvaroaleman) [SIG API Machinery and Instrumentation] [sig/api-machinery,sig/instrumentation] - Added a detailed event for in-place pod vertical scaling completed, improving cluster management and debugging. (#130387, @shiya0705) [SIG API Machinery, Apps, Autoscaling, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/autoscaling,sig/apps,sig/testing]
- Added a mechanism for configurable container restarts: container-level restart rules. This was an alpha feature behind the
ContainerRestartRulesfeature gate. (#132642, @yuanwang04) [SIG API Machinery, Apps, Node and Testing] [sig/node,sig/api-machinery,sig/apps,sig/testing] - Added a new
FileKeyReffield to containers, allowing them to load variables from files by setting this field.
Introduced the EnvFiles feature gate to govern activation of this functionality. (#132626, @HirazawaUi) [SIG API Machinery, Apps, Node and Testing] [sig/node,sig/api-machinery,sig/apps,sig/testing]
- Added driver-owned fields in
ResourceSliceto mark whether the device was shareable among multiple resource claims (or requests) and to specify how each capacity could be shared between different requests. - Added user-owned fields in
ResourceClaimto specify resource requirements against each device capacity. - Added scheduler-owned field in
ResourceClaim.Statusto specify how much device capacity is reserved for a specific request. - Added an additional identifier to
ResourceClaim.Statusfor the device supports multiple allocations. - Added a new constraint type to enforce uniqueness of specified attributes across all allocated devices. (#132522, @sunya-ch) [SIG API Machinery, Apps, Architecture, CLI, Cluster Lifecycle, Network, Node, Release, Scheduling and Testing] [sig/network,sig/scheduling,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/apps,sig/cli,sig/testing,sig/release,sig/architecture]
- Added new optional APIs in
ResouceSlice.BasicandResourceClaim.Status.AllocatedDeviceStatus. (#130160, @KobayashiD27) [SIG API Machinery, Apps, Architecture, Node, Release, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/apps,sig/testing,sig/release,sig/architecture] - Added support for specifying
controlplaneorclusteregress selectors in JWT authenticators via theissuer.egressSelectorTypefield in theAuthenticationConfiguration.jwtarray. If unset, the previous behavior of using no egress selector is preserved. This functionality requires theStructuredAuthenticationConfigurationEgressSelectorbeta feature gate (enabled by default). (#132768, @enj) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] - Added support in the Kubelet for monitoring the health of devices allocated via Dynamic Resource Allocation (DRA) and report it in the
pod.status.containerStatuses.allocatedResourcesStatusfield. This required the DRA plugin to implement the new v1alpha1NodeHealthgRPC service. This feature was controlled by theResourceHealthStatusfeature gate. (#130606, @Jpsassine) [SIG Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Network, Node, Release, Scheduling, Storage and Testing] [sig/network,sig/scheduling,sig/storage,sig/node,sig/cluster-lifecycle,sig/auth,sig/apps,sig/cli,sig/testing,sig/release,sig/architecture,sig/cloud-provider] - Added support in the kubelet's image pull credential tracking for service account-based verification. When an image was pulled using service account credentials via external credential providers, subsequent Pods using the same service account (UID, name, and namespace) could access the cached image without re-authentication for the lifetime of that service account. (#132771, @aramase) [SIG Auth, Node and Testing] [sig/node,sig/auth,sig/testing]
- Added validation to reject Pods using the
PodLevelResourcesfeature on Windows OS due to lack of support. The API server rejected Pods with pod-level resources and aPod.spec.os.nametargeting Windows. Kubelet on nodes running Windows also rejected Pods with pod-level resources at the admission phase. (#133046, @toVersus) [SIG Apps and Node] [sig/node,sig/apps] - Added warnings when creating headless service with set
loadBalancerIP,externalIPsand/orSessionAffinity. (#132214, @Peac36) [sig/network] - Allowed
pvc.spec.VolumeAttributesClassNameto change from non-nil to nil. (#132106, @AndrewSirenko) [sig/apps] - Allowed setting the
hostnameOverridefield inPodSpecto specify any RFC 1123 DNS subdomain as the pod's hostname. TheHostnameOverridefeature gate was introduced to control enablement of this functionality. (#132558, @HirazawaUi) [SIG API Machinery, Apps, Network, Node and Testing] [sig/network,sig/node,sig/api-machinery,sig/apps,sig/testing] - Changed underlying logic for
Eviction Managerhelper functions. (#132277, @KevinTMtz) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing] - Changed underlying logic to propagate pod-level hugepage cgroup to containers when they did not specify hugepage resources.
- Added validation to enforce the hugepage aggregated container limits to be smaller than or equal to pod-level limits. This was already enforced with the defaulted requests from the specified limits, however it did not make it clear about both hugepage requests and limits. (#131089, @KevinTMtz) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing]
- Corrected the documentation to clarify that
podSelectoris optional and described its default behavior. (#131354, @tomoish) [sig/network] - DRA API: resource.k8s.io/v1alpha3 now only contains DeviceTaintRule. All other types got removed because they became obsolete when introducing the v1beta1 API in 1.32. before updating a cluster where resourceclaims, resourceclaimtemplates, deviceclasses, or resourceslices might have been stored using Kubernetes < 1.32, delete all of those resources before updating and recreate them as needed while running Kubernetes >= 1.32. (#132000, @pohly) [SIG Etcd, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing,sig/etcd]
- DRA: Starting with Kubernetes 1.34, the alpha-level
resource.k8s.io/admin-accesslabel has been updated toresource.kubernetes.io/admin-access. Admins using the alpha feature and updating from 1.33 can set both labels, upgrade, then removeresource.k8s.io/admin-accesswhen no downgrade is going to happen anymore. (#131996, @ritazh) [SIG Node and Testing] [sig/node,sig/testing] - DRA: The scheduler plugin prevented abnormal filter runtimes by timing out after 10 seconds. This was configurable via the plugin configuration's
FilterTimeout. Setting it to zero disabled the timeout and restored the behavior of Kubernetes <= 1.33. (#132033, @pohly) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing] - DRA: When the prioritized list feature was used in a request and the resulting number of allocated devices exceeded the number of allowed devices per claim, the scheduler aborted the attempt to allocate devices early. Previously, it tried to many different combinations, which could take a long time. (#130593, @mortent) [SIG Apps, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/apps,sig/testing]
- DRA: removed support for the v1alpha4 kubelet gRPC API (added in 1.31, superseded in 1.32). DRA drivers using the helper package from Kubernetes >= 1.32 use the v1beta1 API and continue to be supported. (#132574, @pohly) [sig/node]
- Deprecated
StreamingConnectionIdleTimeoutfield of the kubelet config. (#131992, @lalitc375) [sig/node] - Dynamic Resource Allocation: Graduated core functionality to general availability (GA). This newly stable feature uses the structured parameters flavor of DRA. (#132706, @pohly) [SIG API Machinery, Apps, Auth, Autoscaling, Etcd, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/autoscaling,sig/auth,sig/apps,sig/testing,sig/etcd]
- Enabled kube-apiserver support for
PodCertificateRequestandPodCertificateprojected volumes (behind thePodCertificateRequestfeature gate). (#128010, @ahmedtd) [SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Storage and Testing] [sig/storage,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/testing,sig/cloud-provider,sig/etcd] - Extended resources backed by DRA feature allowed cluster operator to specify
extendedResourceNameinDeviceClass, and application operator to continue using extended resources in pod's requests to request for DRA devices matching the DeviceClass.
NodeResourcesFit plugin scoring didn't work for extended resources backed by DRA. (#130653, @yliaog) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/testing]
- Extended the NodePorts scheduling plugin to consider hostPorts used by restartable init containers. (#132040, @avrittrohwer) [SIG Scheduling and Testing] [sig/scheduling,sig/testing]
- Fixed a 1.33 regression that causes a nil panic in kube-scheduler when aggregating resource requested across container's spec and status. (#132895, @yue9944882) [SIG Node and Scheduling] [sig/scheduling,sig/node]
- Fixed prerelease lifecycle for
PodCertificateRequest. (#133350, @carlory) [sig/auth] - Introduced OpenAPI format support for
k8s-short-nameandk8s-long-namein CustomResourceDefinition schemas. (#132504, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/architecture,sig/cloud-provider] - Introduced the
admissionregistration.k8s.io/v1beta1/MutatingAdmissionPolicyAPI type. To enable, enable theMutatingAdmissionPolicyfeature gate (which was off by default) and set--runtime-config=admissionregistration.k8s.io/v1beta1=trueon the kube-apiserver. Note that the default stored version remained alpha in 1.34, and whoever enabled beta during 1.34 needed to run a storage migration yourself to ensure you don't depend on alpha data in etcd. (#132821, @cici37) [SIG API Machinery, Etcd and Testing] [sig/api-machinery,sig/testing,sig/etcd] - Kube-apiserver: Added support for disabling caching of authorization webhook decisions in the
--authorization-configfile. The new fieldscacheAuthorizedRequestsandcacheUnauthorizedRequestscould be set tofalseto prevent caching for authorized or unauthorized requests. See the https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. (#129237, @rfranzke) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Kube-apiserver: Promoted the
StructuredAuthenticationConfigurationfeature gate to GA. (#131916, @aramase) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] - Kube-apiserver: the AuthenticationConfiguration type accepted in
--authentication-configfiles has been promoted toapiserver.config.k8s.io/v1. (#131752, @aramase) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] - Kube-log-runner: Added the
-log-file-sizeparameter to rotate log output into a new file once it reached a certain size. Introduced-log-file-ageto enable automatic removal of old output files, and-flush-intervalto support periodic flushing. (#127667, @zylxjtu) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/autoscaling,sig/auth,sig/apps,sig/windows,sig/cli,sig/instrumentation,sig/testing,sig/release,sig/architecture] - Kubectl: Graduated kuberc support to beta. A
kubercconfiguration file provided a mechanism for customizingkubectlbehavior (distinct from kubeconfig, which configures cluster access across different clients). (#131818, @soltysh) [SIG CLI and Testing] [sig/cli,sig/testing] - Promoted Job Pod Replacement Policy to general availability. The
JobPodReplacementPolicyfeature gate was locked totrueand will be removed in a future Kubernetes release. (#132173, @dejanzele) [SIG Apps and Testing] [sig/apps,sig/testing] - Promoted
MutableCSINodeAllocatableCountto beta. (#132429, @torredil) [sig/storage] - Promoted feature-gate
VolumeAttributesClassto GA - Promoted API
VolumeAttributesClassandVolumeAttributesClassListtostorage.k8s.io/v1. (#131549, @carlory) [SIG API Machinery, Apps, Auth, CLI, Etcd, Storage and Testing] [sig/storage,sig/api-machinery,sig/auth,sig/apps,sig/cli,sig/testing,sig/etcd] - Promoted the
APIServerTracingfeature gate to GA. The--tracing-config-fileflag acceptedTracingConfigurationin versionapiserver.config.k8s.io/v1(with no changes fromapiserver.config.k8s.io/v1beta1). (#132340, @dashpole) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing] - Promoted the
AuthorizeWithSelectorsandAuthorizeNodeWithSelectorsfeature gates to stable and locked on. (#132656, @liggitt) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] - Promoted the
KubeletTracingfeature gate to GA. (#132341, @dashpole) [SIG Instrumentation and Node] [sig/node,sig/instrumentation] - Promoted the
RelaxedEnvironmentVariableValidationfeature gate to GA and locked it in the enabled state by default. (#132054, @HirazawaUi) [SIG Apps, Architecture, Node and Testing] [sig/node,sig/apps,sig/testing,sig/architecture] - Removed an inaccurate statement about requiring ports when the Pod spec
hostNetworkfield was set. (#130994, @BenTheElder) [SIG Network and Node] [sig/network,sig/node] - Removed deprecated
gogoprotocol definitions fromk8s.io/kubelet/pkg/apis/pluginregistrationin favor ofgoogle.golang.org/protobuf. (#132773, @saschagrunert) [sig/node] - Removed deprecated gogo protocol definitions from
k8s.io/cri-apiin favor ofgoogle.golang.org/protobuf. (#128653, @saschagrunert) [SIG API Machinery, Auth, Instrumentation, Node and Testing] [sig/node,sig/api-machinery,sig/auth,sig/instrumentation,sig/testing] - Replaced Boolean-pointer-helper functions with the
k8s.io/utils/ptrimplementations. (#132794, @PatrickLaabs) [SIG API Machinery, Auth, CLI, Node and Testing] [sig/node,sig/api-machinery,sig/auth,sig/cli,sig/testing] - Replaced
boolPtrFnhelper functions with the "k8s.io/utils/ptr" implementation. (#132907, @PatrickLaabs) [sig/architecture] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the apiextensions-apiserver apiextensions. (#132723, @PatrickLaabs) [sig/api-machinery] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the apiserver (1/2). (#132751, @PatrickLaabs) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the component-base. (#132754, @PatrickLaabs) [SIG API Machinery, Architecture, Instrumentation and Scheduling] [sig/scheduling,sig/api-machinery,sig/instrumentation,sig/architecture] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the kube-aggregator apiregistration. (#132701, @PatrickLaabs) [sig/api-machinery] - Simplied validation error message for invalid fields by removing redundant field name. (#132513, @xiaoweim) [SIG API Machinery, Apps, Auth, Node and Scheduling] [sig/scheduling,sig/node,sig/api-machinery,sig/auth,sig/apps]
- Simplied validation error message for required fields by removing redundant messages. (#132472, @xiaoweim) [SIG API Machinery, Apps, Architecture, Auth, Cloud Provider, Network, Node and Storage] [sig/network,sig/storage,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/architecture,sig/cloud-provider]
- The
KubeletServiceAccountTokenForCredentialProvidersfeature was beta and enabled by default. (#133017, @aramase) [SIG Auth and Node] [sig/node,sig/auth] - The
conditionTypeis "oneof" approved/denied check of CertificateSigningRequest's.status.conditionsfield was migrated to declarative validation. If theDeclarativeValidationfeature gate was enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeoverfeature gate was enabled, declarative validation was the primary source of errors for migrated fields. (#133013, @aaron-prindle) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - The fallback behavior of the Downward API's
resourceFieldReffield was updated to account for pod-level resources: if container-level limits were not set, pod-level limits were now used before falling back to node allocatable resources. (#132605, @toVersus) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing] - The validation of
replicasfield in the ReplicationController/scalesubresource has been migrated to declarative validation. If theDeclarativeValidationfeature gate is enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeoverfeature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#131664, @jpbetz) [SIG API Machinery and Apps] [sig/api-machinery,sig/apps] - The validation-gen code generator generated validation code that supported validation ratcheting. (#132236, @yongruilin) [SIG API Machinery, Apps, Auth and Node] [sig/node,sig/api-machinery,sig/auth,sig/apps]
- Updated
IsDNS1123SubdomainWithUnderscoreso that, when it returned an error, it also returned the correct regex information (dns1123SubdomainFmtWithUnderscore). (#132034, @ChosenFoam) [sig/network] - Updated etcd version to v3.6.0. (#131501, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing] [sig/api-machinery,sig/cluster-lifecycle,sig/testing,sig/cloud-provider,sig/etcd]
- Updated the
v1credential provider configuration to include thetokenAttributes.cacheTypefield. This field is required and must be set to eitherServiceAccountorTokenwhen configuring a provider that uses a service account to fetch registry credentials. (#132617, @aramase) [SIG Auth, Node and Testing] [sig/node,sig/auth,sig/testing] - Zero-value
metadata.creationTimestampvalues are now omitted and no longer serialize an explicitnullin JSON, YAML, and CBOR output (#130989, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Scheduling, Storage and Testing] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/apps,sig/cli,sig/instrumentation,sig/testing,sig/architecture,sig/cloud-provider] AppArmorprofiles specified in the Pod or containerSecurityContextwere no longer copied to deprecatedAppArmorannotations (prefixcontainer.apparmor.security.beta.kubernetes.io/). Anything that inspected the deprecated annotations must be migrated to use theSecurityContextfields instead. (#131989, @tallclair) [sig/node]MultiCIDRServiceAllocatorwas locked and enabled by default,DisableAllocatorDualWritewas enabled by default. (#131318, @aojea) [SIG API Machinery, Apps, Architecture, Auth, Etcd, Network and Testing] [sig/network,sig/api-machinery,sig/auth,sig/apps,sig/testing,sig/architecture,sig/etcd]
-
Added 3 new metrics for monitoring async API calls in the scheduler when the
SchedulerAsyncAPICallsfeature gate was enabled: -
scheduler_async_api_call_execution_total: tracks executed API calls by call type and result (success/error) -
scheduler_async_api_call_duration_seconds: histogram of API call execution duration by call type and result -
scheduler_pending_async_api_calls: gauge showing current number of pending API calls in the queue. (#133120, @utam0k) [SIG Release and Scheduling] [sig/scheduling,sig/release] -
Added HPA support to pod-level resource specifications. When the pod-level resource feature was enabled, HPAs configured with
Resourcetype metrics calculated the pod resources frompod.Spec.Resourcesfield, if specified. (#132430, @laoj2) [SIG Apps, Autoscaling and Testing] [sig/autoscaling,sig/apps,sig/testing] -
Added Traffic Distribution field to
kubectl describe serviceoutput (#131491, @tchap) [SIG CLI] [sig/cli] -
Added
SizeBasedListCostEstimatefeature gate that allowed apiserver to estimate sizes of objects to calculate cost of LIST requests. (#132355, @serathius) [SIG API Machinery and Etcd] [sig/api-machinery,sig/etcd] -
Added
apiserver_resource_size_estimate_bytesmetric to API server. (#132893, @serathius) [SIG API Machinery, Etcd and Instrumentation] [sig/api-machinery,sig/instrumentation,sig/etcd] -
Added
started_user_namespaced_pods_totalandstarted_user_namespaced_pods_errors_totalfor tracking the successes and failures in creating pods if a user namespace was requested. (#132902, @haircommander) [SIG Node and Testing] [sig/node,sig/testing] -
Added a
--show-swapoption tokubectl topsubcommands (#129458, @iholder101) [SIG CLI] [sig/cli] -
Added a
container_swap_limit_bytesmetric to expose the swap limit assigned to containers under theLimitedSwapswap behavior. (#132348, @iholder101) [SIG Node and Testing] [sig/node,sig/testing] -
Added a delay to node updates after kubelet startup. A random offset, based on the configured
nodeStatusReportFrequency, helped distribute traffic and load from node status updates more evenly over time. The initial status update could occur up to 50% earlier or later than the regular schedule. (#130919, @mengqiy) [sig/node] -
Added a flag to kubectl version to detect whether a client/server version mismatch was outside the officially supported range. (#127365, @omerap12) [sig/cli]
-
Added a new
PreBindPreFlightfunction to thePreBindPlugininterface. All in-treePreBindplugins have been updated to implementPreBindPreFlightfunction. (#132391, @sanposhiho) [SIG Node, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing] -
Added a warning when alpha metrics are used with emulated versions. (#132276, @michaelasp) [SIG API Machinery and Architecture] [sig/api-machinery,sig/architecture]
-
Added alpha metrics for compatibility versioning (#131842, @michaelasp) [SIG API Machinery, Architecture, Instrumentation and Scheduling] [sig/scheduling,sig/api-machinery,sig/instrumentation,sig/architecture]
-
Added configurable flags to kube-apiserver for coordinated leader election. (#132433, @michaelasp) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing]
-
Added machine readable output options (JSON & YAML) to
kubectl api-resources. (#132604, @dharmit) [SIG Apps, CLI and Network] [sig/network,sig/apps,sig/cli] -
Added memory tracking to scheduler performance tests to help detect memory leaks and monitored memory usage patterns while running
scheduler_perf. (#132910, @utam0k) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] -
Added support for CEL expressions with escaped names in the structured authentication config. Using
[...]to access claims or user data was recommended when names contained characters that would otherwise need escaping. CEL optionals with?could be used where has was not applicable — for example,claims[?"kubernetes.io"]oruser.extra[?"domain.io/foo"]. (#131574, @enj) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] -
Added support for
--cpu,--memoryflag tokubectl autoscale, started deprecating--cpu-precent. (#129373, @googs1025) [sig/cli] -
Added support for a new kubectl output format,
kyaml. KYAML was a strict subset of YAML and should be accepted by any YAML processor. The formatting of KYAML was halfway between JSON and YAML. Because it was more explicit than the default YAML style, it was less error-prone. (#132942, @thockin) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Contributor Experience, Instrumentation, Network, Node, Scheduling, Storage and Testing] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/contributor-experience,sig/auth,sig/cli,sig/instrumentation,sig/testing,sig/architecture,sig/cloud-provider] -
Added the
DetectCacheInconsistencyfeature gate, allowing the API server to periodically verify consistency between itscacheandetcd. Detected inconsistencies reported via theapiserver_storage_consistency_checks_totalmetric and trigger purging of affected cache snapshots. (#132884, @serathius) [SIG API Machinery, Instrumentation and Testing] [sig/api-machinery,sig/instrumentation,sig/testing] -
Added the
SizeBasedListCostEstimatefeature gate (enabled by default), which changes how APF seats are assigned toLISTrequests. With this feature, one seat is assigned per 100KB of data loaded into memory at once during aLISToperation. (#132932, @serathius) [sig/api-machinery] -
Added useful endpoints for kube-apiserver. (#132581, @itssimrank) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing] [sig/network,sig/scheduling,sig/node,sig/api-machinery,sig/instrumentation,sig/testing,sig/architecture]
-
Built Kubernetes using Go 1.24.3. (#131934, @cpanato) [SIG Release and Testing] [sig/testing,sig/release]
-
Built Kubernetes using Go 1.24.4. (#132222, @cpanato) [SIG Release and Testing] [sig/testing,sig/release]
-
Bumped DRA API version to
v1indeviceattributepackage ink8s.io/dynamic-resource-allocation. (#133164, @everpeace) [sig/node] -
Bumped
KubeletCgroupDriverFromCRIto GA and add metric to track out-of-support CRI implementations. (#133157, @haircommander) [SIG Node and Testing] [sig/node,sig/testing] -
CRI API had auth fields in image pulling marked as
debug_redact. (#133135, @SergeyKanzhelev) [sig/node] -
Changed handling of
CustomResourceDefinitionswith unrecognized formats. Writing a schema with an unrecognized format now triggered a warning (the write was still accepted). (#133136, @yongruilin) [sig/api-machinery] -
DRA kubelet: Fixed the kubelet to also clean up
ResourceSlicesin some additional failure scenarios (driver was removed forcibly or crashed and did not restart). (#132058, @pohly) [SIG Node and Testing] [sig/node,sig/testing] -
DRAAdminAccess was enabled by default allowing users to create
ResourceClaimsandResourceClaimTemplatesin privileged mode to grant access to devices that were in use by other users for admin tasks like monitoring health or status of the device. (#133085, @ritazh) [SIG Auth and Node] [sig/node,sig/auth] -
Demoted KEP-5278 feature gates
ClearingNominatedNodeNameAfterBindingandNominatedNodeNameForExpectationto alpha from beta. (#133293, @utam0k) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] -
Deprecated
apiserver_storage_objectsand replaced it withapiserver_resource_objectsmetric using labels consistent with other metrics. (#132965, @serathius) [SIG API Machinery, Etcd and Instrumentation] [sig/api-machinery,sig/instrumentation,sig/etcd] -
Eliminated work when creating Services or understanding port purposes, especially for external resources deployed via Helm charts. (#133018, @rushmash91) [sig/cli]
-
Enabled compact snapshots in the watch cache based on
etcdcompaction events. (#132876, @serathius) [SIG API Machinery and Etcd] [sig/api-machinery,sig/etcd] -
Enabled completion for aliases defined in
kubectlrc. (#131586, @ardaguclu) [sig/cli] -
Ensured memory resizing for Guaranteed QoS pods on static Memory policy configurations was gated by
InPlacePodVerticalScalingExclusiveMemory(defaults:false). (#132473, @pravk03) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing] -
Ensured that non-scheduling related errors (e.g., network errors) did not lengthen the Pod scheduling backoff time. (#128748, @sanposhiho) [SIG Scheduling and Testing] [sig/scheduling,sig/testing]
-
Executed API calls dispatched during pod scheduling asynchronously if the
SchedulerAsyncAPICallsfeature gate was enabled. Out-of-tree plugins usedAPIDispatcherandAPICacherfrom the framework to dispatch their own calls. (#132886, @macsko) [SIG Release, Scheduling and Testing] [sig/scheduling,sig/testing,sig/release] -
Fixed recording the
kubelet_container_resize_requests_totalmetric to include all resize-related updates. (#133060, @natasha41575) [sig/node] -
Graduated
ListFromCacheSnapshotto beta. (#132901, @serathius) [SIG API Machinery and Etcd] [sig/api-machinery,sig/etcd] -
Graduated
PodLevelResourcesfeature to beta and have it on by default. This feature allowed defining CPU and memory resources for an entire pod inpod.spec.resources. (#132999, @ndixita) [sig/node] -
Graduated
PodObservedGenerationTrackingfeature to beta and had it on by default. This feature meant that the top levelstatus.observedGenerationandstatus.conditions[].observedGenerationfields in Pods were populated to reflect themetadata.generationof the podspec at the time that the status or condition was reported. (#132912, @natasha41575) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing] -
Graduated
ResilientWatchCacheInitializationto GA. (#131979, @serathius) [sig/api-machinery] -
Graduated
StreamingCollectionEncodingToJSONandStreamingCollectionEncodingToProtobufto GA. (#132648, @serathius) [sig/api-machinery] -
Graduated configurable endpoints for anonymous authentication using the authentication configuration file to stable. (#131654, @vinayakankugoyal) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing]
-
Graduated relaxed DNS search string validation to GA. For the Pod API,
.spec.dnsConfig.searchesnow allows an underscore (_) where a dash (-) would be allowed, and it allows search strings be a single dot.. (#132036, @adrianmoisey) [SIG Network and Testing] [sig/network,sig/testing] -
Graduated scheduler
QueueingHintsupport to GA (general availability) (#131973, @sanposhiho) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] -
Graduated the WinOverlay feature in the kube-proxy to GA. The WinOverlay feature gate was enabled by default. (#133042, @rzlink) [SIG Network and Windows] [sig/network,sig/windows]
-
Graduated the
ConsistentListFromCacheto GA. (#132645, @serathius) [sig/api-machinery] -
Graduated the
WatchListfeature gate to beta for kube-apiserver and enabledWatchListClientfor KCM. (#132704, @p0lyn0mial) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing] -
Graduated the
WinDSRfeature in the kube-proxy to GA. TheWinDSRfeature gate was enabled by default. (#132108, @rzlink) [SIG Network and Windows] [sig/network,sig/windows] -
If
PreBindPreFlightreturnedSkip, the scheduler didn't run the plugin atPreBind. If anyPreBindPreFlightreturnedSuccess, the scheduler put NominatedNodeName to the pod so that other components (such as the cluster autoscaler) could notice the pod was going to be bound to the node. (#133021, @sanposhiho) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] -
Implemented prioritization of resize requests based on
priorityClassand QoS class when node resources are insufficient to accommodate all pending resize operations. (#132342, @natasha41575) [SIG Node and Testing] [sig/node,sig/testing] -
Included the namespace in the output of
kubectl deletefor better identification of resources. (#126619, @totegamma) [sig/cli] -
Increased APF max seats to 100 for LIST requests. (#133034, @serathius) [sig/api-machinery]
-
Introduced a method
GetPCIeRootAttributeByPCIBusID(pciBusID)for third-party DRA drivers to provide common logic for the standardized device attributeresource.kubernetes.io/pcieRoot. (#132296, @everpeace) [sig/node] -
Kube-apiserver reported the last configuration hash as a label in
-
apiserver_authentication_config_controller_last_config_infometric after successfully loading the authentication configuration file. -
apiserver_authorization_config_controller_last_config_infometric after successfully loading the authorization configuration file. -
apiserver_encryption_config_controller_last_config_infometric after successfully loading the encryption configuration file. (#132299, @aramase) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] -
Kube-apiserver: Each unique set of etcd server overrides specified with
--etcd-servers-overridessurfaced health checks namedetcd-override-<index>andetcd-override-readiness-<index>. These checks were still excluded by the?exclude=etcdand?exclude=etcd-readinessdirectives. (#129438, @pacoxu) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing] -
Kube-apiserver: Previously persisted
CustomResourceDefinitionobjects with an invalid whitespace-onlycaBundlecould serve requests that did not require conversion. (#132514, @tiffanny29631) [sig/api-machinery] -
Kube-apiserver: Promoted the
ExternalServiceAccountTokenSignerfeature to beta, which enabled external signing of service account tokens and fetching of public verifying keys. This was accomplished by enabling the betaExternalServiceAccountTokenSignerfeature gate and specifying the--service-account-signing-endpointflag. The flag value could either be the path to a Unix domain socket on the filesystem, or be prefixed with @ to indicate a Unix domain socket in the abstract namespace. (#131300, @HarshalNeelkamal) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] -
Kube-proxy: Checked whether IPv6 was available on Linux before using it. (#131265, @rikatz) [sig/network]
-
Kubeadm: Added support for ECDSA-P384 as an encryption algorithm type in v1beta4. (#131677, @lalitc375) [sig/cluster-lifecycle]
-
Kubeadm: Fixed an issue where etcd member promotion failed with an error indicating the member was already promoted. (#130782, @BernardMC) [sig/cluster-lifecycle]
-
Kubeadm: graduated the
NodeLocalCRISocketfeature gate to beta and enabed it by default. When its enabled, kubeadm will:
- Generate a
/var/lib/kubelet/instance-config.yamlfile to customize thecontainerRuntimeEndpointfield in per-node kubelet configurations. - Remove the
kubeadm.alpha.kubernetes.io/cri-socketannotation from nodes during upgrade operations. - Remove the
--container-runtime-endpointflag from the/var/lib/kubelet/kubeadm-flags.envfile during upgrades. (#131981, @HirazawaUi) [SIG Cluster Lifecycle] [sig/cluster-lifecycle]
- Kubeadm: graduated the kubeadm specific feature gate
WaitForAllControlPlaneComponentsto GA. The feature gate is was locked to always be enabled and on node initialization kubeadm performed a health check for all control plane components and not only thekube-apiserver. (#132594, @neolit123) [sig/cluster-lifecycle] - Kubeadm: switched the validation check for Linux kernel version to throw warnings instead of errors. (#131919, @neolit123) [SIG Cluster Lifecycle and Node] [sig/node,sig/cluster-lifecycle]
- Kubelet detected terminal CSI volume mount failures due to exceeded attachment limits on the node and marked the Stateful Pod as Failed, allowing its controller to recreate it. This prevented Pods from getting stuck indefinitely in the
ContainerCreatingstate. (#132933, @torredil) [SIG Apps, Node, Storage and Testing] [sig/storage,sig/node,sig/apps,sig/testing] - Kubelet reported a hash of the credential provider configuration via the
kubelet_credential_provider_config_infometric. The hash was exposed in thehashlabel. (#133016, @aramase) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Kubelet: Extended the
--image-credential-provider-configflag to accept a directory path in addition to a single file. When a directory was specified, all .json, .yaml, and .yml files in that directory were loaded and merged in lexicographical order. (#131658, @dims) [SIG Auth and Node] [sig/node,sig/auth] - LeaseLocks could now have custom labels that different holders would overwrite when they became the holder of the underlying lease. (#131632, @DerekFrank) [sig/api-machinery]
- Memory limits could be decreased with a
NotRequiredresize restart policy. When decreasing memory limits,a best-effort check was performed to prevent limits from decreasing below usage and triggering an OOM-kill. (#133012, @tallclair) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing] - Migrated validation in
CertificateSigningRequestto use declarative validation. When theDeclarativeValidationfeature gate is enabled, mismatches with existing validation are reported via metrics. IfDeclarativeValidationTakeoveris enabled, declarative validation becomes the primary source of errors for migrated fields. (#132361, @yongruilin) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Moved Recover from volume expansion failure to GA. (#132662, @gnufied) [SIG Apps, Auth, Node, Storage and Testing] [sig/storage,sig/node,sig/auth,sig/apps,sig/testing]
- Prevented any type of CPU/Memory alignment or hint generation with the Topology Manager from the CPU or Memory Manager when pod-level resources were used in the Pod spec. (#133279, @ffromani) [SIG Node and Testing] [sig/node,sig/testing]
- Promoted Linux node pressure stall information (PSI) metrics to beta. (#132822, @roycaihw) [SIG Node] [sig/node]
- Promoted Windows graceful shutdown feature from alpha to beta. (#133062, @zylxjtu) [sig/windows]
- Promoted the Ordered Namespace Deletion test to Conformance. (#132219, @BenTheElder) [SIG API Machinery, Architecture and Testing] [sig/api-machinery,sig/testing,sig/architecture]
- Promoted the
KubeletPodResourcesDynamicResourcesandKubeletPodResourcesGetfeature gates to beta, which were enabled by default if DRA went to GA. (#132940, @guptaNswati) - Promoted the feature
OrderedNamespaceDeletionto GA. (#131514, @cici37) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing] - Removed "endpoint-controller" and "workload-leader-election" FlowSchemas from the default APF configuration.
migrate the lock type used in the leader election in your workloads from configmapsleases/endpointsleases to leases. (#131215, @tosi3k) [SIG API Machinery, Apps, Network, Scalability and Scheduling] [sig/network,sig/scalability,sig/scheduling,sig/api-machinery,sig/apps]
- Started recording metrics for in-place Pod resize. (#132903, @natasha41575) [sig/node]
- The Kubernetes API server merged selectors built from
matchLabelKeysinto thelabelSelectoroftopologySpreadConstraints, aligning Pod Topology Spread behavior with Inter-Pod Affinity. To prevent breaking existing Pods usingmatchLabelKeys, this scheduler behavior was preserved until v1.34. Upgrades from v1.32 to v1.34 should be done incrementally (v1.32 → v1.33 → v1.34), ensuring Pods created at v1.32 withmatchLabelKeysare scheduled before reaching v1.34. Controllers relying onmatchLabelKeysno longer need to handle them directly and can uselabelSelectorinstead. The new feature gateMatchLabelKeysInPodTopologySpreadSelectorMerge, enabled by default, controls this behavior. (#129874, @mochizuki875) [SIG Apps, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/apps,sig/testing] - The PreferSameTrafficDistribution feature gate is now enabled by default,
enabling the
PreferSameNodetraffic distribution value for Services. (#132127, @danwinship) [SIG Apps and Network] [sig/network,sig/apps] - The new
dra_resource_claims_in_usekubelet metrics reported activeResourceClaims, overall and by driver. (#131641, @pohly) [SIG Architecture, Instrumentation, Node and Testing] [sig/node,sig/instrumentation,sig/testing,sig/architecture] - The scheduler no longer cleared the
nominatedNodeNamefield for Pods. External components, such as Cluster Autoscaler and Karpenter, were responsible for managing this field when needed. (#133276, @macsko) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] - The validation in the CertificateSigningRequest
/statusand/approvalsubresources was migrated to declarative validation. If theDeclarativeValidationfeature gate was enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeoverfeature gate was enabled, declarative validation was the primary source of errors for migrated fields. (#133068, @yongruilin) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Updated
kube-controller-managerevents to support contextual logging. (#128351, @mengjiao-liu) [sig/api-machinery] - Updated pause version to
registry.k8s.io/pause:3.10.1. (#130713, @ArkaSaha30) [SIG Cluster Lifecycle, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/cluster-lifecycle,sig/testing] - Updated the Kubernetes build environment to use Go
1.24.5. (#132896, @cpanato) [SIG Release and Testing] [sig/testing,sig/release] - Updated the built in
system:monitoringrole with permission to access kubelet metrics endpoints. (#132178, @gavinkflam) [SIG Auth] [sig/auth] - When
RelaxedServiceNameValidationfeature gate is enabled, the names of new Services names are validation withNameIsDNSLabel(), relaxing the pre-existing validation. (#132339, @adrianmoisey) [SIG Apps, Network and Testing] [sig/network,sig/apps,sig/testing] - When proxying to an aggregated API server, kube-apiserver used the
EndpointSlicesof theserviceindicated by theAPIServer, rather than using Endpoints.
If you were using the aggregated API server feature, and you were writing out
the endpoints for it by hand (rather than letting kube-controller-manager
generate Endpoints and EndpointSlices for it automatically based on the
Service definition), then you should write out an EndpointSlice object rather
than (or in addition to) an Endpoints object. (#129837, @danwinship) [SIG API Machinery, Network and Testing] [sig/network,sig/api-machinery,sig/testing]
- Whenever a pod was successfully bound to a node, the kube-apiserver cleared the pod's
nominatedNodeNamefield. This prevented stale information from affecting external scheduling components. (#132443, @utam0k) [SIG Apps, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/apps,sig/testing] DRAPrioritizedListwas turned on by default which made it possible to provide a prioritized list of subrequests in aResourceClaim. (#132767, @mortent) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing]PodLifecycleSleepActionwas graduated to GA. (#132595, @AxeZhan) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing]kube-controller-managerreported the following metrics forResourceClaimswith admin access:resourceclaim_controller_creates_totalcount metric with labelsadmin_access(true or false),status(failure or success) to track the total number ofResourceClaimscreation requestsresourceclaim_controller_resource_claimsgauge metric with labelsadmin_access(true or false),allocated(true or false) to track the current number ofResourceClaims. (#132800, @ritazh) [SIG Apps, Auth, Instrumentation and Node] [sig/node,sig/auth,sig/apps,sig/instrumentation]kubeadm: Started using a named portprobe-portfor all probes in the static pod manifests generated bykubeadmfor thekube-apiserver,kube-controller-manager,kube-scheduler, and related components. If probe port values were previously patched usingkubeadmpatches, the corresponding named port under the container’sportsfield must now also be patched. (#132776, @neolit123) [sig/cluster-lifecycle]
- DRA driver helper: Fixed handling of apiserver restart when running on a Kubernetes version which did not support the
resource.k8s.ioversion used by the DRA driver. (#133076, @pohly) [SIG Node and Testing] [sig/node,sig/testing] - Fixed e2e test "[Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits" not to leak Pods and namespaces. (#132674, @jsafrane) [SIG Storage and Testing] [sig/storage,sig/testing]
- Kube-apiserver: The --service-account-signing-endpoint flag now only validates the format of abstract socket names (#131509, @liggitt) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth]
- Added
podSpecvalidation for creatingStatefulSet. (#131790, @chengjoey) [SIG Apps, Etcd and Testing] [sig/apps,sig/testing,sig/etcd] - Checked for newer resize fields when deciding the recovery feature status in the kubelet. (#131418, @gnufied) [sig/storage]
- Clarified help message of
--ignore-not-foundflag. Supported--ignore-not-foundinwatchoperation. (#132542, @gemmahou) [sig/cli] - DRA drivers: the resource slice controller sometimes didn't react properly when kubelet or someone else deleted a recently created ResourceSlice. It incorrectly assumed that the ResourceSlice still exists and didn't recreate it. (#132683, @pohly) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing]
- DRA: Ensured that ResourceClaims requesting a fixed number of devices with
adminAccesswere no longer allocated the same device multiple times. (#131299, @nojnhuh) [sig/node] - Disabled reading of disk geometry before calling expansion for ext and xfs filesystems. (#131568, @gnufied) [sig/storage]
- Ensured objects are transformed prior to storage in
SharedInformersif a transformer is provided andWatchListis activated. (#131799, @valerian-roche) [sig/api-machinery] - Fixed API response for
StorageClassListqueries to return a graceful error message, if the providedResourceVersionis too large. (#132374, @PatrickLaabs) [SIG API Machinery and Etcd] [sig/api-machinery,sig/etcd] - Fixed ReplicationController reconciliation when the
DeploymentReplicaSetTerminatingReplicasfeature gate was enabled. (#131822, @atiratree) [sig/apps] - Fixed a bug in CEL's common.UnstructuredToVal where
==evaluates to false for identical objects when a field is present but the value is null. This bug does not impact the Kubernetes API. (#131559, @jpbetz) [SIG API Machinery] [sig/api-machinery] - Fixed a bug in the Job controller that could result in creating unnecessary Pods for Jobs already marked as finished (either successful or failed). (#130333, @kmala) [SIG Apps and Testing] [sig/apps,sig/testing]
- Fixed a bug that caused an unexpected delay in creating Pods for newly created Jobs. (#132109, @linxiulei) [SIG Apps and Testing] [sig/apps,sig/testing]
- Fixed a bug that caused duplicate validation when updating a ReplicaSet. (#131873, @gavinkflam) [SIG Apps] [sig/apps]
- Fixed a bug that fails to create a replica set when a deployment name is too long. (#132560, @hdp617) [SIG API Machinery and Apps] [sig/api-machinery,sig/apps]
- Fixed a bug that the async preemption feature keeps preemptor pods unnecessarily in the queue. (#133167, @sanposhiho) [SIG Scheduling] [sig/scheduling]
- Fixed a panic issue related to kubectl revision history kubernetes/kubectl#1724 (#130503, @tahacodes) [SIG CLI] [sig/cli]
- Fixed a possible deadlock in the watch client that could happen if the watch was not stopped. (#131266, @karlkfi) [SIG API Machinery] [sig/api-machinery]
- Fixed a regression introduced in 1.33 where some paginated LIST calls fell back to
etcdinstead of being served from cache. (#132244, @hakuna-matatah) [sig/api-machinery] - Fixed an incorrect reference to
JoinConfigurationKindin the error message when no ResetConfiguration is found duringkubeadm resetwith the--configflag. (#132258, @J3m3) [SIG Cluster Lifecycle] [sig/cluster-lifecycle] - Fixed an issue that allowed Custom Resources to be created using Server-Side Apply even when their
CustomResourceDefinitionwas terminating. (#132467, @sdowell) [sig/api-machinery] - Fixed an issue where Windows kube-proxy’s
ModifyLoadBalancerAPI updates did not match the HNS state in version 15.4. Support forModifyLoadBalancerpolicy began with Kubernetes 1.31+. (#131506, @princepereira) [sig/windows] - Fixed an issue where
insufficientResourceswas logged as a pointer during pod preemption, making logs more readable. (#132183, @chrisy-x) [SIG Node] [sig/node] - Fixed an issue where the kubelet token cache returned stale tokens when service accounts were recreated with the same name. The cache is now UID-aware. Additionally, the new
TokenRequestServiceAccountUIDValidationfeature gate (Beta, enabled by default) ensures theTokenRequestUID matches the service account UID when set. (#132803, @aramase) [SIG API Machinery, Auth, Node and Testing] [sig/node,sig/api-machinery,sig/auth,sig/testing] - Fixed bug that prevented the alpha feature
PodTopologyLabelAdmissionfrom working due to checking for the incorrect label key when copying topology labels. This bug delayed the graduation of the feature to beta by an additional release to allow time for meaningful feedback. (#132462, @munnerz) [sig/node] - Fixed incorrect behavior for AllocationMode: All in ResourceClaim when used in subrequests. (#131660, @mortent) [SIG Node] [sig/node]
- Fixed misleading response codes in admission control metrics. (#132165, @gavinkflam) [SIG API Machinery, Architecture and Instrumentation] [sig/api-machinery,sig/instrumentation,sig/architecture]
- Fixed runtime cost estimation for
x-int-or-stringcustom resource schemas with maximum lengths. (#132837, @JoelSpeed) [sig/api-machinery] - Fixed the
allocatedResourceStatusesfield name mismatch in PVC status validation. (#131213, @carlory) [sig/apps] - Fixed the
observedGenerationfield in pod resize conditions to accurately reflect the associated pod generation when bothInPlacePodVerticalScalingandPodObservedGenerationTrackingfeature gates are enabled. (#131157, @natasha41575) [sig/node] - Fixed the bug when swap related metrics were not available in
/metrics/resourceendpoint. (#132065, @yuanwang04) [SIG Node and Testing] [sig/node,sig/testing] - Fixed the problem of validation error when specifying resource requirements at the container level for a resource not supported at the pod level. It implicitly interpreted the pod-level value as 0. (#132551, @chao-liang) [SIG Apps] [sig/apps]
- Fixed validation for Job with
suspend=true, andcompletions=0to set the Complete condition. (#132614, @mimowo) [SIG Apps and Testing] [sig/apps,sig/testing] - HPA status displayed memory metrics using Ki. (#132351, @googs1025) [SIG Apps and Autoscaling] [sig/autoscaling,sig/apps]
- Improved the error message shown when a Pod using user namespaces was created on a runtime that did not support user namespaces. (#131623, @rata) [sig/node]
- Kube-apiserver: Defaulted empty
spec.jobTemplate.spec.podFailurePolicy.rules[*].onPodConditions[*].statusfields for CronJob objects as documented, avoiding validation failures during write requests. (#131525, @carlory) [sig/apps] - Kube-apiserver: Fixed OIDC discovery document publishing when external service account token signing was enabled. (#131493, @hoskeri) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing]
- Kube-proxy: Removed the iptables CLI wait interval flag. (#131961, @cyclinder) [sig/network]
- Kube-scheduler: in Kubernetes 1.33, the number of devices that can be allocated per ResourceClaim was accidentally reduced to 16. Now the supported number of devices per ResourceClaim is 32 again. (#131662, @mortent) [SIG Node] [sig/node]
- Kubeadm: Fixed a bug where the default args for etcd were not correct when a local etcd image was used and the etcd version was less than 3.6.0. (#133023, @carlory) [sig/cluster-lifecycle]
- Kubelet: Closed a loophole that allowed static Pods to reference arbitrary ResourceClaims. Even though these Pods failed to run due to a sanity check, such references are now explicitly disallowed. (#131844, @pohly) [SIG Apps, Auth and Node] [sig/node,sig/auth,sig/apps]
- Kubelet: Fixed a bug that caused an unexpected
NodeResizeErrorcondition to appear in the PVC status when the CSI driver did not support node volume expansion and the PVC had theReadWriteManyaccess mode. (#131495, @carlory) [sig/storage] - Modified the node-local
podresourcesAPI endpoint to consider only active pods. Since this changes long-standing behavior, theKubeletPodResourcesListUseActivePodsfeature gate (enabled by default) can be disabled to restore the previous behavior. Users encountering regressions are encouraged to file an issue if they rely on the old behavior. (#132028, @ffromani) [SIG Node and Testing] [sig/node,sig/testing] - Pods were not allowed to mix the usage of
user-namespaces(hostUsers: false) andvolumeDevices. Kubernetes returned an error in this case. (#132868, @rata) [sig/apps] - Reduced the 5s delay before tainting
node.kubernetes.io/unreachable:NoExecutewhen a Node became unreachable. (#120816, @tnqn) [SIG Apps and Node] [sig/node,sig/apps] - Removed defunct
make vettarget, please usemake lintinstead (#132509, @yongruilin) [SIG Testing] [sig/testing] - Removed the deprecated flag
--wait-intervalfor theip6tables-legacy-restorebinary. (#132352, @PatrickLaabs) [sig/network] - ReplicaSets and Deployments should always count
.status.availableReplicasat the correct time without a delay. This results in faster reconciliation of Deployment conditions and faster, unblocked Deployment rollouts. (#132121, @atiratree) [SIG Apps] [sig/apps] - Resolved a bug where DaemonSet updates unnecessarily triggered duplicate validation due to overlapping calls to
ValidateDaemonSetand ValidateDaemonSetUpdate. This redundancy has been removed to prevent repeated validation runs. (#132548, @gavinkflam) [sig/apps] - Skipped pod backoff entirely when the
PodMaxBackoffDurationkube-scheduler option was set to zero and theSchedulerPopFromBackoffQfeature gate was enabled. (#131965, @macsko) [sig/scheduling] - Stopped expanding PVCs annotated with node-expand-not-required. (#131907, @gnufied) [SIG API Machinery, Etcd, Node, Storage and Testing] [sig/storage,sig/node,sig/api-machinery,sig/testing,sig/etcd]
- Stopped expanding the volume on the node if controller-side expansion was already completed. (#131868, @gnufied) [sig/storage]
- Stopped logging error events when waiting for expansion on the kubelet. (#131408, @gnufied) [sig/storage]
- Stopped removing the CSI JSON file if the volume was already mounted during subsequent errors. (#131311, @gnufied) [sig/storage]
- The
baselineandrestrictedpod security admission levels blocked setting thehostfield on probe and lifecycle handlers. (#125271, @tssurya) [SIG Auth, Node and Testing] [sig/node,sig/auth,sig/testing] - The garbage collection controller no longer raced with changes to
ownerReferenceswhen deleting orphaned objects. (#132632, @sdowell) [SIG API Machinery and Apps] [sig/api-machinery,sig/apps] - The shorthand for --output flag in kubectl explain was accidentally deleted, but has been added back. (#131962, @superbrothers) [SIG CLI] [sig/cli]
- Updated Windows
kube-proxyto align with Linux behavior by correctly honoring the port specified inEndpointSlicefor internal traffic routing. (#132647, @princepereira) [SIG Network and Windows] [sig/network,sig/windows] - Updated
kube-proxywithnftablesto reject or drop traffic to services with no endpoints from filter chains at priority 0 (NF_IP_PRI_FILTER). (#132456, @aroradaman) [sig/network] - Updated
kubectl get jobto display theSuccessCriteriaMetstatus for listed jobs. (#132832, @Goend) [SIG Apps and CLI] [sig/apps,sig/cli] - Updated the HPA controller so that it no longer emitted a
FailedRescaleevent if a scale operation initially failed due to a conflict but succeeded after a retry; it now emitted aSuccessfulRescaleevent in this case. AFailedRescaleevent was still emitted if all retries were exhausted. (#132007, @AumPatel1) [SIG Apps and Autoscaling] [sig/autoscaling,sig/apps] StatefulsetrespectedminReadySeconds. (#130909, @Edwinhr716) [sig/apps]kubectl create|delete|get|replace --rawcommands now honored the server root paths specified in the kubeconfig file. (#131165, @liggitt) [sig/api-machinery]
- Added a warning to
kubectl attach, notifying / reminding users that commands and output are available via thelogsubresource of that Pod. (#127183, @mochizuki875) [SIG Auth, CLI, Node and Security] [sig/node,sig/auth,sig/cli,sig/security] - Added support for encoding and decoding types that implement the standard library interfaces
json.Marshaler,json.Unmarshaler,encoding.TextMarshaler, orencoding.TextUnmarshalerto and from CBOR by transcoding. (#132935, @benluddy) [sig/api-machinery] - Bumped kube-dns to v1.26.4. (#132012, @pacoxu) [sig/cloud-provider]
- Bumped the cel-go dependency to v0.25.0. The changeset is available at: https://github.com/google/cel-go/compare/v0.23.2...v0.25.0. (#131444, @erdii) [SIG API Machinery, Auth, Cloud Provider and Node] [sig/node,sig/api-machinery,sig/auth,sig/cloud-provider]
- By default, binaries like kube-apiserver were built with the
grpcnotracetag enabled. Used theDBGflag to enable Golang tracing if needed. (#132210, @dims) [sig/architecture] - Changed Job controller to use the controller UID index for Pod lookups to improve performance. (#132305, @xigang) [sig/apps]
- Changed apiserver to treat failures decoding a mutating webhook patch as failures to call the webhook so they trigger the webhook failurePolicy and count against metrics like
webhook_fail_open_count(#131627, @dims) [SIG API Machinery] [sig/api-machinery] - Crane digest gcr.io/k8s-staging-e2e-test-images/agnhost:2.56 (#132117, @yashsingh74) [SIG Network and Testing] [sig/network,sig/testing]
- DRA kubelet- Updated logging to use
driverNameinstead ofpluginName, aligning with the rest of the Kubernetes components. (#132096, @pohly) [SIG Node and Testing] [sig/node,sig/testing] - DRA kubelet: Simplified recovery from mistakes like scheduling a Pod onto a node where the required driver was not running, as the kubelet no longer unnecessarily blocked Pod deletion. (#131968, @pohly) [SIG Node and Testing] [sig/node,sig/testing]
- Fixed some missing white spaces in the flag descriptions and logs. (#131562, @logica0419) [SIG Network] [sig/network]
- Hack/update-codegen.sh now automatically ensured goimports and protoc. (#131459, @BenTheElder) [sig/api-machinery]
- Increased test coverage for kubelet package to 92.3%. (#132484, @ylink-lfs) [sig/node]
- Kube-apiserver: removed the deprecated
apiserver_encryption_config_controller_automatic_reload_success_totalandapiserver_encryption_config_controller_automatic_reload_failure_totalmetrics in favor ofapiserver_encryption_config_controller_automatic_reloads_total. (#132238, @aramase) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] - Kube-scheduler: removed the deprecated scheduler_scheduler_cache_size metric in favor of scheduler_cache_size (#131425, @carlory) [SIG Scheduling] [sig/scheduling]
- Kubeadm: fixed missing space when printing the warning about pause image mismatch. (#131563, @logica0419) [SIG Cluster Lifecycle] [sig/cluster-lifecycle]
- Kubeadm: made the coredns deployment manifest use named ports consistently for the liveness and readiness probes. (#131587, @neolit123) [SIG Cluster Lifecycle] [sig/cluster-lifecycle]
- Kubectl interactive delete: treat empty newline input as N (#132251, @ardaguclu) [SIG CLI] [sig/cli]
- Masked access to Linux thermal interrupt information exposed via
/procand/sys. (#131018, @saschagrunert) [sig/node] - Migrated Memory Manager to contextual logging. (#130727, @swatisehgal) [sig/node]
- Migrated
pkg/kubelet/statusto use contextual logging. (#130852, @Chulong-Li) [sig/node] - Migrated
pkg/kubelet/volumemanagerto contextual logging. (#131306, @Chulong-Li) [sig/node] - Migrated
pkg/kubelet/winstatsto contextual logging. (#131001, @Chulong-Li) [sig/node] - NONW (#132890, @atiratree) [SIG Apps] [sig/apps]
- Promoted the
SeparateTaintEvictionControllerfeature gate to GA; it is now enabled unconditionally. (#122634, @carlory) [SIG API Machinery, Apps, Node and Testing] [sig/node,sig/api-machinery,sig/apps,sig/testing] - Promoted the
apiserver_authentication_config_controller_automatic_reloads_totalandapiserver_authentication_config_controller_automatic_reload_last_timestamp_secondsmetrics to BETA. (#131798, @aramase) [SIG API Machinery, Auth and Instrumentation] [sig/api-machinery,sig/auth,sig/instrumentation] - Promoted the
apiserver_authorization_config_controller_automatic_reloads_totalandapiserver_authorization_config_controller_automatic_reload_last_timestamp_secondsmetrics to BETA. (#131768, @aramase) [SIG API Machinery, Auth and Instrumentation] [sig/api-machinery,sig/auth,sig/instrumentation] - Promoted two
EndpointSlicetests to conformance to ensure that service proxy implementations rely onEndpointSlicesinstead ofEndpoints. (#132019, @danwinship) [SIG Architecture, Network and Testing] [sig/network,sig/testing,sig/architecture] - Reduced excessive logging in the Volume Binding scheduler plugin by lowering the verbosity of high-frequency messages from
V(4)toV(5). (#132840, @ppmechlinski) [SIG Autoscaling, Scheduling and Storage] [sig/scheduling,sig/storage,sig/autoscaling] - Removed deprecated gogo protocol definitions from
k8s.io/externaljwtin favor ofgoogle.golang.org/protobuf. (#132772, @saschagrunert) [SIG Auth] [sig/auth] - Removed deprecated gogo protocol definitions from
k8s.io/kms/apisin favor ofgoogle.golang.org/protobuf. (#132833, @saschagrunert) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing] - Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/devicepluginin favor ofgoogle.golang.org/protobuf. (#133028, @saschagrunert) [SIG Node and Testing] [sig/node,sig/testing] - Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/podresourcesin favor ofgoogle.golang.org/protobuf. (#133027, @saschagrunert) [SIG Node and Testing] [sig/node,sig/testing] - Removed general available feature-gate
DevicePluginCDIDevices. (#132083, @carlory) [SIG Node and Testing] [sig/node,sig/testing] - Removed generally available feature-gate
PodDisruptionConditions. (#129501, @carlory) [SIG Apps] [sig/apps] - Removed support for API streaming from the REST client. (#132285, @p0lyn0mial) [sig/api-machinery]
- Removed support for API streaming from the
List()method of the typed client. (#132257, @p0lyn0mial) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing] - Removed support for API streaming from the dynamic client’s
List() method. (#132229, @p0lyn0mial) [SIG API Machinery, CLI and Testing] [sig/api-machinery,sig/cli,sig/testing] - Removed support for API streaming from the metadata client’s
List() method. (#132149, @p0lyn0mial) [SIG API Machinery and Testing] [sig/api-machinery,sig/testing] - Removed the
kubernetes.io/initial-events-list-blueprintannotation from the synthetic "Bookmark" event in watch stream requests. (#132326, @p0lyn0mial) [sig/api-machinery] - Removed the deprecated
--register-schedulablecommand line argument from the kubelet. (#122384, @carlory) [SIG Cloud Provider, Node and Scalability] [sig/scalability,sig/node,sig/cloud-provider] - Replaced
toPtrhelper functions with the "k8s.io/utils/ptr" implementations. (#132806, @PatrickLaabs) [SIG Apps, Testing and Windows] [sig/apps,sig/windows,sig/testing] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor ./test/e2e and ./test/utils. (#132763, @PatrickLaabs) [SIG Autoscaling and Testing] [sig/autoscaling,sig/testing] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor ./test/e2e. (#132764, @PatrickLaabs) [SIG Auth, Network, Node, Storage and Testing] [sig/network,sig/storage,sig/node,sig/auth,sig/testing] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor ./test/e2e. (#132765, @PatrickLaabs) [SIG API Machinery, Apps, CLI and Testing] [sig/api-machinery,sig/apps,sig/cli,sig/testing] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor ./test/integration. (#132762, @PatrickLaabs) [sig/testing] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor apiextensions apiservers validation tests. (#132726, @PatrickLaabs) [sig/api-machinery] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor apiextensions-apiserver pkg/controller. (#132724, @PatrickLaabs) [sig/api-machinery] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor apiextensions-apiserver pkg/registry. (#132725, @PatrickLaabs) [sig/api-machinery] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor pkg/apis (1/2). (#132778, @PatrickLaabs) [SIG Apps and Network] [sig/network,sig/apps] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor pkg/apis (2/2). (#132779, @PatrickLaabs) [SIG Apps, Auth and Storage] [sig/storage,sig/auth,sig/apps] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor pkg/controller (1/2). (#132781, @PatrickLaabs) [SIG API Machinery, Apps and Network] [sig/network,sig/api-machinery,sig/apps] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor pkg/controller (2/2). (#132784, @PatrickLaabs) [SIG API Machinery, Apps, Network, Node and Storage] [sig/network,sig/storage,sig/node,sig/api-machinery,sig/apps] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor pod-security-admission tests. (#132741, @PatrickLaabs) [sig/auth] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the apiextensions-apiservers integration tests. (#132721, @PatrickLaabs) [sig/api-machinery] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the apiserver (2/2). (#132752, @PatrickLaabs) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the cli-runtime. (#132750, @PatrickLaabs) [SIG CLI and Release] [sig/cli,sig/release] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the cloud-provider. (#132720, @PatrickLaabs) [SIG Cloud Provider and Network] [sig/network,sig/cloud-provider] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the components-helper of the apimachinery. (#132413, @PatrickLaabs) [sig/api-machinery] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the controller-manager. (#132753, @PatrickLaabs) [SIG API Machinery and Cloud Provider] [sig/api-machinery,sig/cloud-provider] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the csr. (#132699, @PatrickLaabs) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the e2e_node. (#132755, @PatrickLaabs) [SIG Node and Testing] [sig/node,sig/testing] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the kubeapiserver. (#132529, @PatrickLaabs) [SIG API Machinery and Architecture] [sig/api-machinery,sig/architecture] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the pkg/security and plugin/pkg. (#132777, @PatrickLaabs) [SIG Auth, Node and Release] [sig/node,sig/auth,sig/release] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the pod-security-admission admissiontests. (#132742, @PatrickLaabs) [sig/auth] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the pod-security-admission policy. (#132743, @PatrickLaabs) [sig/auth] - Replaced deprecated package
k8s.io/utils/pointerwithk8s.io/utils/ptrfor the reflector. (#132698, @PatrickLaabs) [sig/api-machinery] - Replaced timer ptr helper function with the
k8s.io/utils/ptrimplementations. (#133030, @PatrickLaabs) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - The deprecated
LegacySidecarContainersfeature gate was completely removed. (#131463, @gjkim42) [SIG Node and Testing] [sig/node,sig/testing] - Types: Code and Status moved from pkg/scheduler/framework to staging repo.
Users should update import path for these types from
k8s.io/kubernetes/pkg/scheduler/frameworktok8s.io/kube-scheduler/framework. (#132087, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing] - Types: CycleState, StateData, StateKey and ErrNotFound moved from pkg/scheduler/framework to k8s.io/kube-scheduler/framework. Type CycleState that is passed to each plugin in scheduler framework is changed to the new interface CycleState (in k8s.io/kube-scheduler/framework) (#131887, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing]
- Types:
ClusterEvent,ActionType,EventResource,ClusterEventWithHint,QueueingHintandQueueingHintFnmoved frompkg/scheduler/frameworktok8s.io/kube-scheduler/framework. (#132190, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing] - Types:
NodeInfo,PodInfo,QueuedPodInfo,PodResource,AffinityTerm,WeightedAffinityTerm,Resource,ImageStateSummary,ProtocolPortandHostPortInfowere moved frompkg/scheduler/frameworkto staging repo. Users should update import path for these types fromk8s.io/kubernetes/pkg/scheduler/frameworktok8s.io/kube-scheduler/frameworkand update use of fields (to use getter/setter functions instead) where needed. (#132457, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing] - Updated CNI plugins to v1.7.1 (#131602, @adrianmoisey) [SIG Cloud Provider, Node and Testing] [sig/node,sig/testing,sig/cloud-provider]
- Updated
conntrackreconciler to consider a Service’s target port during cleanup of stale flow entries. (#130542, @aroradaman) [sig/network] - Updated
kubeadmto use theInitialCorruptCheck=trueetcd feature gate instead of the deprecated--experimental-initial-corrupt-checkflag. Also replaced the use of--experimental-watch-progress-notify-intervalwith its graduated counterpart--watch-progress-notify-interval. (#132838, @AwesomePatrol) [sig/cluster-lifecycle] - Updated cri-tools to v1.33.0. (#131406, @saschagrunert) [SIG Cloud Provider] [sig/cloud-provider]
- Updated etcd version to v3.6.1. (#132284, @ArkaSaha30) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing] [sig/api-machinery,sig/cluster-lifecycle,sig/testing,sig/cloud-provider,sig/etcd]
- Updated the etcd client library to v3.6.4. (#133226, @ivanvc) [SIG API Machinery, Auth, Cloud Provider and Node] [sig/node,sig/api-machinery,sig/auth,sig/cloud-provider]
- Upgraded CoreDNS to v1.12.1. (#131151, @yashsingh74) [SIG Cloud Provider and Cluster Lifecycle] [sig/cluster-lifecycle,sig/cloud-provider]
- Upgraded functionality of
kubectl kustomizeas described at https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize%2Fv5.7.0. (#132593, @koba1t) [sig/cli] - Validated APIVersion fields of the
HorizontalPodAutoscalerto ensure that API objects were created and functioned properly. (#132537, @lalitc375) [SIG Etcd and Testing] [sig/testing,sig/etcd]
- buf.build/gen/go/bufbuild/protovalidate/protocolbuffers/go: 63bb56e
- github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp: v1.26.0
- github.com/bufbuild/protovalidate-go: v0.9.1
- github.com/envoyproxy/go-control-plane/envoy: v1.32.4
- github.com/envoyproxy/go-control-plane/ratelimit: v0.1.0
- github.com/go-jose/go-jose/v4: v4.0.4
- github.com/golang-jwt/jwt/v5: v5.2.2
- github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus: v1.0.1
- github.com/grpc-ecosystem/go-grpc-middleware/v2: v2.3.0
- github.com/spiffe/go-spiffe/v2: v2.5.0
- github.com/zeebo/errs: v1.4.0
- go.etcd.io/raft/v3: v3.6.0
- go.opentelemetry.io/contrib/detectors/gcp: v1.34.0
- go.opentelemetry.io/otel/sdk/metric: v1.34.0
- go.yaml.in/yaml/v2: v2.4.2
- go.yaml.in/yaml/v3: v3.0.4
- sigs.k8s.io/structured-merge-diff/v6: v6.3.0
- cel.dev/expr: v0.19.1 → v0.24.0
- cloud.google.com/go/compute/metadata: v0.5.0 → v0.6.0
- github.com/Microsoft/hnslib: v0.0.8 → v0.1.1
- github.com/cncf/xds/go: b4127c9 → 2f00578
- github.com/coredns/corefile-migration: v1.0.25 → v1.0.26
- github.com/cpuguy83/go-md2man/v2: v2.0.4 → v2.0.6
- github.com/emicklei/go-restful/v3: v3.11.0 → v3.12.2
- github.com/envoyproxy/go-control-plane: v0.13.0 → v0.13.4
- github.com/envoyproxy/protoc-gen-validate: v1.1.0 → v1.2.1
- github.com/fsnotify/fsnotify: v1.7.0 → v1.9.0
- github.com/fxamacker/cbor/v2: v2.7.0 → v2.9.0
- github.com/golang/glog: v1.2.2 → v1.2.4
- github.com/google/cel-go: v0.23.2 → v0.26.0
- github.com/google/gnostic-models: v0.6.9 → v0.7.0
- github.com/grpc-ecosystem/grpc-gateway/v2: v2.24.0 → v2.26.3
- github.com/ishidawataru/sctp: 7ff4192 → ae8eb7f
- github.com/jonboulle/clockwork: v0.4.0 → v0.5.0
- github.com/modern-go/reflect2: v1.0.2 → 35a7c28
- github.com/spf13/cobra: v1.8.1 → v1.9.1
- github.com/spf13/pflag: v1.0.5 → v1.0.6
- github.com/vishvananda/netlink: 62fb240 → v1.3.1
- github.com/vishvananda/netns: v0.0.4 → v0.0.5
- go.etcd.io/bbolt: v1.3.11 → v1.4.2
- go.etcd.io/etcd/api/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/client/pkg/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/client/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/pkg/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/server/v3: v3.5.21 → v3.6.4
- go.etcd.io/gofail: v0.1.0 → v0.2.0
- go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful: v0.42.0 → v0.44.0
- go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc: v0.58.0 → v0.60.0
- go.opentelemetry.io/contrib/propagators/b3: v1.17.0 → v1.19.0
- go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/exporters/otlp/otlptrace: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/metric: v1.33.0 → v1.35.0
- go.opentelemetry.io/otel/sdk: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/trace: v1.33.0 → v1.35.0
- go.opentelemetry.io/otel: v1.33.0 → v1.35.0
- go.opentelemetry.io/proto/otlp: v1.4.0 → v1.5.0
- google.golang.org/genproto/googleapis/api: e6fa225 → a0af3ef
- google.golang.org/genproto/googleapis/rpc: e6fa225 → a0af3ef
- google.golang.org/grpc: v1.68.1 → v1.72.1
- k8s.io/gengo/v2: 1244d31 → 85fd79d
- k8s.io/kube-openapi: c8a335a → f3f2b99
- k8s.io/system-validators: v1.9.1 → v1.10.1
- k8s.io/utils: 3ea5e8c → 4c0f3b2
- sigs.k8s.io/json: 9aa6b5e → cfa47c3
- sigs.k8s.io/kustomize/api: v0.19.0 → v0.20.1
- sigs.k8s.io/kustomize/cmd/config: v0.19.0 → v0.20.1
- sigs.k8s.io/kustomize/kustomize/v5: v5.6.0 → v5.7.1
- sigs.k8s.io/kustomize/kyaml: v0.19.0 → v0.20.1
- sigs.k8s.io/yaml: v1.4.0 → v1.6.0
- cloud.google.com/go/accessapproval: v1.7.4
- cloud.google.com/go/accesscontextmanager: v1.8.4
- cloud.google.com/go/aiplatform: v1.58.0
- cloud.google.com/go/analytics: v0.22.0
- cloud.google.com/go/apigateway: v1.6.4
- cloud.google.com/go/apigeeconnect: v1.6.4
- cloud.google.com/go/apigeeregistry: v0.8.2
- cloud.google.com/go/appengine: v1.8.4
- cloud.google.com/go/area120: v0.8.4
- cloud.google.com/go/artifactregistry: v1.14.6
- cloud.google.com/go/asset: v1.17.0
- cloud.google.com/go/assuredworkloads: v1.11.4
- cloud.google.com/go/automl: v1.13.4
- cloud.google.com/go/baremetalsolution: v1.2.3
- cloud.google.com/go/batch: v1.7.0
- cloud.google.com/go/beyondcorp: v1.0.3
- cloud.google.com/go/bigquery: v1.58.0
- cloud.google.com/go/billing: v1.18.0
- cloud.google.com/go/binaryauthorization: v1.8.0
- cloud.google.com/go/certificatemanager: v1.7.4
- cloud.google.com/go/channel: v1.17.4
- cloud.google.com/go/cloudbuild: v1.15.0
- cloud.google.com/go/clouddms: v1.7.3
- cloud.google.com/go/cloudtasks: v1.12.4
- cloud.google.com/go/compute: v1.23.3
- cloud.google.com/go/contactcenterinsights: v1.12.1
- cloud.google.com/go/container: v1.29.0
- cloud.google.com/go/containeranalysis: v0.11.3
- cloud.google.com/go/datacatalog: v1.19.2
- cloud.google.com/go/dataflow: v0.9.4
- cloud.google.com/go/dataform: v0.9.1
- cloud.google.com/go/datafusion: v1.7.4
- cloud.google.com/go/datalabeling: v0.8.4
- cloud.google.com/go/dataplex: v1.14.0
- cloud.google.com/go/dataproc/v2: v2.3.0
- cloud.google.com/go/dataqna: v0.8.4
- cloud.google.com/go/datastore: v1.15.0
- cloud.google.com/go/datastream: v1.10.3
- cloud.google.com/go/deploy: v1.17.0
- cloud.google.com/go/dialogflow: v1.48.1
- cloud.google.com/go/dlp: v1.11.1
- cloud.google.com/go/documentai: v1.23.7
- cloud.google.com/go/domains: v0.9.4
- cloud.google.com/go/edgecontainer: v1.1.4
- cloud.google.com/go/errorreporting: v0.3.0
- cloud.google.com/go/essentialcontacts: v1.6.5
- cloud.google.com/go/eventarc: v1.13.3
- cloud.google.com/go/filestore: v1.8.0
- cloud.google.com/go/firestore: v1.14.0
- cloud.google.com/go/functions: v1.15.4
- cloud.google.com/go/gkebackup: v1.3.4
- cloud.google.com/go/gkeconnect: v0.8.4
- cloud.google.com/go/gkehub: v0.14.4
- cloud.google.com/go/gkemulticloud: v1.1.0
- cloud.google.com/go/gsuiteaddons: v1.6.4
- cloud.google.com/go/iam: v1.1.5
- cloud.google.com/go/iap: v1.9.3
- cloud.google.com/go/ids: v1.4.4
- cloud.google.com/go/iot: v1.7.4
- cloud.google.com/go/kms: v1.15.5
- cloud.google.com/go/language: v1.12.2
- cloud.google.com/go/lifesciences: v0.9.4
- cloud.google.com/go/logging: v1.9.0
- cloud.google.com/go/longrunning: v0.5.4
- cloud.google.com/go/managedidentities: v1.6.4
- cloud.google.com/go/maps: v1.6.3
- cloud.google.com/go/mediatranslation: v0.8.4
- cloud.google.com/go/memcache: v1.10.4
- cloud.google.com/go/metastore: v1.13.3
- cloud.google.com/go/monitoring: v1.17.0
- cloud.google.com/go/networkconnectivity: v1.14.3
- cloud.google.com/go/networkmanagement: v1.9.3
- cloud.google.com/go/networksecurity: v0.9.4
- cloud.google.com/go/notebooks: v1.11.2
- cloud.google.com/go/optimization: v1.6.2
- cloud.google.com/go/orchestration: v1.8.4
- cloud.google.com/go/orgpolicy: v1.12.0
- cloud.google.com/go/osconfig: v1.12.4
- cloud.google.com/go/oslogin: v1.13.0
- cloud.google.com/go/phishingprotection: v0.8.4
- cloud.google.com/go/policytroubleshooter: v1.10.2
- cloud.google.com/go/privatecatalog: v0.9.4
- cloud.google.com/go/pubsub: v1.34.0
- cloud.google.com/go/pubsublite: v1.8.1
- cloud.google.com/go/recaptchaenterprise/v2: v2.9.0
- cloud.google.com/go/recommendationengine: v0.8.4
- cloud.google.com/go/recommender: v1.12.0
- cloud.google.com/go/redis: v1.14.1
- cloud.google.com/go/resourcemanager: v1.9.4
- cloud.google.com/go/resourcesettings: v1.6.4
- cloud.google.com/go/retail: v1.14.4
- cloud.google.com/go/run: v1.3.3
- cloud.google.com/go/scheduler: v1.10.5
- cloud.google.com/go/secretmanager: v1.11.4
- cloud.google.com/go/security: v1.15.4
- cloud.google.com/go/securitycenter: v1.24.3
- cloud.google.com/go/servicedirectory: v1.11.3
- cloud.google.com/go/shell: v1.7.4
- cloud.google.com/go/spanner: v1.55.0
- cloud.google.com/go/speech: v1.21.0
- cloud.google.com/go/storagetransfer: v1.10.3
- cloud.google.com/go/talent: v1.6.5
- cloud.google.com/go/texttospeech: v1.7.4
- cloud.google.com/go/tpu: v1.6.4
- cloud.google.com/go/trace: v1.10.4
- cloud.google.com/go/translate: v1.10.0
- cloud.google.com/go/video: v1.20.3
- cloud.google.com/go/videointelligence: v1.11.4
- cloud.google.com/go/vision/v2: v2.7.5
- cloud.google.com/go/vmmigration: v1.7.4
- cloud.google.com/go/vmwareengine: v1.0.3
- cloud.google.com/go/vpcaccess: v1.7.4
- cloud.google.com/go/webrisk: v1.9.4
- cloud.google.com/go/websecurityscanner: v1.6.4
- cloud.google.com/go/workflows: v1.12.3
- cloud.google.com/go: v0.112.0
- github.com/BurntSushi/toml: v0.3.1
- github.com/census-instrumentation/opencensus-proto: v0.4.1
- github.com/client9/misspell: v0.3.4
- github.com/cncf/udpa/go: 269d4d4
- github.com/ghodss/yaml: v1.0.0
- github.com/go-kit/kit: v0.9.0
- github.com/go-logfmt/logfmt: v0.4.0
- github.com/go-stack/stack: v1.8.0
- github.com/golang-jwt/jwt/v4: v4.5.2
- github.com/golang/mock: v1.1.1
- github.com/google/shlex: e7afc7f
- github.com/grpc-ecosystem/grpc-gateway: v1.16.0
- github.com/konsorten/go-windows-terminal-sequences: v1.0.1
- github.com/kr/logfmt: b84e30a
- github.com/opentracing/opentracing-go: v1.1.0
- go.etcd.io/etcd/client/v2: v2.305.21
- go.etcd.io/etcd/raft/v3: v3.5.21
- go.uber.org/atomic: v1.7.0
- golang.org/x/lint: d0100b6
- google.golang.org/appengine: v1.4.0
- google.golang.org/genproto: ef43131
- honnef.co/go/tools: ea95bdf
- sigs.k8s.io/structured-merge-diff/v4: v4.6.0