Kubernetes API Version: v1.31.0
Kubernetes API Version: v1.31.0
Kubernetes API Version: v1.31.0
-
'ACTION REQUIRED: The Dynamic Resource Allocation (DRA) driver's DaemonSet must be deployed with a service account that enables writing ResourceSlice and reading ResourceClaim objects.' (kubernetes/kubernetes#125163, @pohly) [SIG Auth, Node and Testing]
-
Add UserNamespaces field to NodeRuntimeHandlerFeatures (kubernetes/kubernetes#126034, @sohankunkerkar) [SIG API Machinery, Apps and Node]
-
Added Coordinated Leader Election as Alpha under the
CoordinatedLeaderElection
feature gate. With the feature enabled, the control plane can use LeaseCandidate objects (coordination.k8s.io/v1alpha1 API group) to participate in a leader election and let the kube-apiserver select the best instance according to some strategy. (kubernetes/kubernetes#124012, @Jefftree) [SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Release, Scheduling and Testing] -
Added a
.status.features.supplementalGroupsPolicy
field to Nodes. The field is true when the feature is implemented in the CRI implementation (KEP-3619). (kubernetes/kubernetes#125470, @everpeace) [SIG API Machinery, Apps, Node and Testing] -
Added an
allocatedResourcesStatus
to each container status to indicate the health status of devices exposed by the device plugin. (kubernetes/kubernetes#126243, @SergeyKanzhelev) [SIG API Machinery, Apps, Node and Testing] -
Added support to the kube-proxy nodePortAddresses / --nodeport-addresses option to accept the value "primary", meaning to only listen for NodePort connections on the node's primary IPv4 and/or IPv6 address (according to the Node object). This is strongly recommended, if you were not previously using --nodeport-addresses, to avoid surprising behavior. (This behavior is enabled by default with the nftables backend; you would need to explicitly request
--nodeport-addresses 0.0.0.0/0,::/0
there to get the traditional "listen on all interfaces" behavior.) (kubernetes/kubernetes#123105, @danwinship) [SIG API Machinery, Network and Windows] -
Added the feature gates
StrictCostEnforcementForVAP
andStrictCostEnforcementForWebhooks
to enforce the strict cost calculation for CEL extended libraries. It is strongly recommended to turn on the feature gates as early as possible. (kubernetes/kubernetes#124675, @cici37) [SIG API Machinery, Auth, Node and Testing] -
Changed how the API server handles updates to
.spec.defaultBackend
of Ingress objects. Server-side apply now considers.spec.defaultBackend
to be an atomic struct. This means that any field-owner who sets values in that struct (they are mutually exclusive) owns the whole struct. For almost all users this change has no impact; for controllers that want to change the default backend port from number to name (or vice-versa), this makes it easier. (kubernetes/kubernetes#126207, @thockin) [SIG API Machinery] -
Component-base/logs: when compiled with Go >= 1.21, component-base will automatically configure the slog default logger together with initializing klog. (kubernetes/kubernetes#120696, @pohly) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Storage and Testing]
-
CustomResourceDefinition objects created with non-empty
caBundle
fields which are invalid or do not contain any certificates will not appear in discovery or serve endpoints until a validcaBundle
is provided. Updates to CustomResourceDefinition are no longer allowed to transition a validcaBundle
field to an invalidcaBundle
field, because this breaks serving of the existing CustomResourceDefinition. (kubernetes/kubernetes#124061, @Jefftree) [SIG API Machinery] -
Dynamic Resource Allocation (DRA): Added a feature so the number of ResourceClaim objects can be limited per namespace and by the number of devices requested through a specific class via the v1.ResourceQuota mechanism. (kubernetes/kubernetes#120611, @pohly) [SIG API Machinery, Apps, Auth, CLI, Etcd, Node, Release, Scheduling and Testing]
-
Dynamic Resource Allocation (DRA): client-side validation of a ResourceHandle would have accepted a missing DriverName, whereas server-side validation then would have raised an error. (kubernetes/kubernetes#124075, @pohly)
-
Dynamic Resource Allocation (DRA): in the
pod.spec.recourceClaims
array, thesource
indirection is no longer necessary. Instead of e.g.source: resourceClaimTemplateName: my-template
, one can writeresourceClaimTemplateName: my-template
. (kubernetes/kubernetes#125116, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] -
Enhanced the Dynamic Resource Allocation (DRA) with an updated version of the resource.k8s.io API group. The primary user-facing type remains the ResourceClaim, however significant changes have been made, resulting in the new version, v1alpha3, which is not compatible with the previous version. (kubernetes/kubernetes#125488, @pohly) [SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Etcd, Node, Release, Scheduling, Storage and Testing]
-
Fixed a 1.30.0 regression in OpenAPI descriptions of the
imagePullSecrets
andhostAliases
fields to mark the fields used as keys in those lists as either defaulted or required. (kubernetes/kubernetes#124553, @pmalek) -
Fixed a 1.30.0 regression in openapi descriptions of
PodIP.IP
andHostIP.IP
fields to mark the fields used as keys in those lists as required. (kubernetes/kubernetes#126057, @thockin) -
Fixed a bug in the API server where empty collections of ValidatingAdmissionPolicies did not have an
items
field. (kubernetes/kubernetes#124568, @xyz-li) [SIG API Machinery] -
Fixed a deep copy issue when retrieving the controller reference. (kubernetes/kubernetes#124116, @HiranmoyChowdhury) [SIG API Machinery and Release]
-
Fixed code-generator client-gen to work with
api/v1
-like package structure. (kubernetes/kubernetes#125162, @sttts) [SIG API Machinery and Apps] -
Fixed incorrect "v1 Binding is deprecated in v1.6+" warning in kube-scheduler log. (kubernetes/kubernetes#125540, @pohly) [SIG API Machinery]
-
Fixed the comment for the Job's managedBy field. (kubernetes/kubernetes#124793, @mimowo) [SIG API Machinery and Apps]
-
Fixed the documentation for the default value of the
procMount
entry insecurityContext
within a Pod. The documentation was previously using the name of the internal variableDefaultProcMount
, rather than the actual value, "Default". (kubernetes/kubernetes#125782, @aborrero) [SIG Apps and Node] -
Graduate PodDisruptionConditions to GA and lock (kubernetes/kubernetes#125461, @mimowo) [SIG Apps, Node, Scheduling and Testing]
-
Graduated MatchLabelKeys/MismatchLabelKeys feature in PodAffinity/PodAntiAffinity to Beta. (kubernetes/kubernetes#123638, @sanposhiho) [SIG API Machinery, Apps, Scheduling and Testing]
-
Graduated
JobPodFailurePolicy
to GA and locked it to it's default. (kubernetes/kubernetes#125442, @mimowo) [SIG API Machinery, Apps, Scheduling and Testing] -
Graduated the Job
successPolicy
field to beta.The new reason label, "SuccessPolicy" and "CompletionsReached" are added to the "jobs_finished_total" metric. Additionally, if you enable the
JobSuccessPolicy
feature gate, the Job gets "CompletionsReached" reason for the "SuccessCriteriaMet" and "Complete" condition type when the number of succeeded Job Pods (.status.succeeded
) reached the desired completions (.spec.completions
). (kubernetes/kubernetes#126067, @tenzen-y) [SIG API Machinery, Apps and Testing] -
Graduated the
DisableNodeKubeProxyVersion
feature gate to beta. By default, the kubelet no longer attempts to set the.status.kubeProxyVersion
field for its associated Node. (kubernetes/kubernetes#123845, @HirazawaUi) [SIG API Machinery, Cloud Provider, Network, Node and Testing] -
Improved scheduling performance when many nodes, and prefilter returned 1-2 nodes (e.g. daemonset)
For developers of out-of-tree PostFilter plugins, note that the semantics of NodeToStatusMap are changing: A node with an absent value in the NodeToStatusMap should be interpreted as having an UnschedulableAndUnresolvable status. (kubernetes/kubernetes#125197, @gabesaba)
-
Introduced a new boolean kubelet flag
--fail-cgroupv1
. (kubernetes/kubernetes#126031, @harche) [SIG API Machinery and Node] -
K8s.io/apimachinery/pkg/util/runtime: Added support for new calls to handle panics and errors in the context where they occur.
PanicHandlers
andErrorHandlers
now must accept a context parameter for that. Log output is structured instead of unstructured. (kubernetes/kubernetes#121970, @pohly) [SIG API Machinery and Instrumentation] -
KEP-1880: Users of the new feature to add multiple service CIDR will use by default a dual-write strategy on the new ClusterIP allocators to avoid the problem of possible duplicate IPs allocated to Services when running skewed kube-apiservers using different allocators. They can opt-out of this behavior by enabled the feature gate DisableAllocatorDualWrite. (kubernetes/kubernetes#122047, @aojea) [SIG API Machinery, Apps, Instrumentation and Testing]
-
Kube-apiserver: Added Alpha features to allow API server authz to check the context of requests:
- The
AuthorizeWithSelectors
feature gate enables including field and label selector information from requests in webhook authorization calls. - The
AuthorizeNodeWithSelectors
feature gate changes node authorizer behavior to limit requests from node API clients, so that each Node can only get / list / watch its own Node API object, and can also only get / list / watch Pod API objects bound to that node. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or obtain broader read access independent of the node authorizer. (kubernetes/kubernetes#125571, @liggitt) [SIG API Machinery, Auth, Node, Scheduling and Testing]
- The
-
Kube-apiserver: ControllerRevision objects are now verified to contain valid JSON data in the
data
field. (kubernetes/kubernetes#125549, @liggitt) [SIG API Machinery and Apps] -
Kube-apiserver: the
--encryption-provider-config
file is now loaded with strict deserialization, which fails if the config file contains duplicate or unknown fields. This protects against accidentally running with config files that are malformed, mis-indented, or have typos in field names, and getting unexpected behavior. When--encryption-provider-config-automatic-reload
is used, new encryption config files that contain typos after the kube-apiserver is running are treated as invalid and the last valid config is used. (kubernetes/kubernetes#124912, @enj) [SIG API Machinery and Auth] -
Kube-controller-manager: the
horizontal-pod-autoscaler-upscale-delay
andhorizontal-pod-autoscaler-downscale-delay
flags have been removed (deprecated and non-functional since v1.12). (kubernetes/kubernetes#124948, @SataQiu) [SIG API Machinery, Apps and Autoscaling] -
Made kube-proxy Windows service control manager integration (
--windows-service
) configurable in v1alpha1 component configuration viawindowsRunAsService
field. (kubernetes/kubernetes#126072, @aroradaman) [SIG Network and Scalability] -
PersistentVolumeLastPhaseTransitionTime feature is stable and enabled by default. (kubernetes/kubernetes#124969, @RomanBednar) [SIG API Machinery, Apps, Storage and Testing]
-
Promoted
LocalStorageCapacityIsolation
to beta; the behaviour is enabled by default. Within the kubelet, storage capacity isolation is active if the feature gate is enabled and the specific Pod is using a user namespace. (kubernetes/kubernetes#126014, @PannagaRao) [SIG Apps, Autoscaling, Node, Storage and Testing] -
Promoted
StatefulSetStartOrdinal
to stable. This means--feature-gates=StatefulSetStartOrdinal=true
are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation. (kubernetes/kubernetes#125374, @pwschuurman) [SIG API Machinery, Apps and Testing] -
Promoted feature-gate
VolumeAttributesClass
to beta (disabled by default). Users need to enable the feature gate and thestorage.k8s.io/v1beta1
API group to use this feature. Promoted the VolumeAttributesClass API to beta. (kubernetes/kubernetes#126145, @carlory) [SIG API Machinery, Apps, CLI, Etcd, Storage and Testing] -
Removed deprecated command flags --volume-host-cidr-denylist and --volume-host-allow-local-loopback from kube-controller-manager. (kubernetes/kubernetes#124017, @carlory) [SIG API Machinery, Apps, Cloud Provider and Storage]
-
Removed feature gate
CustomResourceValidationExpressions
. (kubernetes/kubernetes#126136, @cici37) [SIG API Machinery, Cloud Provider and Testing] -
Reverted a change where
ConsistentListFromCache
was moved to beta and enabled by default. (kubernetes/kubernetes#126139, @enj) -
Revised the Pod API with Alpha support for volumes derived from OCI artifacts. This feature is behind the
ImageVolume
feature gate. (kubernetes/kubernetes#125660, @saschagrunert) [SIG API Machinery, Apps and Node] -
Supported fine-grained supplemental groups policy (KEP-3619), which enabled fine-grained control for supplementary groups in the first container processes. This allows you to choose whether to include groups defined in the container image (/etc/groups) for the container's primary UID or not. (kubernetes/kubernetes#117842, @everpeace) [SIG API Machinery, Apps and Node]
-
The (alpha) nftables mode of kube-proxy now requires version 1.0.1 or later of the nft command-line, and kernel 5.13 or later. (For testing/development purposes, you can use older kernels, as far back as 5.4, if you set the
nftables.skipKernelVersionCheck
option in the kube-proxy config, but this is not recommended in production since it may cause problems with other nftables users on the system.) (kubernetes/kubernetes#124152, @danwinship) [SIG Network] -
To enhance usability and developer experience, CRD validation rules now support direct use of (CEL) reserved keywords as field names in object validation expressions for existing expressions in storage, will fully support runtime in next release for compatibility concern. (kubernetes/kubernetes#126188, @cici37) [SIG API Machinery and Testing]
-
Updated the feature MultiCIDRServiceAllocator to beta (disabled by default). Users need to enable the feature gate and the networking v1beta1 group to be able to use this new feature, that allows to dynamically reconfigure Service CIDR ranges. (kubernetes/kubernetes#125021, @aojea) [SIG API Machinery, Apps, CLI, Etcd, Instrumentation, Network and Testing]
-
Use omitempty for optional Job Pod Failure Policy fields. (kubernetes/kubernetes#126046, @mimowo)
-
User can choose a different static policy option
SpreadPhysicalCPUsPreferredOption
to spread cpus across physical cpus for some specific applications (kubernetes/kubernetes#123733, @Jeffwan) [SIG Node] -
When the featuregate AnonymousAuthConfigurableEndpoints is enabled users can update the AuthenticationConfig file with endpoints for with anonymous requests are alllowed. (kubernetes/kubernetes#124917, @vinayakankugoyal) [SIG API Machinery, Auth, Cloud Provider, Node and Testing]
-
Move ConsistentListFromCache feature flag to Beta and enable it by default (kubernetes/kubernetes#126469, @serathius) [SIG API Machinery]
-
Add Coordinated Leader Election as alpha under the CoordinatedLeaderElection feature gate. With the feature enabled, the control plane can use LeaseCandidate objects (coordination.k8s.io/v1alpha1 API group) to participate in a leader election and let the kube-apiserver select the best instance according to some strategy. (kubernetes/kubernetes#124012, @Jefftree) [SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Release, Scheduling and Testing]
-
Add an AllocatedResourcesStatus to each container status to indicate the health status of devices exposed by the device plugin. (kubernetes/kubernetes#126243, @SergeyKanzhelev) [SIG API Machinery, Apps, Node and Testing]
-
Added Node.Status.Features.SupplementalGroupsPolicy field which is set to true when the feature is implemented in the CRI implementation (KEP-3619) (kubernetes/kubernetes#125470, @everpeace) [SIG API Machinery, Apps, Node and Testing]
-
CustomResourceDefinition objects created with non-empty
caBundle
fields which are invalid or do not contain any certificates will not appear in discovery or serve endpoints until a validcaBundle
is provided. Updates to CustomResourceDefinition are no longer allowed to transition a validcaBundle
field to an invalidcaBundle
field. (kubernetes/kubernetes#124061, @Jefftree) [SIG API Machinery] -
DRA: The DRA driver's daemonset must be deployed with a service account that enables writing ResourceSlice and reading ResourceClaim objects. (kubernetes/kubernetes#125163, @pohly) [SIG Auth, Node and Testing]
-
DRA: new API and several new features (kubernetes/kubernetes#125488, @pohly) [SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Etcd, Node, Release, Scheduling, Storage and Testing]
-
DRA: the number of ResourceClaim objects can be limited per namespace and by the number of devices requested through a specific class via the v1.ResourceQuota mechanism. (kubernetes/kubernetes#120611, @pohly) [SIG API Machinery, Apps, Auth, CLI, Etcd, Node, Release, Scheduling and Testing]
-
Fix the documentation for the default value of the procMount entry in the pod securityContext. The documentation was previously using the name of the internal variable 'DefaultProcMount' rather than the actual value 'Default'. (kubernetes/kubernetes#125782, @aborrero) [SIG Apps and Node]
-
Fixed a bug in the API server where empty collections of ValidatingAdmissionPolicies did not have an
items
field. (kubernetes/kubernetes#124568, @xyz-li) [SIG API Machinery] -
Graduate the Job SuccessPolicy to Beta.
The new reason label, "SuccessPolicy" and "CompletionsReached" are added to the "jobs_finished_total" metric. Additionally, If we enable the "JobSuccessPolicy" feature gate, the Job gets "CompletionsReached" reason for the "SuccessCriteriaMet" and "Complete" condition type when the number of succeeded Job Pods (".status.succeeded") reached the desired completions (".spec.completions"). (kubernetes/kubernetes#126067, @tenzen-y) [SIG API Machinery, Apps and Testing]
-
Introduce a new boolean kubelet flag --fail-cgroupv1 (kubernetes/kubernetes#126031, @harche) [SIG API Machinery and Node]
-
Kube-apiserver: adds an alpha AuthorizeWithSelectors feature that includes field and label selector information from requests in webhook authorization calls; adds an alpha AuthorizeNodeWithSelectors feature that makes the node authorizer limit requests from node API clients to get / list / watch its own Node API object, and to get / list / watch its own Pod API objects. Clients using kubelet credentials to read other nodes or unrelated pods must change their authentication credentials (recommended), adjust their usage, or grant broader read access independent of the node authorizer. (kubernetes/kubernetes#125571, @liggitt) [SIG API Machinery, Auth, Node, Scheduling and Testing]
-
Kube-proxy Windows service control manager integration(--windows-service) is now configurable in v1alpha1 component configuration via
WindowsRunAsService
field (kubernetes/kubernetes#126072, @aroradaman) [SIG Network and Scalability] -
Promote LocalStorageCapacityIsolation to beta and enable if user namespace is enabled for the pod (kubernetes/kubernetes#126014, @PannagaRao) [SIG Apps, Autoscaling, Node, Storage and Testing]
-
Promote StatefulSetStartOrdinal to stable. This means
--feature-gates=StatefulSetStartOrdinal=true
are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation (kubernetes/kubernetes#125374, @pwschuurman) [SIG API Machinery, Apps and Testing] -
Promoted feature-gate
VolumeAttributesClass
to beta (disabled by default). Users need to enable the feature gate and the storage v1beta1 group to use this new feature.- Promoted API
VolumeAttributesClass
andVolumeAttributesClassList
tostorage.k8s.io/v1beta1
. (kubernetes/kubernetes#126145, @carlory) [SIG API Machinery, Apps, CLI, Etcd, Storage and Testing]
- Promoted API
-
Removed feature gate
CustomResourceValidationExpressions
. (kubernetes/kubernetes#126136, @cici37) [SIG API Machinery, Cloud Provider and Testing] -
Revert "Move ConsistentListFromCache feature flag to Beta and enable it by default" (kubernetes/kubernetes#126139, @enj) [SIG API Machinery]
-
Revised the Pod API with alpha support for volumes derived from OCI artefacts. This feature is behind the
ImageVolume
feature gate. (kubernetes/kubernetes#125660, @saschagrunert) [SIG API Machinery, Apps and Node] -
The Ingress.spec.defaultBackend is now considered an atomic struct for the purposes of server-side-apply. This means that any field-owner who sets values in that struct (they are mutually exclusive) owns the whole struct. For almost all users this change has no impact. For controllers which want to change port from number to name (or vice-versa), this makes it easier. (kubernetes/kubernetes#126207, @thockin) [SIG API Machinery]
-
To enhance usability and developer experience, CRD validation rules now support direct use of (CEL) reserved keywords as field names in object validation expressions for existing expressions in storage, will fully support runtime in next release for compatibility concern. (kubernetes/kubernetes#126188, @cici37) [SIG API Machinery and Testing]
-
Add UserNamespaces field to NodeRuntimeHandlerFeatures (kubernetes/kubernetes#126034, @sohankunkerkar) [SIG API Machinery, Apps and Node]
-
Fixes a 1.30.0 regression in openapi descriptions of PodIP.IP and HostIP.IP fields to mark the fields used as keys in those lists as required. (kubernetes/kubernetes#126057, @thockin) [SIG API Machinery]
-
Graduate JobPodFailurePolicy to GA and lock (kubernetes/kubernetes#125442, @mimowo) [SIG API Machinery, Apps, Scheduling and Testing]
-
Graduate PodDisruptionConditions to GA and lock (kubernetes/kubernetes#125461, @mimowo) [SIG Apps, Node, Scheduling and Testing]
-
PersistentVolumeLastPhaseTransitionTime feature is stable and enabled by default. (kubernetes/kubernetes#124969, @RomanBednar) [SIG API Machinery, Apps, Storage and Testing]
-
The (alpha) nftables mode of kube-proxy now requires version 1.0.1 or later of the nft command-line, and kernel 5.13 or later. (For testing/development purposes, you can use older kernels, as far back as 5.4, if you set the
nftables.skipKernelVersionCheck
option in the kube-proxy config, but this is not recommended in production since it may cause problems with other nftables users on the system.) (kubernetes/kubernetes#124152, @danwinship) [SIG Network] -
Use omitempty for optional Job Pod Failure Policy fields (kubernetes/kubernetes#126046, @mimowo) [SIG Apps]
-
User can choose a different static policy option
SpreadPhysicalCPUsPreferredOption
to spread cpus across physical cpus for some specific applications (kubernetes/kubernetes#123733, @Jeffwan) [SIG Node] -
DRA: in the
pod.spec.recourceClaims
array, thesource
indirection is no longer necessary. Instead of e.g.source: resourceClaimTemplateName: my-template
, one can writeresourceClaimTemplateName: my-template
. (kubernetes/kubernetes#125116, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] -
Fix code-generator client-gen to work with
api/v1
-like package structure. (kubernetes/kubernetes#125162, @sttts) [SIG API Machinery and Apps] -
KEP-1880: Users of the new feature to add multiple service CIDR will use by default a dual-write strategy on the new ClusterIP allocators to avoid the problem of possible duplicate IPs allocated to Services when running skewed kube-apiservers using different allocators. They can opt-out of this behavior by enabled the feature gate DisableAllocatorDualWrite (kubernetes/kubernetes#122047, @aojea) [SIG API Machinery, Apps, Instrumentation and Testing]
-
Kube-apiserver: ControllerRevision objects are now verified to contain valid JSON data in the
data
field. (kubernetes/kubernetes#125549, @liggitt) [SIG API Machinery and Apps] -
Update the feature MultiCIDRServiceAllocator to beta (disabled by default). Users need to enable the feature gate and the networking v1beta1 group to be able to use this new feature, that allows to dynamically reconfigure Service CIDR ranges. (kubernetes/kubernetes#125021, @aojea) [SIG API Machinery, Apps, CLI, Etcd, Instrumentation, Network and Testing]
-
When the featuregate AnonymousAuthConfigurableEndpoints is enabled users can update the AuthenticationConfig file with endpoints for with anonymous requests are alllowed. (kubernetes/kubernetes#124917, @vinayakankugoyal) [SIG API Machinery, Auth, Cloud Provider, Node and Testing]
-
Fixed incorrect "v1 Binding is deprecated in v1.6+" warning in kube-scheduler log. (kubernetes/kubernetes#125540, @pohly) [SIG API Machinery]
-
Added the feature gates
StrictCostEnforcementForVAP
andStrictCostEnforcementForWebhooks
to enforce the strct cost calculation for CEL extended libraries. It is strongly recommended to turn on the feature gates as early as possible. (kubernetes/kubernetes#124675, @cici37) [SIG API Machinery, Auth, Node and Testing] -
Component-base/logs: when compiled with Go >= 1.21, component-base will automatically configure the slog default logger together with initializing klog. (kubernetes/kubernetes#120696, @pohly) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Storage and Testing]
-
DRA: client-side validation of a ResourceHandle would have accepted a missing DriverName, whereas server-side validation then would have raised an error. (kubernetes/kubernetes#124075, @pohly) [SIG Apps]
-
Fix Deep Copy issue in getting controller reference (kubernetes/kubernetes#124116, @HiranmoyChowdhury) [SIG API Machinery and Release]
-
Fix the comment for the Job's managedBy field (kubernetes/kubernetes#124793, @mimowo) [SIG API Machinery and Apps]
-
Fixes a 1.30.0 regression in openapi descriptions of imagePullSecrets and hostAliases fields to mark the fields used as keys in those lists as either defaulted or required. (kubernetes/kubernetes#124553, @pmalek) [SIG API Machinery]
-
Graduate MatchLabelKeys/MismatchLabelKeys feature in PodAffinity/PodAntiAffinity to Beta (kubernetes/kubernetes#123638, @sanposhiho) [SIG API Machinery, Apps, Scheduling and Testing]
-
Graduated the
DisableNodeKubeProxyVersion
feature gate to beta. By default, the kubelet no longer attempts to set the.status.kubeProxyVersion
field for its associated Node. (kubernetes/kubernetes#123845, @HirazawaUi) [SIG API Machinery, Cloud Provider, Network, Node and Testing] -
Improved scheduling performance when many nodes, and prefilter returns 1-2 nodes (e.g. daemonset)
For developers of out-of-tree PostFilter plugins, note that the semantics of NodeToStatusMap are changing: A node with an absent value in the NodeToStatusMap should be interpreted as having an UnschedulableAndUnresolvable status (kubernetes/kubernetes#125197, @gabesaba) [SIG Scheduling]
-
K8s.io/apimachinery/pkg/util/runtime: new calls support handling panics and errors in the context where they occur.
PanicHandlers
andErrorHandlers
now must accept a context parameter for that. Log output is structured instead of unstructured. (kubernetes/kubernetes#121970, @pohly) [SIG API Machinery and Instrumentation] -
Kube-apiserver: the
--encryption-provider-config
file is now loaded with strict deserialization, which fails if the config file contains duplicate or unknown fields. This protects against accidentally running with config files that are malformed, mis-indented, or have typos in field names, and getting unexpected behavior. When--encryption-provider-config-automatic-reload
is used, new encryption config files that contain typos after the kube-apiserver is running are treated as invalid and the last valid config is used. (kubernetes/kubernetes#124912, @enj) [SIG API Machinery and Auth] -
Kube-controller-manager removes deprecated command flags: --volume-host-cidr-denylist and --volume-host-allow-local-loopback (kubernetes/kubernetes#124017, @carlory) [SIG API Machinery, Apps, Cloud Provider and Storage]
-
Kube-controller-manager: the
horizontal-pod-autoscaler-upscale-delay
andhorizontal-pod-autoscaler-downscale-delay
flags have been removed (deprecated and non-functional since v1.12) (kubernetes/kubernetes#124948, @SataQiu) [SIG API Machinery, Apps and Autoscaling] -
Support fine-grained supplemental groups policy (KEP-3619), which enables fine-grained control for supplementary groups in the first container processes. You can choose whether to include groups defined in the container image(/etc/groups) for the container's primary uid or not. (kubernetes/kubernetes#117842, @everpeace) [SIG API Machinery, Apps and Node]
-
The kube-proxy nodeportAddresses / --nodeport-addresses option now accepts the value "primary", meaning to only listen for NodePort connections on the node's primary IPv4 and/or IPv6 address (according to the Node object). This is strongly recommended, if you were not previously using --nodeport-addresses, to avoid surprising behavior.
(This behavior is enabled by default with the nftables backend; you would need to explicitly request
--nodeport-addresses 0.0.0.0/0,::/0
there to get the traditional "listen on all interfaces" behavior.) (kubernetes/kubernetes#123105, @danwinship) [SIG API Machinery, Network and Windows]
Kubernetes API Version: v1.30.1
New Feature:
- Add utility functions to parse and format GEP-2257 Duration strings for Gateway API
Kubernetes API Version: v1.30.1
Kubernetes API Version: v1.30.1
-
Fixes a 1.30.0 regression in openapi descriptions of imagePullSecrets and hostAliases fields to mark the fields used as keys in those lists as either defaulted or required. (kubernetes/kubernetes#124553, @pmalek) [SIG API Machinery]
-
Fixes a 1.30.0 regression in openapi descriptions of imagePullSecrets and hostAliases fields to mark the fields used as keys in those lists as either defaulted or required. (kubernetes/kubernetes#124694, @pmalek) [SIG API Machinery]
-
Added (alpha) support for the
managedBy
field on Jobs. Jobs with a custom value of this field - any value other thankubernetes.io/job-controller
- were skipped by the job controller, and their reconciliation was delegated to an external controller, indicated by the value of the field. Jobs that didn't have this field at all, or where the field value was the reserved stringkubernetes.io/job-controller
, were reconciled by the built-in job controller. (kubernetes/kubernetes#123273, @mimowo) -
Added alpha-level support for the SuccessPolicy in Jobs. (kubernetes/kubernetes#123412, @tenzen-y)
-
Added the
CEL
library for IP Addresses and CIDRs. This was made available for use starting from version1.31
. (kubernetes/kubernetes#121912, @JoelSpeed) -
Allowed container runtimes to fix an image garbage collection bug by adding an
image_id
field to the CRI Container message. (kubernetes/kubernetes#123508, @saschagrunert) -
Dynamic Resource Allocation: DRA drivers can now use "structured parameters" to let the scheduler handle claim allocation. (kubernetes/kubernetes#123516, @pohly)
-
Fixed accidental enablement of the new alpha
optionalOldSelf
API field inCustomResourceDefinition
validation rules, which should only have been allowed to be set when theCRDValidationRatcheting
feature gate is enabled. (kubernetes/kubernetes#122329, @jpbetz) -
Implemented the
prescore
extension point for thevolumeBinding
plugin. It now returns skip if it doesn't do anything in Score. (kubernetes/kubernetes#115768, @AxeZhan) -
Kubelet would fail if NodeSwap was used with LimitedSwap and cgroupv1 node. (kubernetes/kubernetes#123738, @kannon92)
-
Promoted
AdmissionWebhookMatchConditions
to GA. The feature is now stable, and the feature gate is now locked to default. (kubernetes/kubernetes#123560, @ivelichkovich) -
Structured Authentication Configuration now supports
DiscoveryURL
. If specified,discoveryURL
overrides the URL used to fetch discovery information. This is for scenarios where the well-known and jwks endpoints are hosted at a different location than the issuer (such as locally in the cluster). (kubernetes/kubernetes#123527, @aramase) -
The
StorageVersionMigration
API, previously available as a Custom Resource Definition (CRD), is now a built-in API in Kubernetes. (kubernetes/kubernetes#123344, @nilekhc) -
When configuring a JWT authenticator:
If
username.expression
used 'claims.email', then 'claims.email_verified' must have been used inusername.expression
orextra[*].valueExpression
orclaimValidationRules[*].expression
. An example claim validation rule expression that matches the validation automatically applied whenusername.claim
is set to 'email' is 'claims.?email_verified.orValue(true)'. (kubernetes/kubernetes#123737, @enj) -
readOnly
volumes now support recursive read-only mounts for kernel versions >= 5.12." (kubernetes/kubernetes#123180, @AkihiroSuda) -
cri-api: Implemented KEP-3857: Recursive Read-only (RRO) mounts. (kubernetes/kubernetes#123272, @AkihiroSuda)
-
kube-apiserver: the AuthenticationConfiguration type accepted in
--authentication-config
files has been promoted toapiserver.config.k8s.io/v1beta1
. (kubernetes/kubernetes#123696, @aramase) -
kubelet allowed specifying a custom root directory for pod logs (instead of the default /var/log/pods) using the
podLogsDir
key in kubelet configuration. (kubernetes/kubernetes#112957, @mxpv) -
resource.k8s.io/ResourceClaim (alpha API): The strategic merge patch strategy for the
status.reservedFor
array was changed so that a strategic-merge-patch can now add individual entries. This change may break clients using strategic merge patch to update status, which rely on the previous behavior (replacing the entire array). (kubernetes/kubernetes#122276, @pohly) -
Added a CBOR implementation of
runtime.Serializer
. Until CBOR graduates to Alpha, API servers will refuse to start if configured with CBOR support. (kubernetes/kubernetes#122881, @benluddy) -
Added a alpha feature, behind the
RelaxedEnvironmentVariableValidation
feature gate. When that gate is enabled, Kubernetes allows almost all printable ASCII characters to be used in the names of environment variables for containers in Pods. (kubernetes/kubernetes#123385, @HirazawaUi) -
Added a new (alpha) field,
trafficDistribution
, to the Servicespec
to express preferences for traffic distribution to endpoints. Enabled through theServiceTrafficDistribution
feature gate. (kubernetes/kubernetes#123487, @gauravkghildiyal) -
Added audienceMatchPolicy field to AuthenticationConfiguration and support for configuring multiple audiences. The "audienceMatchPolicy" can be empty (or unset) when a single audience is specified in the "audiences" field. The "audienceMatchPolicy" must be set to "MatchAny" when multiple audiences are specified in the "audiences" field. (kubernetes/kubernetes#123165, @aramase)
-
Added consistent vanity import to files and provided tooling for verifying and updating them. (kubernetes/kubernetes#120642, @jcchavezs)
-
Added the
disable-force-detach
CLI option forkube-controller-manager
. By default, it's set tofalse
. When enabled, it prevents force detaching volumes based on maximum unmount time and node status. If activated, the non-graceful node shutdown feature must be used to recover from node failure. Additionally, if a pod needs to be forcibly terminated at the risk of corruption, the appropriate VolumeAttachment object must be deleted. (kubernetes/kubernetes#120344, @rohitssingh) -
Added to
MutableFeatureGate
the ability to override the default setting of feature gates, to allow default-enabling a feature on a component-by-component basis instead of for all affected components simultaneously. (kubernetes/kubernetes#122647, @benluddy) -
Aggregated discovery supports both
v2beta1
and v2 types and feature is promoted to GA. (kubernetes/kubernetes#122882, @Jefftree) -
Alpha support for field selectors on custom resources has been added. With the
CustomResourceFieldSelectors
feature gate enabled, the CustomResourceDefinition API now allows specifyingselectableFields
. Listing a field there enables filtering custom resources for that CustomResourceDefinition in list or watch requests. (kubernetes/kubernetes#122717, @jpbetz) -
AppArmor profiles can now be configured through fields on the
PodSecurityContext
and containerSecurityContext
. The beta AppArmor annotations are deprecated, and AppArmor status is no longer included in the node ready condition. (kubernetes/kubernetes#123435, @tallclair) -
Contextual logging is now in beta and enabled by default. Check out the KEP and official documentation for more details. (kubernetes/kubernetes#122589, @pohly)
-
Enabled concurrent log rotation in kubelet. You can now configure the maximum number of concurrent rotations with the
containerLogMaxWorkers
setting, and adjust the monitoring interval withcontainerLogMonitorInterval
. (kubernetes/kubernetes#114301, @harshanarayana) -
Graduated pod scheduling gates to general availability. The
PodSchedulingReadiness
feature gate no longer has any effect, and the.spec.schedulingGates
field is always available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123575, @Huang-Wei) -
Graduated support for
minDomains
in pod topology spread constraints, to general availability. TheMinDomainsInPodTopologySpread
feature gate no longer has any effect, and the field is always available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123481, @sanposhiho) -
In kubelet configuration, the
.memorySwap.swapBehavior
field now accepts a new valueNoSwap
, which becomes the default if unspecified. The previously acceptedUnlimitedSwap
value has been dropped. (kubernetes/kubernetes#122745, @kannon92) -
Kube-apiserver: the AuthorizationConfiguration type accepted in
--authorization-config
files has been promoted toapiserver.config.k8s.io/v1beta1
. (kubernetes/kubernetes#123640, @liggitt) -
OIDC authentication will now fail if the username asserted based on a CEL expression config is the empty string. Previously the request would be authenticated with the username set to the empty string. (kubernetes/kubernetes#123568, @enj)
-
Removed note that
hostAliases
are not supported on hostNetwork Pods from the PodSpec API. The feature has been supported since v1.8. (kubernetes/kubernetes#122422, @neolit123) -
Structured Authentication Configuration now supports configuring multiple JWT authenticators. The maximum allowed JWT authenticators in the authentication configuration is 64. (kubernetes/kubernetes#123431, @aramase)
-
Text logging in Kubernetes components now uses textlogger. The same split streams of info and error log entries with buffering of info entries is now also supported for text output (off by default, alpha feature). Previously, this was only supported for JSON. Performance is better also without split streams. (kubernetes/kubernetes#114672, @pohly)
-
The API server now detects and fails on startup if there are conflicting issuers between JWT authenticators and service account configurations. Previously, such configurations would run but could be inconsistently effective depending on the credential. (kubernetes/kubernetes#123561, @enj)
-
The JWT authenticator configuration set via the
--authentication-config
flag is now dynamically reloaded as the file changes on disk. (kubernetes/kubernetes#123525, @enj) -
The
StructuredAuthenticationConfiguration
feature is now beta and enabled. (kubernetes/kubernetes#123719, @enj) -
The
kube_codegen
tool now ignores the vendor folder during code generation. (kubernetes/kubernetes#122729, @jparrill) -
The kubernetes repo now uses Go workspaces. This should not impact end users at all, but does have impact for developers of downstream projects. Switching to workspaces caused some breaking changes in the flags to the various k8s.io/code-generator tools. Downstream consumers should look at staging/src/k8s.io/code-generator/kube_codegen.sh to see the changes. (kubernetes/kubernetes#123529, @thockin)
-
Updated an audit annotation key used by the
…/serviceaccounts/<name>/token
resource handler. The annotation used to persist the issued credential identifier is nowauthentication.kubernetes.io/issued-credential-id
. (kubernetes/kubernetes#123098, @munnerz) [SIG Auth] -
Users are now allowed to mutate
FSGroupPolicy
andPodInfoOnMount
inCSIDriver.Spec
. (kubernetes/kubernetes#116209, @haoruan) -
ValidatingAdmissionPolicy was promoted to GA and will be
enabled
by default. (kubernetes/kubernetes#123405, @cici37) -
When scheduling a mix of pods using
ResourceClaims
and others that don't, scheduling a pod withResourceClaims
has a lower impact on scheduling latency. (kubernetes/kubernetes#121876, @pohly) -
When working with client-go events, it's now recommended to use
NewEventBroadcasterAdapterWithContext
instead ofNewEventBroadcasterAdapter
if contextual logging support is needed. (kubernetes/kubernetes#122142, @pohly) -
A new (alpha) field,
trafficDistribution
, has been added to the Servicespec
. This field provides a way to express preferences for how traffic is distributed to the endpoints for a Service. It can be enabled through theServiceTrafficDistribution
feature gate. (kubernetes/kubernetes#123487, @gauravkghildiyal) [SIG API Machinery, Apps and Network] -
Add alpha-level support for the SuccessPolicy in Jobs (kubernetes/kubernetes#123412, @tenzen-y) [SIG API Machinery, Apps and Testing]
-
Added (alpha) support for the managedBy field on Jobs. Jobs with a custom value of this field - any value other than
kubernetes.io/job-controller
- are skipped by the job controller, and their reconciliation is delegated to an external controller, indicated by the value of the field. Jobs that don't have this field at all, or where the field value is the reserved stringkubernetes.io/job-controller
, are reconciled by the built-in job controller. (kubernetes/kubernetes#123273, @mimowo) [SIG API Machinery, Apps and Testing] -
Added a alpha feature, behind the
RelaxedEnvironmentVariableValidation
feature gate. When that gate is enabled, Kubernetes allows almost all printable ASCII characters to be used in the names of environment variables for containers in Pods. (kubernetes/kubernetes#123385, @HirazawaUi) [SIG Apps, Node and Testing] -
Added alpha support for field selectors on custom resources. Provided that the
CustomResourceFieldSelectors
feature gate is enabled, the CustomResourceDefinition API now lets you specifyselectableFields
. Listing a field there allows filtering custom resources for that CustomResourceDefinition in list or watch requests. (kubernetes/kubernetes#122717, @jpbetz) [SIG API Machinery] -
Added support for configuring multiple JWT authenticators in Structured Authentication Configuration. The maximum allowed JWT authenticators in the authentication configuration is 64. (kubernetes/kubernetes#123431, @aramase) [SIG Auth and Testing]
-
Aggregated discovery supports both v2beta1 and v2 types and feature is promoted to GA (kubernetes/kubernetes#122882, @Jefftree) [SIG API Machinery and Testing]
-
Allowing container runtimes to fix an image garbage collection bug by adding an
image_id
field to the CRI Container message. (kubernetes/kubernetes#123508, @saschagrunert) [SIG Node] -
AppArmor profiles can now be configured through fields on the PodSecurityContext and container SecurityContext.
- The beta AppArmor annotations are deprecated.
- AppArmor status is no longer included in the node ready condition (kubernetes/kubernetes#123435, @tallclair) [SIG API Machinery, Apps, Auth, Node and Testing]
-
Conflicting issuers between JWT authenticators and service account config are now detected and fail on API server startup. Previously such a config would run but would be inconsistently effective depending on the credential. (kubernetes/kubernetes#123561, @enj) [SIG API Machinery and Auth]
-
Dynamic Resource Allocation: DRA drivers may now use "structured parameters" to let the scheduler handle claim allocation. (kubernetes/kubernetes#123516, @pohly) [SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Instrumentation, Node, Release, Scheduling, Storage and Testing]
-
Graduated pod scheduling gates to general availability. The
PodSchedulingReadiness
feature gate no longer has any effect, and the.spec.schedulingGates
field is always available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123575, @Huang-Wei) [SIG API Machinery, Apps, Node, Scheduling and Testing] -
Graduated support for
minDomains
in pod topology spread constraints, to general availability. TheMinDomainsInPodTopologySpread
feature gate no longer has any effect, and the field is always available within the Pod and PodTemplate APIs. (kubernetes/kubernetes#123481, @sanposhiho) [SIG API Machinery, Apps, Scheduling and Testing] -
JWT authenticator config set via the --authentication-config flag is now dynamically reloaded as the file changes on disk. (kubernetes/kubernetes#123525, @enj) [SIG API Machinery, Auth and Testing]
-
Kube-apiserver: the AuthenticationConfiguration type accepted in
--authentication-config
files has been promoted toapiserver.config.k8s.io/v1beta1
. (kubernetes/kubernetes#123696, @aramase) [SIG API Machinery, Auth and Testing] -
Kube-apiserver: the AuthorizationConfiguration type accepted in
--authorization-config
files has been promoted toapiserver.config.k8s.io/v1beta1
. (kubernetes/kubernetes#123640, @liggitt) [SIG Auth and Testing] -
Kubelet should fail if NodeSwap is used with LimitedSwap and cgroupv1 node. (kubernetes/kubernetes#123738, @kannon92) [SIG API Machinery, Node and Testing]
-
Kubelet: a custom root directory for pod logs (instead of default /var/log/pods) can be specified using the
podLogsDir
key in kubelet configuration. (kubernetes/kubernetes#112957, @mxpv) [SIG API Machinery, Node, Scalability and Testing] -
Kubelet: the
.memorySwap.swapBehavior
field in kubelet configuration accepts a new valueNoSwap
and makes this the default if unspecified; the previously acceptedUnlimitedSwap
value has been dropped. (kubernetes/kubernetes#122745, @kannon92) [SIG API Machinery, Node and Testing] -
OIDC authentication will now fail if the username asserted based on a CEL expression config is the empty string. Previously the request would be authenticated with the username set to the empty string. (kubernetes/kubernetes#123568, @enj) [SIG API Machinery, Auth and Testing]
-
PodSpec API: remove note that hostAliases are not supported on hostNetwork Pods. The feature has been supported since v1.8. (kubernetes/kubernetes#122422, @neolit123) [SIG API Machinery and Apps]
-
Promote AdmissionWebhookMatchConditions to GA. The feature is now stable and the feature gate is now locked to default. (kubernetes/kubernetes#123560, @ivelichkovich) [SIG API Machinery and Testing]
-
Structured Authentication Configuration now supports
DiscoveryURL
. discoveryURL if specified, overrides the URL used to fetch discovery information. This is for scenarios where the well-known and jwks endpoints are hosted at a different location than the issuer (such as locally in the cluster). (kubernetes/kubernetes#123527, @aramase) [SIG API Machinery, Auth and Testing] -
Support Recursive Read-only (RRO) mounts (KEP-3857) (kubernetes/kubernetes#123180, @AkihiroSuda) [SIG API Machinery, Apps, Node and Testing]
-
The StructuredAuthenticationConfiguration feature is now beta and enabled by default. (kubernetes/kubernetes#123719, @enj) [SIG API Machinery and Auth]
-
The
StorageVersionMigration
API, which was previously available as a Custom Resource Definition (CRD), is now a built-in API in Kubernetes. (kubernetes/kubernetes#123344, @nilekhc) [SIG API Machinery, Apps, Auth, CLI and Testing] -
The kubernetes repo now uses Go workspaces. This should not impact end users at all, but does have impact for developers of downstream projects. Switching to workspaces caused some breaking changes in the flags to the various k8s.io/code-generator tools. Downstream consumers should look at staging/src/k8s.io/code-generator/kube_codegen.sh to see the changes. (kubernetes/kubernetes#123529, @thockin) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Storage and Testing]
-
ValidatingAdmissionPolicy is promoted to GA and will be enabled by default. (kubernetes/kubernetes#123405, @cici37) [SIG API Machinery, Apps, Auth and Testing]
-
When configuring a JWT authenticator:
If username.expression uses 'claims.email', then 'claims.email_verified' must be used in username.expression or extra[].valueExpression or claimValidationRules[].expression. An example claim validation rule expression that matches the validation automatically applied when username.claim is set to 'email' is 'claims.?email_verified.orValue(true)'. (kubernetes/kubernetes#123737, @enj) [SIG API Machinery and Auth]
-
Added a CBOR implementation of
runtime.Serializer
. Until CBOR graduates to Alpha, API servers will refuse to start if configured with CBOR support. (kubernetes/kubernetes#122881, @benluddy) [SIG API Machinery] -
Added audienceMatchPolicy field to AuthenticationConfiguration and support for configuring multiple audiences.
- The "audienceMatchPolicy" can be empty (or unset) when a single audience is specified in the "audiences" field.
- The "audienceMatchPolicy" must be set to "MatchAny" when multiple audiences are specified in the "audiences" field. (kubernetes/kubernetes#123165, @aramase) [SIG API Machinery, Auth and Testing]
-
Contextual logging is now beta and enabled by default. (kubernetes/kubernetes#122589, @pohly) [SIG Instrumentation]
-
Cri-api: KEP-3857: Recursive Read-only (RRO) mounts (kubernetes/kubernetes#123272, @AkihiroSuda) [SIG Node]
-
Enabled a mechanism for concurrent log rotatation via
kubelet
using a configuration entity ofcontainerLogMaxWorkers
which controls the maximum number of concurrent rotation that can be performed and an interval configuration ofcontainerLogMonitorInterval
that can aid is configuring the monitoring duration to best suite your cluster's log generation standards. (kubernetes/kubernetes#114301, @harshanarayana) [SIG API Machinery, Node and Testing] -
Text logging in Kubernetes components now uses textlogger. The same split streams of info and error log entries with buffering of info entries is now also supported for text output (off by default, alpha feature). Previously, this was only supported for JSON. Performance is better also without split streams. (kubernetes/kubernetes#114672, @pohly) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Storage and Testing]
-
This change adds the following CLI option for
kube-controller-manager
:disable-force-detach
(defaults tofalse
): Prevent force detaching volumes based on maximum unmount time and node status. If enabled, the non-graceful node shutdown feature must be used to recover from node failure (see https://kubernetes.io/blog/2023/08/16/kubernetes-1-28-non-graceful-node-shutdown-ga/). If enabled and a pod must be forcibly terminated at the risk of corruption, then the appropriate VolumeAttachment object (see here: https://kubernetes.io/docs/reference/kubernetes-api/config-and-storage-resources/volume-attachment-v1/) must be deleted. (kubernetes/kubernetes#120344, @rohitssingh) [SIG API Machinery, Apps, Storage and Testing]
-
Updated an audit annotation key used by the
…/serviceaccounts/<name>/token
resource handler. The annotation used to persist the issued credential identifier is nowauthentication.kubernetes.io/issued-credential-id
. (kubernetes/kubernetes#123098, @munnerz) [SIG Auth] -
Add CEL library for IP Addresses and CIDRs. This will not be available for use until 1.31. (kubernetes/kubernetes#121912, @JoelSpeed) [SIG API Machinery]
-
Added to MutableFeatureGate the ability to override the default setting of feature gates, to allow default-enabling a feature on a component-by-component basis instead of for all affected components simultaneously. (kubernetes/kubernetes#122647, @benluddy) [SIG API Machinery and Cluster Lifecycle]
-
Adds a rule on the kube_codegen tool to ignore vendor folder during the code generation. (kubernetes/kubernetes#122729, @jparrill) [SIG API Machinery and Cluster Lifecycle]
-
Allow users to mutate FSGroupPolicy and PodInfoOnMount in CSIDriver.Spec (kubernetes/kubernetes#116209, @haoruan) [SIG API Machinery, Storage and Testing]
-
Client-go events:
NewEventBroadcasterAdapterWithContext
should be used instead ofNewEventBroadcasterAdapter
if the goal is to support contextual logging. (kubernetes/kubernetes#122142, @pohly) [SIG API Machinery, Instrumentation and Scheduling] -
Fixes accidental enablement of the new alpha
optionalOldSelf
API field in CustomResourceDefinition validation rules, which should only be allowed to be set when the CRDValidationRatcheting feature gate is enabled. (kubernetes/kubernetes#122329, @jpbetz) [SIG API Machinery] -
Implement
prescore
extension point forvolumeBinding
plugin. Return skip if it doesn't do anything in Score. (kubernetes/kubernetes#115768, @AxeZhan) [SIG Scheduling, Storage and Testing] -
Resource.k8s.io/ResourceClaim (alpha API): the strategic merge patch strategy for the
status.reservedFor
array was changed such that a strategic-merge-patch can add individual entries. This breaks clients using strategic merge patch to update status which rely on the previous behavior (replacing the entire array). (kubernetes/kubernetes#122276, @pohly) [SIG API Machinery] -
When scheduling a mixture of pods using ResourceClaims and others which don't, scheduling a pod with ResourceClaims impacts scheduling latency less. (kubernetes/kubernetes#121876, @pohly) [SIG API Machinery, Node, Scheduling and Testing]
Kubernetes API Version: v1.29.0
- Fix UTF-8 failures in Watch (#2100, @davidopic)
- Fix upper version boundary of urllib3, since other dependencies don't support urllib3 in version 2 (#2105, @jsaalfeld)
Kubernetes API Version: v1.29.0
- Fix UTF-8 failures in Watch (#2100, @davidopic)
- Fix upper version boundary of urllib3, since other dependencies don't support urllib3 in version 2 (#2105, @jsaalfeld)
Kubernetes API Version: v1.29.0
-
'
kube-apiserver
: adds--authentication-config
flag for readingAuthenticationConfiguration
files.--authentication-config
flag is mutually exclusive with the existing--oidc-*
flags.' (kubernetes/kubernetes#119142, @aramase) -
'
kube-scheduler
component config (KubeSchedulerConfiguration
)kubescheduler.config.k8s.io/v1beta3
is removed inv1.29
. Migratedkube-scheduler
configuration files tokubescheduler.config.k8s.io/v1
.' (kubernetes/kubernetes#119994, @SataQiu) -
A new sleep action for the
PreStop
lifecycle hook was added, allowing containers to pause for a specified duration before termination. (kubernetes/kubernetes#119026, @AxeZhan) -
Added CEL expressions to
v1alpha1 AuthenticationConfiguration
. (kubernetes/kubernetes#121078, @aramase) -
Added Windows support for InPlace Pod Vertical Scaling feature. (kubernetes/kubernetes#112599, @fabi200123) [SIG Autoscaling, Node, Scalability, Scheduling and Windows]
-
Added
ImageMaximumGCAge
field to Kubelet configuration, which allows a user to set the maximum age an image is unused before it's garbage collected. (kubernetes/kubernetes#121275, @haircommander) -
Added
UserNamespacesPodSecurityStandards
feature gate to enable user namespace support for Pod Security Standards. Enabling this feature will modify all Pod Security Standard rules to allow setting:spec[.*].securityContext.[runAsNonRoot,runAsUser]
. This feature gate should only be enabled if all nodes in the cluster support the user namespace feature and have it enabled. The feature gate will not graduate or be enabled by default in future Kubernetes releases. (kubernetes/kubernetes#118760, @saschagrunert) [SIG API Machinery, Auth, Node and Release] -
Added
optionalOldSelf
tox-kubernetes-validations
to support ratcheting CRD schema constraints. (kubernetes/kubernetes#121034, @alexzielenski) -
Added a new
ServiceCIDR
type that allows to dynamically configure the cluster range used to allocateService ClusterIPs
addresses. (kubernetes/kubernetes#116516, @aojea) -
Added a new
ipMode
field to the.status
of Services wheretype
is set toLoadBalancer
. The new field is behind theLoadBalancerIPMode
feature gate. (kubernetes/kubernetes#119937, @RyanAoh) [SIG API Machinery, Apps, Cloud Provider, Network and Testing] -
Added options for configuring
nf_conntrack_udp_timeout
, andnf_conntrack_udp_timeout_stream
variables of netfilter conntrack subsystem. (kubernetes/kubernetes#120808, @aroradaman) -
Added support for CEL expressions to
v1alpha1 AuthorizationConfiguration
webhookmatchConditions
. (kubernetes/kubernetes#121223, @ritazh) -
Added support for projecting
certificates.k8s.io/v1alpha1
ClusterTrustBundle objects into pods. (kubernetes/kubernetes#113374, @ahmedtd) -
Added the
DisableNodeKubeProxyVersion
feature gate. IfDisableNodeKubeProxyVersion
is enabled, thekubeProxyVersion
field is not set. (kubernetes/kubernetes#120954, @HirazawaUi) -
Fixed a bug where CEL expressions in CRD validation rules would incorrectly compute a high estimated cost for functions that return strings, lists or maps. The incorrect cost was evident when the result of a function was used in subsequent operations. (kubernetes/kubernetes#119800, @jpbetz) [SIG API Machinery, Auth and Cloud Provider]
-
Fixed the API comments for the Job
Ready
field in status. (kubernetes/kubernetes#121765, @mimowo) -
Fixed the API comments for the
FailIndex
Job pod failure policy action. (kubernetes/kubernetes#121764, @mimowo) -
Go API: the
ResourceRequirements
struct was replaced withVolumeResourceRequirements
for use with volumes. (kubernetes/kubernetes#118653, @pohly) -
Graduated
Job BackoffLimitPerIndex
feature tobeta
. (kubernetes/kubernetes#121356, @mimowo) -
Marked the
onPodConditions
field as optional inJob
's pod failure policy. (kubernetes/kubernetes#120204, @mimowo) -
Promoted
PodReadyToStartContainers
condition tobeta
. (kubernetes/kubernetes#119659, @kannon92) -
The
flowcontrol.apiserver.k8s.io/v1beta3
FlowSchema
andPriorityLevelConfiguration
APIs has been promoted toflowcontrol.apiserver.k8s.io/v1
, with the following changes:PriorityLevelConfiguration
: the.spec.limited.nominalConcurrencyShares
field defaults to30
only if the field is omitted (v1beta3 also defaulted an explicit0
value to30
). Specifying an explicit0
value is not allowed in thev1
version in v1.29 to ensure compatibility withv1.28
API servers. Inv1.30
, explicit0
values will be allowed in this field in thev1
API. Theflowcontrol.apiserver.k8s.io/v1beta3
APIs are deprecated and will no longer be served in v1.32. All existing objects are available via thev1
APIs. Transition clients and manifests to use thev1
APIs before upgrading tov1.32
. (kubernetes/kubernetes#121089, @tkashem)
-
The
kube-proxy
command-line documentation was updated to clarify that--bind-address
does not actually have anything to do with binding to an address, and you probably don't actually want to be using it. (kubernetes/kubernetes#120274, @danwinship) -
The
kube-scheduler
selectorSpread
plugin has been removed, please use thepodTopologySpread
plugin instead. (kubernetes/kubernetes#117720, @kerthcet) -
The
matchLabelKeys/mismatchLabelKeys
feature is introduced to the hard/softPodAffinity/PodAntiAffinity
. (kubernetes/kubernetes#116065, @sanposhiho) -
When updating a CRD, per-expression cost limit check are now skipped for
x-kubernetes-validations
rules of versions that are not mutated. (kubernetes/kubernetes#121460, @jiahuif) -
CSINodeExpandSecret
feature has been promoted toGA
in this release and is enabled by default. The CSI drivers can make use of thesecretRef
values passed inNodeExpansion
request optionally sent by the CSI Client from this release onwards. (kubernetes/kubernetes#121303, @humblec) -
NodeStageVolume
calls will now be retried if the CSI node driver is not running. (kubernetes/kubernetes#120330, @rohitssingh) -
PersistentVolumeLastPhaseTransitionTime
is now beta and enabled by default. (kubernetes/kubernetes#120627, @RomanBednar) -
ValidatingAdmissionPolicy
type checking now supports CRDs and API extensions types. (kubernetes/kubernetes#119109, @jiahuif) -
kube-apiserver
: added--authorization-config
flag for reading a configuration file containing anapiserver.config.k8s.io/v1alpha1 AuthorizationConfiguration
object. The--authorization-config
flag is mutually exclusive with--authorization-modes
and--authorization-webhook-*
flags. Thealpha
StructuredAuthorizationConfiguration
feature flag must be enabled for--authorization-config
to be specified. (kubernetes/kubernetes#120154, @palnabarun) -
kube-proxy
now has a new nftables-based mode, available by running`kube-proxy --feature-gates NFTablesProxyMode=true --proxy-mode nftables`
This is currently an alpha-level feature and while it probably will not eat your data, it may nibble at it a bit. (It passes e2e testing but has not yet seen real-world use.)
At this point it should be functionally mostly identical to the iptables mode, except that it does not (and will not) support Service NodePorts on 127.0.0.1. (Also note that there are currently no command-line arguments for the nftables-specific config; you will need to use a config file if you want to set the equivalent of any of the
--iptables-xxx
options.)As this code is still very new, it has not been heavily optimized yet; while it is expected to eventually have better performance than the iptables backend, very little performance testing has been done so far. (kubernetes/kubernetes#121046, @danwinship)
-
kube-proxy
: Added an option/flag for configuring thenf_conntrack_tcp_be_liberal
sysctl (in the kernel's netfilter conntrack subsystem). When enabled,kube-proxy
will not install theDROP
rule for invalid conntrack states, which currently breaks users of asymmetric routing. (kubernetes/kubernetes#120354, @aroradaman) -
Added support for projecting certificates.k8s.io/v1alpha1 ClusterTrustBundle objects into pods. (kubernetes/kubernetes#113374, @ahmedtd) [SIG API Machinery, Apps, Auth, Node, Storage and Testing]
-
Adds
optionalOldSelf
tox-kubernetes-validations
to support ratcheting CRD schema constraints (kubernetes/kubernetes#121034, @alexzielenski) [SIG API Machinery] -
Fix API comment for the Job Ready field in status (kubernetes/kubernetes#121765, @mimowo) [SIG API Machinery and Apps]
-
Fix API comments for the FailIndex Job pod failure policy action. (kubernetes/kubernetes#121764, @mimowo) [SIG API Machinery and Apps]
-
A new sleep action for the PreStop lifecycle hook is added, allowing containers to pause for a specified duration before termination. (kubernetes/kubernetes#119026, @AxeZhan) [SIG API Machinery, Apps, Node and Testing]
-
Add ImageMaximumGCAge field to Kubelet configuration, which allows a user to set the maximum age an image is unused before it's garbage collected. (kubernetes/kubernetes#121275, @haircommander) [SIG API Machinery and Node]
-
Add a new ServiceCIDR type that allows to dynamically configure the cluster range used to allocate Service ClusterIPs addresses (kubernetes/kubernetes#116516, @aojea) [SIG API Machinery, Apps, Auth, CLI, Network and Testing]
-
Add the DisableNodeKubeProxyVersion feature gate. If DisableNodeKubeProxyVersion is enabled, the kubeProxyVersion field is not set. (kubernetes/kubernetes#120954, @HirazawaUi) [SIG API Machinery, Apps and Node]
-
Added Windows support for InPlace Pod Vertical Scaling feature. (kubernetes/kubernetes#112599, @fabi200123) [SIG Autoscaling, Node, Scalability, Scheduling and Windows]
-
Added
UserNamespacesPodSecurityStandards
feature gate to enable user namespace support for Pod Security Standards. Enabling this feature will modify all Pod Security Standard rules to allow setting:spec[.*].securityContext.[runAsNonRoot,runAsUser]
. This feature gate should only be enabled if all nodes in the cluster support the user namespace feature and have it enabled. The feature gate will not graduate or be enabled by default in future Kubernetes releases. (kubernetes/kubernetes#118760, @saschagrunert) [SIG API Machinery, Auth, Node and Release] -
Added options for configuring nf_conntrack_udp_timeout, and nf_conntrack_udp_timeout_stream variables of netfilter conntrack subsystem. (kubernetes/kubernetes#120808, @aroradaman) [SIG API Machinery and Network]
-
Adds CEL expressions to v1alpha1 AuthenticationConfiguration. (kubernetes/kubernetes#121078, @aramase) [SIG API Machinery, Auth and Testing]
-
Adds support for CEL expressions to v1alpha1 AuthorizationConfiguration webhook matchConditions. (kubernetes/kubernetes#121223, @ritazh) [SIG API Machinery and Auth]
-
CSINodeExpandSecret feature has been promoted to GA in this release and enabled by default. The CSI drivers can make use of the
secretRef
values passed in NodeExpansion request optionally sent by the CSI Client from this release onwards. (kubernetes/kubernetes#121303, @humblec) [SIG API Machinery, Apps and Storage] -
Graduate Job BackoffLimitPerIndex feature to Beta (kubernetes/kubernetes#121356, @mimowo) [SIG Apps]
-
Kube-apiserver: adds --authorization-config flag for reading a configuration file containing an apiserver.config.k8s.io/v1alpha1 AuthorizationConfiguration object. --authorization-config flag is mutually exclusive with --authorization-modes and --authorization-webhook-* flags. The alpha StructuredAuthorizationConfiguration feature flag must be enabled for --authorization-config to be specified. (kubernetes/kubernetes#120154, @palnabarun) [SIG API Machinery, Auth and Testing]
-
Kube-proxy now has a new nftables-based mode, available by running
kube-proxy --feature-gates NFTablesProxyMode=true --proxy-mode nftables
This is currently an alpha-level feature and while it probably will not eat your data, it may nibble at it a bit. (It passes e2e testing but has not yet seen real-world use.)
At this point it should be functionally mostly identical to the iptables mode, except that it does not (and will not) support Service NodePorts on 127.0.0.1. (Also note that there are currently no command-line arguments for the nftables-specific config; you will need to use a config file if you want to set the equivalent of any of the
--iptables-xxx
options.)As this code is still very new, it has not been heavily optimized yet; while it is expected to eventually have better performance than the iptables backend, very little performance testing has been done so far. (kubernetes/kubernetes#121046, @danwinship) [SIG API Machinery and Network]
-
Kube-proxy: Added an option/flag for configuring the
nf_conntrack_tcp_be_liberal
sysctl (in the kernel's netfilter conntrack subsystem). When enabled, kube-proxy will not install the DROP rule for invalid conntrack states, which currently breaks users of asymmetric routing. (kubernetes/kubernetes#120354, @aroradaman) [SIG API Machinery and Network] -
PersistentVolumeLastPhaseTransitionTime is now beta, enabled by default. (kubernetes/kubernetes#120627, @RomanBednar) [SIG Storage]
-
Promote PodReadyToStartContainers condition to beta. (kubernetes/kubernetes#119659, @kannon92) [SIG Node and Testing]
-
The flowcontrol.apiserver.k8s.io/v1beta3 FlowSchema and PriorityLevelConfiguration APIs has been promoted to flowcontrol.apiserver.k8s.io/v1, with the following changes:
- PriorityLevelConfiguration: the
.spec.limited.nominalConcurrencyShares
field defaults to30
only if the field is omitted (v1beta3 also defaulted an explicit0
value to30
). Specifying an explicit0
value is not allowed in thev1
version in v1.29 to ensure compatibility with 1.28 API servers. In v1.30, explicit0
values will be allowed in this field in thev1
API. The flowcontrol.apiserver.k8s.io/v1beta3 APIs are deprecated and will no longer be served in v1.32. All existing objects are available via thev1
APIs. Transition clients and manifests to use thev1
APIs before upgrading to v1.32. (kubernetes/kubernetes#121089, @tkashem) [SIG API Machinery and Testing]
- PriorityLevelConfiguration: the
-
The kube-proxy command-line documentation was updated to clarify that
--bind-address
does not actually have anything to do with binding to an address, and you probably don't actually want to be using it. (kubernetes/kubernetes#120274, @danwinship) [SIG Network] -
The matchLabelKeys/mismatchLabelKeys feature is introduced to the hard/soft PodAffinity/PodAntiAffinity. (kubernetes/kubernetes#116065, @sanposhiho) [SIG API Machinery, Apps, Cloud Provider, Scheduling and Testing]
-
ValidatingAdmissionPolicy Type Checking now supports CRDs and API extensions types. (kubernetes/kubernetes#119109, @jiahuif) [SIG API Machinery, Apps, Auth and Testing]
-
When updating a CRD, per-expression cost limit check is skipped for x-kubernetes-validations rules of versions that are not mutated. (kubernetes/kubernetes#121460, @jiahuif) [SIG API Machinery]
-
Added a new
ipMode
field to the.status
of Services wheretype
is set toLoadBalancer
. The new field is behind theLoadBalancerIPMode
feature gate. (kubernetes/kubernetes#119937, @RyanAoh) [SIG API Machinery, Apps, Cloud Provider, Network and Testing] -
Fixed a bug where CEL expressions in CRD validation rules would incorrectly compute a high estimated cost for functions that return strings, lists or maps. The incorrect cost was evident when the result of a function was used in subsequent operations. (kubernetes/kubernetes#119800, @jpbetz) [SIG API Machinery, Auth and Cloud Provider]
-
Go API: the ResourceRequirements struct needs to be replaced with VolumeResourceRequirements for use with volumes. (kubernetes/kubernetes#118653, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling, Storage and Testing]
-
Kube-apiserver: adds --authentication-config flag for reading AuthenticationConfiguration files. --authentication-config flag is mutually exclusive with the existing --oidc-* flags. (kubernetes/kubernetes#119142, @aramase) [SIG API Machinery, Auth and Testing]
-
Kube-scheduler component config (KubeSchedulerConfiguration) kubescheduler.config.k8s.io/v1beta3 is removed in v1.29. Migrate kube-scheduler configuration files to kubescheduler.config.k8s.io/v1. (kubernetes/kubernetes#119994, @SataQiu) [SIG Scheduling and Testing]
-
Mark the onPodConditions field as optional in Job's pod failure policy. (kubernetes/kubernetes#120204, @mimowo) [SIG API Machinery and Apps]
-
Retry NodeStageVolume calls if CSI node driver is not running (kubernetes/kubernetes#120330, @rohitssingh) [SIG Apps, Storage and Testing]
-
The kube-scheduler
selectorSpread
plugin has been removed, please use thepodTopologySpread
plugin instead. (kubernetes/kubernetes#117720, @kerthcet) [SIG Scheduling]
Kubernetes API Version: v1.28.2
- Fixed a bug where CEL expressions in CRD validation rules would incorrectly compute a high estimated cost for functions that return strings, lists or maps. The incorrect cost was evident when the result of a function was used in subsequent operations. (kubernetes/kubernetes#119807, @jpbetz) [SIG API Machinery, Auth and Cloud Provider]
- Mark Job onPodConditions as optional in pod failure policy (kubernetes/kubernetes#120208, @mimowo) [SIG API Machinery and Apps]
Kubernetes API Version: v1.28.1
Kubernetes API Version: v1.28.1
- A CDIDevice field is included in the Device Plugin's
ContainerAllocateResponse
. This field maps to the CDIDevice field in the CRI protocol. (kubernetes/kubernetes#118254, @elezar) [SIG Node and Testing] - ACTION_REQUIRED When an Indexed Job has a number of completions higher than 10^5 and parallelism higher than 10^4, and a big number of Indexes fail, Kubernetes might not be able to track the termination of the Job. Kubernetes now emits a warning, at Job creation, when the Job manifest exceeds both of these limits. (kubernetes/kubernetes#118420, @alculquicondor) [SIG Apps]
- Added
ServedVersions
field toStorageVersion
API. (kubernetes/kubernetes#118386, @Richabanker) - Added
IP mode
field to loadbalancer status ingress. (kubernetes/kubernetes#118895, @RyanAoh) - Added
podReplacementPolicy
and terminating field to job api. (kubernetes/kubernetes#119301, @kannon92) - Added a new
namespaceParamRef
field toadmissionregistration.k8s.io/v1alpha1.ValidatingAdmissionPolicy
. (kubernetes/kubernetes#119215, @alexzielenski) [SIG API Machinery and Testing] - Added a warning that TLS 1.3 ciphers are not configurable. (kubernetes/kubernetes#115399, @3u13r) [SIG API Machinery and Node]
- Added error handling for seccomp localhost configurations that do not properly set a
localhostProfile
. (kubernetes/kubernetes#117020, @cji) - Added fields
reason
andfieldPath
into CRD validation rules to allow users to specify reason and field path when validation failed. (kubernetes/kubernetes#118041, @cici37) [SIG API Machinery] - Added namespace access support to the CEL expressions of ValidatingAdmissionPolicy via a
namespaceObject
variable with expressions. (kubernetes/kubernetes#118267, @cici37) [SIG API Machinery and Testing] - Added new
CRDValidationRatcheting
alpha feature. During a PATCH or UPDATE Validation Ratcheting discards errors thrown by unchanged portions of the resource from most OpenAPI schema validations. (kubernetes/kubernetes#118990, @alexzielenski) - Added new annotation
batch.kubernetes.io/cronjob-scheduled-timestamp
to Job objects scheduled from CronJobs. (kubernetes/kubernetes#118137, @helayoty) - Added new config option
delayCacheUntilActive
toKubeSchedulerConfiguration
that can provide a tradeoff between memory efficiency and scheduling speed when their leadership is updated inkube-scheduler
(kubernetes/kubernetes#115754, @linxiulei) [SIG API Machinery and Scheduling] - Changed how KMS v2 encryption at rest can generate data encryption keys.
When you enable the
KMSv2KDF
feature gate (off by default), KMS v2 uses a key derivation function to generate single use data encryption keys from a secret seed combined with some random data. This eliminates the need for a counter based nonce while avoiding nonce collision concerns associated with AES-GCM's 12 byte nonce. (kubernetes/kubernetes#118828, @enj) - Exposed
rest.DefaultServerUrlFor
function. (kubernetes/kubernetes#118055, @timofurrer) - Extended the Job API for alpha version of
BackoffLimitPerIndex
. (kubernetes/kubernetes#119294, @mimowo) - Graduated
AdmissionWebhookMatchCondition
feature to beta. (kubernetes/kubernetes#119380, @a-hilaly) - If using cgroups v2, then the cgroup aware OOM killer will be enabled for container cgroups via
memory.oom.group
. This causes processes within the cgroup to be treated as a unit and killed simultaneously in the event of an OOM kill on any process in the cgroup. (kubernetes/kubernetes#117793, @tzneal) [SIG Apps, Node and Testing] - In the API Priority and Fairness feature, priority levels that are exempt from limitation can now be given a nominal and a lendable concurrency and their dispatching borrows from the concurrency limits of the other priority levels. For details see https://github.com/kubernetes/enhancements/tree/master/keps/sig-api-machinery/1040-priority-and-fairness#dispatching . (kubernetes/kubernetes#118782, @MikeSpreitzer) [SIG API Machinery]
- Indexed Job pods now have the pod completion index set as a pod label. (kubernetes/kubernetes#118883, @danielvegamyhre) [SIG Apps]
- Kube-proxy: added
--logging-format
flag to support structured logging. (kubernetes/kubernetes#117800, @cyclinder) - NodeVolumeLimits implement the
PreFilter
extension point for skipping the Filter phase if the Pod doesn't use volumes with limits. (kubernetes/kubernetes#115398, @tangwz) [SIG Scheduling] - PersistentVolumes have a new
LastPhaseTransitionTime
field which holds a timestamp of when the volume last transitioned its phase. (kubernetes/kubernetes#116469, @RomanBednar) - Pods which set
hostNetwork: true
and declare ports, get thehostPort
field set automatically. Previously this would happen in the PodTemplate of a Deployment, DaemonSet or other workload API. NowhostPort
will only be set when an actual Pod is being created. If this presents a problem, setting the feature gate "DefaultHostNetworkHostPortsInPodTemplates" to true will revert this behavior. Please file a kubernetes bug if you need to do this. (kubernetes/kubernetes#117696, @thockin) [SIG Apps] - Promoted API groups
ValidatingAdmissionPolicy
andValidatingAdmissionPolicyBinding
tov1beta1
. (kubernetes/kubernetes#118644, @alexzielenski) [SIG API Machinery, Apps and Testing] - Promoted the feature gate
ValidtaingAdmissionPolicy
to beta, and it is turned off by default. (kubernetes/kubernetes#119409, @alexzielenski) - Registered_metric_total, disabled_metric_total, hidden_metric_total & kubernetes_feature_enabled are promoted to
BETA
stability. (kubernetes/kubernetes#119264, @logicalhan) [SIG API Machinery, Architecture, Cluster Lifecycle and Instrumentation] - Removed
resizeStatus
enum frompvc.Status
and replaced withAllocatedResourceStatus
. (kubernetes/kubernetes#116335, @gnufied) [SIG API Machinery, Apps, Auth, Node, Storage and Testing] - Removed
WindowsHostProcessContainers
feature-gate. (kubernetes/kubernetes#117570, @marosset) [SIG API Machinery, Apps, Auth, Node and Windows] - Revised the comment about the feature-gate level for
PodFailurePolicy
from alpha to beta. (kubernetes/kubernetes#117802, @kerthcet) [SIG API Machinery and Apps] - StatefulSet pods now have the pod index set as a pod label
statefulset.kubernetes.io/pod-index
. (kubernetes/kubernetes#119232, @danielvegamyhre) [SIG Apps] - Support for proxying a request to a peer kube-apiserver if the local apiserver is not able to serve it due to version skew or in the case the requested api is disabled on the local apiserver (kubernetes/kubernetes#117740, @Richabanker) [SIG API Machinery, Apps, Auth, Cloud Provider, Network, Node and Testing]
- Supported
BackoffLimitPerIndex
in Jobs. (kubernetes/kubernetes#118009, @mimowo) - The
IPTablesOwnershipCleanup
feature (KEP-3178) is now GA; kubelet no longer creates theKUBE-MARK-DROP
chain (which has been unused for several releases) or theKUBE-MARK-MASQ
chain (which is now only created by kube-proxy). (kubernetes/kubernetes#119374, @danwinship) - The
SelfSubjectReview
API is promoted toauthentication.k8s.io/v1
and thekubectl auth whoami
command is GA. (kubernetes/kubernetes#117713, @nabokihms) [SIG API Machinery, Architecture, Auth, CLI and Testing] - The names of ResourceClaims generated from ResourceClaimTemplate are now generated. The base name is still
<pod>-<claim name>
, but a random suffix will avoid name collisions. (kubernetes/kubernetes#117351, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] - The new feature gate "SidecarContainers" is now available. This feature introduces sidecar containers, a new type of init container that starts before other containers but remains running for the full duration of the pod's lifecycle and will not block pod termination. (kubernetes/kubernetes#116429, @gjkim42) [SIG API Machinery, Apps, Node, Scheduling and Testing]
- Updated the comment about the feature-gate level for
PodFailurePolicy
from alpha to beta (kubernetes/kubernetes#118278, @mimowo) client-go
: Improved memory use of reflector caches when watching large numbers of objects which do not change frequently. (kubernetes/kubernetes#113362, @sxllwx)component-base/logs
is now stricter about not applying configurations multiple times and will return an error when that is attempted. Can be overridden by binaries which need to do that. (kubernetes/kubernetes#117108, @pohly)kube-controller-manager
: TheLegacyServiceAccountTokenCleanUp
feature gate is now available as alpha (off by default). When enabled, thelegacy-service-account-token-cleaner
controller loop removes service account token secrets that have not been used in the time specified by--legacy-service-account-token-clean-up-period
(defaulting to one year), and are referenced from the.secrets
list of a ServiceAccount object, and are not referenced from pods. (kubernetes/kubernetes#115554, @yt2985)kube-scheduler
component config (KubeSchedulerConfiguration)kubescheduler.config.k8s.io/v1beta2
is removed inv1.28
. Migratekube-scheduler
configuration files tokubescheduler.config.k8s.io/v1
. (kubernetes/kubernetes#117649, @SataQiu)- Aggregated discovery now returns
responseKind: {}
for resources which are missing group/version/kind information, to ensure compatibility with v0.26.0-v0.26.3 clients. (kubernetes/kubernetes#119835, @liggitt) [SIG API Machinery and Testing] - Fix CustomResourceDefinition status.storedVersions validation error messages. (kubernetes/kubernetes#119653, @sttts) [SIG API Machinery]
- Kube-proxy in Kubernetes >= 1.28 up until v1.28.0-beta.0 ignored the
-v
command line flag when combined with--config
. (kubernetes/kubernetes#119867, @pohly) [SIG Network] - PersistentVolumes have a new LastPhaseTransitionTime field which holds a timestamp of when the volume last transitioned its phase. (kubernetes/kubernetes#116469, @RomanBednar) [SIG API Machinery, Apps, Auth, Node, Release, Storage and Testing]
- Promoted API groups
ValidatingAdmissionPolicy
andValidatingAdmissionPolicyBinding
tov1beta1
. (kubernetes/kubernetes#118644, @alexzielenski) [SIG API Machinery, Apps and Testing] - Promoted the feature gate
ValidtaingAdmissionPolicy
to beta and it is turned off by default. (kubernetes/kubernetes#119409, @alexzielenski) [SIG API Machinery, Apps, Auth, Instrumentation, Node, Release, Storage and Testing] - Changed how KMS v2 encryption at rest can generate data encryption keys. When you enable the
KMSv2KDF
feature gate (off by default), KMS v2 uses a key derivation function to generate single use data encryption keys from a secret seed combined with some random data. This eliminates the need for a counter based nonce while avoiding nonce collision concerns associated with AES-GCM's 12 byte nonce. (kubernetes/kubernetes#118828, @enj) [SIG API Machinery, Auth and Testing] - A CDIDevice field is includes in the Device Plugin's
ContainerAllocateResponse
. This field maps to the CDIDevice field in the CRI protocol. (kubernetes/kubernetes#118254, @elezar) [SIG Node and Testing] - Add new annotation
batch.kubernetes.io/cronjob-scheduled-timestamp
to Job objects scheduled from CronJobs. (kubernetes/kubernetes#118137, @helayoty) [SIG Apps] - Add podReplacementPolicy and terminating field to job api (kubernetes/kubernetes#119301, @kannon92) [SIG API Machinery and Apps]
- Added fields
reason
andfieldPath
into CRD validation rules to allow users to specify reason and field path when validation failed. (kubernetes/kubernetes#118041, @cici37) [SIG API Machinery] - Added namespace access support to the CEL expressions of ValidatingAdmissionPolicy via a
namespaceObject
variable with expressions. (kubernetes/kubernetes#118267, @cici37) [SIG API Machinery and Testing] - Adds new CRDValidationRatcheting alpha feature. During a PATCH or UPDATE Validation Ratcheting discards errors thrown by unchanged portions of the resource from most OpenAPI schema validations. (kubernetes/kubernetes#118990, @alexzielenski) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node and Storage]
- Adds new namespaceParamRef to admissionregistration.k8s.io/v1alpha1.ValidatingAdmissionPolicy (kubernetes/kubernetes#119215, @alexzielenski) [SIG API Machinery and Testing]
- Extend the Job API for alpha version of BackoffLimitPerIndex (kubernetes/kubernetes#119294, @mimowo) [SIG API Machinery and Apps]
- Graduate
AdmissionWebhookMatchCondition
feature to beta (kubernetes/kubernetes#119380, @a-hilaly) [SIG API Machinery] - In the API Priority and Fairness feature, priority levels that are exempt from limitation can now be given a nominal and a lendable concurrency and their dispatching borrows from the concurrency limits of the other priority levels. For details see https://github.com/kubernetes/enhancements/tree/master/keps/sig-api-machinery/1040-priority-and-fairness#dispatching . (kubernetes/kubernetes#118782, @MikeSpreitzer) [SIG API Machinery]
- Indexed Job pods now have the pod completion index set as a pod label. (kubernetes/kubernetes#118883, @danielvegamyhre) [SIG Apps]
- Kube-proxy: add '--logging-format' flag to support structured logging (kubernetes/kubernetes#117800, @cyclinder) [SIG API Machinery, Architecture, Instrumentation and Network]
- Registered_metric_total, disabled_metric_total, hidden_metric_total & kubernetes_feature_enabled are promoted to
BETA
stability. (kubernetes/kubernetes#119264, @logicalhan) [SIG API Machinery, Architecture, Cluster Lifecycle and Instrumentation] - Removed
resizeStatus
enum frompvc.Status
and replaced withAllocatedResourceStatus
(kubernetes/kubernetes#116335, @gnufied) [SIG API Machinery, Apps, Auth, Node, Storage and Testing] - StatefulSet pods now have the pod index set as a pod label
statefulset.kubernetes.io/pod-index
. (kubernetes/kubernetes#119232, @danielvegamyhre) [SIG Apps] - Support BackoffLimitPerIndex in Jobs (kubernetes/kubernetes#118009, @mimowo) [SIG API Machinery, Apps and Testing]
- Support for proxying a request to a peer kube-apiserver if the local apiserver is not able to serve it due to version skew or in the case the requested api is disabled on the local apiserver (kubernetes/kubernetes#117740, @Richabanker) [SIG API Machinery, Apps, Auth, Cloud Provider, Network, Node and Testing]
- The IPTablesOwnershipCleanup feature (KEP-3178) is now GA; kubelet no longer creates the KUBE-MARK-DROP chain (which has been unused for several releases) or the KUBE-MARK-MASQ chain (which is now only created by kube-proxy). (kubernetes/kubernetes#119374, @danwinship) [SIG API Machinery, Network and Node]
- The names of ResourceClaims generated from ResourceClaimTemplate are now generated. The base name is still
<pod>-<claim name>
, but a random suffix will avoid name collisions. (kubernetes/kubernetes#117351, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] - The new feature gate "SidecarContainers" is now available. This feature introduces sidecar containers, a new type of init container that starts before other containers but remains running for the full duration of the pod's lifecycle and will not block pod termination. (kubernetes/kubernetes#116429, @gjkim42) [SIG API Machinery, Apps, Node, Scheduling and Testing]
- Add ServedVersions field to StorageVersion API (kubernetes/kubernetes#118386, @Richabanker) [SIG API Machinery and Testing]
- Component-base/logs is now more strict about not applying configurations multiple times and will return an error when that is attempted. Can be overridden by binaries which need to do that. (kubernetes/kubernetes#117108, @pohly) [SIG API Machinery, Architecture, Cloud Provider, Instrumentation, Scheduling and Testing]
- ACTION_REQUIRED When an Indexed Job has a number of completions higher than 10^5 and parallelism higher than 10^4, and a big number of Indexes fail, Kubernetes might not be able to track the termination of the Job. Kubernetes now emits a warning, at Job creation, when the Job manifest exceeds both of these limits. (kubernetes/kubernetes#118420, @alculquicondor) [SIG Apps]
- Expose rest.DefaultServerUrlFor function (kubernetes/kubernetes#118055, @timofurrer) [SIG API Machinery]
- If using cgroups v2, then the cgroup aware OOM killer will be enabled for container cgroups via
memory.oom.group
. This causes processes within the cgroup to be treated as a unit and killed simultaneously in the event of an OOM kill on any process in the cgroup. (kubernetes/kubernetes#117793, @tzneal) [SIG Apps, Node and Testing] - Update the comment about the feature-gate level for PodFailurePolicy from alpha to beta (kubernetes/kubernetes#118278, @mimowo) [SIG Apps]
- Added a warning that TLS 1.3 ciphers are not configurable. (kubernetes/kubernetes#115399, @3u13r) [SIG API Machinery and Node]
- Added error handling for seccomp localhost configurations that do not properly set a localhostProfile (kubernetes/kubernetes#117020, @cji) [SIG API Machinery and Node]
- Added new config option
delayCacheUntilActive
toKubeSchedulerConfiguration
that can provide a tradeoff between memory efficiency and scheduling speed when their leadership is updated inkube-scheduler
(kubernetes/kubernetes#115754, @linxiulei) [SIG API Machinery and Scheduling] - Client-go: Improved memory use of reflector caches when watching large numbers of objects which do not change frequently (kubernetes/kubernetes#113362, @sxllwx) [SIG API Machinery]
- Kube-controller-manager: The
LegacyServiceAccountTokenCleanUp
feature gate is now available as alpha (off by default). When enabled, thelegacy-service-account-token-cleaner
controller loop removes service account token secrets that have not been used in the time specified by--legacy-service-account-token-clean-up-period
(defaulting to one year), and are referenced from the.secrets
list of a ServiceAccount object, and are not referenced from pods. (kubernetes/kubernetes#115554, @yt2985) [SIG API Machinery, Apps, Auth, Release and Testing] - Kube-scheduler component config (KubeSchedulerConfiguration) kubescheduler.config.k8s.io/v1beta2 is removed in v1.28. Migrate kube-scheduler configuration files to kubescheduler.config.k8s.io/v1. (kubernetes/kubernetes#117649, @SataQiu) [SIG API Machinery, Scheduling and Testing]
- NodeVolumeLimits implement the PreFilter extension point for skipping the Filter phase if the Pod doesn't use volumes with limits. (kubernetes/kubernetes#115398, @tangwz) [SIG Scheduling]
- Pods which set
hostNetwork: true
and declare ports get thehostPort
field set automatically. Previously this would happen in the PodTemplate of a Deployment, DaemonSet or other workload API. NowhostPort
will only be set when an actual Pod is being created. If this presents a problem, setting the feature gate "DefaultHostNetworkHostPortsInPodTemplates" to true will revert this behavior. Please file a kubernetes bug if you need to do this. (kubernetes/kubernetes#117696, @thockin) [SIG Apps] - Removing WindowsHostProcessContainers feature-gate (kubernetes/kubernetes#117570, @marosset) [SIG API Machinery, Apps, Auth, Node and Windows]
- Revised the comment about the feature-gate level for PodFailurePolicy from alpha to beta (kubernetes/kubernetes#117802, @kerthcet) [SIG API Machinery and Apps]
- The
SelfSubjectReview
API is promoted toauthentication.k8s.io/v1
and thekubectl auth whoami
command is GA. (kubernetes/kubernetes#117713, @nabokihms) [SIG API Machinery, Architecture, Auth, CLI and Testing]
Kubernetes API Version: v1.27.3
- Fix request_timeout example and doc. Arg name should be _request_timeout. Single value type should be int or long. (#2071, @hemslo)
Kubernetes API Version: v1.27.2
Kubernetes API Version: v1.27.2
-
Added error handling for seccomp localhost configurations that do not properly set a localhostProfile (kubernetes/kubernetes#117020, @cji) [SIG API Machinery and Node]
-
Fixed an issue where kubelet does not set case-insensitive headers for http probes. (#117182, @dddddai) (kubernetes/kubernetes#117324, @dddddai) [SIG API Machinery, Apps and Node]
-
Revised the comment about the feature-gate level for PodFailurePolicy from alpha to beta (kubernetes/kubernetes#117815, @kerthcet) [SIG Apps]
-
A fix in the
resource.k8s.io/v1alpha1/ResourceClaim
API avoids harmless (?) ".status.reservedFor: element 0: associative list without keys has an element that's a map type" errors in the apiserver. Validation now rejects the incorrect reuse of the same UID in different entries. (kubernetes/kubernetes#115354, @pohly) -
A terminating pod on a node that is not caused by preemption no longer prevents
kube-scheduler
from preempting pods on that node- Rename
PreemptionByKubeScheduler
toPreemptionByScheduler
(kubernetes/kubernetes#114623, @Huang-Wei)
- Rename
-
API: resource.k8s.io/v1alpha1.PodScheduling was renamed to resource.k8s.io/v1alpha2.PodSchedulingContext. (kubernetes/kubernetes#116556, @pohly) [SIG API Machinery, Apps, Auth, CLI, Node, Scheduling and Testing]
-
Added CEL runtime cost calculation into ValidatingAdmissionPolicy, matching the evaluation cost restrictions that already apply to CustomResourceDefinition. If rule evaluation uses more compute than the limit, the API server aborts the evaluation and the admission check that was being performed is aborted; the
failurePolicy
for the ValidatingAdmissionPolicy determines the outcome. (kubernetes/kubernetes#115747, @cici37) -
Added
auditAnnotations
toValidatingAdmissionPolicy
, enabling CEL to be used to add audit annotations to request audit events. AddedvalidationActions
toValidatingAdmissionPolicyBinding
, enabling validation failures to be handled by any combination of the warn, audit and deny enforcement actions. (kubernetes/kubernetes#115973, @jpbetz) -
Added
messageExpression
field toValidationRule
. (kubernetes/kubernetes#115969, @DangerOnTheRanger) -
Added
messageExpression
toValidatingAdmissionPolicy
, to set custom failure message via CEL expression. (kubernetes/kubernetes#116397, @jiahuif) [SIG API Machinery] -
Added a new IPAddress object kind
- Added a new ClusterIP allocator. The new allocator removes previous Service CIDR block size limitations for IPv4, and limits IPv6 size to a /64 (kubernetes/kubernetes#115075, @aojea) [SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Network and Testing]
-
Added a new alpha API: ClusterTrustBundle (
certificates.k8s.io/v1alpha1
). A ClusterTrustBundle may be used to distribute X.509 trust anchors to workloads within the cluster. (kubernetes/kubernetes#113218, @ahmedtd) [SIG API Machinery, Auth and Testing] -
Added authorization check support to the CEL expressions of ValidatingAdmissionPolicy via a
authorizer
variable with expressions. The new variable provides a builder that allows expressions suchauthorizer.group('').resource('pods').check('create').allowed()
. (kubernetes/kubernetes#116054, @jpbetz) [SIG API Machinery and Testing] -
Added matchConditions field to ValidatingAdmissionPolicy and enabled support for CEL based custom match criteria. (kubernetes/kubernetes#116350, @maxsmythe)
-
Added new option to the
InterPodAffinity
scheduler plugin to ignore existing podspreferred inter-pod affinities if the incoming pod has no preferred inter-pod affinities. This option can be used as an optimization for higher scheduling throughput (at the cost of an occasional pod being scheduled non-optimally/violating existing pods preferred inter-pod affinities). To enable this scheduler option, set the
InterPodAffinityscheduler plugin arg
ignorePreferredTermsOfExistingPods: true` (kubernetes/kubernetes#114393, @danielvegamyhre) -
Added the
MatchConditions
field toValidatingWebhookConfiguration
andMutatingWebhookConfiguration
for the v1beta and v1 apis.The
AdmissionWebhookMatchConditions
featuregate is now in Alpha (kubernetes/kubernetes#116261, @ivelichkovich) [SIG API Machinery and Testing] -
Added validation to ensure that if
service.kubernetes.io/topology-aware-hints
andservice.kubernetes.io/topology-mode
annotations are both set, they are set to the same value.Also Added deprecation warning ifservice.kubernetes.io/topology-aware-hints
annotation is used. (kubernetes/kubernetes#116612, @robscott) -
Added warnings about workload resources (Pods, ReplicaSets, Deployments, Jobs, CronJobs, or ReplicationControllers) whose names are not valid DNS labels. (kubernetes/kubernetes#114412, @thockin)
-
Adds feature gate
NodeLogQuery
which provides cluster administrators with a streaming view of logs using kubectl without them having to implement a client side reader or logging into the node. (kubernetes/kubernetes#96120, @LorbusChris) -
Api: validation of a
PodSpec
now rejects invalidResourceClaim
andResourceClaimTemplate
names. For a pod, the name generated for theResourceClaim
when using a template also must be valid. (kubernetes/kubernetes#116576, @pohly) -
Bump default API QPS limits for Kubelet. (kubernetes/kubernetes#116121, @wojtek-t)
-
Enabled the
StatefulSetStartOrdinal
feature gate in beta (kubernetes/kubernetes#115260, @pwschuurman) -
Enabled usage of
kube-proxy
,kube-scheduler
andkubelet
HTTP APIs for changing the logging verbosity at runtime for JSON output. (kubernetes/kubernetes#114609, @pohly) -
Encryption of API Server at rest configuration now allows the use of wildcards in the list of resources. For example, . can be used to encrypt all resources, including all current and future custom resources. (kubernetes/kubernetes#115149, @nilekhc)
-
Extended the kubelet's PodResources API to include resources allocated in
ResourceClaims
viaDynamicResourceAllocation
. Additionally, added a newGet()
method to query a specific pod for its resources. (kubernetes/kubernetes#115847, @moshe010) [SIG Node] -
Forbid to set matchLabelKeys when labelSelector is not set in topologySpreadConstraints (kubernetes/kubernetes#116535, @denkensk)
-
GCE does not support LoadBalancer Services with ports with different protocols (TCP and UDP) (kubernetes/kubernetes#115966, @aojea) [SIG Apps and Cloud Provider]
-
GRPC probes are now a GA feature.
GRPCContainerProbe
feature gate was locked to default value and will be removed in v1.29. If you were setting this feature gate explicitly, please remove it now. (kubernetes/kubernetes#116233, @SergeyKanzhelev) -
Graduated
Kubelet Topology Manager
to GA. (kubernetes/kubernetes#116093, @swatisehgal) -
Graduated
KubeletTracing
to beta, which means that the feature gate is now enabled by default. (kubernetes/kubernetes#115750, @saschagrunert) -
Graduated seccomp profile defaulting to GA.
Set the kubelet
--seccomp-default
flag orseccompDefault
kubelet configuration field totrue
to make pods on that node default to using theRuntimeDefault
seccomp profile.Enabling seccomp for your workload can have a negative performance impact depending on the kernel and container runtime version in use.
Guidance for identifying and mitigating those issues is outlined in the Kubernetes seccomp tutorial. (kubernetes/kubernetes#115719, @saschagrunert) [SIG API Machinery, Node, Storage and Testing]
-
Graduated the container resource metrics feature on
HPA
to beta. (kubernetes/kubernetes#116046, @sanposhiho) -
Implemented API streaming for the
watch-cache
When
sendInitialEvents
ListOption
is set together withwatch=true
, it begins the watch stream with synthetic init events followed by a synthetic "Bookmark" after which the server continues streaming events. (kubernetes/kubernetes#110960, @p0lyn0mial) -
Introduced API for streaming.
Added
SendInitialEvents
field to theListOptions
. When the new option is set together withwatch=true
, it begins the watch stream with synthetic init events followed by a synthetic "Bookmark" after which the server continues streaming events. (kubernetes/kubernetes#115402, @p0lyn0mial) -
Introduced a breaking change to the
resource.k8s.io
API in itsAllocationResult
struct. This change allows a kubelet plugin for theDynamicResourceAllocation
feature to service allocations from multiple resource driver controllers. (kubernetes/kubernetes#116332, @klueska) -
Introduces new alpha functionality to the reflector, allowing user to enable API streaming.
To activate this feature, users can set the
ENABLE_CLIENT_GO_WATCH_LIST_ALPHA
environmental variable. It is important to note that the server must support streaming for this feature to function properly. If streaming is not supported by the server, the reflector will revert to the previous method of obtaining data through LIST/WATCH semantics. (kubernetes/kubernetes#110772, @p0lyn0mial) [SIG API Machinery] -
K8s.io/client-go/tools/record.EventBroadcaster: after Shutdown() is called, the broadcaster now gives up immediately after a failure to write an event to a sink. Previously it tried multiple times for 12 seconds in a goroutine. (kubernetes/kubernetes#115514, @pohly) [SIG API Machinery]
-
K8s.io/component-base/logs: usage of the pflag values in a normal Go flag set led to panics when printing the help message (kubernetes/kubernetes#114680, @pohly) [SIG Instrumentation]
-
Kubeadm: explicitly set
priority
for static pods withpriorityClassName: system-node-critical
(kubernetes/kubernetes#114338, @champtar) [SIG Cluster Lifecycle] -
Kubelet: a "maxParallelImagePulls" field can now be specified in the kubelet configuration file to control how many image pulls the kubelet can perform in parallel. (kubernetes/kubernetes#115220, @ruiwen-zhao) [SIG API Machinery, Node and Scalability]
-
Kubelet: changed
MemoryThrottlingFactor
default value to0.9
and formulas to calculatememory.high
(kubernetes/kubernetes#115371, @pacoxu) -
Kubernetes components that perform leader election now only support using
Leases
for this. (kubernetes/kubernetes#114055, @aimuz) -
Migrated the
DaemonSet
controller (withinkube-controller-manager
) to use contextual logging (kubernetes/kubernetes#113622, @249043822) -
New
service.kubernetes.io/topology-mode
annotation has been introduced as a replacement for theservice.kubernetes.io/topology-aware-hints
annotation.service.kubernetes.io/topology-aware-hints
annotation has been deprecated.- kube-proxy now accepts any value that is not "disabled" for these annotations, enabling custom implementation-specific and/or future built-in heuristics to be used. (kubernetes/kubernetes#116522, @robscott) [SIG Apps, Network and Testing]
-
Pods owned by a Job now uses the labels
batch.kubernetes.io/job-name
andbatch.kubernetes.io/controller-uid
. The legacy labelsjob-name
andcontroller-uid
are still added for compatibility. (kubernetes/kubernetes#114930, @kannon92) -
Promoted
CronJobTimeZone
feature to GA (kubernetes/kubernetes#115904, @soltysh) -
Promoted
SelfSubjectReview
to Beta (kubernetes/kubernetes#116274, @nabokihms) [SIG API Machinery, Auth, CLI and Testing] -
Relaxed API validation to allow pod node selector to be mutable for gated pods (additions only, no deletions or mutations). (kubernetes/kubernetes#116161, @danielvegamyhre)
-
Remove
kubernetes.io/grpc
standard appProtocol (kubernetes/kubernetes#116866, @LiorLieberman) [SIG API Machinery and Apps] -
Remove deprecated
--enable-taint-manager
and--pod-eviction-timeout
CLI (kubernetes/kubernetes#115840, @atosatto) -
Removed support for the
v1alpha1
kubeletplugin API ofDynamicResourceManagement
. All plugins must be updated tov1alpha2
in order to function properly. (kubernetes/kubernetes#116558, @klueska) -
The API server now re-uses data encryption keys while the kms v2 plugin key ID is stable. Data encryption keys are still randomly generated on server start but an atomic counter is used to prevent nonce collisions. (kubernetes/kubernetes#116155, @enj)
-
The PodDisruptionBudget
spec.unhealthyPodEvictionPolicy
field has graduated to beta and is enabled by default. On servers with the feature enabled, this field may be set toAlwaysAllow
to always allow unhealthy pods covered by the PodDisruptionBudget to be evicted. (kubernetes/kubernetes#115363, @ravisantoshgudimetla) [SIG Apps, Auth and Node] -
The
DownwardAPIHugePages
kubelet feature graduated to stable / GA. (kubernetes/kubernetes#115721, @saschagrunert) [SIG Apps and Node] -
The following feature gates for volume expansion GA features have now been removed and must no longer be referenced in
--feature-gates
flags:ExpandCSIVolumes
,ExpandInUsePersistentVolumes
,ExpandPersistentVolumes
(kubernetes/kubernetes#113942, @mengjiao-liu) -
The list-type of the alpha
resourceClaims
field introduced toPods
in1.26.0
was modified fromset
tomap
, resolving an incompatibility with use of this schema inCustomResourceDefinitions
and with server-side apply. (kubernetes/kubernetes#114585, @JoelSpeed) -
Updated API reference for Requests, specifying they must not exceed limits (kubernetes/kubernetes#115434, @ehashman)
-
Updated
KMSv2
to beta (kubernetes/kubernetes#115123, @aramase) -
Updated: Redefine AppProtocol field description and add new standard values (kubernetes/kubernetes#115433, @LiorLieberman) [SIG API Machinery, Apps and Network]
-
/metrics/slis
is now available for control plane components allowing you to scrape health check metrics. (kubernetes/kubernetes#114997, @Richabanker) -
APIServerTracing
feature gate is now enabled by default. Tracing in the API Server is still disabled by default, and requires a config file to enable. (kubernetes/kubernetes#116144, @dashpole) -
NodeResourceFit
andNodeResourcesBalancedAllocation
implement thePreScore
extension point for a more performant calculation. (kubernetes/kubernetes#115655, @tangwz) -
PodSchedulingReadiness
is graduated to beta. (kubernetes/kubernetes#115815, @Huang-Wei) -
PodSpec.Container.Resources
became mutable for CPU and memory resource types.PodSpec.Container.ResizePolicy
(new object) gives users control over how their containers are resized.PodStatus.Resize
status describes the state of a requested Pod resize.PodStatus.ResourcesAllocated
describes node resources allocated to Pod.PodStatus.Resources
describes node resources applied to running containers by CRI.UpdateContainerResources
CRI API now supports both Linux and Windows. (kubernetes/kubernetes#102884, @vinaykul)
-
SELinuxMountReadWriteOncePod
graduated to Beta. (kubernetes/kubernetes#116425, @jsafrane) -
StatefulSetAutoDeletePVC
feature gate promoted to beta. (kubernetes/kubernetes#116501, @mattcary) -
StatefulSet
names must be DNS labels, rather than subdomains. AnyStatefulSet
which took advantage of subdomain validation (by having dots in the name) can't possibly have worked, because we eventually setpod.spec.hostname
from theStatefulSetName
, and that is validated as a DNS label. (kubernetes/kubernetes#114172, @thockin) -
ValidatingAdmissionPolicy
now provides a status field that contains results of type checking the validation expression. The type checking is fully informational, and the behavior of the policy is unchanged. (kubernetes/kubernetes#115668, @jiahuif) -
cacheSize
field inEncryptionConfiguration
is not supported for KMSv2 provider (kubernetes/kubernetes#113121, @aramase) -
k8s.io/component-base/logs
now also supports adding command line flags to aflag.FlagSet
. (kubernetes/kubernetes#114731, @pohly) -
kubelet
: migrated--container-runtime-endpoint
and--image-service-endpoint
to kubelet config (kubernetes/kubernetes#112136, @pacoxu) -
resource.k8s.io/v1alpha1
was replaced withresource.k8s.io/v1alpha2
. Before upgrading a cluster, all objects in resource.k8s.io/v1alpha1 (ResourceClaim, ResourceClaimTemplate, ResourceClass, PodScheduling) must be deleted. The changes are internal, so YAML files which create pods and resource claims don't need changes except for the newerapiVersion
. (kubernetes/kubernetes#116299, @pohly) -
volumes
:resource.claims
is now cleared for PVC specs during create or update of a pod spec with inline PVC template or of a PVC because it has no effect. (kubernetes/kubernetes#115928, @pohly) -
Added a new alpha API: ClusterTrustBundle (
certificates.k8s.io/v1alpha1
). A ClusterTrustBundle may be used to distribute X.509 trust anchors to workloads within the cluster. (kubernetes/kubernetes#113218, @ahmedtd) [SIG API Machinery, Auth and Testing] -
Remove
kubernetes.io/grpc
standard appProtocol (kubernetes/kubernetes#116866, @LiorLieberman) [SIG API Machinery and Apps] -
API: resource.k8s.io/v1alpha1.PodScheduling was renamed to resource.k8s.io/v1alpha2.PodSchedulingContext. (kubernetes/kubernetes#116556, @pohly) [SIG API Machinery, Apps, Auth, CLI, Node, Scheduling and Testing]
-
APIServerTracing feature gate is now enabled by default. Tracing in the API Server is still disabled by default, and requires a config file to enable. (kubernetes/kubernetes#116144, @dashpole) [SIG API Machinery and Testing]
-
Added CEL runtime cost calculation into ValidatingAdmissionPolicy, matching the evaluation cost restrictions that already apply to CustomResourceDefinition. If rule evaluation uses more compute than the limit, the API server aborts the evaluation and the admission check that was being performed is aborted; the
failurePolicy
for the ValidatingAdmissionPolicy determines the outcome. (kubernetes/kubernetes#115747, @cici37) [SIG API Machinery] -
Added
messageExpression
toValidatingAdmissionPolicy
, to set custom failure message via CEL expression. (kubernetes/kubernetes#116397, @jiahuif) [SIG API Machinery] -
Added a new IPAddress object kind
- Added a new ClusterIP allocator. The new allocator removes previous Service CIDR block size limitations for IPv4, and limits IPv6 size to a /64 (kubernetes/kubernetes#115075, @aojea) [SIG API Machinery, Apps, Auth, CLI, Cluster Lifecycle, Network and Testing]
-
Added a new alpha API: ClusterTrustBundle (
certificates.k8s.io/v1alpha1
). A ClusterTrustBundle may be used to distribute X.509 trust anchors to workloads within the cluster. (kubernetes/kubernetes#113218, @ahmedtd) [SIG API Machinery, Auth and Testing] -
Added authorization check support to the CEL expressions of ValidatingAdmissionPolicy via a
authorizer
variable with expressions. The new variable provides a builder that allows expressions suchauthorizer.group('').resource('pods').check('create').allowed()
. (kubernetes/kubernetes#116054, @jpbetz) [SIG API Machinery and Testing] -
Added matchConditions field to ValidatingAdmissionPolicy, enabled support for CEL based custom match criteria. (kubernetes/kubernetes#116350, @maxsmythe) [SIG API Machinery and Testing]
-
Added messageExpression field to ValidationRule. (#115969, @DangerOnTheRanger) (kubernetes/kubernetes#115969, @DangerOnTheRanger) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Instrumentation, Node and Testing]
-
Added the
MatchConditions
field toValidatingWebhookConfiguration
andMutatingWebhookConfiguration
for the v1beta and v1 apis.The
AdmissionWebhookMatchConditions
featuregate is now in Alpha (kubernetes/kubernetes#116261, @ivelichkovich) [SIG API Machinery and Testing] -
Added validation to ensure that if
service.kubernetes.io/topology-aware-hints
andservice.kubernetes.io/topology-mode
annotations are both set, they are set to the same value.- Added deprecation warning if
service.kubernetes.io/topology-aware-hints
annotation is used. (kubernetes/kubernetes#116612, @robscott) [SIG Apps, Network and Testing]
- Added deprecation warning if
-
Adds auditAnnotations to ValidatingAdmissionPolicy, enabling CEL to be used to add audit annotations to request audit events. Adds validationActions to ValidatingAdmissionPolicyBinding, enabling validation failures to be handled by any combination of the warn, audit and deny enforcement actions. (kubernetes/kubernetes#115973, @jpbetz) [SIG API Machinery and Testing]
-
Adds feature gate
NodeLogQuery
which provides cluster administrators with a streaming view of logs using kubectl without them having to implement a client side reader or logging into the node. (kubernetes/kubernetes#96120, @LorbusChris) [SIG API Machinery, Apps, CLI, Node, Testing and Windows] -
Api: validation of a PodSpec now rejects invalid ResourceClaim and ResourceClaimTemplate names. For a pod, the name generated for the ResourceClaim when using a template also must be valid. (kubernetes/kubernetes#116576, @pohly) [SIG Apps]
-
Bump default API QPS limits for Kubelet. (kubernetes/kubernetes#116121, @wojtek-t) [SIG API Machinery and Node]
-
Enable the "StatefulSetStartOrdinal" feature gate in beta (kubernetes/kubernetes#115260, @pwschuurman) [SIG API Machinery and Apps]
-
Extended the kubelet's PodResources API to include resources allocated in
ResourceClaims
viaDynamicResourceAllocation
. Additionally, added a newGet()
method to query a specific pod for its resources. (kubernetes/kubernetes#115847, @moshe010) [SIG Node] -
Forbid to set matchLabelKeys when labelSelector isn’t set in topologySpreadConstraints (kubernetes/kubernetes#116535, @denkensk) [SIG API Machinery, Apps and Scheduling]
-
GCE does not support LoadBalancer Services with ports with different protocols (TCP and UDP) (kubernetes/kubernetes#115966, @aojea) [SIG Apps and Cloud Provider]
-
GRPC probes are now a GA feature. GRPCContainerProbe feature gate was locked to default value and will be removed in v1.29. If you were setting this feature gate explicitly, please remove it now. (kubernetes/kubernetes#116233, @SergeyKanzhelev) [SIG API Machinery, Apps and Node]
-
Graduate Kubelet Topology Manager to GA. (kubernetes/kubernetes#116093, @swatisehgal) [SIG API Machinery, Node and Testing]
-
Graduate
KubeletTracing
to beta, which means that the feature gate is now enabled by default. (kubernetes/kubernetes#115750, @saschagrunert) [SIG Instrumentation and Node] -
Graduate the container resource metrics feature on HPA to beta. (kubernetes/kubernetes#116046, @sanposhiho) [SIG Autoscaling]
-
Introduced a breaking change to the
resource.k8s.io
API in itsAllocationResult
struct. This change allows a kubelet plugin for theDynamicResourceAllocation
feature to service allocations from multiple resource driver controllers. (kubernetes/kubernetes#116332, @klueska) [SIG API Machinery, Apps, CLI, Node, Scheduling and Testing] -
Introduces new alpha functionality to the reflector, allowing user to enable API streaming.
To activate this feature, users can set the
ENABLE_CLIENT_GO_WATCH_LIST_ALPHA
environmental variable. It is important to note that the server must support streaming for this feature to function properly. If streaming is not supported by the server, the reflector will revert to the previous method of obtaining data through LIST/WATCH semantics. (kubernetes/kubernetes#110772, @p0lyn0mial) [SIG API Machinery] -
Kubelet: change MemoryThrottlingFactor default value to 0.9 and formulas to calculate memory.high (kubernetes/kubernetes#115371, @pacoxu) [SIG API Machinery, Apps and Node]
-
Migrated the DaemonSet controller (within `kube-controller-manager) to use contextual logging (kubernetes/kubernetes#113622, @249043822) [SIG API Machinery, Apps, Instrumentation and Testing]
-
New
service.kubernetes.io/topology-mode
annotation has been introduced as a replacement for theservice.kubernetes.io/topology-aware-hints
annotation.service.kubernetes.io/topology-aware-hints
annotation has been deprecated.- kube-proxy now accepts any value that is not "disabled" for these annotations, enabling custom implementation-specific and/or future built-in heuristics to be used. (kubernetes/kubernetes#116522, @robscott) [SIG Apps, Network and Testing]
-
NodeResourceFit and NodeResourcesBalancedAllocation implement the PreScore extension point for a more performant calculation. (kubernetes/kubernetes#115655, @tangwz) [SIG Scheduling]
-
Pods owned by a Job will now use the labels
batch.kubernetes.io/job-name
andbatch.kubernetes.io/controller-uid
. The legacy labelsjob-name
andcontroller-uid
are still added for compatibility. (kubernetes/kubernetes#114930, @kannon92) [SIG Apps] -
Promote CronJobTimeZone feature to GA (kubernetes/kubernetes#115904, @soltysh) [SIG API Machinery and Apps]
-
Promoted
SelfSubjectReview
to Beta (kubernetes/kubernetes#116274, @nabokihms) [SIG API Machinery, Auth, CLI and Testing] -
Relax API validation to allow pod node selector to be mutable for gated pods (additions only, no deletions or mutations). (kubernetes/kubernetes#116161, @danielvegamyhre) [SIG Apps, Scheduling and Testing]
-
Remove deprecated
--enable-taint-manager
and--pod-eviction-timeout
CLI flags (kubernetes/kubernetes#115840, @atosatto) [SIG API Machinery, Apps, Node and Testing] -
Resource.k8s.io/v1alpha1 was replaced with resource.k8s.io/v1alpha2. Before upgrading a cluster, all objects in resource.k8s.io/v1alpha1 (ResourceClaim, ResourceClaimTemplate, ResourceClass, PodScheduling) must be deleted. The changes will be internal, so YAML files which create pods and resource claims don't need changes except for the newer
apiVersion
. (kubernetes/kubernetes#116299, @pohly) [SIG API Machinery, Apps, CLI, Node, Scheduling and Testing] -
SELinuxMountReadWriteOncePod graduated to Beta. (kubernetes/kubernetes#116425, @jsafrane) [SIG Storage and Testing]
-
StatefulSetAutoDeletePVC feature gate promoted to beta. (kubernetes/kubernetes#116501, @mattcary) [SIG Apps, Auth and Testing]
-
The API server now re-uses data encryption keys while the kms v2 plugin's key ID is stable. Data encryption keys are still randomly generated on server start but an atomic counter is used to prevent nonce collisions. (kubernetes/kubernetes#116155, @enj) [SIG API Machinery, Auth and Testing]
-
The API server's encryption at rest configuration now allows the use of wildcards in the list of resources. For example, '.' can be used to encrypt all resources, including all current and future custom resources. (kubernetes/kubernetes#115149, @nilekhc) [SIG API Machinery, Auth and Testing]
-
Update KMSv2 to beta (kubernetes/kubernetes#115123, @aramase) [SIG API Machinery, Auth and Testing]
-
Updated: Redefine AppProtocol field description and add new standard values (kubernetes/kubernetes#115433, @LiorLieberman) [SIG API Machinery, Apps and Network]
-
ValidatingAdmissionPolicy now provides a status field that contains results of type checking the validation expression. The type checking is fully informational, and the behavior of the policy is unchanged. (kubernetes/kubernetes#115668, @jiahuif) [SIG API Machinery, Auth, Cloud Provider and Testing]
-
We have removed support for the v1alpha1 kubeletplugin API of DynamicResourceManagement. All plugins must update to v1alpha2 in order to function properly going forward. (kubernetes/kubernetes#116558, @klueska) [SIG API Machinery, Apps, CLI, Node, Scheduling and Testing]
-
Graduated seccomp profile defaulting to GA.
Set the kubelet
--seccomp-default
flag orseccompDefault
kubelet configuration field totrue
to make pods on that node default to using theRuntimeDefault
seccomp profile.Enabling seccomp for your workload can have a negative performance impact depending on the kernel and container runtime version in use.
Guidance for identifying and mitigating those issues is outlined in the Kubernetes seccomp tutorial. (kubernetes/kubernetes#115719, @saschagrunert) [SIG API Machinery, Node, Storage and Testing]
-
Implements API for streaming for the watch-cache
When sendInitialEvents ListOption is set together with watch=true, it begins the watch stream with synthetic init events followed by a synthetic "Bookmark" after which the server continues streaming events. (kubernetes/kubernetes#110960, @p0lyn0mial) [SIG API Machinery]
-
Introduce API for streaming.
Add SendInitialEvents field to the ListOptions. When the new option is set together with watch=true, it begins the watch stream with synthetic init events followed by a synthetic "Bookmark" after which the server continues streaming events. (kubernetes/kubernetes#115402, @p0lyn0mial) [SIG API Machinery]
-
Kubelet: a "maxParallelImagePulls" field can now be specified in the kubelet configuration file to control how many image pulls the kubelet can perform in parallel. (kubernetes/kubernetes#115220, @ruiwen-zhao) [SIG API Machinery, Node and Scalability]
-
PodSchedulingReadiness is graduated to beta. (kubernetes/kubernetes#115815, @Huang-Wei) [SIG API Machinery, Apps, Scheduling and Testing]
-
In-place resize feature for Kubernetes Pods
- Changed the Pod API so that the
resources
defined for containers are mutable forcpu
andmemory
resource types. - Added
resizePolicy
for containers in a pod to allow users control over how their containers are resized. - Added
allocatedResources
field to container status in pod status that describes the node resources allocated to a pod. - Added
resources
field to container status that reports actual resources applied to running containers. - Added
resize
field to pod status that describes the state of a requested pod resize. For details, see KEPs below. (kubernetes/kubernetes#102884, @vinaykul) [SIG API Machinery, Apps, Instrumentation, Node, Scheduling and Testing]
- Changed the Pod API so that the
-
The PodDisruptionBudget
spec.unhealthyPodEvictionPolicy
field has graduated to beta and is enabled by default. On servers with the feature enabled, this field may be set toAlwaysAllow
to always allow unhealthy pods covered by the PodDisruptionBudget to be evicted. (kubernetes/kubernetes#115363, @ravisantoshgudimetla) [SIG Apps, Auth and Node] -
The
DownwardAPIHugePages
kubelet feature graduated to stable / GA. (kubernetes/kubernetes#115721, @saschagrunert) [SIG Apps and Node] -
Volumes:
resource.claims
gets cleared for PVC specs during create or update of a pod spec with inline PVC template or of a PVC because it has no effect. (kubernetes/kubernetes#115928, @pohly) [SIG API Machinery, Apps and Storage] -
A fix in the resource.k8s.io/v1alpha1/ResourceClaim API avoids harmless (?) ".status.reservedFor: element 0: associative list without keys has an element that's a map type" errors in the apiserver. Validation now rejects the incorrect reuse of the same UID in different entries. (kubernetes/kubernetes#115354, @pohly) [SIG API Machinery]
-
CacheSize field in EncryptionConfiguration is not supported for KMSv2 provider (kubernetes/kubernetes#113121, @aramase) [SIG API Machinery, Auth and Testing]
-
K8s.io/client-go/tools/record.EventBroadcaster: after Shutdown() is called, the broadcaster now gives up immediately after a failure to write an event to a sink. Previously it tried multiple times for 12 seconds in a goroutine. (kubernetes/kubernetes#115514, @pohly) [SIG API Machinery]
-
K8s.io/component-base/logs now also supports adding command line flags to a flag.FlagSet. (kubernetes/kubernetes#114731, @pohly) [SIG Architecture]
-
Update API reference for Requests, specifying they must not exceed limits (kubernetes/kubernetes#115434, @ehashman) [SIG Architecture, Docs and Node]
-
/metrics/slis
is made available for control plane components allowing you to scrape health check metrics. (kubernetes/kubernetes#114997, @Richabanker) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling, Storage and Testing] -
A terminating pod on a node that is not caused by preemption won't prevent kube-scheduler from preempting pods on that node
- Rename 'PreemptionByKubeScheduler' to 'PreemptionByScheduler' (kubernetes/kubernetes#114623, @Huang-Wei) [SIG Scheduling]
-
Added new option to the InterPodAffinity scheduler plugin to ignore existing pods` preferred inter-pod affinities if the incoming pod has no preferred inter-pod affinities. This option can be used as an optimization for higher scheduling throughput (at the cost of an occasional pod being scheduled non-optimally/violating existing pods' preferred inter-pod affinities). To enable this scheduler option, set the InterPodAffinity scheduler plugin arg "ignorePreferredTermsOfExistingPods: true". (kubernetes/kubernetes#114393, @danielvegamyhre) [SIG API Machinery and Scheduling]
-
Added warnings about workload resources (Pods, ReplicaSets, Deployments, Jobs, CronJobs, or ReplicationControllers) whose names are not valid DNS labels. (kubernetes/kubernetes#114412, @thockin) [SIG API Machinery and Apps]
-
K8s.io/component-base/logs: usage of the pflag values in a normal Go flag set led to panics when printing the help message (kubernetes/kubernetes#114680, @pohly) [SIG Instrumentation]
-
Kube-proxy, kube-scheduler and kubelet have HTTP APIs for changing the logging verbosity at runtime. This now also works for JSON output. (kubernetes/kubernetes#114609, @pohly) [SIG API Machinery, Architecture, Cloud Provider, Instrumentation and Testing]
-
Kubeadm: explicitly set
priority
for static pods withpriorityClassName: system-node-critical
(kubernetes/kubernetes#114338, @champtar) [SIG Cluster Lifecycle] -
Kubelet: migrate "--container-runtime-endpoint" and "--image-service-endpoint" to kubelet config (kubernetes/kubernetes#112136, @pacoxu) [SIG API Machinery, Node and Scalability]
-
Kubernetes components that perform leader election now only support using Leases for this. (kubernetes/kubernetes#114055, @aimuz) [SIG API Machinery, Cloud Provider and Scheduling]
-
StatefulSet names must be DNS labels, rather than subdomains. Any StatefulSet which took advantage of subdomain validation (by having dots in the name) can't possibly have worked, because we eventually set
pod.spec.hostname
from the StatefulSetName, and that is validated as a DNS label. (kubernetes/kubernetes#114172, @thockin) [SIG Apps] -
The following feature gates for volume expansion GA features have been removed and must no longer be referenced in
--feature-gates
flags: ExpandCSIVolumes, ExpandInUsePersistentVolumes, ExpandPersistentVolumes (kubernetes/kubernetes#113942, @mengjiao-liu) [SIG API Machinery, Apps and Testing] -
The list-type of the alpha resourceClaims field introduced to Pods in 1.26.0 was modified from "set" to "map", resolving an incompatibility with use of this schema in CustomResourceDefinitions and with server-side apply. (kubernetes/kubernetes#114585, @JoelSpeed) [SIG API Machinery]
Kubernetes API Version: v1.26.1
- The timeout unit of the WSClient update method is now always seconds for both poll and select functions. (#1976, @t-yrka)
- Adds support for loading CA certificates from a file using the
idp-certificate-authority
key for the oidc plugin. (#1916, @vgupta3)
Kubernetes API Version: v1.26.1
- The timeout unit of the WSClient update method is now always seconds for both poll and select functions. (#1976, @t-yrka)
- Adds support for loading CA certificates from a file using the
idp-certificate-authority
key for the oidc plugin. (#1916, @vgupta3)
Kubernetes API Version: v1.26.1
-
The list-type of the alpha resourceClaims field introduced to Pods in 1.26.0 was modified from "set" to "map", resolving an incompatibility with use of this schema in CustomResourceDefinitions and with server-side apply. (kubernetes/kubernetes#114617, @JoelSpeed) [SIG API Machinery]
-
'A new
preEnqueue
extension point was added to scheduler's component configv1beta2/v1beta3/v1
.' (kubernetes/kubernetes#113275, @Huang-Wei) -
'Added a
ResourceClaim
API (in theresource.k8s.io/v1alpha1
API group and behind theDynamicResourceAllocation
feature gate). The new API is now more flexible than the existing Device Plugins feature of Kubernetes because it allows Pods to request (claim) special kinds of resources, which can be available at node level, cluster level, or following any other model you implement.' (kubernetes/kubernetes#111023, @pohly) -
'Container
preStop
andpostStart
lifecycle handlers usinghttpGet
now honor the specifiedscheme
andheaders
fields. This enables setting custom headers and changing the scheme toHTTPS
, consistent with container startup/readiness/liveness probe capabilities. Lifecycle handlers configured withscheme: HTTPS
that encounter errors indicating the endpoint is actually using HTTP fall back to making the request over HTTP for compatibility with previous releases. When this happens, aLifecycleHTTPFallback
event is recorded in the namespace of the pod and akubelet_lifecycle_handler_http_fallbacks_total
metric in the kubelet is incremented. Cluster administrators can opt out of the expanded lifecycle handler capabilities by setting--feature-gates=ConsistentHTTPGetHandlers=false
inkubelet
.' (kubernetes/kubernetes#86139, @jasimmons) -
'Graduated
JobTrackingWithFinalizers
to stable. Jobs created before the feature was enabled are still tracked without finalizers. Jobs tracked with finalizers have the annotation batch.kubernetes.io/job-tracking. If the annotation is present and the user attempts to remove it, the control plane adds it back. The annotationbatch.kubernetes.io/job-tracking
is now deprecated. The control plane will ignore it and stop adding it for new Jobs in v1.27.' (kubernetes/kubernetes#113510, @alculquicondor) -
'Kubelet added the following Pod failure conditions:
DisruptionTarget
(graceful node shutdown, node pressure eviction)' (kubernetes/kubernetes#112360, @mimowo)
-
'Priority and Fairness has introduced a new feature called borrowing that allows an API priority level to borrow a number of seats from other priority level(s). As a cluster operator, you can enable borrowing for a certain priority level configuration object via the two newly introduced fields
lendablePercent
, andborrowingLimitPercent
located under the.spec.limited
field of the designated priority level. This change added the following metrics:apiserver_flowcontrol_nominal_limit_seats
: Nominal number of execution seats configured for each priority levelapiserver_flowcontrol_lower_limit_seats
: Configured lower bound on number of execution seats available to each priority levelapiserver_flowcontrol_upper_limit_seats
: Configured upper bound on number of execution seats available to each priority levelapiserver_flowcontrol_demand_seats
: Observations, at the end of every nanosecond, of (the number of seats each priority level could use) / (nominal number of seats for that level)apiserver_flowcontrol_demand_seats_high_watermark
: High watermark, over last adjustment period, of demand_seatsapiserver_flowcontrol_demand_seats_average
: Time-weighted average, over last adjustment period, of demand_seatsapiserver_flowcontrol_demand_seats_stdev
: Time-weighted standard deviation, over last adjustment period, of demand_seatsapiserver_flowcontrol_demand_seats_smoothed
: Smoothed seat demandsapiserver_flowcontrol_target_seats
: Seat allocation targetsapiserver_flowcontrol_seat_fair_frac
: Fair fraction of server's concurrency to allocate to each priority level that can use itapiserver_flowcontrol_current_limit_seats
: current derived number of execution seats available to each priority level The possibility of borrowing means that the old metricapiserver_flowcontrol_request_concurrency_limit
can no longer mean both the configured concurrency limit and the enforced concurrency limit. Henceforth it means the configured concurrency limit.' (kubernetes/kubernetes#113485, @MikeSpreitzer)
-
'
NodeInclusionPolicy
inpodTopologySpread
plugin is now enabled by default.' (kubernetes/kubernetes#113500, @kerthcet) -
'
PodDisruptionBudget
now adds an alphaspec.unhealthyPodEvictionPolicy
field. When thePDBUnhealthyPodEvictionPolicy
feature-gate is enabled inkube-apiserver
, setting this field to"AlwaysAllow"
allows pods to be evicted if they do not have a ready condition, regardless of whether the PodDisruptionBudget is currently healthy.' (kubernetes/kubernetes#113375, @atiratree) -
'
metav1.LabelSelectors
specified in API objects are now validated to ensure they do not contain invalid label values that will error at time of use. Existing invalid objects can be updated, but new objects are required to contain valid label selectors.' (kubernetes/kubernetes#113699, @liggitt) -
Add
percentageOfNodesToScore
as a scheduler profile level parameter to API versionv1
. When a profilepercentageOfNodesToScore
is set, it will override globalpercentageOfNodesToScore
. (kubernetes/kubernetes#112521, @yuanchen8911) -
Add auth API to get self subject attributes (new selfsubjectreviews API is added). The corresponding command for kubctl is provided -
kubectl auth whoami
. (kubernetes/kubernetes#111333, @nabokihms) [SIG API Machinery, Auth, CLI and Testing] -
Added
kubernetes_feature_enabled
metric series to track whether each active feature gate is enabled. (kubernetes/kubernetes#112690, @logicalhan) -
Added a
--topology-manager-policy-options
flag to the kubelet to support fine tuning the topology manager policies. The first policy option,prefer-closest-numa-nodes
, allows these policies to favor sets of NUMA nodes with shorter distance between nodes when making admission decisions. (kubernetes/kubernetes#112914, @PiotrProkop) -
Added a feature that allows a
StatefulSet
to start numbering replicas from an arbitrary non-negative ordinal, using the.spec.ordinals.start
field. (kubernetes/kubernetes#112744, @pwschuurman) -
Added a kube-proxy flag (
--iptables-localhost-nodeports
, default true) to allow disabling NodePort services on loopback addresses. Note: this only applies to iptables mode and ipv4. (kubernetes/kubernetes#108250, @cyclinder) -
Added a new namespace alpha field to
DataSourceRef
field inPersistentVolumeClaim
API. (kubernetes/kubernetes#113186, @ttakahashi21) -
Aggregated discovery will be alpha and can be toggled with the
AggregatedDiscoveryEndpoint
feature flag. (kubernetes/kubernetes#113171, @Jefftree) -
Clarified the CFS quota as 100ms in the code comments and set the minimum
cpuCFSQuotaPeriod
to 1ms to match Linux kernel expectations. (kubernetes/kubernetes#112123, @paskal) -
Component-base: make the validation logic about LeaderElectionConfiguration consistent between component-base and client-go (kubernetes/kubernetes#111758, @SataQiu) [SIG API Machinery and Scheduling]
-
Deprecated the
apiserver_request_slo_duration_seconds
metric for v1.27 in favor ofapiserver_request_sli_duration_seconds
for naming consistency purposes with other SLI-specific metrics and to avoid any confusion between SLOs and SLIs. (kubernetes/kubernetes#112679, @dgrisonnet) -
Enable the "Retriable and non-retriable pod failures for jobs" feature into beta. (kubernetes/kubernetes#113360, @mimowo)
-
Enabled
kube-controller-manager
to support '--concurrent-horizontal-pod-autoscaler-syncs' flag to set the number of horizontal pod autoscaler controller workers. (kubernetes/kubernetes#108501, @zroubalik) -
Fixed spurious
field is immutable
errors validating updates to Event API objects via theevents.k8s.io/v1
API. (kubernetes/kubernetes#112183, @liggitt) -
Graduated
ServiceInternalTrafficPolicy
feature to GA. (kubernetes/kubernetes#113496, @avoltz) -
In 'kube-proxy`: The "userspace" proxy mode (deprecated for over a year) is no longer supported on either Linux or Windows. Users should use "iptables" or "ipvs" on Linux, or "kernelspace" on Windows. (kubernetes/kubernetes#112133, @knabben)
-
Introduce
v1beta3
for Priority and Fairness with the following changes to the API spec:- rename 'assuredConcurrencyShares' (located under `spec.limited') to 'nominalConcurrencyShares'.
- apply strategic merge patch annotations to 'Conditions' of flowschemas and
prioritylevelconfigurations
. (kubernetes/kubernetes#112306, @tkashem)
-
Introduced
v1alpha1
API for validating admission policies, enabling extensible admission control via CEL expressions (KEP 3488: CEL for Admission Control). To use, enable theValidatingAdmissionPolicy
feature gate and theadmissionregistration.k8s.io/v1alpha1
API via--runtime-config
. (kubernetes/kubernetes#113314, @cici37) -
KMS: added validation for duplicate kms config name when auto reload is enabled. If you enabled automatic reload of encryption configuration with API server flag
--encryption-provider-config-automatic-reload
, ensure all the KMS provider names (v1 and v2) in the encryption configuration are unique. (kubernetes/kubernetes#113697, @aramase) -
Kubelet external Credential Provider feature is moved to GA. Credential Provider Plugin and Credential Provider Config APIs updated from
v1beta1
tov1
with no API changes. (kubernetes/kubernetes#111616, @ndixita) -
Legacy klog flags are no longer available. Only
-v
and-vmodule
are still supported. (kubernetes/kubernetes#112120, @pohly) [SIG Architecture, CLI, Instrumentation, Node and Testing] -
Moved
MixedProtocolLBService
from beta to GA. (kubernetes/kubernetes#112895, @janosi) -
New Pod API field
.spec.schedulingGates
is introduced to enable users to control when to mark a Pod as scheduling ready. (kubernetes/kubernetes#113274, @Huang-Wei) -
Protobuf serialization of metav1.MicroTime timestamps (used in
Lease
andEvent
API objects) has been corrected to truncate to microsecond precision, to match the documented behavior and JSON/YAML serialization. Any existing persisted data is truncated to microsecond when read from etcd. (kubernetes/kubernetes#111936, @haoruan) -
Removed feature gates
ServiceLoadBalancerClass
andServiceLBNodePortControl
. These feature gates were enabled (and locked) sincev1.24
. (kubernetes/kubernetes#112577, @andrewsykim) -
Reverted regression that prevented
client-go
latency metrics to be reported with a template URL to avoid label cardinality. (kubernetes/kubernetes#111752, @aanm) -
The
EndpointSliceTerminatingCondition
feature gate was graduated to GA. The gate is now locked and will be removed in v1.28. (kubernetes/kubernetes#113351, @andrewsykim) -
DynamicKubeletConfig
feature gate has been removed from the API server. Dynamic kubelet reconfiguration now can't be used even when older nodes are still attempting to rely on it. This is aligned with the Kubernetes version skew policy. (kubernetes/kubernetes#112643, @SergeyKanzhelev) -
kubectl wait
command withjsonpath
flag will wait for target path until timeout. (kubernetes/kubernetes#109525, @jonyhy96) -
Add a
ResourceClaim
API (in the resource.k8s.io/v1alpha1 API group and behind theDynamicResourceAllocation
feature gate). The new API is more flexible than the existing Device Plugins feature of Kubernetes because it allows Pods to request (claim) special kinds of resources, which can be available at node level, cluster level, or following any other model you implement. (kubernetes/kubernetes#111023, @pohly) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Node, Release, Scheduling, Storage and Testing] -
PodDisruptionBudget adds an alpha
spec.unhealthyPodEvictionPolicy
field. When thePDBUnhealthyPodEvictionPolicy
feature-gate is enabled inkube-apiserver
, setting this field to"AlwaysAllow"
allows pods to be evicted if they do not have a ready condition, regardless of whether the PodDisruptionBudget is currently healthy. (kubernetes/kubernetes#113375, @atiratree) [SIG API Machinery, Apps, Auth and Testing] -
A new
preEnqueue
extension point is added to scheduler's component config v1beta2/v1beta3/v1. (kubernetes/kubernetes#113275, @Huang-Wei) [SIG API Machinery, Apps, Instrumentation, Scheduling and Testing] -
Add a new namespace alpha field to dataSourceRef field in PersistentVolumeClaim API. (kubernetes/kubernetes#113186, @ttakahashi21) [SIG API Machinery, Apps, Storage and Testing]
-
Add a kube-proxy flag (--iptables-localhost-nodeports, default true) to allow disabling NodePort services on loopback addresses. Note: this only applies to iptables mode and ipv4. (kubernetes/kubernetes#108250, @cyclinder) [SIG API Machinery, Cloud Provider, Network, Node, Scalability, Storage and Testing]
-
Added a --topology-manager-policy-options flag to the kubelet to support fine tuning the topology manager policies. The first policy option,
prefer-closest-numa-nodes
, allows these policies to favor sets of NUMA nodes with shorter distance between nodes when making admission decisions. (kubernetes/kubernetes#112914, @PiotrProkop) [SIG API Machinery and Node] -
Added a feature that allows a StatefulSet to start numbering replicas from an arbitrary non-negative ordinal, using the
.spec.ordinals.start
field. (kubernetes/kubernetes#112744, @pwschuurman) [SIG API Machinery and Apps] -
Deprecate the apiserver_request_slo_duration_seconds metric for v1.27 in favor of apiserver_request_sli_duration_seconds for naming consistency purposes with other SLI-specific metrics and to avoid any confusion between SLOs and SLIs. (kubernetes/kubernetes#112679, @dgrisonnet) [SIG API Machinery and Instrumentation]
-
Enable the "Retriable and non-retriable pod failures for jobs" feature into beta (kubernetes/kubernetes#113360, @mimowo) [SIG Apps, Auth, Node, Scheduling and Testing]
-
Graduate JobTrackingWithFinalizers to stable. Jobs created before the feature was enabled are still tracked without finalizers. Users can choose to migrate jobs to tracking with finalizers by adding the annotation batch.kubernetes.io/job-tracking. If the annotation was already present and the user attempts to remove it, the control plane adds the annotation back. (kubernetes/kubernetes#113510, @alculquicondor) [SIG API Machinery, Apps and Testing]
-
Graduate ServiceInternalTrafficPolicy feature to GA (kubernetes/kubernetes#113496, @avoltz) [SIG Apps and Network]
-
If you enabled automatic reload of encryption configuration with API server flag --encryption-provider-config-automatic-reload, ensure all the KMS provider names (v1 and v2) in the encryption configuration are unique. (kubernetes/kubernetes#113697, @aramase) [SIG API Machinery and Auth]
-
Introduce v1alpha1 API for validating admission policies, enabling extensible admission control via CEL expressions (KEP 3488: CEL for Admission Control). To use, enable the
ValidatingAdmissionPolicy
feature gate and theadmissionregistration.k8s.io/v1alpha1
API via--runtime-config
. (kubernetes/kubernetes#113314, @cici37) [SIG API Machinery, Auth, Cloud Provider and Testing] -
Kubelet adds the following pod failure conditions:
- DisruptionTarget (graceful node shutdown, node pressure eviction) (kubernetes/kubernetes#112360, @mimowo) [SIG Apps, Node and Testing]
-
Metav1.LabelSelectors specified in API objects are now validated to ensure they do not contain invalid label values that will error at time of use. Existing invalid objects can be updated, but new objects are required to contain valid label selectors. (kubernetes/kubernetes#113699, @liggitt) [SIG API Machinery, Apps, Auth, Network and Storage]
-
Moving MixedProtocolLBService from beta to GA (kubernetes/kubernetes#112895, @janosi) [SIG Apps, Network and Testing]
-
New Pod API field
.spec.schedulingGates
is introduced to enable users to control when to mark a Pod as scheduling ready. (kubernetes/kubernetes#113274, @Huang-Wei) [SIG Apps, Scheduling and Testing] -
NodeInclusionPolicy in podTopologySpread plugin is enabled by default. (kubernetes/kubernetes#113500, @kerthcet) [SIG API Machinery, Apps, Scheduling and Testing]
-
Priority and Fairness has introduced a new feature called borrowing that allows an API priority level to borrow a number of seats from other priority level(s). As a cluster operator, you can enable borrowing for a certain priority level configuration object via the two newly introduced fields
lendablePercent
, andborrowingLimitPercent
located under the.spec.limited
field of the designated priority level. This PR adds the following metrics.apiserver_flowcontrol_nominal_limit_seats
: Nominal number of execution seats configured for each priority levelapiserver_flowcontrol_lower_limit_seats
: Configured lower bound on number of execution seats available to each priority levelapiserver_flowcontrol_upper_limit_seats
: Configured upper bound on number of execution seats available to each priority levelapiserver_flowcontrol_demand_seats
: Observations, at the end of every nanosecond, of (the number of seats each priority level could use) / (nominal number of seats for that level)apiserver_flowcontrol_demand_seats_high_watermark
: High watermark, over last adjustment period, of demand_seatsapiserver_flowcontrol_demand_seats_average
: Time-weighted average, over last adjustment period, of demand_seatsapiserver_flowcontrol_demand_seats_stdev
: Time-weighted standard deviation, over last adjustment period, of demand_seatsapiserver_flowcontrol_demand_seats_smoothed
: Smoothed seat demandsapiserver_flowcontrol_target_seats
: Seat allocation targetsapiserver_flowcontrol_seat_fair_frac
: Fair fraction of server's concurrency to allocate to each priority level that can use itapiserver_flowcontrol_current_limit_seats
: current derived number of execution seats available to each priority level
The possibility of borrowing means that the old metric apiserver_flowcontrol_request_concurrency_limit can no longer mean both the configured concurrency limit and the enforced concurrency limit. Henceforth it means the configured concurrency limit. (kubernetes/kubernetes#113485, @MikeSpreitzer) [SIG API Machinery and Testing]
-
The EndpointSliceTerminatingCondition feature gate has graduated to GA. The gate is now locked and will be removed in v1.28. (kubernetes/kubernetes#113351, @andrewsykim) [SIG API Machinery, Apps, Network and Testing]
-
Yes, aggregated discovery will be alpha and can be toggled with the AggregatedDiscoveryEndpoint feature flag (kubernetes/kubernetes#113171, @Jefftree) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Network, Node, Release, Scalability, Scheduling, Storage and Testing]
-
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:
([kubernetes/kubernetes#86139](kubernetes/kubernetes#86139), [@jasimmons](https://github.com/jasimmons)) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Contributor Experience, Instrumentation, Network, Node, Release, Scheduling, Storage and Testing] -
Add percentageOfNodesToScore as a scheduler profile level parameter to API version v1. If a profile percentageOfNodesToScore is set, it will override global percentageOfNodesToScore. (kubernetes/kubernetes#112521, @yuanchen8911) [SIG API Machinery, Scheduling and Testing]
-
Kube-controller-manager supports '--concurrent-horizontal-pod-autoscaler-syncs' flag to set the number of horizontal pod autoscaler controller workers. (kubernetes/kubernetes#108501, @zroubalik) [SIG API Machinery, Apps and Autoscaling]
-
Kube-proxy: The "userspace" proxy mode (deprecated for over a year) is no longer supported on either Linux or Windows. Users should use "iptables" or "ipvs" on Linux, or "kernelspace" on Windows. (kubernetes/kubernetes#112133, @knabben) [SIG API Machinery, Network, Scalability, Testing and Windows]
-
Kubectl wait command with jsonpath flag will wait for target path appear until timeout. (kubernetes/kubernetes#109525, @jonyhy96) [SIG CLI and Testing]
-
Kubelet external Credential Provider feature is moved to GA. Credential Provider Plugin and Credential Provider Config APIs updated from v1beta1 to v1 with no API changes. (kubernetes/kubernetes#111616, @ndixita) [SIG API Machinery, Node, Scheduling and Testing]
-
The
DynamicKubeletConfig
feature gate has been removed from the API server. Dynamic kubelet reconfiguration now cannot be used even when older nodes are still attempting to rely on it. This is aligned with the Kubernetes version skew policy. (kubernetes/kubernetes#112643, @SergeyKanzhelev) [SIG API Machinery, Apps, Auth, Node and Testing] -
Add
kubernetes_feature_enabled
metric series to track whether each active feature gate is enabled. (kubernetes/kubernetes#112690, @logicalhan) [SIG API Machinery, Architecture, Cluster Lifecycle, Instrumentation, Network, Node and Scheduling] -
Introduce v1beta3 for Priority and Fairness with the following changes to the API spec:
- rename 'assuredConcurrencyShares' (located under spec.limited') to 'nominalConcurrencyShares'
- apply strategic merge patch annotations to 'Conditions' of flowschemas and prioritylevelconfigurations (kubernetes/kubernetes#112306, @tkashem) [SIG API Machinery and Testing]
-
Legacy klog flags are no longer available. Only
-v
and-vmodule
are still supported. (kubernetes/kubernetes#112120, @pohly) [SIG Architecture, CLI, Instrumentation, Node and Testing] -
The feature gates ServiceLoadBalancerClass and ServiceLBNodePortControl have been removed. These feature gates were enabled (and locked) since v1.24. (kubernetes/kubernetes#112577, @andrewsykim) [SIG Apps]
-
Add auth API to get self subject attributes (new selfsubjectreviews API is added). The corresponding command for kubctl is provided -
kubectl auth whoami
. (kubernetes/kubernetes#111333, @nabokihms) [SIG API Machinery, Auth, CLI and Testing] -
Clarified the CFS quota as 100ms in the code comments and set the minimum cpuCFSQuotaPeriod to 1ms to match Linux kernel expectations. (kubernetes/kubernetes#112123, @paskal) [SIG API Machinery and Node]
-
Component-base: make the validation logic about LeaderElectionConfiguration consistent between component-base and client-go (kubernetes/kubernetes#111758, @SataQiu) [SIG API Machinery and Scheduling]
-
Fixes spurious
field is immutable
errors validating updates to Event API objects via theevents.k8s.io/v1
API (kubernetes/kubernetes#112183, @liggitt) [SIG Apps] -
Protobuf serialization of metav1.MicroTime timestamps (used in
Lease
andEvent
API objects) has been corrected to truncate to microsecond precision, to match the documented behavior and JSON/YAML serialization. Any existing persisted data is truncated to microsecond when read from etcd. (kubernetes/kubernetes#111936, @haoruan) [SIG API Machinery] -
Revert regression that prevented client-go latency metrics to be reported with a template URL to avoid label cardinality. (kubernetes/kubernetes#111752, @aanm) [SIG API Machinery]
-
[kubelet] Change default
cpuCFSQuotaPeriod
value with enabledcpuCFSQuotaPeriod
flag from 100ms to 100µs to match the Linux CFS and k8s defaults.cpuCFSQuotaPeriod
of 100ms now requirescustomCPUCFSQuotaPeriod
flag to be set to work. (kubernetes/kubernetes#111520, @paskal) [SIG API Machinery and Node]
Kubernetes API Version: v1.25.3
- Adds support for loading CA certificates from a file using the
idp-certificate-authority
key for the oidc plugin. (#1916, @vgupta3)
Kubernetes API Version: v1.25.3
- Adds support for loading CA certificates from a file using the
idp-certificate-authority
key for the oidc plugin. (#1916, @vgupta3)
Kubernetes API Version: v1.25.3
- Adds support for loading CA certificates from a file using the
idp-certificate-authority
key for the oidc plugin. (#1916, @vgupta3)
Kubernetes API Version: v1.25.2
- Revert regression that prevented client-go latency metrics to be reported with a template URL to avoid label cardinality. (kubernetes/kubernetes#112055, @aanm) [SIG API Machinery]
- Add
NodeInclusionPolicy
toTopologySpreadConstraints
in PodSpec. (kubernetes/kubernetes#108492, @kerthcet) - Added KMS v2alpha1 support. (kubernetes/kubernetes#111126, @aramase)
- Added a deprecated warning for node beta label usage in PV/SC/RC and CSI Storage Capacity. (kubernetes/kubernetes#108554, @pacoxu)
- Added a new feature gate
CheckpointRestore
to enable support to checkpoint containers. If enabled it is possible to checkpoint a container using the newly kubelet API (/checkpoint/{podNamespace}/{podName}/{containerName}). (kubernetes/kubernetes#104907, @adrianreber) [SIG Node and Testing] - Added alpha support for user namespaces in pods phase 1 (KEP 127, feature gate: UserNamespacesStatelessPodsSupport) (kubernetes/kubernetes#111090, @rata)
- As of v1.25, the PodSecurity
restricted
level no longer requires pods that set .spec.os.name="windows" to also set Linux-specific securityContext fields. If a 1.25+ cluster has unsupported out-of-skew nodes prior to v1.23 and wants to ensure namespaces enforcing therestricted
policy continue to require Linux-specific securityContext fields on all pods, ensure a version of therestricted
prior to v1.25 is selected by labeling the namespace (for example,pod-security.kubernetes.io/enforce-version: v1.24
) (kubernetes/kubernetes#105919, @ravisantoshgudimetla) - Changed ownership semantics of PersistentVolume's spec.claimRef from
atomic
togranular
. (kubernetes/kubernetes#110495, @alexzielenski) - Extended ContainerStatus CRI API to allow runtime response with container resource requests and limits that are in effect.
- UpdateContainerResources CRI API now supports both Linux and Windows. (kubernetes/kubernetes#111645, @vinaykul)
- For v1.25, Kubernetes will be using Golang 1.19, In this PR the version is updated to 1.19rc2 as GA is not yet available. (kubernetes/kubernetes#111254, @dims)
- Introduced NodeIPAM support for multiple ClusterCIDRs (kubernetes/kubernetes#2593) as an alpha feature.
Set feature gate
MultiCIDRRangeAllocator=true
, determines whether theMultiCIDRRangeAllocator
controller can be used, while the kube-controller-manager flag below will pick the active controller. Enabled theMultiCIDRRangeAllocator
by setting--cidr-allocator-type=MultiCIDRRangeAllocator
flag in kube-controller-manager. (kubernetes/kubernetes#109090, @sarveshr7) - Introduced PodHasNetwork condition for pods. (kubernetes/kubernetes#111358, @ddebroy)
- Introduced support for handling pod failures with respect to the configured pod failure policy rules. (kubernetes/kubernetes#111113, @mimowo)
- Introduction of the
DisruptionTarget
pod condition type. Itsreason
field indicates the reason for pod termination:- PreemptionByKubeScheduler (Pod preempted by kube-scheduler)
- DeletionByTaintManager (Pod deleted by taint manager due to NoExecute taint)
- EvictionByEvictionAPI (Pod evicted by Eviction API)
- DeletionByPodGC (an orphaned Pod deleted by PodGC) (kubernetes/kubernetes#110959, @mimowo)
- Kube-Scheduler ComponentConfig is graduated to GA,
kubescheduler.config.k8s.io/v1
is available now. PluginSelectorSpread
is removed in v1. (kubernetes/kubernetes#110534, @kerthcet) - Local Storage Capacity Isolation feature is GA in 1.25 release. For systems (rootless) that cannot check root file system, please use kubelet config --local-storage-capacity-isolation=false to disable this feature. Once disabled, pod cannot set local ephemeral storage request/limit, and emptyDir sizeLimit niether. (kubernetes/kubernetes#111513, @jingxu97)
- Make PodSpec.Ports' description clearer on how this information is only informational and how it can be incorrect. (kubernetes/kubernetes#110564, @j4m3s-s) [SIG API Machinery, Network and Node]
- On compatible systems, a mounter's Unmount implementation is changed to not return an error when the specified target can be detected as not a mount point. On Linux, the behavior of detecting a mount point depends on
umount
command is validated when the mounter is created. Additionally, mount point checks will be skipped in CleanupMountPoint/CleanupMountWithForce if the mounter's Unmount having the changed behavior of not returning error when target is not a mount point. (kubernetes/kubernetes#109676, @cartermckinnon) [SIG Storage] - PersistentVolumeClaim objects are no longer left with storage class set to
nil
forever, but will be updated retroactively once any StorageClass is set or created as default. (kubernetes/kubernetes#111467, @RomanBednar) - Promote StatefulSet minReadySeconds to GA. This means
--feature-gates=StatefulSetMinReadySeconds=true
are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation (kubernetes/kubernetes#110896, @ravisantoshgudimetla) [SIG API Machinery, Apps and Testing] - Promoted CronJob's TimeZone support to beta. (kubernetes/kubernetes#111435, @soltysh)
- Promoted DaemonSet MaxSurge to GA. This means
--feature-gates=DaemonSetUpdateSurge=true
are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation . (kubernetes/kubernetes#111194, @ravisantoshgudimetla) - Scheduler: included supported ScoringStrategyType list in error message for NodeResourcesFit plugin (kubernetes/kubernetes#111206, @SataQiu)
- The Go API for logging configuration in
k8s.io/component-base
was moved tok8s.io/component-base/logs/api/v1
. The configuration file format and command line flags are the same as before. (kubernetes/kubernetes#105797, @pohly) - The Pod
spec.podOS
field is promoted to GA. TheIdentifyPodOS
feature gate unconditionally enabled, and will no longer be accepted as a--feature-gates
parameter in 1.27. (kubernetes/kubernetes#111229, @ravisantoshgudimetla) - The PodTopologySpread is respected after rolling upgrades. (kubernetes/kubernetes#111441, @denkensk)
- The
CSIInlineVolume
feature has moved from beta to GA. (kubernetes/kubernetes#111258, @dobsonj) - The
PodSecurity
admission plugin has graduated to GA and is enabled by default. The admission configuration version has been promoted topod-security.admission.config.k8s.io/v1
. (kubernetes/kubernetes#110459, @wangyysde) - The
endPort
field in Network Policy is now promoted to GA Network Policy providers that supportendPort
field now can use it to specify a range of ports to apply a Network Policy. Previously, each Network Policy could only target a single port. Please be aware thatendPort
field MUST BE SUPPORTED by the Network Policy provider. In case your provider does not supportendPort
and this field is specified in a Network Policy, the Network Policy will be created covering only the port field (single port). (kubernetes/kubernetes#110868, @rikatz) - The
metadata.clusterName
field is completely removed. This should not have any user-visible impact. (kubernetes/kubernetes#109602, @lavalamp) - The
minDomains
field in Pod Topology Spread is graduated to beta (kubernetes/kubernetes#110388, @sanposhiho) [SIG API Machinery and Apps] - The command line flag
enable-taint-manager
for kube-controller-manager is deprecated and will be removed in 1.26. The feature that it supports, taint based eviction, is enabled by default and will continue to be implicitly enabled when the flag is removed. (kubernetes/kubernetes#111411, @alculquicondor) - This release added support for
NodeExpandSecret
for CSI driver client which enables the CSI drivers to make use of this secret while performing node expansion operation based on the user request. Previously there was no secret provided as part of thenodeexpansion
call, thus CSI drivers did not make use of the same while expanding the volume at the node side. (kubernetes/kubernetes#105963, @zhucan) - Ephemeral Containers are now generally available (GA). The
EphemeralContainers
feature gate is always enabled and should be removed from--feature-gates
flag on the kube-apiserver and the kubelet command lines. TheEphemeralContainers
feature gate is deprecated and scheduled for removal in a future release. (kubernetes/kubernetes#111402, @verb) - Introduces support for handling pod failures with respect to the configured pod failure policy rules (kubernetes/kubernetes#111113, @mimowo) [SIG API Machinery, Apps, Auth, Scheduling and Testing]
- NodeIPAM support for multiple ClusterCIDRs (kubernetes/enhancements#2593) introduced as an alpha feature. Setting feature gate MultiCIDRRangeAllocator=true, determines whether the MultiCIDRRangeAllocator controller can be used, while the kube-controller-manager flag below will pick the active controller. Enable the MultiCIDRRangeAllocator by setting --cidr-allocator-type=MultiCIDRRangeAllocator flag in kube-controller-manager. (kubernetes/kubernetes#109090, @sarveshr7) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Instrumentation, Network and Testing]
- The CSIInlineVolume feature has moved from beta to GA. (kubernetes/kubernetes#111258, @dobsonj) [SIG API Machinery, Apps, Auth, Instrumentation, Storage and Testing]
- Added alpha support for user namespaces in pods phase 1 (KEP 127, feature gate: UserNamespacesSupport) (kubernetes/kubernetes#111090, @rata) [SIG Apps, Auth, Network, Node, Storage and Testing]
- Adds KMS v2alpha1 support (kubernetes/kubernetes#111126, @aramase) [SIG API Machinery, Auth, Instrumentation and Testing]
- As of v1.25, the PodSecurity
restricted
level no longer requires pods that set .spec.os.name="windows" to also set Linux-specific securityContext fields. If a 1.25+ cluster has unsupported out-of-skew nodes prior to v1.23 and wants to ensure namespaces enforcing therestricted
policy continue to require Linux-specific securityContext fields on all pods, ensure a version of therestricted
prior to v1.25 is selected by labeling the namespace (for example,pod-security.kubernetes.io/enforce-version: v1.24
) (kubernetes/kubernetes#105919, @ravisantoshgudimetla) [SIG API Machinery, Apps, Auth, Testing and Windows] - Changes ownership semantics of PersistentVolume's spec.claimRef from
atomic
togranular
. (kubernetes/kubernetes#110495, @alexzielenski) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Instrumentation and Testing] - Extends ContainerStatus CRI API to allow runtime response with container resource requests and limits that are in effect.
- UpdateContainerResources CRI API now supports both Linux and Windows. For details, see KEPs below. (kubernetes/kubernetes#111645, @vinaykul) [SIG Node]
- For v1.25, Kubernetes will be using golang 1.19, In this PR we update to 1.19rc2 as GA is not yet available. (kubernetes/kubernetes#111254, @dims) [SIG Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling, Storage and Testing]
- Introduce PodHasNetwork condition for pods (kubernetes/kubernetes#111358, @ddebroy) [SIG Apps, Node and Testing]
- Introduction of the
DisruptionTarget
pod condition type. Itsreason
field indicates the reason for pod termination:- PreemptionByKubeScheduler (Pod preempted by kube-scheduler)
- DeletionByTaintManager (Pod deleted by taint manager due to NoExecute taint)
- EvictionByEvictionAPI (Pod evicted by Eviction API)
- DeletionByPodGC (an orphaned Pod deleted by PodGC) (kubernetes/kubernetes#110959, @mimowo) [SIG Apps, Auth, Node, Scheduling and Testing]
- Kube-Scheduler ComponentConfig is graduated to GA,
kubescheduler.config.k8s.io/v1
is available now. PluginSelectorSpread
is removed in v1. (kubernetes/kubernetes#110534, @kerthcet) [SIG API Machinery, Scheduling and Testing] - Local Storage Capacity Isolation feature is GA in 1.25 release. For systems (rootless) that cannot check root file system, please use kubelet config --local-storage-capacity-isolation=false to disable this feature. Once disabled, pod cannot set local ephemeral storage request/limit, and emptyDir sizeLimit niether. (kubernetes/kubernetes#111513, @jingxu97) [SIG API Machinery, Node, Scalability and Scheduling]
- PersistentVolumeClaim objects are no longer left with storage class set to
nil
forever, but will be updated retroactively once any StorageClass is set or created as default. (kubernetes/kubernetes#111467, @RomanBednar) [SIG Apps, Storage and Testing] - Promote CronJob's TimeZone support to beta (kubernetes/kubernetes#111435, @soltysh) [SIG API Machinery, Apps and Testing]
- Promote DaemonSet MaxSurge to GA. This means
--feature-gates=DaemonSetUpdateSurge=true
are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation (kubernetes/kubernetes#111194, @ravisantoshgudimetla) [SIG Apps] - Respect PodTopologySpread after rolling upgrades (kubernetes/kubernetes#111441, @denkensk) [SIG API Machinery, Apps, Scheduling and Testing]
- Scheduler: include supported ScoringStrategyType list in error message for NodeResourcesFit plugin (kubernetes/kubernetes#111206, @SataQiu) [SIG Scheduling]
- The Pod
spec.podOS
field is promoted to GA. TheIdentifyPodOS
feature gate unconditionally enabled, and will no longer be accepted as a--feature-gates
parameter in 1.27. (kubernetes/kubernetes#111229, @ravisantoshgudimetla) [SIG API Machinery, Apps and Windows] - The command line flag
enable-taint-manager
for kube-controller-manager is deprecated and will be removed in 1.26. The feature that it supports, taint based eviction, is enabled by default and will continue to be implicitly enabled when the flag is removed. (kubernetes/kubernetes#111411, @alculquicondor) [SIG API Machinery] - Ephemeral Containers are now generally available. The
EphemeralContainers
feature gate is always enabled and should be removed from--feature-gates
flag on the kube-apiserver and the kubelet command lines. TheEphemeralContainers
feature gate is deprecated and scheduled for removal in a future release. (kubernetes/kubernetes#111402, @verb) [SIG API Machinery, Apps, Node, Storage and Testing] - Added a new feature gate
CheckpointRestore
to enable support to checkpoint containers. If enabled it is possible to checkpoint a container using the newly kubelet API (/checkpoint/{podNamespace}/{podName}/{containerName}). (kubernetes/kubernetes#104907, @adrianreber) [SIG Node and Testing] - EndPort field in Network Policy is now promoted to GA Network Policy providers that support endPort field now can use it to specify a range of ports to apply a Network Policy. Previously, each Network Policy could only target a single port. Please be aware that endPort field MUST BE SUPPORTED by the Network Policy provider. In case your provider does not support endPort and this field is specified in a Network Policy, the Network Policy will be created covering only the port field (single port). (kubernetes/kubernetes#110868, @rikatz) [SIG API Machinery, Network and Testing]
- Make PodSpec.Ports' description clearer on how this information is only informational and how it can be incorrect. (kubernetes/kubernetes#110564, @j4m3s-s) [SIG API Machinery, Network and Node]
- On compatible systems, a mounter's Unmount implementation is changed to not return an error when the specified target can be detected as not a mount point. On Linux, the behavior of detecting a mount point depends on
umount
command is validated when the mounter is created. Additionally, mount point checks will be skipped in CleanupMountPoint/CleanupMountWithForce if the mounter's Unmount having the changed behavior of not returning error when target is not a mount point. (kubernetes/kubernetes#109676, @cartermckinnon) [SIG Storage] - Promote StatefulSet minReadySeconds to GA. This means
--feature-gates=StatefulSetMinReadySeconds=true
are not needed on kube-apiserver and kube-controller-manager binaries and they'll be removed soon following policy at https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecation (kubernetes/kubernetes#110896, @ravisantoshgudimetla) [SIG API Machinery, Apps and Testing] - The Pod
spec.podOS
field is promoted to GA. TheIdentifyPodOS
feature gate unconditionally enabled, and will no longer be accepted as a--feature-gates
parameter in 1.27. (kubernetes/kubernetes#111229, @ravisantoshgudimetla) [SIG API Machinery, Apps and Windows] - The
minDomains
field in Pod Topology Spread is graduated to beta (kubernetes/kubernetes#110388, @sanposhiho) [SIG API Machinery and Apps] - The Go API for logging configuration in k8s.io/component-base was moved to k8s.io/component-base/logs/api/v1. The configuration file format and command line flags are the same as before. (kubernetes/kubernetes#105797, @pohly) [SIG API Machinery, Architecture, Cluster Lifecycle, Instrumentation, Node, Scheduling and Testing]
- The PodSecurity admission plugin has graduated to GA and is enabled by default. The admission configuration version has been promoted to
pod-security.admission.config.k8s.io/v1
. (kubernetes/kubernetes#110459, @wangyysde) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Node, Storage and Testing] - Introduce NodeInclusionPolicies to specify nodeAffinity/nodeTaint strategy when calculating pod topology spread skew. (kubernetes/kubernetes#108492, @kerthcet) [SIG API Machinery, Apps, Scheduling and Testing]
- The
metadata.clusterName
field is completely removed. This should not have any user-visible impact. (kubernetes/kubernetes#109602, @lavalamp) [SIG API Machinery, Apps, Auth and Testing] - This release add support for NodeExpandSecret for CSI driver client which enables the CSI drivers to make use of this secret while performing node expansion operation based on the user request. Previously there was no secret provided as part of the nodeexpansion call, thus CSI drivers were not make use of the same while expanding the volume at node side. (kubernetes/kubernetes#105963, @zhucan) [SIG API Machinery, Apps and Storage]
Kubernetes API Version: v1.24.2
- The dynamic client now support the
_request_timeout
parameter to configure connection and request timeouts. (#1732, @philipp-sontag-by)
Kubernetes API Version: v1.24.1
- The dynamic client now support the
_request_timeout
parameter to configure connection and request timeouts. (#1732, @philipp-sontag-by)
Kubernetes API Version: v1.24.1
- Add 2 new options for kube-proxy running in winkernel mode.
--forward-healthcheck-vip
, if specified as true, health check traffic whose destination is service VIP will be forwarded to kube-proxy's healthcheck service.--root-hnsendpoint-name
specifies the name of the hns endpoint for the root network namespace. This option enables the pass-through load balancers like Google's GCLB to correctly health check the backend services. Without this change, the health check packets is dropped, and Windows node will be considered to be unhealthy by those load balancers. (kubernetes/kubernetes#99287, @anfernee) - Added CEL runtime cost calculation into CustomerResource validation. CustomerResource validation will fail if runtime cost exceeds the budget. (kubernetes/kubernetes#108482, @cici37)
- Added a new metric
webhook_fail_open_count
to monitor webhooks that fail to open. (kubernetes/kubernetes#107171, @ltagliamonte-dd) - Adds a new Status subresource in Network Policy objects (kubernetes/kubernetes#107963, @rikatz)
- Adds support for
InterfaceNamePrefix
andBridgeInterface
as arguments to--detect-local-mode
option and also introduces a new optional--pod-interface-name-prefix
and--pod-bridge-interface
flags to kube-proxy. (kubernetes/kubernetes#95400, @tssurya) - CEL CRD validation expressions may now reference existing object state using the identifier
oldSelf
. (kubernetes/kubernetes#108073, @benluddy) - CRD deep copies should no longer contain shallow copies of
JSONSchemaProps.XValidations
. (kubernetes/kubernetes#107956, @benluddy) - CRD writes will generate validation errors if a CEL validation rule references the identifier
oldSelf
on a part of the schema that does not support it. (kubernetes/kubernetes#108013, @benluddy) - CSIStorageCapacity.storage.k8s.io: The v1beta1 version of this API is deprecated in favor of v1, and will be removed in v1.27. If a CSI driver supports storage capacity tracking, then it must get deployed with a release of external-provisioner that supports the v1 API. (kubernetes/kubernetes#108445, @pohly)
- Custom resource requests with
fieldValidation=Strict
consistently requireapiVersion
andkind
, matching non-strict requests (kubernetes/kubernetes#109019, @liggitt) - Feature of
DefaultPodTopologySpread
is graduated to GA (kubernetes/kubernetes#108278, @kerthcet) - Feature of
NonPreemptingPriority
is graduated to GA (kubernetes/kubernetes#107432, @denkensk) - Feature of
PodOverhead
is graduated to GA (kubernetes/kubernetes#108441, @pacoxu) - Fixed OpenAPI serialization of the x-kubernetes-validations field (kubernetes/kubernetes#107970, @liggitt)
- Fixed failed flushing logs in defer function when kubelet cmd exit 1. (kubernetes/kubernetes#104774, @kerthcet)
- Fixes a regression in v1beta1 PodDisruptionBudget handling of
strategic merge patch
-type API requests for theselector
field. Prior to 1.21, these requests would mergematchLabels
content and replacematchExpressions
content. In 1.21, patch requests touching theselector
field started replacing the entire selector. This is consistent with server-side apply and the v1 PodDisruptionBudget behavior, but should not have been changed for v1beta1. (kubernetes/kubernetes#108138, @liggitt) - Improve kubectl's user help commands readability (kubernetes/kubernetes#104736, @lauchokyip)
- Indexed Jobs graduated to stable. (kubernetes/kubernetes#107395, @alculquicondor)
- Introduce a v1alpha1 networking API for ClusterCIDRConfig (kubernetes/kubernetes#108290, @sarveshr7)
- Introduction of a new "sync_proxy_rules_no_local_endpoints_total" proxy metric. This metric represents the number of services with no internal endpoints. The "traffic_policy" label will contain both "internal" or "external". (kubernetes/kubernetes#108930, @MaxRenaud)
- JobReadyPods graduates to Beta and it's enabled by default. (kubernetes/kubernetes#107476, @alculquicondor)
- Kube-apiserver:
--audit-log-version
and--audit-webhook-version
now only support the default value ofaudit.k8s.io/v1
. The v1alpha1 and v1beta1 audit log versions, deprecated since 1.13, have been removed. (kubernetes/kubernetes#108092, @carlory) - Kube-apiserver: the
metadata.selfLink
field can no longer be populated by kube-apiserver; it was deprecated in 1.16 and has not been populated by default since 1.20+. (kubernetes/kubernetes#107527, @wojtek-t) - Kubelet external Credential Provider feature is moved to Beta. Credential Provider Plugin and Credential Provider Config API's updated from v1alpha1 to v1beta1 with no API changes. (kubernetes/kubernetes#108847, @adisky)
- Make STS available replicas optional again. (kubernetes/kubernetes#109241, @ravisantoshgudimetla)
- MaxUnavailable for StatefulSets, allows faster RollingUpdate by taking down more than 1 pod at a time. The number of pods you want to take down during a RollingUpdate is configurable using maxUnavailable parameter. (kubernetes/kubernetes#82162, @krmayankk)
- Non-graceful node shutdown handling is enabled for stateful workload failovers (kubernetes/kubernetes#108486, @sonasingh46)
- Omit enum declarations from the static openapi file captured at https://git.k8s.io/kubernetes/api/openapi-spec. This file is used to generate API clients, and use of enums in those generated clients (rather than strings) can break forward compatibility with additional future values in those fields. See https://issue.k8s.io/109177 for details. (kubernetes/kubernetes#109178, @liggitt)
- OpenAPI V3 is turned on by default (kubernetes/kubernetes#109031, @Jefftree)
- Pod affinity namespace selector and cross-namespace quota graduated to GA. The feature gate
PodAffinityNamespaceSelector
is locked and will be removed in 1.26. (kubernetes/kubernetes#108136, @ahg-g) - Promote IdentifyPodOS feature to beta. (kubernetes/kubernetes#107859, @ravisantoshgudimetla)
- Remove a v1alpha1 networking API for ClusterCIDRConfig (kubernetes/kubernetes#109436, @JamesLaverack)
- Renamed metrics
evictions_number
toevictions_total
and mark it as stable. The originalevictions_number
metrics name is marked as "Deprecated" and has been removed in kubernetes 1.23 . (kubernetes/kubernetes#106366, @cyclinder) - Skip x-kubernetes-validations rules if having fundamental error against the OpenAPIv3 schema. (kubernetes/kubernetes#108859, @cici37)
- Support for gRPC probes is now in beta. GRPCContainerProbe feature gate is enabled by default. (kubernetes/kubernetes#108522, @SergeyKanzhelev)
- Suspend job to GA. The feature gate
SuspendJob
is locked and will be removed in 1.26. (kubernetes/kubernetes#108129, @ahg-g) - The AnyVolumeDataSource feature is now beta, and the feature gate is enabled by default. In order to provide user feedback on PVCs with data sources, deployers must install the VolumePopulators CRD and the data-source-validator controller. (kubernetes/kubernetes#108736, @bswartz)
- The CertificateSigningRequest
spec.expirationSeconds
API field has graduated to GA. TheCSRDuration
feature gate for the field is now unconditionally enabled and will be removed in 1.26. (kubernetes/kubernetes#108782, @cfryanr) - The
ServerSideFieldValidation
feature has graduated to beta and is now enabled by default. Kubectl 1.24 and newer will use server-side validation instead of client-side validation when writing to API servers with the feature enabled. (kubernetes/kubernetes#108889, @kevindelgado) - The
ServiceLBNodePortControl
feature has graduated to GA. The feature gate will be removed in 1.26. (kubernetes/kubernetes#107027, @uablrek) - The deprecated kube-controller-manager flag '--deployment-controller-sync-period' has been removed, it is not used by the deployment controller. (kubernetes/kubernetes#107178, @SataQiu)
- The feature
DynamicKubeletConfig
has been removed from the kubelet. (kubernetes/kubernetes#106932, @SergeyKanzhelev) - The infrastructure for contextual logging is complete (feature gate implemented, JSON backend ready). (kubernetes/kubernetes#108995, @pohly)
- This adds an optional
timeZone
field as part of the CronJob spec to support running cron jobs in a specific time zone. (kubernetes/kubernetes#108032, @deejross) - Updated the default API priority-and-fairness config to avoid endpoint/configmaps operations from controller-manager to all match leader-election priority level. (kubernetes/kubernetes#106725, @wojtek-t)
topologySpreadConstraints
includesminDomains
field to limit the minimum number of topology domains. (kubernetes/kubernetes#107674, @sanposhiho)- Introduce a v1alpha1 networking API for ClusterCIDRConfig (kubernetes/kubernetes#108290, @sarveshr7) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Instrumentation, Network and Testing]
- Introduction of a new "sync_proxy_rules_no_local_endpoints_total" proxy metric. This metric represents the number of services with no internal endpoints. The "traffic_policy" label will contain both "internal" or "external". (kubernetes/kubernetes#108930, @MaxRenaud) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows]
- Make STS available replicas optional again, (kubernetes/kubernetes#109241, @ravisantoshgudimetla) [SIG API Machinery and Apps]
- Omit enum declarations from the static openapi file captured at https://git.k8s.io/kubernetes/api/openapi-spec. This file is used to generate API clients, and use of enums in those generated clients (rather than strings) can break forward compatibility with additional future values in those fields. See https://issue.k8s.io/109177 for details. (kubernetes/kubernetes#109178, @liggitt) [SIG API Machinery and Auth]
- Remove a v1alpha1 networking API for ClusterCIDRConfig (kubernetes/kubernetes#109436, @JamesLaverack) [SIG API Machinery, Apps, Auth, CLI, Network and Testing]
- The deprecated kube-controller-manager flag '--deployment-controller-sync-period' has been removed, it is not used by the deployment controller. (kubernetes/kubernetes#107178, @SataQiu) [SIG API Machinery and Apps]
- Adds a new Status subresource in Network Policy objects (kubernetes/kubernetes#107963, @rikatz) [SIG API Machinery, Apps, Network and Testing]
- Adds support for "InterfaceNamePrefix" and "BridgeInterface" as arguments to --detect-local-mode option and also introduces a new optional
--pod-interface-name-prefix
and--pod-bridge-interface
flags to kube-proxy. (kubernetes/kubernetes#95400, @tssurya) [SIG API Machinery and Network] - CEL CRD validation expressions may now reference existing object state using the identifier
oldSelf
. (kubernetes/kubernetes#108073, @benluddy) [SIG API Machinery and Testing] - CSIStorageCapacity.storage.k8s.io: The v1beta1 version of this API is deprecated in favor of v1, and will be removed in v1.27. If a CSI driver supports storage capacity tracking, then it must get deployed with a release of external-provisioner that supports the v1 API. (kubernetes/kubernetes#108445, @pohly) [SIG API Machinery, Architecture, Auth, Scheduling, Storage and Testing]
- Custom resource requests with fieldValidation=Strict consistently require apiVersion and kind, matching non-strict requests (kubernetes/kubernetes#109019, @liggitt) [SIG API Machinery]
- Improve kubectl's user help commands readability (kubernetes/kubernetes#104736, @lauchokyip) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Contributor Experience, Instrumentation, Network, Node, Release, Scalability, Scheduling, Security, Storage, Testing and Windows]
- Indexed Jobs graduates to stable (kubernetes/kubernetes#107395, @alculquicondor) [SIG Apps, Architecture and Testing]
- Introduce a v1alpha1 networking API for ClusterCIDRConfig (kubernetes/kubernetes#108290, @sarveshr7) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Instrumentation, Network and Testing]
- JobReadyPods graduates to Beta and it's enabled by default. (kubernetes/kubernetes#107476, @alculquicondor) [SIG API Machinery, Apps and Testing]
- Kubelet external Credential Provider feature is moved to Beta. Credential Provider Plugin and Credential Provider Config API's updated from v1alpha1 to v1beta1 with no API changes. (kubernetes/kubernetes#108847, @adisky) [SIG API Machinery and Node]
- MaxUnavailable for StatefulSets, allows faster RollingUpdate by taking down more than 1 pod at a time. The number of pods you want to take down during a RollingUpdate is configurable using maxUnavailable parameter. (kubernetes/kubernetes#82162, @krmayankk) [SIG API Machinery and Apps]
- Non graceful node shutdown handling. (kubernetes/kubernetes#108486, @sonasingh46) [SIG Apps, Node and Storage]
- OpenAPI V3 is turned on by default (kubernetes/kubernetes#109031, @Jefftree) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling, Storage and Testing]
- Promote IdentifyPodOS feature to beta. (kubernetes/kubernetes#107859, @ravisantoshgudimetla) [SIG API Machinery, Apps, Node, Testing and Windows]
- Skip x-kubernetes-validations rules if having fundamental error against OpenAPIv3 schema. (kubernetes/kubernetes#108859, @cici37) [SIG API Machinery and Testing]
- Support for gRPC probes is now in beta. GRPCContainerProbe feature gate is enabled by default. (kubernetes/kubernetes#108522, @SergeyKanzhelev) [SIG API Machinery, Apps, Node and Testing]
- The AnyVolumeDataSource feature is now beta, and the feature gate is enabled by default. In order to provide user feedback on PVCs with data sources, deployers must install the VolumePopulators CRD and the data-source-validator controller. (kubernetes/kubernetes#108736, @bswartz) [SIG Apps, Storage and Testing]
- The
ServerSideFieldValidation
feature has graduated to beta and is now enabled by default. Kubectl 1.24 and newer will use server-side validation instead of client-side validation when writing to API servers with the feature enabled. (kubernetes/kubernetes#108889, @kevindelgado) [SIG API Machinery, Architecture, CLI and Testing] - The infrastructure for contextual logging is complete (feature gate implemented, JSON backend ready). (kubernetes/kubernetes#108995, @pohly) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Testing]
- This adds an optional
timeZone
field as part of the CronJob spec to support running cron jobs in a specific time zone. (kubernetes/kubernetes#108032, @deejross) [SIG API Machinery and Apps] - Add 2 new options for kube-proxy running in winkernel mode.
--forward-healthcheck-vip
, if specified as true, health check traffic whose destination is service VIP will be forwarded to kube-proxy's healthcheck service.--root-hnsendpoint-name
specifies the name of the hns endpoint for the root network namespace. This option enables the pass-through load balancers like Google's GCLB to correctly health check the backend services. Without this change, the health check packets is dropped, and Windows node will be considered to be unhealthy by those load balancers. (kubernetes/kubernetes#99287, @anfernee) [SIG API Machinery, Cloud Provider, Network, Testing and Windows] - Added CEL runtime cost calculation into CustomerResource validation. CustomerResource validation will fail if runtime cost exceeds the budget. (kubernetes/kubernetes#108482, @cici37) [SIG API Machinery]
- CRD writes will generate validation errors if a CEL validation rule references the identifier "oldSelf" on a part of the schema that does not support it. (kubernetes/kubernetes#108013, @benluddy) [SIG API Machinery]
- Feature of
DefaultPodTopologySpread
is graduated to GA (kubernetes/kubernetes#108278, @kerthcet) [SIG Scheduling] - Feature of
PodOverhead
is graduated to GA (kubernetes/kubernetes#108441, @pacoxu) [SIG API Machinery, Apps, Node and Scheduling] - Fixes a regression in v1beta1 PodDisruptionBudget handling of "strategic merge patch"-type API requests for the
selector
field. Prior to 1.21, these requests would mergematchLabels
content and replacematchExpressions
content. In 1.21, patch requests touching theselector
field started replacing the entire selector. This is consistent with server-side apply and the v1 PodDisruptionBudget behavior, but should not have been changed for v1beta1. (kubernetes/kubernetes#108138, @liggitt) [SIG Apps, Auth and Testing] - Kube-apiserver: --audit-log-version and --audit-webhook-version now only support the default value of audit.k8s.io/v1. The v1alpha1 and v1beta1 audit log versions, deprecated since 1.13, have been removed. (kubernetes/kubernetes#108092, @carlory) [SIG API Machinery, Auth and Testing]
- Pod-affinity namespace selector and cross-namespace quota graduated to GA. The feature gate PodAffinityNamespaceSelector is locked and will be removed in 1.26. (kubernetes/kubernetes#108136, @ahg-g) [SIG API Machinery, Apps, Scheduling and Testing]
- Suspend job to GA. The feature gate SuspendJob is locked and will be removed in 1.26. (kubernetes/kubernetes#108129, @ahg-g) [SIG Apps and Testing]
- The CertificateSigningRequest
spec.expirationSeconds
API field has graduated to GA. TheCSRDuration
feature gate for the field is now unconditionally enabled and will be removed in 1.26. (kubernetes/kubernetes#108782, @cfryanr) [SIG API Machinery, Apps, Auth, Instrumentation and Testing] - TopologySpreadConstraints includes minDomains field to limit the minimum number of topology domains. (kubernetes/kubernetes#107674, @sanposhiho) [SIG API Machinery, Apps and Scheduling]
- CRD deep copies should no longer contain shallow copies of JSONSchemaProps.XValidations. (kubernetes/kubernetes#107956, @benluddy) [SIG API Machinery]
- Feature of
NonPreemptingPriority
is graduated to GA (kubernetes/kubernetes#107432, @denkensk) [SIG Apps, Scheduling and Testing] - Fix OpenAPI serialization of the x-kubernetes-validations field (kubernetes/kubernetes#107970, @liggitt) [SIG API Machinery]
- Kube-apiserver: the
metadata.selfLink
field can no longer be populated by kube-apiserver; it was deprecated in 1.16 and has not been populated by default in 1.20+. (kubernetes/kubernetes#107527, @wojtek-t) [SIG API Machinery, Apps, Auth, Autoscaling, CLI, Cloud Provider, Network, Scheduling, Storage and Testing] - Add a new metric
webhook_fail_open_count
to monitor webhooks that fail open (kubernetes/kubernetes#107171, @ltagliamonte-dd) [SIG API Machinery and Instrumentation] - Fix failed flushing logs in defer function when kubelet cmd exit 1. (kubernetes/kubernetes#104774, @kerthcet) [SIG Node and Scheduling]
- Rename metrics
evictions_number
toevictions_total
and mark it as stable. The originalevictions_number
metrics name is marked as "Deprecated" and will be removed in kubernetes 1.23 (kubernetes/kubernetes#106366, @cyclinder) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scalability, Scheduling, Storage, Testing and Windows] - The
ServiceLBNodePortControl
feature graduates to GA. The feature gate will be removed in 1.26. (kubernetes/kubernetes#107027, @uablrek) [SIG Network and Testing] - The feature DynamicKubeletConfig is removed from the kubelet. (kubernetes/kubernetes#106932, @SergeyKanzhelev) [SIG Apps, Auth, Instrumentation, Node and Testing]
- Update default API priority-and-fairness config to avoid endpoint/configmaps operations from controller-manager to all match leader-election priority level. (kubernetes/kubernetes#106725, @wojtek-t) [SIG API Machinery]
Kubernetes API Version: v1.23.6
- Omits alpha-level enums from the static openapi file captured in api/openapi-spec (kubernetes/kubernetes#109179, @liggitt) [SIG Apps and Auth]
- Fixes a regression in v1beta1 PodDisruptionBudget handling of "strategic merge patch"-type API requests for the
selector
field. Prior to 1.21, these requests would mergematchLabels
content and replacematchExpressions
content. In 1.21, patch requests touching theselector
field started replacing the entire selector. This is consistent with server-side apply and the v1 PodDisruptionBudget behavior, but should not have been changed for v1beta1. (kubernetes/kubernetes#108139, @liggitt) [SIG Auth and Testing]
Kubernetes API Version: v1.23.4
Kubernetes API Version: v1.23.4
- Fix OpenAPI serialization of the x-kubernetes-validations field (kubernetes/kubernetes#108030, @liggitt) [SIG API Machinery]
Kubernetes API Version: v1.23.3
-
A new field
omitManagedFields
has been added to bothaudit.Policy
andaudit.PolicyRule
so cluster operators can opt in to omit managed fields of the request and response bodies from being written to the API audit log. (kubernetes/kubernetes#94986, @tkashem) [SIG API Machinery, Auth, Cloud Provider and Testing] -
A small regression in Service updates was fixed. The circumstances are so unlikely that probably nobody would ever hit it. (kubernetes/kubernetes#104601, @thockin)
-
Added a feature gate
StatefulSetAutoDeletePVC
, which allows PVCs automatically created for StatefulSet pods to be automatically deleted. (kubernetes/kubernetes#99728, @mattcary) -
Client-go impersonation config can specify a UID to pass impersonated uid information through in requests. (kubernetes/kubernetes#104483, @margocrawf)
-
Create HPA v2 from v2beta2 with some fields changed. (kubernetes/kubernetes#102534, @wangyysde) [SIG API Machinery, Apps, Auth, Autoscaling and Testing]
-
Ephemeral containers graduated to beta and are now available by default. (kubernetes/kubernetes#105405, @verb)
-
Fix kube-proxy regression on UDP services because the logic to detect stale connections was not considering if the endpoint was ready. (kubernetes/kubernetes#106163, @aojea) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Contributor Experience, Instrumentation, Network, Node, Release, Scalability, Scheduling, Storage, Testing and Windows]
-
If a conflict occurs when creating an object with
generateName
, the server now returns an "AlreadyExists" error with a retry option. (kubernetes/kubernetes#104699, @vincepri) -
Implement support for recovering from volume expansion failures (kubernetes/kubernetes#106154, @gnufied) [SIG API Machinery, Apps and Storage]
-
In kubelet, log verbosity and flush frequency can also be configured via the configuration file and not just via command line flags. In other commands (kube-apiserver, kube-controller-manager), the flags are listed in the "Logs flags" group and not under "Global" or "Misc". The type for
-vmodule
was made a bit more descriptive (pattern=N,...
instead ofmoduleSpec
). (kubernetes/kubernetes#106090, @pohly) [SIG API Machinery, Architecture, CLI, Cluster Lifecycle, Instrumentation, Node and Scheduling] -
Introduce
OS
field in the PodSpec (kubernetes/kubernetes#104693, @ravisantoshgudimetla) -
Introduce
v1beta3
API for scheduler. This version-
increases the weight of user specifiable priorities. The weights of following priority plugins are increased
TaintTolerations
to 3 - as leveraging node tainting to group nodes in the cluster is becoming a widely-adopted practiceNodeAffinity
to 2InterPodAffinity
to 2
-
Won't have
HealthzBindAddress
,MetricsBindAddress
fields (kubernetes/kubernetes#104251, @ravisantoshgudimetla)
-
-
Introduce v1beta2 for Priority and Fairness with no changes in API spec. (kubernetes/kubernetes#104399, @tkashem)
-
JSON log output is configurable and now supports writing info messages to stdout and error messages to stderr. Info messages can be buffered in memory. The default is to write both to stdout without buffering, as before. (kubernetes/kubernetes#104873, @pohly)
-
JobTrackingWithFinalizers graduates to beta. Feature is enabled by default. (kubernetes/kubernetes#105687, @alculquicondor)
-
Kube-apiserver: Fixes handling of CRD schemas containing literal null values in enums. (kubernetes/kubernetes#104969, @liggitt)
-
Kube-apiserver: The
rbac.authorization.k8s.io/v1alpha1
API version is removed; use therbac.authorization.k8s.io/v1
API, available since v1.8. Thescheduling.k8s.io/v1alpha1
API version is removed; use thescheduling.k8s.io/v1
API, available since v1.14. (kubernetes/kubernetes#104248, @liggitt) -
Kube-scheduler: support for configuration file version
v1beta1
is removed. Update configuration files to v1beta2(xref: kubernetes/enhancements#2901) or v1beta3 before upgrading to 1.23. (kubernetes/kubernetes#104782, @kerthcet) -
KubeSchedulerConfiguration provides a new field
MultiPoint
which will register a plugin for all valid extension points (kubernetes/kubernetes#105611, @damemi) [SIG Scheduling and Testing] -
Kubelet should reject pods whose OS doesn't match the node's OS label. (kubernetes/kubernetes#105292, @ravisantoshgudimetla) [SIG Apps and Node]
-
Kubelet: turn the KubeletConfiguration v1beta1
ResolverConfig
field from astring
to*string
. (kubernetes/kubernetes#104624, @Haleygo) -
Kubernetes is now built using go 1.17. (kubernetes/kubernetes#103692, @justaugustus)
-
Performs strict server side schema validation requests via the
fieldValidation=[Strict,Warn,Ignore]
. (kubernetes/kubernetes#105916, @kevindelgado) -
Promote
IPv6DualStack
feature to stable. Controller Manager flags for the node IPAM controller have slightly changed:- When configuring a dual-stack cluster, the user must specify both
--node-cidr-mask-size-ipv4
and--node-cidr-mask-size-ipv6
to set the per-node IP mask sizes, instead of the previous--node-cidr-mask-size
flag. - The
--node-cidr-mask-size
flag is mutually exclusive with--node-cidr-mask-size-ipv4
and--node-cidr-mask-size-ipv6
. - Single-stack clusters do not need to change, but may choose to use the more specific flags. Users can use either the older
--node-cidr-mask-size
flag or one of the newer--node-cidr-mask-size-ipv4
or--node-cidr-mask-size-ipv6
flags to configure the per-node IP mask size, provided that the flag's IP family matches the cluster's IP family (--cluster-cidr). (kubernetes/kubernetes#104691, @khenidak)
- When configuring a dual-stack cluster, the user must specify both
-
Remove
NodeLease
feature gate that was graduated and locked to stable in 1.17 release. (kubernetes/kubernetes#105222, @cyclinder) -
Removed deprecated
--seccomp-profile-root
/seccompProfileRoot
config. (kubernetes/kubernetes#103941, @saschagrunert) -
Since golang 1.17 both net.ParseIP and net.ParseCIDR rejects leading zeros in the dot-decimal notation of IPv4 addresses, Kubernetes will keep allowing leading zeros on IPv4 address to not break the compatibility. IMPORTANT: Kubernetes interprets leading zeros on IPv4 addresses as decimal, users must not rely on parser alignment to not being impacted by the associated security advisory: CVE-2021-29923 golang standard library "net" - Improper Input Validation of octal literals in golang 1.16.2 and below standard library "net" results in indeterminate SSRF & RFI vulnerabilities. Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-29923 (kubernetes/kubernetes#104368, @aojea)
-
StatefulSet
minReadySeconds
is promoted to beta. (kubernetes/kubernetes#104045, @ravisantoshgudimetla) -
Support pod priority based node graceful shutdown. (kubernetes/kubernetes#102915, @wzshiming)
-
The "Generic Ephemeral Volume" feature graduates to GA. It is now enabled unconditionally. (kubernetes/kubernetes#105609, @pohly)
-
The Kubelet's
--register-with-taints
option is now available via the Kubelet config file field registerWithTaints (kubernetes/kubernetes#105437, @cmssczy) [SIG Node and Scalability] -
The
CSIDriver.Spec.StorageCapacity
can now be modified. (kubernetes/kubernetes#101789, @pohly) -
The
CSIVolumeFSGroupPolicy
feature has moved from beta to GA. (kubernetes/kubernetes#105940, @dobsonj) -
The
IngressClass.Spec.Parameters.Namespace
field is now GA. (kubernetes/kubernetes#104636, @hbagdi) -
The
Service.spec.ipFamilyPolicy
field is now required in order to create or update a Service as dual-stack. This is a breaking change from the beta behavior. Previously the server would try to infer the value of that field from eitheripFamilies
orclusterIPs
, but that caused ambiguity on updates. Users who want a dual-stack Service MUST specifyipFamilyPolicy
as either "PreferDualStack" or "RequireDualStack". (kubernetes/kubernetes#96684, @thockin) -
The
TTLAfterFinished
feature gate is now GA and enabled by default. (kubernetes/kubernetes#105219, @sahilvv) -
The
kube-controller-manager
supports--concurrent-ephemeralvolume-syncs
flag to set the number of ephemeral volume controller workers. (kubernetes/kubernetes#102981, @SataQiu) -
The legacy scheduler policy config is removed in v1.23, the associated flags
policy-config-file
,policy-configmap
,policy-configmap-namespace
anduse-legacy-policy-config
are also removed. Migrate to Component Config instead, see https://kubernetes.io/docs/reference/scheduling/config/ for details. (kubernetes/kubernetes#105424, @kerthcet) -
Track the number of Pods with a Ready condition in Job status. The feature is alpha and needs the feature gate JobReadyPods to be enabled. (kubernetes/kubernetes#104915, @alculquicondor)
-
Users of
LogFormatRegistry
in component-base must update their code to use the logr v1.0.0 API. The JSON log output now uses the format from go-logr/zapr (nov
field for error messages, additional information for invalid calls) and has some fixes (correct source code location for warnings about invalid log calls). (kubernetes/kubernetes#104103, @pohly) -
Validation rules for Custom Resource Definitions can be written in the CEL expression language using the
x-kubernetes-validations
extension in OpenAPIv3 schemas (alpha). This is gated by the alpha "CustomResourceValidationExpressions" feature gate. (kubernetes/kubernetes#106051, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Node, Storage and Testing] -
Add gRPC probe to Pod.Spec.Container.{Liveness,Readiness,Startup}Probe (#106463, @SergeyKanzhelev) [SIG API Machinery, Apps, CLI, Node and Testing]
-
Adds a feature gate StatefulSetAutoDeletePVC, which allows PVCs automatically created for StatefulSet pods to be automatically deleted. (#99728, @mattcary) [SIG API Machinery, Apps, Auth and Testing]
-
Performs strict server side schema validation requests via the
fieldValidation=[Strict,Warn,Ignore]
query parameter. (#105916, @kevindelgado) [SIG API Machinery, Apps, Auth, Cloud Provider and Testing] -
Support pod priority based node graceful shutdown (#102915, @wzshiming) [SIG Node and Testing]
-
A new field
omitManagedFields
has been added to bothaudit.Policy
andaudit.PolicyRule
so cluster operators can opt in to omit managed fields of the request and response bodies from being written to the API audit log. (#94986, @tkashem) [SIG API Machinery, Auth, Cloud Provider and Testing] -
Create HPA v2 from v2beta2 with some fields changed. (#102534, @wangyysde) [SIG API Machinery, Apps, Auth, Autoscaling and Testing]
-
Fix kube-proxy regression on UDP services because the logic to detect stale connections was not considering if the endpoint was ready. (#106163, @aojea) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Contributor Experience, Instrumentation, Network, Node, Release, Scalability, Scheduling, Storage, Testing and Windows]
-
Implement support for recovering from volume expansion failures (#106154, @gnufied) [SIG API Machinery, Apps and Storage]
-
In kubelet, log verbosity and flush frequency can also be configured via the configuration file and not just via command line flags. In other commands (kube-apiserver, kube-controller-manager), the flags are listed in the "Logs flags" group and not under "Global" or "Misc". The type for
-vmodule
was made a bit more descriptive (pattern=N,...
instead ofmoduleSpec
). (#106090, @pohly) [SIG API Machinery, Architecture, CLI, Cluster Lifecycle, Instrumentation, Node and Scheduling] -
IngressClass.Spec.Parameters.Namespace field is now GA. (#104636, @hbagdi) [SIG Network and Testing]
-
KubeSchedulerConfiguration provides a new field
MultiPoint
which will register a plugin for all valid extension points (#105611, @damemi) [SIG Scheduling and Testing] -
Kubelet should reject pods whose OS doesn't match the node's OS label. (#105292, @ravisantoshgudimetla) [SIG Apps and Node]
-
The CSIVolumeFSGroupPolicy feature has moved from beta to GA. (#105940, @dobsonj) [SIG Storage]
-
The Kubelet's
--register-with-taints
option is now available via the Kubelet config file field registerWithTaints (#105437, @cmssczy) [SIG Node and Scalability] -
Validation rules for Custom Resource Definitions can be written in the CEL expression language using the
x-kubernetes-validations
extension in OpenAPIv3 schemas (alpha). This is gated by the alpha "CustomResourceValidationExpressions" feature gate. (#106051, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Node, Storage and Testing] - (#104782, @kerthcet) [SIG Scheduling and Testing]
-
Ephemeral containers have reached beta maturity and are now available by default. (#105405, @verb) [SIG API Machinery, Apps, Node and Testing]
-
Introduce OS field in the Pod Spec (#104693, @ravisantoshgudimetla) [SIG API Machinery and Apps]
-
Introduce v1beta3 api for scheduler. This version
-
increases the weight of user specifiable priorities. The weights of following priority plugins are increased
- TaintTolerations to 3 - as leveraging node tainting to group nodes in the cluster is becoming a widely-adopted practice
- NodeAffinity to 2
- InterPodAffinity to 2
-
Won't have HealthzBindAddress, MetricsBindAddress fields (#104251, @ravisantoshgudimetla) [SIG Scheduling and Testing]
-
-
JSON log output is configurable and now supports writing info messages to stdout and error messages to stderr. Info messages can be buffered in memory. The default is to write both to stdout without buffering, as before. (#104873, @pohly) [SIG API Machinery, Architecture, CLI, Cluster Lifecycle, Instrumentation, Node and Scheduling]
-
JobTrackingWithFinalizers graduates to beta. Feature is enabled by default. (#105687, @alculquicondor) [SIG Apps and Testing]
-
Remove NodeLease feature gate that was graduated and locked to stable in 1.17 release. (#105222, @cyclinder) [SIG Apps, Node and Testing]
-
TTLAfterFinished is now GA and enabled by default (#105219, @sahilvv) [SIG API Machinery, Apps, Auth and Testing]
-
The "Generic Ephemeral Volume" feature graduates to GA. It is now enabled unconditionally. (#105609, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling, Storage and Testing]
-
The legacy scheduler policy config is removed in v1.23, the associated flags policy-config-file, policy-configmap, policy-configmap-namespace and use-legacy-policy-config are also removed. Migrate to Component Config instead, see https://kubernetes.io/docs/reference/scheduling/config/ for details. (#105424, @kerthcet) [SIG Scheduling and Testing]
-
Track the number of Pods with a Ready condition in Job status. The feature is alpha and needs the feature gate JobReadyPods to be enabled. (#104915, @alculquicondor) [SIG API Machinery, Apps, CLI and Testing]
-
Client-go impersonation config can specify a UID to pass impersonated uid information through in requests. (kubernetes/kubernetes#104483, @margocrawf) [SIG API Machinery, Auth and Testing]
-
IPv6DualStack feature moved to stable. Controller Manager flags for the node IPAM controller have slightly changed:
- When configuring a dual-stack cluster, the user must specify both --node-cidr-mask-size-ipv4 and --node-cidr-mask-size-ipv6 to set the per-node IP mask sizes, instead of the previous --node-cidr-mask-size flag.
- The --node-cidr-mask-size flag is mutually exclusive with --node-cidr-mask-size-ipv4 and --node-cidr-mask-size-ipv6.
- Single-stack clusters do not need to change, but may choose to use the more specific flags. Users can use either the older --node-cidr-mask-size flag or one of the newer --node-cidr-mask-size-ipv4 or --node-cidr-mask-size-ipv6 flags to configure the per-node IP mask size, provided that the flag's IP family matches the cluster's IP family (--cluster-cidr). (kubernetes/kubernetes#104691, @khenidak) [SIG API Machinery, Apps, Auth, Cloud Provider, Cluster Lifecycle, Network, Node and Testing]
-
Kubelet: turn the KubeletConfiguration v1beta1
ResolverConfig
field from astring
to*string
. (kubernetes/kubernetes#104624, @Haleygo) [SIG Cluster Lifecycle and Node] -
A small regression in Service updates was fixed. The circumstances are so unlikely that probably nobody would ever hit it. (kubernetes/kubernetes#104601, @thockin) [SIG Network]
-
Introduce v1beta2 for Priority and Fairness with no changes in API spec (kubernetes/kubernetes#104399, @tkashem) [SIG API Machinery and Testing]
-
Kube-apiserver: Fixes handling of CRD schemas containing literal null values in enums. (kubernetes/kubernetes#104969, @liggitt) [SIG API Machinery, Apps and Network]
-
Kubelet: turn the KubeletConfiguration v1beta1
ResolverConfig
field from astring
to*string
. (kubernetes/kubernetes#104624, @Haleygo) [SIG Cluster Lifecycle and Node] -
Kubernetes is now built using go1.17 (kubernetes/kubernetes#103692, @justaugustus) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling, Storage and Testing]
-
Removed deprecated
--seccomp-profile-root
/seccompProfileRoot
config (kubernetes/kubernetes#103941, @saschagrunert) [SIG Node] -
Since golang 1.17 both net.ParseIP and net.ParseCIDR rejects leading zeros in the dot-decimal notation of IPv4 addresses. Kubernetes will keep allowing leading zeros on IPv4 address to not break the compatibility. IMPORTANT: Kubernetes interprets leading zeros on IPv4 addresses as decimal, users must not rely on parser alignment to not being impacted by the associated security advisory: CVE-2021-29923 golang standard library "net" - Improper Input Validation of octal literals in golang 1.16.2 and below standard library "net" results in indeterminate SSRF & RFI vulnerabilities. Reference: https://nvd.nist.gov/vuln/detail/CVE-2021-29923 (kubernetes/kubernetes#104368, @aojea) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scalability, Scheduling, Storage and Testing]
-
StatefulSet minReadySeconds is promoted to beta (kubernetes/kubernetes#104045, @ravisantoshgudimetla) [SIG Apps and Testing]
-
The
Service.spec.ipFamilyPolicy
field is now required in order to create or update a Service as dual-stack. This is a breaking change from the beta behavior. Previously the server would try to infer the value of that field from eitheripFamilies
orclusterIPs
, but that caused ambiguity on updates. Users who want a dual-stack Service MUST specifyipFamilyPolicy
as either "PreferDualStack" or "RequireDualStack". (kubernetes/kubernetes#96684, @thockin) [SIG API Machinery, Apps, Network and Testing] -
Users of LogFormatRegistry in component-base must update their code to use the logr v1.0.0 API. The JSON log output now uses the format from go-logr/zapr (no
v
field for error messages, additional information for invalid calls) and has some fixes (correct source code location for warnings about invalid log calls). (kubernetes/kubernetes#104103, @pohly) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation and Storage] -
When creating an object with generateName, if a conflict occurs the server now returns an AlreadyExists error with a retry option. (kubernetes/kubernetes#104699, @vincepri) [SIG API Machinery]
-
CSIDriver.Spec.StorageCapacity can now be modified. (kubernetes/kubernetes#101789, @pohly) [SIG Storage]
-
Kube-apiserver: The
rbac.authorization.k8s.io/v1alpha1
API version is removed; use therbac.authorization.k8s.io/v1
API, available since v1.8. Thescheduling.k8s.io/v1alpha1
API version is removed; use thescheduling.k8s.io/v1
API, available since v1.14. (kubernetes/kubernetes#104248, @liggitt) [SIG API Machinery, Auth, Network and Testing] -
Kube-controller-manager supports '--concurrent-ephemeralvolume-syncs' flag to set the number of ephemeral volume controller workers. (kubernetes/kubernetes#102981, @SataQiu) [SIG API Machinery and Apps]
Kubernetes API Version: v1.22.6
- Notable feature additions for async creation of Custom resources using dynamic Client (#1697, @venukarnati92)
- Add
utils.create_from_directory
for creating all yaml files in a directory (#1683, @dingyiyi0226)
Kubernetes API Version: v1.22.6
- Add
utils.create_from_directory
for creating all yaml files in a directory (#1683, @dingyiyi0226)
Kubernetes API Version: v1.22.6
-
Kube-apiserver: Fixes handling of CRD schemas containing literal null values in enums (#104988, @liggitt) [SIG API Machinery, Apps and Network]
-
A new score extension for NodeResourcesFit plugin that merges the functionality of
NodeResourcesLeastAllocated
,NodeResourcesMostAllocated
,RequestedToCapacityRatio
plugins, which are marked as deprecated as of v1beta2. In v1beta1, the three plugins can still be used in v1beta1 but not at the same time with the score extension ofNodeResourcesFit
. (kubernetes/kubernetes#101822, @yuzhiquan) -
A value of
Auto
is now a valid for theservice.kubernetes.io/topology-aware-hints
annotation. (kubernetes/kubernetes#100728, @robscott) -
Add
DataSourceRef
alpha field to PVC spec, which allows contents other thanPVCs
andVolumeSnapshots
to be data sources. (kubernetes/kubernetes#103276, @bswartz) -
Add
PersistentVolumeClaimDeletePoilcy
to StatefulSet API. (kubernetes/kubernetes#99378, @mattcary) -
Add a new Priority and Fairness rule that exempts all probes (
/readyz
,/healthz
,/livez
) to prevent restarting of healthykube-apiserver
instance by kubelet. (kubernetes/kubernetes#100678, @tkashem) -
Add alpha support for HostProcess containers on Windows (kubernetes/kubernetes#99576, @marosset) [SIG API Machinery, Apps, Node, Testing and Windows]
-
Add distributed tracing to the
kube-apiserver
. It is can be enabled with the feature gateAPIServerTracing
(kubernetes/kubernetes#94942, @dashpole) -
Add three metrics to the job controller to monitor if a job works in healthy condition.
IndexedJob
has been promoted to Beta. (kubernetes/kubernetes#101292, @AliceZhang2016) -
Added field
.status.uncountedTerminatedPods
to the Job resource. This field is used by the job controller to keep track of finished pods before adding them to the Job status counters. Pods created by the job controller get the finalizerbatch.kubernetes.io/job-tracking
Jobs that are tracked using this mechanism get the annotationbatch.kubernetes.io/job-tracking
. This is a temporary measure. Two releases after this feature graduates to beta, the annotation won't be added to Jobs anymore. (kubernetes/kubernetes#98817, @alculquicondor) -
Added new kubelet alpha feature
SeccompDefault
. This feature enables falling back to theRuntimeDefault
(formerruntime/default
) seccomp profile if nothing else is specified in the pod/containerSecurityContext
or the pod annotation level. To use the feature, enable the feature gate as well as set the kubelet configuration optionSeccompDefault
(--seccomp-default
) totrue
. (kubernetes/kubernetes#101943, @saschagrunert) [SIG Node] -
Adds the
ReadWriteOncePod
access mode forPersistentVolumes
andPersistentVolumeClaims
. Restricts volume access to a single pod on a single node. (kubernetes/kubernetes#102028, @chrishenzie) -
Alpha swap support can now be enabled on Kubernetes nodes with the
NodeSwapEnabled
feature flag. See KEP-2400 for details. (kubernetes/kubernetes#102823, @ehashman) -
Because of the implementation logic of
time.Format
in golang, the displayed time zone is not consistent. (kubernetes/kubernetes#102366, @cndoit18) -
Corrected the documentation for escaping dollar signs in a container's env, command and args property. (kubernetes/kubernetes#101916, @MartinKanters) [SIG Apps]
-
Enable
MaxSurge
forDaemonSet
by default. (kubernetes/kubernetes#101742, @ravisantoshgudimetla) -
Enforce the
ReadWriteOncePod
PVC access mode during scheduling (kubernetes/kubernetes#103082, @chrishenzie) -
Ephemeral containers are now allowed to configure a
securityContext
that differs from that of the Pod. Cluster administrators should ensure that security policy controllers supportEphemeralContainers
before enabling this feature in clusters. (kubernetes/kubernetes#99023, @verb) -
Exec plugin authors can override default handling of standard input via new
interactiveMode
kubeconfig field. (kubernetes/kubernetes#99310, @ankeesler) -
If someone had the
ProbeTerminationGracePeriod
alpha feature enabled in 1.21, they should update/delete any workloads/pods with probeterminationGracePeriods
< 1 before upgrading (kubernetes/kubernetes#103245, @wzshiming) -
Improved parsing of label selectors (kubernetes/kubernetes#102188, @alculquicondor) [SIG API Machinery]
-
Introduce
minReadySeconds
api to theStatefulSets
. (kubernetes/kubernetes#100842, @ravisantoshgudimetla) -
Introducing Memory quality of service support with
cgroups v2 (Alpha)
. TheMemoryQoS
feature is now in Alpha. This allowskubelet
running withcgroups v2
to set memory QoS at container, pod and QoS level to protect and guarantee better memory quality. This feature can be enabled through feature gate Memory QoS. (kubernetes/kubernetes#102970, @borgerli) -
Kube API server accepts
Impersonate-Uid
header to impersonate a user with a specific UID, in the same way that you can currently useImpersonate-User
,Impersonate-Group
andImpersonate-Extra
. (kubernetes/kubernetes#99961, @margocrawf) -
Kube-apiserver:
--service-account-issuer
can be specified multiple times now, to enable non-disruptive change of issuer. (kubernetes/kubernetes#101155, @zshihang) [SIG API Machinery, Auth, Node and Testing] -
Kube-controller-manager: the
--horizontal-pod-autoscaler-use-rest-clients
flag and Heapster support in the horizontal pod autoscaler, deprecated since 1.12, is removed. (kubernetes/kubernetes#90368, @serathius) -
Kube-scheduler: a plugin enabled in a v1beta2 configuration file takes precedence over the default configuration for that plugin. This simplifies enabling default plugins with custom configuration without needing to explicitly disable those default plugins. (kubernetes/kubernetes#99582, @chendave)
-
New
node-high
priority-level has been added to Suggested API Priority and (kubernetes/kubernetes#101151, @mborsz) -
NodeSwapEnabled feature flag was renamed to NodeSwap
The flag was only available in the 1.22.0-beta.1 release, and the new flag should be used going forward. (kubernetes/kubernetes#103553, @ehashman) [SIG Node]
-
Omit comparison with boolean constant (kubernetes/kubernetes#101523, @chuntaochen) [SIG CLI and Cloud Provider]
-
Removed the feature flag for probe-level termination grace period from Kubelet. If a user wants to disable this feature on already created pods, they will have to delete and recreate the pods. (kubernetes/kubernetes#103168, @raisaat) [SIG Apps and Node]
-
Revert addition of Add
PersistentVolumeClaimDeletePoilcy
toStatefulSet
API. (kubernetes/kubernetes#103747, @mattcary) -
Scheduler could be configured to consider new resources beside CPU and memory, GPU for example, for the score plugin of
NodeResourcesBalancedAllocation
. (kubernetes/kubernetes#101946, @chendave) [SIG Scheduling] -
Server Side Apply now treats all Selector fields as atomic (meaning the entire selector is managed by a single writer and updated together), since they contain interrelated and inseparable fields that do not merge in intuitive ways. (kubernetes/kubernetes#97989, @Danil-Grigorev) [SIG API Machinery]
-
Suspend Job feature graduated to beta. Added the
action
label to Job controller sync metricsjob_sync_total
andjob_sync_duration_seconds
. (kubernetes/kubernetes#102022, @adtac) -
The API documentation for the DaemonSet's
spec.updateStrategy.rollingUpdate.maxUnavailable
field was corrected to state that the value is rounded up. (kubernetes/kubernetes#101296, @Miciah) -
The
CSIServiceAccountToken
graduates to Ga and is unconditionally enabled. (kubernetes/kubernetes#103001, @zshihang) -
The
CertificateSigningRequest.certificates.k8s.io
API supports an optional expirationSeconds field to allow the client to request a particular duration for the issued certificate. The default signer implementations provided by the Kubernetes controller manager will honor this field as long as it does not exceed the --cluster-signing-duration flag. (kubernetes/kubernetes#99494, @enj) -
The
EndpointSlicen Mirroring controller
no longer mirrors thelast-applied-configuration
annotation created bykubectl
to updateEndpointSlices
. (kubernetes/kubernetes#102731, @sharmarajdaksh) -
The
NetworkPolicyEndPort
is graduated to beta and is enabled by default. (kubernetes/kubernetes#102834, @rikatz) -
The
PodDeletionCost
feature has been promoted to beta, and enabled by default. (kubernetes/kubernetes#101080, @ahg-g) -
The
Server Side Apply
treats certain structs as atomic. Meaning the entire selector field is managed by a single writer and updated together. (kubernetes/kubernetes#100684, @Jefftree) -
The
ServiceAppProtocol
feature gate has been removed. It reached GA in Kubernetes (kubernetes/kubernetes#103190, @robscott) -
The
TerminationGracePeriodSeconds
on pod specs and container probes should not be negative. Negative values ofTerminationGracePeriodSeconds
will be treated as the value1s
on the delete path. Immutable field validation will be relaxed in order to update negative values. In a future release, negative values will not be permitted. (kubernetes/kubernetes#98866, @wzshiming) -
The
kube-scheduler
component configv1beta2
API available Three scheduler plugins deprecated (NodeLabel
,ServiceAffinity
,NodePreferAvoidPods
). (kubernetes/kubernetes#99597, @adtac) -
The
pod/eviction
subresource now acceptspolicy/v1
eviction requests in addition topolicy/v1beta1
eviction requests (kubernetes/kubernetes#100724, @liggitt) -
The
podAffinity
,NamespaceSelector
and the associatedCrossNamespaceAffinity
quota scope features graduate to Beta and they are now enabled by default. (kubernetes/kubernetes#101496, @ahg-g) -
The
pods/ephemeralcontainers
API now returns and expects aPod
object instead ofEphemeralContainers
. This is incompatible with the previous alpha-level API. (kubernetes/kubernetes#101034, @verb) [SIG Apps, Auth, CLI and Testing] -
The
v1.Node
and.status.images[].names
are now optional. (kubernetes/kubernetes#102159, @roycaihw) -
The deprecated flag
--algorithm-provider
has been removed fromkube-scheduler
. Use insteadComponentConfig
to configure the set of enabled plugins. (kubernetes/kubernetes#102239, @Haleygo) -
The options
--ssh-user
and--ssh-key
are removed. They only functioned on GCE, and only in-tree. Use the apiserver network proxy instead. (kubernetes/kubernetes#102297, @deads2k) -
Track Job completion through status and Pod finalizers, removing dependency on Pod tombstones. (kubernetes/kubernetes#98238, @alculquicondor) [SIG API Machinery, Apps, Auth and Testing]
-
Track ownership of scale subresource for all scalable resources i.e. Deployment, ReplicaSet, StatefulSet, ReplicationController, and Custom Resources. (kubernetes/kubernetes#98377, @nodo) [SIG API Machinery and Testing]
-
Revert addition of Add PersistentVolumeClaimDeletePoilcy to StatefulSet API. (kubernetes/kubernetes#103747, @mattcary) [SIG API Machinery and Apps]
-
Added field .status.uncountedTerminatedPods to the Job resource. This field is used by the job controller to keep track of finished pods before adding them to the Job status counters.
Pods created by the job controller get the finalizer batch.kubernetes.io/job-tracking
Jobs that are tracked using this mechanism get the annotation batch.kubernetes.io/job-tracking. This is a temporary measure. Two releases after this feature graduates to beta, the annotation won't be added to Jobs anymore. (kubernetes/kubernetes#98817, @alculquicondor) [SIG API Machinery, Apps, Auth and CLI]
-
Ephemeral containers are now allowed to configure a securityContext that differs from that of the Pod.
Cluster administrators should ensure that security policy controllers support EphemeralContainers before enabling this feature in clusters. (kubernetes/kubernetes#99023, @verb) [SIG API Machinery, Apps, Auth and Node]
-
If someone had the ProbeTerminationGracePeriod alpha feature enabled in 1.21, they should update/delete any workloads/pods with probe terminationGracePeriods < 1 before upgrading (kubernetes/kubernetes#103245, @wzshiming) [SIG Apps and Node]
-
Introducing Memory QoS support with cgroups v2 (Alpha) The MemoryQoS feature is now in Alpha. This allows kubelet running with cgroups v2 to set memory QoS at container, pod and QoS level to protect and guarantee better memory quality. This feature can be enabled through feature gate MemoryQoS. (kubernetes/kubernetes#102970, @borgerli) [SIG Node and Storage]
-
NodeSwapEnabled feature flag was renamed to NodeSwap
The flag was only available in the 1.22.0-beta.1 release, and the new flag should be used going forward. (kubernetes/kubernetes#103553, @ehashman) [SIG Node]
-
Removed the feature flag for probe-level termination grace period from Kubelet. If a user wants to disable this feature on already created pods, they will have to delete and recreate the pods. (kubernetes/kubernetes#103168, @raisaat) [SIG Apps and Node]
-
Track Job completion through status and Pod finalizers, removing dependency on Pod tombstones. (kubernetes/kubernetes#98238, @alculquicondor) [SIG API Machinery, Apps, Auth and Testing]
-
When using
kubectl replace
(or the equivalent API call) on a Service, the caller no longer needs to do a read-modify-write cycle to fetch the allocated values for.spec.clusterIP
and.spec.ports[].nodePort
. Instead the API server will automatically carry these forward from the original object when the new object does not specify them. (kubernetes/kubernetes#103532, @thockin) [SIG Apps and Network] -
A new score extension for NodeResourcesFit plugin that merges the functionality of NodeResourcesLeastAllocated,NodeResourcesMostAllocated,RequestedToCapacityRatio plugins, which are marked as deprecated as of v1beta2. In v1beta1, the three plugins can still be used in v1beta1 but not at the same time with the score extension of NodeResourcesFit
-
Add DataSourceRef alpha field to PVC spec, which allows contents other than PVCs and VolumeSnapshots to be data sources. (kubernetes/kubernetes#103276, @bswartz) [SIG API Machinery, Apps and Storage]
-
Add PersistentVolumeClaimDeletePoilcy to StatefulSet API. (kubernetes/kubernetes#99378, @mattcary) [SIG API Machinery and Apps]
-
Add distributed tracing to the kube-apiserver. It is can be enabled with the feature gate: APIServerTracing=true (kubernetes/kubernetes#94942, @dashpole) [SIG API Machinery, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Node, Storage and Testing]
-
Added new kubelet alpha feature
SeccompDefault
. This feature enables falling back to theRuntimeDefault
(formerruntime/default
) seccomp profile if nothing else is specified in the pod/containerSecurityContext
or the pod annotation level. To use the feature, enable the feature gate as well as set the kubelet configuration optionSeccompDefault
(--seccomp-default
) totrue
. (kubernetes/kubernetes#101943, @saschagrunert) [SIG Node] -
Adds the ReadWriteOncePod access mode for PersistentVolumes and PersistentVolumeClaims. Restricts volume access to a single pod on a single node. (kubernetes/kubernetes#102028, @chrishenzie) [SIG Apps, CLI, Node, Scheduling and Storage]
-
Alpha swap support can now be enabled on Kubernetes nodes with the NodeSwapEnabled feature flag. See for details. (kubernetes/kubernetes#102823, @ehashman) [SIG Node]
-
CSIServiceAccountToken is GA. (kubernetes/kubernetes#103001, @zshihang) [SIG Auth and Storage]
-
Enforce the ReadWriteOncePod PVC access mode during scheduling (kubernetes/kubernetes#103082, @chrishenzie) [SIG Apps, CLI, Node, Scheduling and Storage]
-
Improved parsing of label selectors (kubernetes/kubernetes#102188, @alculquicondor) [SIG API Machinery]
-
Kube API server accepts Impersonate-Uid header to impersonate a user with a specific UID, in the same way that you can currently use Impersonate-User, Impersonate-Group and Impersonate-Extra (kubernetes/kubernetes#99961, @margocrawf) [SIG API Machinery, Auth and Testing]
-
Kube-scheduler: a plugin enabled in a v1beta2 configuration file takes precedence over the default configuration for that plugin; this simplifies enabling default plugins with custom configuration without needing to explicitly disable those default plugins. (kubernetes/kubernetes#99582, @chendave) [SIG Scheduling]
-
Scheduler could be configured to consider new resources beside CPU and memory, GPU for example, for the score plugin of
NodeResourcesBalancedAllocation
. (kubernetes/kubernetes#101946, @chendave) [SIG Scheduling] -
Suspend Job feature graduated to beta Added the "action" label to Job controller sync metrics job_sync_total and job_sync_duration_seconds (kubernetes/kubernetes#102022, @adtac) [SIG Apps, Instrumentation and Testing]
-
TerminationGracePeriodSeconds on pod specs and container probes should not be negative. Negative values of TerminationGracePeriodSeconds will be treated as the value
1s
on the delete path. Immutable field validation will be relaxed in order to update negative values. In a future release, negative values will not be permitted. (kubernetes/kubernetes#98866, @wzshiming) [SIG API Machinery, Apps and Node] -
The API documentation for the DaemonSet's spec.updateStrategy.rollingUpdate.maxUnavailable field was corrected to state that the value is rounded up. (kubernetes/kubernetes#101296, @Miciah) [SIG Apps and CLI]
-
The CertificateSigningRequest.certificates.k8s.io API supports an optional expirationSeconds field to allow the client to request a particular duration for the issued certificate. The default signer implementations provided by the Kubernetes controller manager will honor this field as long as it does not exceed the --cluster-signing-duration flag. (kubernetes/kubernetes#99494, @enj) [SIG API Machinery, Apps, Auth, CLI, Instrumentation, Node, Security and Testing]
-
The ServiceAppProtocol feature gate has been removed. It reached GA in Kubernetes 1.20. (kubernetes/kubernetes#103190, @robscott) [SIG Network]
-
Because of the implementation logic of time.Format in golang, the displayed time zone is not consistent (kubernetes/kubernetes#102366, @cndoit18) [SIG Apps, Auth, Autoscaling, CLI, Cluster Lifecycle, Instrumentation, Network, Node and Testing]
-
Endpoint slices mirroring controller no longer mirrors the last-applied-configuration annotation created by kubectl to updated endpoint slices (kubernetes/kubernetes#102731, @sharmarajdaksh) [SIG API Machinery, Apps, Cloud Provider, Network, Release, Scheduling, Storage and Testing]
-
Exec plugin authors can override default handling of standard input via new interactiveMode kubeconfig field (kubernetes/kubernetes#99310, @ankeesler) [SIG API Machinery, Auth, CLI and Testing]
-
Kube-scheduler component config v1beta2 API available Three scheduler plugins deprecated (NodeLabel, ServiceAffinity, NodePreferAvoidPods) (kubernetes/kubernetes#99597, @adtac) [SIG Scheduling]
-
Network Policy EndPort is graduated to beta and is enabled by default (kubernetes/kubernetes#102834, @rikatz) [SIG Network]
-
--ssh-user and --ssh-key options are removed. They only functioned on GCE, and only in-tree. Use the apiserver network proxy instead. (kubernetes/kubernetes#102297, @deads2k) [SIG API Machinery, Cloud Provider and Testing]
-
Enable MaxSurge for DS by default (kubernetes/kubernetes#101742, @ravisantoshgudimetla) [SIG Apps and Testing]
-
Introduce minReadySeconds api to the StatefulSets. (kubernetes/kubernetes#100842, @ravisantoshgudimetla) [SIG API Machinery, Apps and Testing]
-
Kube-controller-manger: the
--horizontal-pod-autoscaler-use-rest-clients
flag and Heapster support in the horizontal pod autoscaler, deprecated since 1.12, is removed. (kubernetes/kubernetes#90368, @serathius) [SIG API Machinery, Apps, Autoscaling, Cloud Provider and Instrumentation] -
The deprecated flag --algorithm-provider has been removed from kube-scheduler. Use instead ComponentConfig to configure the set of enabled plugins (kubernetes/kubernetes#102239, @Haleygo) [SIG Cloud Provider and Scheduling]
-
Add alpha support for HostProcess containers on Windows (kubernetes/kubernetes#99576, @marosset) [SIG API Machinery, Apps, Node, Testing and Windows]
-
Add three metrics to job controller to monitor if Job works in a healthy condition. IndexedJob promoted to Beta (kubernetes/kubernetes#101292, @AliceZhang2016) [SIG Apps, Instrumentation and Testing]
-
Corrected the documentation for escaping dollar signs in a container's env, command and args property. (kubernetes/kubernetes#101916, @MartinKanters) [SIG Apps]
-
Omit comparison with boolean constant (kubernetes/kubernetes#101523, @GreenApple10) [SIG CLI and Cloud Provider]
-
Pod Affinity NamespaceSelector and the associated CrossNamespaceAffinity quota scope graduated to beta (kubernetes/kubernetes#101496, @ahg-g) [SIG API Machinery, Apps and Testing]
-
V1.Node .status.images[].names is now optional (kubernetes/kubernetes#102159, @roycaihw) [SIG Apps and Node]
-
"Auto" is now a valid value for the
service.kubernetes.io/topology-aware-hints
annotation. (kubernetes/kubernetes#100728, @robscott) [SIG Apps, Instrumentation and Network] -
Kube-apiserver:
--service-account-issuer
can be specified multiple times now, to enable non-disruptive change of issuer. (kubernetes/kubernetes#101155, @zshihang) [SIG API Machinery, Auth, Node and Testing] -
New "node-high" priority-level has been added to Suggested API Priority and Fairness configuration. (kubernetes/kubernetes#101151, @mborsz) [SIG API Machinery]
-
PodDeletionCost promoted to Beta (kubernetes/kubernetes#101080, @ahg-g) [SIG Apps]
-
SSA treats certain structs as atomic (kubernetes/kubernetes#100684, @Jefftree) [SIG API Machinery, Auth, Node and Storage]
-
Server Side Apply now treats all Selector fields as atomic (meaning the entire selector is managed by a single writer and updated together), since they contain interrelated and inseparable fields that do not merge in intuitive ways. (kubernetes/kubernetes#97989, @Danil-Grigorev) [SIG API Machinery]
-
The
pods/ephemeralcontainers
API now returns and expects aPod
object instead ofEphemeralContainers
. This is incompatible with the previous alpha-level API. (kubernetes/kubernetes#101034, @verb) [SIG Apps, Auth, CLI and Testing] -
The pod/eviction subresource now accepts policy/v1 Eviction requests in addition to policy/v1beta1 Eviction requests (kubernetes/kubernetes#100724, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, CLI, Storage and Testing]
-
Track ownership of scale subresource for all scalable resources i.e. Deployment, ReplicaSet, StatefulSet, ReplicationController, and Custom Resources. (kubernetes/kubernetes#98377, @nodo) [SIG API Machinery and Testing]
-
We have added a new Priority & Fairness rule that exempts all probes (/readyz, /healthz, /livez) to prevent restarting of "healthy" kube-apiserver instance(s) by kubelet. (kubernetes/kubernetes#100678, @tkashem) [SIG API Machinery]
Kubernetes API Version: v1.21.7
- Fixed #741, an issue which prevented Kubernetes cluster api-tokens from exec-plugin auth providers from being refreshed after expiry. (#250, @emenendez)
- Use select.poll() for exec on linux/darwin to improve scalability of WSClient (#268, @jsun-splunk)
Kubernetes API Version: v1.21.7
Kubernetes API Version: v1.21.7
- Kube-apiserver: Fixes handling of CRD schemas containing literal null values in enums (#104989, @liggitt) [SIG API Machinery, Apps and Network]
- "Auto" is now a valid value for the
service.kubernetes.io/topology-aware-hints
annotation. (kubernetes/kubernetes#100728, @robscott) [SIG Apps, Instrumentation and Network] - We have added a new Priority & Fairness rule that exempts all probes (/readyz, /healthz, /livez) to prevent restarting of "healthy" kube-apiserver instance(s) by kubelet. (kubernetes/kubernetes#101111, @tkashem) [SIG API Machinery]
-
- PodAffinityTerm includes a namespaceSelector field to allow selecting eligible namespaces based on their labels.
- A new CrossNamespacePodAffinity quota scope API that allows restricting which namespaces allowed to use PodAffinityTerm with corss-namespace reference via namespaceSelector or namespaces fields. (kubernetes/kubernetes#98582, @ahg-g) [SIG API Machinery, Apps, Auth and Testing]
- Add Probe-level terminationGracePeriodSeconds field (kubernetes/kubernetes#99375, @ehashman) [SIG API Machinery, Apps, Node and Testing]
- Added
.spec.completionMode
field to Job, with accepted valuesNonIndexed
(default) andIndexed
. This is an alpha field and is only honored by servers with theIndexedJob
feature gate enabled. (kubernetes/kubernetes#98441, @alculquicondor) [SIG Apps and CLI] - Adds support for endPort field in NetworkPolicy (kubernetes/kubernetes#97058, @rikatz) [SIG Apps and Network]
- CSIServiceAccountToken graduates to Beta and enabled by default. (kubernetes/kubernetes#99298, @zshihang)
- Cluster admins can now turn off
/debug/pprof
and/debug/flags/v
endpoint in kubelet by settingenableProfilingHandler
andenableDebugFlagsHandler
tofalse
in the Kubelet configuration file. OptionsenableProfilingHandler
andenableDebugFlagsHandler
can be set totrue
only whenenableDebuggingHandlers
is also set totrue
. (kubernetes/kubernetes#98458, @SaranBalaji90) - DaemonSets accept a MaxSurge integer or percent on their rolling update strategy that will launch the updated pod on nodes and wait for those pods to go ready before marking the old out-of-date pods as deleted. This allows workloads to avoid downtime during upgrades when deployed using DaemonSets. This feature is alpha and is behind the DaemonSetUpdateSurge feature gate. (kubernetes/kubernetes#96441, @smarterclayton) [SIG Apps and Testing]
- Enable SPDY pings to keep connections alive, so that
kubectl exec
andkubectl portforward
won't be interrupted. (kubernetes/kubernetes#97083, @knight42) [SIG API Machinery and CLI] - FieldManager no longer owns fields that get reset before the object is persisted (e.g. "status wiping"). (kubernetes/kubernetes#99661, @kevindelgado) [SIG API Machinery, Auth and Testing]
- Fixes server-side apply for APIService resources. (kubernetes/kubernetes#98576, @kevindelgado)
- Generic ephemeral volumes are beta. (kubernetes/kubernetes#99643, @pohly) [SIG API Machinery, Apps, Auth, CLI, Node, Storage and Testing]
- Hugepages request values are limited to integer multiples of the page size. (kubernetes/kubernetes#98515, @lala123912) [SIG Apps]
- Implement the GetAvailableResources in the podresources API. (kubernetes/kubernetes#95734, @fromanirh) [SIG Instrumentation, Node and Testing]
- IngressClass resource can now reference a resource in a specific namespace for implementation-specific configuration (previously only Cluster-level resources were allowed). This feature can be enabled using the IngressClassNamespacedParams feature gate. (kubernetes/kubernetes#99275, @hbagdi)
- Jobs API has a new
.spec.suspend
field that can be used to suspend and resume Jobs. This is an alpha field which is only honored by servers with theSuspendJob
feature gate enabled. (kubernetes/kubernetes#98727, @adtac) - Kubelet Graceful Node Shutdown feature graduates to Beta and enabled by default. (kubernetes/kubernetes#99735, @bobbypage)
- Kubernetes is now built using go1.15.7 (kubernetes/kubernetes#98363, @cpanato) [SIG Cloud Provider, Instrumentation, Node, Release and Testing]
- Namespace API objects now have a
kubernetes.io/metadata.name
label matching their metadata.name field to allow selecting any namespace by its name using a label selector. (kubernetes/kubernetes#96968, @jayunit100) [SIG API Machinery, Apps, Cloud Provider, Storage and Testing] - One new field "InternalTrafficPolicy" in Service is added. It specifies if the cluster internal traffic should be routed to all endpoints or node-local endpoints only. "Cluster" routes internal traffic to a Service to all endpoints. "Local" routes traffic to node-local endpoints only, and traffic is dropped if no node-local endpoints are ready. The default value is "Cluster". (kubernetes/kubernetes#96600, @maplain) [SIG API Machinery, Apps and Network]
- PodDisruptionBudget API objects can now contain conditions in status. (kubernetes/kubernetes#98127, @mortent) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Cluster Lifecycle and Instrumentation]
- PodSecurityPolicy only stores "generic" as allowed volume type if the GenericEphemeralVolume feature gate is enabled (kubernetes/kubernetes#98918, @pohly) [SIG Auth and Security]
- Promote CronJobs to batch/v1 (kubernetes/kubernetes#99423, @soltysh) [SIG API Machinery, Apps, CLI and Testing]
- Promote Immutable Secrets/ConfigMaps feature to Stable. This allows to set
immutable
field in Secret or ConfigMap object to mark their contents as immutable. (kubernetes/kubernetes#97615, @wojtek-t) [SIG Apps, Architecture, Node and Testing] - Remove support for building Kubernetes with bazel. (kubernetes/kubernetes#99561, @BenTheElder) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scalability, Scheduling, Storage, Testing and Windows]
- Scheduler extender filter interface now can report unresolvable failed nodes in the new field
FailedAndUnresolvableNodes
ofExtenderFilterResult
struct. Nodes in this map will be skipped in the preemption phase. (kubernetes/kubernetes#92866, @cofyc) [SIG Scheduling] - Services can specify loadBalancerClass to use a custom load balancer (kubernetes/kubernetes#98277, @XudongLiuHarold)
- Storage capacity tracking (= the CSIStorageCapacity feature) graduates to Beta and enabled by default, storage.k8s.io/v1alpha1/VolumeAttachment and storage.k8s.io/v1alpha1/CSIStorageCapacity objects are deprecated (kubernetes/kubernetes#99641, @pohly)
- Support for Indexed Job: a Job that is considered completed when Pods associated to indexes from 0 to (.spec.completions-1) have succeeded. (kubernetes/kubernetes#98812, @alculquicondor) [SIG Apps and CLI]
- The BoundServiceAccountTokenVolume feature has been promoted to beta, and enabled by default.
- This changes the tokens provided to containers at
/var/run/secrets/kubernetes.io/serviceaccount/token
to be time-limited, auto-refreshed, and invalidated when the containing pod is deleted. - Clients should reload the token from disk periodically (once per minute is recommended) to ensure they continue to use a valid token.
k8s.io/client-go
version v11.0.0+ and v0.15.0+ reload tokens automatically. - By default, injected tokens are given an extended lifetime so they remain valid even after a new refreshed token is provided. The metric
serviceaccount_stale_tokens_total
can be used to monitor for workloads that are depending on the extended lifetime and are continuing to use tokens even after a refreshed token is provided to the container. If that metric indicates no existing workloads are depending on extended lifetimes, injected token lifetime can be shortened to 1 hour by startingkube-apiserver
with--service-account-extend-token-expiration=false
. (kubernetes/kubernetes#95667, @zshihang) [SIG API Machinery, Auth, Cluster Lifecycle and Testing]
- This changes the tokens provided to containers at
- The EndpointSlice Controllers are now GA. The
EndpointSliceController
will not populate thedeprecatedTopology
field and will only provide topology information through thezone
andnodeName
fields. (kubernetes/kubernetes#99870, @swetharepakula) - The Endpoints controller will now set the
endpoints.kubernetes.io/over-capacity
annotation to "warning" when an Endpoints resource contains more than 1000 addresses. In a future release, the controller will truncate Endpoints that exceed this limit. The EndpointSlice API can be used to support significantly larger number of addresses. (kubernetes/kubernetes#99975, @robscott) [SIG Apps and Network] - The PodDisruptionBudget API has been promoted to policy/v1 with no schema changes. The only functional change is that an empty selector (
{}
) written to a policy/v1 PodDisruptionBudget now selects all pods in the namespace. The behavior of the policy/v1beta1 API remains unchanged. The policy/v1beta1 PodDisruptionBudget API is deprecated and will no longer be served in 1.25+. (kubernetes/kubernetes#99290, @mortent) [SIG API Machinery, Apps, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Scheduling and Testing] - The
EndpointSlice
API is now GA. TheEndpointSlice
topology field has been removed from the GA API and will be replaced by a new per Endpoint Zone field. If the topology field was previously used, it will be converted into an annotation in the v1 Resource. Thediscovery.k8s.io/v1alpha1
API is removed. (kubernetes/kubernetes#99662, @swetharepakula) - The
controller.kubernetes.io/pod-deletion-cost
annotation can be set to offer a hint on the cost of deleting aPod
compared to other pods belonging to the same ReplicaSet. Pods with lower deletion cost are deleted first. This is an alpha feature. (kubernetes/kubernetes#99163, @ahg-g) - The kube-apiserver now resets
managedFields
that got corrupted by a mutating admission controller. (kubernetes/kubernetes#98074, @kwiesmueller) - Topology Aware Hints are now available in alpha and can be enabled with the
TopologyAwareHints
feature gate. (kubernetes/kubernetes#99522, @robscott) [SIG API Machinery, Apps, Auth, Instrumentation, Network and Testing] - Users might specify the
kubectl.kubernetes.io/default-exec-container
annotation in a Pod to preselect container for kubectl commands. (kubernetes/kubernetes#97099, @pacoxu) [SIG CLI] - Add Probe-level terminationGracePeriodSeconds field (kubernetes/kubernetes#99375, @ehashman) [SIG API Machinery, Apps, Node and Testing]
- CSIServiceAccountToken is Beta now (kubernetes/kubernetes#99298, @zshihang) [SIG Auth, Storage and Testing]
- Discovery.k8s.io/v1beta1 EndpointSlices are deprecated in favor of discovery.k8s.io/v1, and will no longer be served in Kubernetes v1.25. (kubernetes/kubernetes#100472, @liggitt) [SIG Network]
- FieldManager no longer owns fields that get reset before the object is persisted (e.g. "status wiping"). (kubernetes/kubernetes#99661, @kevindelgado) [SIG API Machinery, Auth and Testing]
- Generic ephemeral volumes are beta. (kubernetes/kubernetes#99643, @pohly) [SIG API Machinery, Apps, Auth, CLI, Node, Storage and Testing]
- Implement the GetAvailableResources in the podresources API. (kubernetes/kubernetes#95734, @fromanirh) [SIG Instrumentation, Node and Testing]
- The Endpoints controller will now set the
endpoints.kubernetes.io/over-capacity
annotation to "warning" when an Endpoints resource contains more than 1000 addresses. In a future release, the controller will truncate Endpoints that exceed this limit. The EndpointSlice API can be used to support significantly larger number of addresses. (kubernetes/kubernetes#99975, @robscott) [SIG Apps and Network] - The PodDisruptionBudget API has been promoted to policy/v1 with no schema changes. The only functional change is that an empty selector (
{}
) written to a policy/v1 PodDisruptionBudget now selects all pods in the namespace. The behavior of the policy/v1beta1 API remains unchanged. The policy/v1beta1 PodDisruptionBudget API is deprecated and will no longer be served in 1.25+. (kubernetes/kubernetes#99290, @mortent) [SIG API Machinery, Apps, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Scheduling and Testing] - Topology Aware Hints are now available in alpha and can be enabled with the
TopologyAwareHints
feature gate. (kubernetes/kubernetes#99522, @robscott) [SIG API Machinery, Apps, Auth, Instrumentation, Network and Testing] -
- PodAffinityTerm includes a namespaceSelector field to allow selecting eligible namespaces based on their labels.
- A new CrossNamespacePodAffinity quota scope API that allows restricting which namespaces allowed to use PodAffinityTerm with corss-namespace reference via namespaceSelector or namespaces fields. (kubernetes/kubernetes#98582, @ahg-g) [SIG API Machinery, Apps, Auth and Testing]
- Add a default metadata name labels for selecting any namespace by its name. (kubernetes/kubernetes#96968, @jayunit100) [SIG API Machinery, Apps, Cloud Provider, Storage and Testing]
- Added
.spec.completionMode
field to Job, with accepted valuesNonIndexed
(default) andIndexed
(kubernetes/kubernetes#98441, @alculquicondor) [SIG Apps and CLI] - Clarified NetworkPolicy policyTypes documentation (kubernetes/kubernetes#97216, @joejulian) [SIG Network]
- DaemonSets accept a MaxSurge integer or percent on their rolling update strategy that will launch the updated pod on nodes and wait for those pods to go ready before marking the old out-of-date pods as deleted. This allows workloads to avoid downtime during upgrades when deployed using DaemonSets. This feature is alpha and is behind the DaemonSetUpdateSurge feature gate. (kubernetes/kubernetes#96441, @smarterclayton) [SIG Apps and Testing]
- EndpointSlice API is now GA. The EndpointSlice topology field has been removed from the GA API and will be replaced by a new per Endpoint Zone field. If the topology field was previously used, it will be converted into an annotation in the v1 Resource. The discovery.k8s.io/v1alpha1 API is removed. (kubernetes/kubernetes#99662, @swetharepakula) [SIG API Machinery, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network and Testing]
- EndpointSlice Controllers are now GA. The EndpointSlice Controller will not populate the
deprecatedTopology
field and will only provide topology information through thezone
andnodeName
fields. (kubernetes/kubernetes#99870, @swetharepakula) [SIG API Machinery, Apps, Auth, Network and Testing] - IngressClass resource can now reference a resource in a specific namespace for implementation-specific configuration(previously only Cluster-level resources were allowed). This feature can be enabled using the IngressClassNamespacedParams feature gate. (kubernetes/kubernetes#99275, @hbagdi) [SIG API Machinery, CLI and Network]
- Introduce conditions for PodDisruptionBudget (kubernetes/kubernetes#98127, @mortent) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Cluster Lifecycle and Instrumentation]
- Jobs API has a new .spec.suspend field that can be used to suspend and resume Jobs (kubernetes/kubernetes#98727, @adtac) [SIG API Machinery, Apps, Node, Scheduling and Testing]
- Kubelet Graceful Node Shutdown feature is now beta. (kubernetes/kubernetes#99735, @bobbypage) [SIG Node]
- Limit the quest value of hugepage to integer multiple of page size. (kubernetes/kubernetes#98515, @lala123912) [SIG Apps]
- One new field "InternalTrafficPolicy" in Service is added. It specifies if the cluster internal traffic should be routed to all endpoints or node-local endpoints only. "Cluster" routes internal traffic to a Service to all endpoints. "Local" routes traffic to node-local endpoints only, and traffic is dropped if no node-local endpoints are ready. The default value is "Cluster". (kubernetes/kubernetes#96600, @maplain) [SIG API Machinery, Apps and Network]
- PodSecurityPolicy only stores "generic" as allowed volume type if the GenericEphemeralVolume feature gate is enabled (kubernetes/kubernetes#98918, @pohly) [SIG Auth and Security]
- Promote CronJobs to batch/v1 (kubernetes/kubernetes#99423, @soltysh) [SIG API Machinery, Apps, CLI and Testing]
- Remove support for building Kubernetes with bazel. (kubernetes/kubernetes#99561, @BenTheElder) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scalability, Scheduling, Storage, Testing and Windows]
- Setting loadBalancerClass in load balancer type of service is available with this PR. Users who want to use a custom load balancer can specify loadBalancerClass to achieve it. (kubernetes/kubernetes#98277, @XudongLiuHarold) [SIG API Machinery, Apps, Cloud Provider and Network]
- Storage capacity tracking (= the CSIStorageCapacity feature) is beta, storage.k8s.io/v1alpha1/VolumeAttachment and storage.k8s.io/v1alpha1/CSIStorageCapacity objects are deprecated (kubernetes/kubernetes#99641, @pohly) [SIG API Machinery, Apps, Auth, Scheduling, Storage and Testing]
- Support for Indexed Job: a Job that is considered completed when Pods associated to indexes from 0 to (.spec.completions-1) have succeeded. (kubernetes/kubernetes#98812, @alculquicondor) [SIG Apps and CLI]
- The apiserver now resets managedFields that got corrupted by a mutating admission controller. (kubernetes/kubernetes#98074, @kwiesmueller) [SIG API Machinery and Testing]
controller.kubernetes.io/pod-deletion-cost
annotation can be set to offer a hint on the cost of deleting a pod compared to other pods belonging to the same ReplicaSet. Pods with lower deletion cost are deleted first. This is an alpha feature. (kubernetes/kubernetes#99163, @ahg-g) [SIG Apps]- Cluster admins can now turn off /debug/pprof and /debug/flags/v endpoint in kubelet by setting enableProfilingHandler and enableDebugFlagsHandler to false in their kubelet configuration file. enableProfilingHandler and enableDebugFlagsHandler can be set to true only when enableDebuggingHandlers is also set to true. (kubernetes/kubernetes#98458, @SaranBalaji90) [SIG Node]
- The BoundServiceAccountTokenVolume feature has been promoted to beta, and enabled by default.
- This changes the tokens provided to containers at
/var/run/secrets/kubernetes.io/serviceaccount/token
to be time-limited, auto-refreshed, and invalidated when the containing pod is deleted. - Clients should reload the token from disk periodically (once per minute is recommended) to ensure they continue to use a valid token.
k8s.io/client-go
version v11.0.0+ and v0.15.0+ reload tokens automatically. - By default, injected tokens are given an extended lifetime so they remain valid even after a new refreshed token is provided. The metric
serviceaccount_stale_tokens_total
can be used to monitor for workloads that are depending on the extended lifetime and are continuing to use tokens even after a refreshed token is provided to the container. If that metric indicates no existing workloads are depending on extended lifetimes, injected token lifetime can be shortened to 1 hour by startingkube-apiserver
with--service-account-extend-token-expiration=false
. (kubernetes/kubernetes#95667, @zshihang) [SIG API Machinery, Auth, Cluster Lifecycle and Testing]
- This changes the tokens provided to containers at
- Adds support for portRange / EndPort in Network Policy (kubernetes/kubernetes#97058, @rikatz) [SIG Apps and Network]
- Fixes using server-side apply with APIService resources (kubernetes/kubernetes#98576, @kevindelgado) [SIG API Machinery, Apps and Testing]
- Kubernetes is now built using go1.15.7 (kubernetes/kubernetes#98363, @cpanato) [SIG Cloud Provider, Instrumentation, Node, Release and Testing]
- Scheduler extender filter interface now can report unresolvable failed nodes in the new field
FailedAndUnresolvableNodes
ofExtenderFilterResult
struct. Nodes in this map will be skipped in the preemption phase. (kubernetes/kubernetes#92866, @cofyc) [SIG Scheduling] - Enable SPDY pings to keep connections alive, so that
kubectl exec
andkubectl port-forward
won't be interrupted. (kubernetes/kubernetes#97083, @knight42) [SIG API Machinery and CLI] - Change the APIVersion proto name of BoundObjectRef from aPIVersion to apiVersion. (kubernetes/kubernetes#97379, @kebe7jun) [SIG Auth]
- Promote Immutable Secrets/ConfigMaps feature to Stable.
This allows to set
Immutable
field in Secrets or ConfigMap object to mark their contents as immutable. (kubernetes/kubernetes#97615, @wojtek-t) [SIG Apps, Architecture, Node and Testing]
Kubernetes API Version: v1.20.13
Kubernetes API Version: v1.20.12
- Kube-apiserver: Fixes handling of CRD schemas containing literal null values in enums (#104990, @liggitt) [SIG API Machinery, Apps and Network]
Kubernetes API Version: v1.20.11
-
We have added a new Priority & Fairness rule that exempts all probes (/readyz, /healthz, /livez) to prevent restarting of "healthy" kube-apiserver instance(s) by kubelet. (kubernetes/kubernetes#101112, @tkashem) [SIG API Machinery]
-
Fixes using server-side apply with APIService resources (kubernetes/kubernetes#100714, @kevindelgado) [SIG API Machinery, Apps and Testing]
-
Regenerate protobuf code to fix CVE-2021-3121 (kubernetes/kubernetes#100501, @joelsmith) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Node and Storage]
-
Kubernetes is now built using go1.15.8 (kubernetes/kubernetes#98962, @cpanato) [SIG Cloud Provider, Instrumentation, Release and Testing]
-
TokenRequest
andTokenRequestProjection
features have been promoted to GA. This feature allows generating service account tokens that are not visible in Secret objects and are tied to the lifetime of a Pod object. See https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#service-account-token-volume-projection for details on configuring and using this feature. TheTokenRequest
andTokenRequestProjection
feature gates will be removed in v1.21.- kubeadm's kube-apiserver Pod manifest now includes the following flags by default "--service-account-key-file", "--service-account-signing-key-file", "--service-account-issuer". (kubernetes/kubernetes#93258, @zshihang) [SIG API Machinery, Auth, Cluster Lifecycle, Storage and Testing]
-
A new
nofuzz
go build tag now disables gofuzz support. Release binaries enable this. (kubernetes/kubernetes#92491, @BenTheElder) [SIG API Machinery] -
Add WindowsContainerResources and Annotations to CRI-API UpdateContainerResourcesRequest (kubernetes/kubernetes#95741, @katiewasnothere) [SIG Node]
-
Add a
serving
andterminating
condition to the EndpointSlice API.serving
tracks the readiness of endpoints regardless of their terminating state. This is distinct fromready
sinceready
is only true when pods are not terminating.terminating
is true when an endpoint is terminating. For pods this is any endpoint with a deletion timestamp. (kubernetes/kubernetes#92968, @andrewsykim) [SIG Apps and Network] -
Add dual-stack Services (alpha). This is a BREAKING CHANGE to an alpha API. It changes the dual-stack API wrt Service from a single ipFamily field to 3 fields: ipFamilyPolicy (SingleStack, PreferDualStack, RequireDualStack), ipFamilies (a list of families assigned), and clusterIPs (inclusive of clusterIP). Most users do not need to set anything at all, defaulting will handle it for them. Services are single-stack unless the user asks for dual-stack. This is all gated by the "IPv6DualStack" feature gate. (kubernetes/kubernetes#91824, @khenidak) [SIG API Machinery, Apps, CLI, Network, Node, Scheduling and Testing]
-
Add support for hugepages to downward API (kubernetes/kubernetes#86102, @derekwaynecarr) [SIG API Machinery, Apps, CLI, Network, Node, Scheduling and Testing]
-
Adds kubelet alpha feature,
GracefulNodeShutdown
which makes kubelet aware of node system shutdowns and result in graceful termination of pods during a system shutdown. (kubernetes/kubernetes#96129, @bobbypage) [SIG Node] -
AppProtocol is now GA for Endpoints and Services. The ServiceAppProtocol feature gate will be deprecated in 1.21. (kubernetes/kubernetes#96327, @robscott) [SIG Apps and Network]
-
Automatic allocation of NodePorts for services with type LoadBalancer can now be disabled by setting the (new) parameter Service.spec.allocateLoadBalancerNodePorts=false. The default is to allocate NodePorts for services with type LoadBalancer which is the existing behavior. (kubernetes/kubernetes#92744, @uablrek) [SIG Apps and Network]
-
Certain fields on Service objects will be automatically cleared when changing the service's
type
to a mode that does not need those fields. For example, changing from type=LoadBalancer to type=ClusterIP will clear the NodePort assignments, rather than forcing the user to clear them. (kubernetes/kubernetes#95196, @thockin) [SIG API Machinery, Apps, Network and Testing] -
Document that ServiceTopology feature is required to use
service.spec.topologyKeys
. (kubernetes/kubernetes#96528, @andrewsykim) [SIG Apps] -
EndpointSlice has a new NodeName field guarded by the EndpointSliceNodeName feature gate.
- EndpointSlice topology field will be deprecated in an upcoming release.
- EndpointSlice "IP" address type is formally removed after being deprecated in Kubernetes 1.17.
- The discovery.k8s.io/v1alpha1 API is deprecated and will be removed in Kubernetes 1.21. (kubernetes/kubernetes#96440, @robscott) [SIG API Machinery, Apps and Network]
-
External facing API podresources is now available under k8s.io/kubelet/pkg/apis/ (kubernetes/kubernetes#92632, @RenaudWasTaken) [SIG Node and Testing]
-
Fewer candidates are enumerated for preemption to improve performance in large clusters. (kubernetes/kubernetes#94814, @adtac)
-
Fix conversions for custom metrics. (kubernetes/kubernetes#94481, @wojtek-t) [SIG API Machinery and Instrumentation]
-
GPU metrics provided by kubelet are now disabled by default. (kubernetes/kubernetes#95184, @RenaudWasTaken)
-
If BoundServiceAccountTokenVolume is enabled, cluster admins can use metric
serviceaccount_stale_tokens_total
to monitor workloads that are depending on the extended tokens. If there are no such workloads, turn off extended tokens by startingkube-apiserver
with flag--service-account-extend-token-expiration=false
(kubernetes/kubernetes#96273, @zshihang) [SIG API Machinery and Auth] -
Introduce alpha support for exec-based container registry credential provider plugins in the kubelet. (kubernetes/kubernetes#94196, @andrewsykim) [SIG Node and Release]
-
Introduces a metric source for HPAs which allows scaling based on container resource usage. (kubernetes/kubernetes#90691, @arjunrn) [SIG API Machinery, Apps, Autoscaling and CLI]
-
Kube-apiserver now deletes expired kube-apiserver Lease objects:
- The feature is under feature gate
APIServerIdentity
. - A flag is added to kube-apiserver:
identity-lease-garbage-collection-check-period-seconds
(kubernetes/kubernetes#95895, @roycaihw) [SIG API Machinery, Apps, Auth and Testing]
- The feature is under feature gate
-
Kube-controller-manager: volume plugins can be restricted from contacting local and loopback addresses by setting
--volume-host-allow-local-loopback=false
, or from contacting specific CIDR ranges by setting--volume-host-cidr-denylist
(for example,--volume-host-cidr-denylist=127.0.0.1/28,feed::/16
) (kubernetes/kubernetes#91785, @mattcary) [SIG API Machinery, Apps, Auth, CLI, Network, Node, Storage and Testing] -
Migrate scheduler, controller-manager and cloud-controller-manager to use LeaseLock (kubernetes/kubernetes#94603, @wojtek-t) [SIG API Machinery, Apps, Cloud Provider and Scheduling]
-
Modify DNS-1123 error messages to indicate that RFC 1123 is not followed exactly (kubernetes/kubernetes#94182, @mattfenwick) [SIG API Machinery, Apps, Auth, Network and Node]
-
Move configurable fsgroup change policy for pods to beta (kubernetes/kubernetes#96376, @gnufied) [SIG Apps and Storage]
-
New flag is introduced, i.e. --topology-manager-scope=container|pod. The default value is the "container" scope. (kubernetes/kubernetes#92967, @cezaryzukowski) [SIG Instrumentation, Node and Testing]
-
New parameter
defaultingType
forPodTopologySpread
plugin allows to use k8s defined or user provided default constraints (kubernetes/kubernetes#95048, @alculquicondor) [SIG Scheduling] -
NodeAffinity plugin can be configured with AddedAffinity. (kubernetes/kubernetes#96202, @alculquicondor) [SIG Node, Scheduling and Testing]
-
Promote RuntimeClass feature to GA. Promote node.k8s.io API groups from v1beta1 to v1. (kubernetes/kubernetes#95718, @SergeyKanzhelev) [SIG Apps, Auth, Node, Scheduling and Testing]
-
Reminder: The labels "failure-domain.beta.kubernetes.io/zone" and "failure-domain.beta.kubernetes.io/region" are deprecated in favor of "topology.kubernetes.io/zone" and "topology.kubernetes.io/region" respectively. All users of the "failure-domain.beta..." labels should switch to the "topology..." equivalents. (kubernetes/kubernetes#96033, @thockin) [SIG API Machinery, Apps, CLI, Cloud Provider, Network, Node, Scheduling, Storage and Testing]
-
Server Side Apply now treats LabelSelector fields as atomic (meaning the entire selector is managed by a single writer and updated together), since they contain interrelated and inseparable fields that do not merge in intuitive ways. (kubernetes/kubernetes#93901, @jpbetz) [SIG API Machinery, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Storage and Testing]
-
Services will now have a
clusterIPs
field to go withclusterIP
.clusterIPs[0]
is a synonym forclusterIP
and will be synchronized on create and update operations. (kubernetes/kubernetes#95894, @thockin) [SIG Network] -
The ServiceAccountIssuerDiscovery feature gate is now Beta and enabled by default. (kubernetes/kubernetes#91921, @mtaufen) [SIG Auth]
-
The status of v1beta1 CRDs without "preserveUnknownFields:false" now shows a violation, "spec.preserveUnknownFields: Invalid value: true: must be false". (kubernetes/kubernetes#93078, @vareti)
-
The usage of mixed protocol values in the same LoadBalancer Service is possible if the new feature gate MixedProtocolLBService is enabled. The feature gate is disabled by default. The user has to enable it for the API Server. (kubernetes/kubernetes#94028, @janosi) [SIG API Machinery and Apps]
-
This PR will introduce a feature gate CSIServiceAccountToken with two additional fields in
CSIDriverSpec
. (kubernetes/kubernetes#93130, @zshihang) [SIG API Machinery, Apps, Auth, CLI, Network, Node, Storage and Testing] -
Users can try the CronJob controller v2 using the feature gate. This will be the default controller in future releases. (kubernetes/kubernetes#93370, @alaypatel07) [SIG API Machinery, Apps, Auth and Testing]
-
VolumeSnapshotDataSource moves to GA in 1.20 release (kubernetes/kubernetes#95282, @xing-yang) [SIG Apps]
-
WinOverlay feature graduated to beta (kubernetes/kubernetes#94807, @ksubrmnn) [SIG Windows]
-
API priority and fairness graduated to beta 1.19 servers with APF turned on should not be run in a multi-server cluster with 1.20+ servers. (kubernetes/kubernetes#96527, @adtac) [SIG API Machinery and Testing]
-
Add LoadBalancerIPMode feature gate (kubernetes/kubernetes#92312, @Sh4d1) [SIG Apps, CLI, Cloud Provider and Network]
-
Add WindowsContainerResources and Annotations to CRI-API UpdateContainerResourcesRequest (kubernetes/kubernetes#95741, @katiewasnothere) [SIG Node]
-
Add a 'serving' and
terminating
condition to the EndpointSlice API.serving
tracks the readiness of endpoints regardless of their terminating state. This is distinct fromready
sinceready
is only true when pods are not terminating.terminating
is true when an endpoint is terminating. For pods this is any endpoint with a deletion timestamp. (kubernetes/kubernetes#92968, @andrewsykim) [SIG Apps and Network] -
Add support for hugepages to downward API (kubernetes/kubernetes#86102, @derekwaynecarr) [SIG API Machinery, Apps, CLI, Network, Node, Scheduling and Testing]
-
Adds kubelet alpha feature,
GracefulNodeShutdown
which makes kubelet aware of node system shutdowns and result in graceful termination of pods during a system shutdown. (kubernetes/kubernetes#96129, @bobbypage) [SIG Node] -
AppProtocol is now GA for Endpoints and Services. The ServiceAppProtocol feature gate will be deprecated in 1.21. (kubernetes/kubernetes#96327, @robscott) [SIG Apps and Network]
-
Automatic allocation of NodePorts for services with type LoadBalancer can now be disabled by setting the (new) parameter Service.spec.allocateLoadBalancerNodePorts=false. The default is to allocate NodePorts for services with type LoadBalancer which is the existing behavior. (kubernetes/kubernetes#92744, @uablrek) [SIG Apps and Network]
-
Document that ServiceTopology feature is required to use
service.spec.topologyKeys
. (kubernetes/kubernetes#96528, @andrewsykim) [SIG Apps] -
EndpointSlice has a new NodeName field guarded by the EndpointSliceNodeName feature gate.
- EndpointSlice topology field will be deprecated in an upcoming release.
- EndpointSlice "IP" address type is formally removed after being deprecated in Kubernetes 1.17.
- The discovery.k8s.io/v1alpha1 API is deprecated and will be removed in Kubernetes 1.21. (kubernetes/kubernetes#96440, @robscott) [SIG API Machinery, Apps and Network]
-
Fewer candidates are enumerated for preemption to improve performance in large clusters (kubernetes/kubernetes#94814, @adtac) [SIG Scheduling]
-
If BoundServiceAccountTokenVolume is enabled, cluster admins can use metric
serviceaccount_stale_tokens_total
to monitor workloads that are depending on the extended tokens. If there are no such workloads, turn off extended tokens by startingkube-apiserver
with flag--service-account-extend-token-expiration=false
(kubernetes/kubernetes#96273, @zshihang) [SIG API Machinery and Auth] -
Introduce alpha support for exec-based container registry credential provider plugins in the kubelet. (kubernetes/kubernetes#94196, @andrewsykim) [SIG Node and Release]
-
Kube-apiserver now deletes expired kube-apiserver Lease objects:
- The feature is under feature gate
APIServerIdentity
. - A flag is added to kube-apiserver:
identity-lease-garbage-collection-check-period-seconds
(kubernetes/kubernetes#95895, @roycaihw) [SIG API Machinery, Apps, Auth and Testing]
- The feature is under feature gate
-
Move configurable fsgroup change policy for pods to beta (kubernetes/kubernetes#96376, @gnufied) [SIG Apps and Storage]
-
New flag is introduced, i.e. --topology-manager-scope=container|pod. The default value is the "container" scope. (kubernetes/kubernetes#92967, @cezaryzukowski) [SIG Instrumentation, Node and Testing]
-
NodeAffinity plugin can be configured with AddedAffinity. (kubernetes/kubernetes#96202, @alculquicondor) [SIG Node, Scheduling and Testing]
-
Promote RuntimeClass feature to GA. Promote node.k8s.io API groups from v1beta1 to v1. (kubernetes/kubernetes#95718, @SergeyKanzhelev) [SIG Apps, Auth, Node, Scheduling and Testing]
-
Reminder: The labels "failure-domain.beta.kubernetes.io/zone" and "failure-domain.beta.kubernetes.io/region" are deprecated in favor of "topology.kubernetes.io/zone" and "topology.kubernetes.io/region" respectively. All users of the "failure-domain.beta..." labels should switch to the "topology..." equivalents. (kubernetes/kubernetes#96033, @thockin) [SIG API Machinery, Apps, CLI, Cloud Provider, Network, Node, Scheduling, Storage and Testing]
-
The usage of mixed protocol values in the same LoadBalancer Service is possible if the new feature gate MixedProtocolLBSVC is enabled. "action required" The feature gate is disabled by default. The user has to enable it for the API Server. (kubernetes/kubernetes#94028, @janosi) [SIG API Machinery and Apps]
-
This PR will introduce a feature gate CSIServiceAccountToken with two additional fields in
CSIDriverSpec
. (kubernetes/kubernetes#93130, @zshihang) [SIG API Machinery, Apps, Auth, CLI, Network, Node, Storage and Testing] -
Users can try the CronJob controller v2 using the feature gate. This will be the default controller in future releases. (kubernetes/kubernetes#93370, @alaypatel07) [SIG API Machinery, Apps, Auth and Testing]
-
VolumeSnapshotDataSource moves to GA in 1.20 release (kubernetes/kubernetes#95282, @xing-yang) [SIG Apps]
-
TokenRequest
andTokenRequestProjection
features have been promoted to GA. This feature allows generating service account tokens that are not visible in Secret objects and are tied to the lifetime of a Pod object. See https://kubernetes.io/docs/tasks/configure-pod-container/configure-service-account/#service-account-token-volume-projection for details on configuring and using this feature. TheTokenRequest
andTokenRequestProjection
feature gates will be removed in v1.21.- kubeadm's kube-apiserver Pod manifest now includes the following flags by default "--service-account-key-file", "--service-account-signing-key-file", "--service-account-issuer". (kubernetes/kubernetes#93258, @zshihang) [SIG API Machinery, Auth, Cluster Lifecycle, Storage and Testing]
-
Certain fields on Service objects will be automatically cleared when changing the service's
type
to a mode that does not need those fields. For example, changing from type=LoadBalancer to type=ClusterIP will clear the NodePort assignments, rather than forcing the user to clear them. (kubernetes/kubernetes#95196, @thockin) [SIG API Machinery, Apps, Network and Testing] -
Services will now have a
clusterIPs
field to go withclusterIP
.clusterIPs[0]
is a synonym forclusterIP
and will be synchronized on create and update operations. (kubernetes/kubernetes#95894, @thockin) [SIG Network] -
Add dual-stack Services (alpha). This is a BREAKING CHANGE to an alpha API. It changes the dual-stack API wrt Service from a single ipFamily field to 3 fields: ipFamilyPolicy (SingleStack, PreferDualStack, RequireDualStack), ipFamilies (a list of families assigned), and clusterIPs (inclusive of clusterIP). Most users do not need to set anything at all, defaulting will handle it for them. Services are single-stack unless the user asks for dual-stack. This is all gated by the "IPv6DualStack" feature gate. (kubernetes/kubernetes#91824, @khenidak) [SIG API Machinery, Apps, CLI, Network, Node, Scheduling and Testing]
-
Introduces a metric source for HPAs which allows scaling based on container resource usage. (kubernetes/kubernetes#90691, @arjunrn) [SIG API Machinery, Apps, Autoscaling and CLI]
-
New parameter
defaultingType
forPodTopologySpread
plugin allows to use k8s defined or user-provided default constraints (kubernetes/kubernetes#95048, @alculquicondor) [SIG Scheduling] -
GPU metrics provided by kubelet are now disabled by default (kubernetes/kubernetes#95184, @RenaudWasTaken) [SIG Node]
-
New parameter
defaultingType
forPodTopologySpread
plugin allows to use k8s defined or user provided default constraints (kubernetes/kubernetes#95048, @alculquicondor) [SIG Scheduling] -
Server Side Apply now treats LabelSelector fields as atomic (meaning the entire selector is managed by a single writer and updated together), since they contain interrelated and inseparable fields that do not merge in intuitive ways. (kubernetes/kubernetes#93901, @jpbetz) [SIG API Machinery, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Storage and Testing]
-
Status of v1beta1 CRDs without "preserveUnknownFields:false" will show violation "spec.preserveUnknownFields: Invalid value: true: must be false" (kubernetes/kubernetes#93078, @vareti) [SIG API Machinery]
-
A new
nofuzz
go build tag now disables gofuzz support. Release binaries enable this. (kubernetes/kubernetes#92491, @BenTheElder) [SIG API Machinery] -
A new alpha-level field,
SupportsFsGroup
, has been introduced for CSIDrivers to allow them to specify whether they support volume ownership and permission modifications. TheCSIVolumeSupportFSGroup
feature gate must be enabled to allow this field to be used. (kubernetes/kubernetes#92001, @huffmanca) [SIG API Machinery, CLI and Storage] -
Added pod version skew strategy for seccomp profile to synchronize the deprecated annotations with the new API Server fields. Please see the corresponding section in the KEP for more detailed explanations. (kubernetes/kubernetes#91408, @saschagrunert) [SIG Apps, Auth, CLI and Node]
-
Adds the ability to disable Accelerator/GPU metrics collected by Kubelet (kubernetes/kubernetes#91930, @RenaudWasTaken) [SIG Node]
-
Custom Endpoints are now mirrored to EndpointSlices by a new EndpointSliceMirroring controller. (kubernetes/kubernetes#91637, @robscott) [SIG API Machinery, Apps, Auth, Cloud Provider, Instrumentation, Network and Testing]
-
External facing API podresources is now available under k8s.io/kubelet/pkg/apis/ (kubernetes/kubernetes#92632, @RenaudWasTaken) [SIG Node and Testing]
-
Fix conversions for custom metrics. (kubernetes/kubernetes#94481, @wojtek-t) [SIG API Machinery and Instrumentation]
-
Generic ephemeral volumes, a new alpha feature under the
GenericEphemeralVolume
feature gate, provide a more flexible alternative toEmptyDir
volumes: as withEmptyDir
, volumes are created and deleted for each pod automatically by Kubernetes. But because the normal provisioning process is used (PersistentVolumeClaim
), storage can be provided by third-party storage vendors and all of the usual volume features work. Volumes don't need to be empty; for example, restoring from snapshot is supported. (kubernetes/kubernetes#92784, @pohly) [SIG API Machinery, Apps, Auth, CLI, Instrumentation, Node, Scheduling, Storage and Testing] -
Kube-controller-manager: volume plugins can be restricted from contacting local and loopback addresses by setting
--volume-host-allow-local-loopback=false
, or from contacting specific CIDR ranges by setting--volume-host-cidr-denylist
(for example,--volume-host-cidr-denylist=127.0.0.1/28,feed::/16
) (kubernetes/kubernetes#91785, @mattcary) [SIG API Machinery, Apps, Auth, CLI, Network, Node, Storage and Testing] -
Kubernetes is now built with golang 1.15.0-rc.1.
- The deprecated, legacy behavior of treating the CommonName field on X.509 serving certificates as a host name when no Subject Alternative Names are present is now disabled by default. It can be temporarily re-enabled by adding the value x509ignoreCN=0 to the GODEBUG environment variable. (kubernetes/kubernetes#93264, @justaugustus) [SIG API Machinery, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scalability, Storage and Testing]
-
Migrate scheduler, controller-manager and cloud-controller-manager to use LeaseLock (kubernetes/kubernetes#94603, @wojtek-t) [SIG API Machinery, Apps, Cloud Provider and Scheduling]
-
Modify DNS-1123 error messages to indicate that RFC 1123 is not followed exactly (kubernetes/kubernetes#94182, @mattfenwick) [SIG API Machinery, Apps, Auth, Network and Node]
-
The ServiceAccountIssuerDiscovery feature gate is now Beta and enabled by default. (kubernetes/kubernetes#91921, @mtaufen) [SIG Auth]
-
The kube-controller-manager managed signers can now have distinct signing certificates and keys. See the help about
--cluster-signing-[signer-name]-{cert,key}-file
.--cluster-signing-{cert,key}-file
is still the default. (kubernetes/kubernetes#90822, @deads2k) [SIG API Machinery, Apps and Auth] -
When creating a networking.k8s.io/v1 Ingress API object,
spec.tls[*].secretName
values are required to pass validation rules for Secret API object names. (kubernetes/kubernetes#93929, @liggitt) [SIG Network] -
WinOverlay feature graduated to beta (kubernetes/kubernetes#94807, @ksubrmnn) [SIG Windows]
Kubernetes API Version: v1.19.15
- The new parameter 'no_proxy' has been added to configuration for the REST and websocket client. (kubernetes-client/python#1579, @itaru2622)//github.com/itaru2622))//github.com/itaru2622))//github.com/itaru2622))//github.com/itaru2622))//github.com/itaru2622))//github.com/itaru2622))//github.com/itaru2622))
Kubernetes API Version: v1.19.15
- No changes. The same as
v19.15.0a1
.
Kubernetes API Version: v1.19.15
- Type checking in
Client.serialize_body()
was made more restrictive and robust. (kubernetes-client/python-base#241, @piglei)
- Support Proxy Authentication in websocket client(stream/ws_client) like REST client. (kubernetes-client/python-base#256, @itaru2622)
- Support for the dryRun parameter has been added to the dynamic client. (kubernetes-client/python-base#247, @gravesm)
- We have added a new Priority & Fairness rule that exempts all probes (/readyz, /healthz, /livez) to prevent restarting of "healthy" kube-apiserver instance(s) by kubelet. (kubernetes/kubernetes#101113, @tkashem) [SIG API Machinery]
- Fixes using server-side apply with APIService resources (kubernetes/kubernetes#100713, @kevindelgado) [SIG API Machinery, Apps, Scheduling and Testing]
- Regenerate protobuf code to fix CVE-2021-3121 (kubernetes/kubernetes#100515, @joelsmith) [SIG API Machinery, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Node and Storage]
- Kubernetes is now built using go1.15.8 (kubernetes/kubernetes#99093, @cpanato) [SIG Cloud Provider, Instrumentation, Release and Testing]
- Fix conversions for custom metrics. (kubernetes/kubernetes#94654, @wojtek-t) [SIG Instrumentation]
- A new alpha-level field,
SupportsFsGroup
, has been introduced for CSIDrivers to allow them to specify whether they support volume ownership and permission modifications. TheCSIVolumeSupportFSGroup
feature gate must be enabled to allow this field to be used. (kubernetes/kubernetes#92001, @huffmanca) [SIG API Machinery, CLI and Storage] - Added pod version skew strategy for seccomp profile to synchronize the deprecated annotations with the new API Server fields. Please see the corresponding section in the KEP for more detailed explanations. (kubernetes/kubernetes#91408, @saschagrunert) [SIG Apps, Auth, CLI and Node]
- Adds the ability to disable Accelerator/GPU metrics collected by Kubelet (kubernetes/kubernetes#91930, @RenaudWasTaken) [SIG Node]
- Admission webhooks can now return warning messages that are surfaced to API clients, using the
.response.warnings
field in the admission review response. (kubernetes/kubernetes#92667, @liggitt) [SIG API Machinery and Testing] - CertificateSigningRequest API conditions were updated:
- a
status
field was added; this field defaults toTrue
, and may only be set toTrue
forApproved
,Denied
, andFailed
conditions - a
lastTransitionTime
field was added - a
Failed
condition type was added to allow signers to indicate permanent failure; this condition can be added via thecertificatesigningrequests/status
subresource. Approved
andDenied
conditions are mutually exclusiveApproved
,Denied
, andFailed
conditions can no longer be removed from a CSR (kubernetes/kubernetes#90191, @liggitt) [SIG API Machinery, Apps, Auth, CLI and Node]
- a
- Cluster admins can now turn off /logs endpoint in kubelet by setting enableSystemLogHandler to false in their kubelet configuration file. enableSystemLogHandler can be set to true only when enableDebuggingHandlers is also set to true. (kubernetes/kubernetes#87273, @SaranBalaji90) [SIG Node]
- Custom Endpoints are now mirrored to EndpointSlices by a new EndpointSliceMirroring controller. (kubernetes/kubernetes#91637, @robscott) [SIG API Machinery, Apps, Auth, Cloud Provider, Instrumentation, Network and Testing]
- CustomResourceDefinitions added support for marking versions as deprecated by setting
spec.versions[*].deprecated
totrue
, and for optionally overriding the default deprecation warning with aspec.versions[*].deprecationWarning
field. (kubernetes/kubernetes#92329, @liggitt) [SIG API Machinery] - EnvVarSource api doc bug fixes (kubernetes/kubernetes#91194, @wawa0210) [SIG Apps]
- Fix bug in reflector that couldn't recover from "Too large resource version" errors (kubernetes/kubernetes#92537, @wojtek-t) [SIG API Machinery]
- Fixed: log timestamps now include trailing zeros to maintain a fixed width (kubernetes/kubernetes#91207, @iamchuckss) [SIG Apps and Node]
- Generic ephemeral volumes, a new alpha feature under the
GenericEphemeralVolume
feature gate, provide a more flexible alternative toEmptyDir
volumes: as withEmptyDir
, volumes are created and deleted for each pod automatically by Kubernetes. But because the normal provisioning process is used (PersistentVolumeClaim
), storage can be provided by third-party storage vendors and all of the usual volume features work. Volumes don't need to be empt; for example, restoring from snapshot is supported. (kubernetes/kubernetes#92784, @pohly) [SIG API Machinery, Apps, Auth, CLI, Instrumentation, Node, Scheduling, Storage and Testing] - Go1.14.4 is now the minimum version required for building Kubernetes (kubernetes/kubernetes#92438, @liggitt) [SIG API Machinery, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Storage and Testing]
- Hide managedFields from kubectl edit command (kubernetes/kubernetes#91946, @soltysh) [SIG CLI]
- K8s.io/apimachinery - scheme.Convert() now uses only explicitly registered conversions - default reflection based conversion is no longer available.
+k8s:conversion-gen
tags can be used with thek8s.io/code-generator
component to generate conversions. (kubernetes/kubernetes#90018, @wojtek-t) [SIG API Machinery, Apps and Testing] - Kube-proxy: add
--bind-address-hard-fail
flag to treat failure to bind to a port as fatal (kubernetes/kubernetes#89350, @SataQiu) [SIG Cluster Lifecycle and Network] - Kubebuilder validation tags are set on metav1.Condition for CRD generation (kubernetes/kubernetes#92660, @damemi) [SIG API Machinery]
- Kubelet's --runonce option is now also available in Kubelet's config file as
runOnce
. (kubernetes/kubernetes#89128, @vincent178) [SIG Node] - Kubelet: add '--logging-format' flag to support structured logging (kubernetes/kubernetes#91532, @afrouzMashaykhi) [SIG API Machinery, Cluster Lifecycle, Instrumentation and Node]
- Kubernetes is now built with golang 1.15.0-rc.1.
- The deprecated, legacy behavior of treating the CommonName field on X.509 serving certificates as a host name when no Subject Alternative Names are present is now disabled by default. It can be temporarily re-enabled by adding the value x509ignoreCN=0 to the GODEBUG environment variable. (kubernetes/kubernetes#93264, @justaugustus) [SIG API Machinery, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scalability, Storage and Testing]
- Promote Immutable Secrets/ConfigMaps feature to Beta and enable the feature by default.
This allows to set
Immutable
field in Secrets or ConfigMap object to mark their contents as immutable. (kubernetes/kubernetes#89594, @wojtek-t) [SIG Apps and Testing] - Remove
BindTimeoutSeconds
from schedule configurationKubeSchedulerConfiguration
(kubernetes/kubernetes#91580, @cofyc) [SIG Scheduling and Testing] - Remove kubescheduler.config.k8s.io/v1alpha1 (kubernetes/kubernetes#89298, @gavinfish) [SIG Scheduling]
- Reserve plugins that fail to reserve will trigger the unreserve extension point (kubernetes/kubernetes#92391, @adtac) [SIG Scheduling and Testing]
- Resolve regression in
metadata.managedFields
handling in update/patch requests submitted by older API clients (kubernetes/kubernetes#91748, @apelisse) - Scheduler: optionally check for available storage capacity before scheduling pods which have unbound volumes (alpha feature with the new
CSIStorageCapacity
feature gate, only works for CSI drivers and depends on support for the feature in a CSI driver deployment) (kubernetes/kubernetes#92387, @pohly) [SIG API Machinery, Apps, Auth, Scheduling, Storage and Testing] - Seccomp support has graduated to GA. A new
seccompProfile
field is added to pod and container securityContext objects. Support forseccomp.security.alpha.kubernetes.io/pod
andcontainer.seccomp.security.alpha.kubernetes.io/...
annotations is deprecated, and will be removed in v1.22. (kubernetes/kubernetes#91381, @pjbgf) [SIG Apps, Auth, Node, Release, Scheduling and Testing] - ServiceAppProtocol feature gate is now beta and enabled by default, adding new AppProtocol field to Services and Endpoints. (kubernetes/kubernetes#90023, @robscott) [SIG Apps and Network]
- SetHostnameAsFQDN is a new field in PodSpec. When set to true, the fully qualified domain name (FQDN) of a Pod is set as hostname of its containers. In Linux containers, this means setting the FQDN in the hostname field of the kernel (the nodename field of struct utsname). In Windows containers, this means setting the this means setting the registry value of hostname for the registry key HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Tcpip\Parameters to FQDN. If a pod does not have FQDN, this has no effect. (kubernetes/kubernetes#91699, @javidiaz) [SIG Apps, Network, Node and Testing]
- The CertificateSigningRequest API is promoted to certificates.k8s.io/v1 with the following changes:
spec.signerName
is now required, and requests forkubernetes.io/legacy-unknown
are not allowed to be created via thecertificates.k8s.io/v1
APIspec.usages
is now required, may not contain duplicate values, and must only contain known usagesstatus.conditions
may not contain duplicate typesstatus.conditions[*].status
is now requiredstatus.certificate
must be PEM-encoded, and contain only CERTIFICATE blocks (kubernetes/kubernetes#91685, @liggitt) [SIG API Machinery, Architecture, Auth, CLI and Testing]
- The HugePageStorageMediumSize feature gate is now on by default allowing usage of multiple sizes huge page resources on a container level. (kubernetes/kubernetes#90592, @bart0sh) [SIG Node]
- The Kubelet's --node-status-max-images option is now available via the Kubelet config file field nodeStatusMaxImage (kubernetes/kubernetes#91275, @knabben) [SIG Node]
- The Kubelet's --seccomp-profile-root option is now marked as deprecated. (kubernetes/kubernetes#91182, @knabben) [SIG Node]
- The Kubelet's
--bootstrap-checkpoint-path
option is now removed. (kubernetes/kubernetes#91577, @knabben) [SIG Apps and Node] - The Kubelet's
--cloud-provider
and--cloud-config
options are now marked as deprecated. (kubernetes/kubernetes#90408, @knabben) [SIG Cloud Provider and Node] - The Kubelet's
--enable-server
and--provider-id
option is now available via the Kubelet config file fieldenableServer
andproviderID
respectively. (kubernetes/kubernetes#90494, @knabben) [SIG Node] - The Kubelet's
--kernel-memcg-notification
option is now available via the Kubelet config file field kernelMemcgNotification (kubernetes/kubernetes#91863, @knabben) [SIG Cloud Provider, Node and Testing] - The Kubelet's
--really-crash-for-testing
and--chaos-chance
options are now marked as deprecated. (kubernetes/kubernetes#90499, @knabben) [SIG Node] - The Kubelet's
--volume-plugin-dir
option is now available via the Kubelet config file fieldVolumePluginDir
. (kubernetes/kubernetes#88480, @savitharaghunathan) [SIG Node] - The
DefaultIngressClass
feature is now GA. The--feature-gate
parameter will be removed in 1.20. (kubernetes/kubernetes#91957, @cmluciano) [SIG API Machinery, Apps, Network and Testing] - The alpha
DynamicAuditing
feature gate andauditregistration.k8s.io/v1alpha1
API have been removed and are no longer supported. (kubernetes/kubernetes#91502, @deads2k) [SIG API Machinery, Auth and Testing] - The kube-controller-manager managed signers can now have distinct signing certificates and keys. See the help about
--cluster-signing-[signer-name]-{cert,key}-file
.--cluster-signing-{cert,key}-file
is still the default. (kubernetes/kubernetes#90822, @deads2k) [SIG API Machinery, Apps and Auth] - The unused
series.state
field, deprecated since v1.14, is removed from theevents.k8s.io/v1beta1
andv1
Event types. (kubernetes/kubernetes#90449, @wojtek-t) [SIG Apps] - Unreserve extension point for scheduler plugins is merged into Reserve extension point (kubernetes/kubernetes#92200, @adtac) [SIG Scheduling and Testing]
- Update Golang to v1.14.4 (kubernetes/kubernetes#88638, @justaugustus) [SIG API Machinery, Cloud Provider, Release and Testing]
- Updated the API documentation for Service.Spec.IPFamily to warn that its exact semantics will probably change before the dual-stack feature goes GA, and users should look at ClusterIP or Endpoints, not IPFamily, to figure out if an existing Service is IPv4, IPv6, or dual-stack. (kubernetes/kubernetes#91527, @danwinship) [SIG Apps and Network]
- Users can configure a resource prefix to ignore a group of resources. (kubernetes/kubernetes#88842, @angao) [SIG Node and Scheduling]
Ingress
andIngressClass
resources have graduated tonetworking.k8s.io/v1
. Ingress and IngressClass types in theextensions/v1beta1
andnetworking.k8s.io/v1beta1
API versions are deprecated and will no longer be served in 1.22+. Persisted objects can be accessed via thenetworking.k8s.io/v1
API. Notable changes in v1 Ingress objects (v1beta1 field names are unchanged):spec.backend
->spec.defaultBackend
serviceName
->service.name
servicePort
->service.port.name
(for string values)servicePort
->service.port.number
(for numeric values)pathType
no longer has a default value in v1; "Exact", "Prefix", or "ImplementationSpecific" must be specified Other Ingress API updates:- backends can now be resource or service backends
path
is no longer required to be a valid regular expression (kubernetes/kubernetes#89778, @cmluciano) [SIG API Machinery, Apps, CLI, Network and Testing]
NodeResourcesLeastAllocated
andNodeResourcesMostAllocated
plugins now support customized weight on the CPU and memory. (kubernetes/kubernetes#90544, @chendave) [SIG Scheduling]PostFilter
type is added to scheduler component config API on version v1beta1. (kubernetes/kubernetes#91547, @Huang-Wei) [SIG Scheduling]RequestedToCapacityRatioArgs
encoding is now strict (kubernetes/kubernetes#91603, @pancernik) [SIG Scheduling]v1beta1
SchedulerExtender
encoding is case-sensitive (v1alpha1
/v1alpha2
was case-insensitive), itshttpTimeout
field uses duration encoding (for example, one second is specified as"1s"
), and theenableHttps
field inv1alpha1
/v1alpha2
was renamed toenableHTTPS
. (kubernetes/kubernetes#91625, @pancernik) [SIG Scheduling]- Adds the ability to disable Accelerator/GPU metrics collected by Kubelet (kubernetes/kubernetes#91930, @RenaudWasTaken) [SIG Node]
- Kubernetes is now built with golang 1.15.0-rc.1.
- The deprecated, legacy behavior of treating the CommonName field on X.509 serving certificates as a host name when no Subject Alternative Names are present is now disabled by default. It can be temporarily re-enabled by adding the value x509ignoreCN=0 to the GODEBUG environment variable. (kubernetes/kubernetes#93264, @justaugustus) [SIG API Machinery, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scalability, Storage and Testing]
- A new alpha-level field,
SupportsFsGroup
, has been introduced for CSIDrivers to allow them to specify whether they support volume ownership and permission modifications. TheCSIVolumeSupportFSGroup
feature gate must be enabled to allow this field to be used. (kubernetes/kubernetes#92001, @huffmanca) [SIG API Machinery, CLI and Storage] - The kube-controller-manager managed signers can now have distinct signing certificates and keys. See the help about
--cluster-signing-[signer-name]-{cert,key}-file
.--cluster-signing-{cert,key}-file
is still the default. (kubernetes/kubernetes#90822, @deads2k) [SIG API Machinery, Apps and Auth] - Added pod version skew strategy for seccomp profile to synchronize the deprecated annotations with the new API Server fields. Please see the corresponding section in the KEP for more detailed explanations. (kubernetes/kubernetes#91408, @saschagrunert) [SIG Apps, Auth, CLI and Node]
- Custom Endpoints are now mirrored to EndpointSlices by a new EndpointSliceMirroring controller. (kubernetes/kubernetes#91637, @robscott) [SIG API Machinery, Apps, Auth, Cloud Provider, Instrumentation, Network and Testing]
- Generic ephemeral volumes, a new alpha feature under the
GenericEphemeralVolume
feature gate, provide a more flexible alternative toEmptyDir
volumes: as withEmptyDir
, volumes are created and deleted for each pod automatically by Kubernetes. But because the normal provisioning process is used (PersistentVolumeClaim
), storage can be provided by third-party storage vendors and all of the usual volume features work. Volumes don't need to be empt; for example, restoring from snapshot is supported. (kubernetes/kubernetes#92784, @pohly) [SIG API Machinery, Apps, Auth, CLI, Instrumentation, Node, Scheduling, Storage and Testing] - Remove
BindTimeoutSeconds
from schedule configurationKubeSchedulerConfiguration
(kubernetes/kubernetes#91580, @cofyc) [SIG Scheduling and Testing] - Resolve regression in metadata.managedFields handling in update/patch requests submitted by older API clients (kubernetes/kubernetes#91748, @apelisse) [SIG API Machinery and Testing]
- The CertificateSigningRequest API is promoted to certificates.k8s.io/v1 with the following changes:
spec.signerName
is now required, and requests forkubernetes.io/legacy-unknown
are not allowed to be created via thecertificates.k8s.io/v1
APIspec.usages
is now required, may not contain duplicate values, and must only contain known usagesstatus.conditions
may not contain duplicate typesstatus.conditions[*].status
is now requiredstatus.certificate
must be PEM-encoded, and contain only CERTIFICATE blocks (kubernetes/kubernetes#91685, @liggitt) [SIG API Machinery, Architecture, Auth, CLI and Testing]
- The Kubelet's
--cloud-provider
and--cloud-config
options are now marked as deprecated. (kubernetes/kubernetes#90408, @knabben) [SIG Cloud Provider and Node] - CertificateSigningRequest API conditions were updated:
- a
status
field was added; this field defaults toTrue
, and may only be set toTrue
forApproved
,Denied
, andFailed
conditions - a
lastTransitionTime
field was added - a
Failed
condition type was added to allow signers to indicate permanent failure; this condition can be added via thecertificatesigningrequests/status
subresource. Approved
andDenied
conditions are mutually exclusiveApproved
,Denied
, andFailed
conditions can no longer be removed from a CSR (kubernetes/kubernetes#90191, @liggitt) [SIG API Machinery, Apps, Auth, CLI and Node]
- a
- EnvVarSource api doc bug fixes (kubernetes/kubernetes#91194, @wawa0210) [SIG Apps]
- Fixed: log timestamps now include trailing zeros to maintain a fixed width (kubernetes/kubernetes#91207, @iamchuckss) [SIG Apps and Node]
- The Kubelet's --node-status-max-images option is now available via the Kubelet config file field nodeStatusMaxImage (kubernetes/kubernetes#91275, @knabben) [SIG Node]
- The Kubelet's --seccomp-profile-root option is now available via the Kubelet config file field seccompProfileRoot. (kubernetes/kubernetes#91182, @knabben) [SIG Node]
- The Kubelet's
--enable-server
and--provider-id
option is now available via the Kubelet config file fieldenableServer
andproviderID
respectively. (kubernetes/kubernetes#90494, @knabben) [SIG Node] - The Kubelet's
--really-crash-for-testing
and--chaos-chance
options are now marked as deprecated. (kubernetes/kubernetes#90499, @knabben) [SIG Node] - The alpha
DynamicAuditing
feature gate andauditregistration.k8s.io/v1alpha1
API have been removed and are no longer supported. (kubernetes/kubernetes#91502, @deads2k) [SIG API Machinery, Auth and Testing] NodeResourcesLeastAllocated
andNodeResourcesMostAllocated
plugins now support customized weight on the CPU and memory. (kubernetes/kubernetes#90544, @chendave) [SIG Scheduling]PostFilter
type is added to scheduler component config API on version v1beta1. (kubernetes/kubernetes#91547, @Huang-Wei) [SIG Scheduling]kubescheduler.config.k8s.io
is now beta (kubernetes/kubernetes#91420, @pancernik) [SIG Scheduling]- EnvVarSource api doc bug fixes (kubernetes/kubernetes#91194, @wawa0210) [SIG Apps]
- The Kubelet's
--really-crash-for-testing
and--chaos-chance
options are now marked as deprecated. (kubernetes/kubernetes#90499, @knabben) [SIG Node] NodeResourcesLeastAllocated
andNodeResourcesMostAllocated
plugins now support customized weight on the CPU and memory. (kubernetes/kubernetes#90544, @chendave) [SIG Scheduling]- K8s.io/apimachinery - scheme.Convert() now uses only explicitly registered conversions - default reflection based conversion is no longer available.
+k8s:conversion-gen
tags can be used with thek8s.io/code-generator
component to generate conversions. (kubernetes/kubernetes#90018, @wojtek-t) [SIG API Machinery, Apps and Testing] - Kubelet's --runonce option is now also available in Kubelet's config file as
runOnce
. (kubernetes/kubernetes#89128, @vincent178) [SIG Node] - Promote Immutable Secrets/ConfigMaps feature to Beta and enable the feature by default.
This allows to set
Immutable
field in Secrets or ConfigMap object to mark their contents as immutable. (kubernetes/kubernetes#89594, @wojtek-t) [SIG Apps and Testing] - The unused
series.state
field, deprecated since v1.14, is removed from theevents.k8s.io/v1beta1
andv1
Event types. (kubernetes/kubernetes#90449, @wojtek-t) [SIG Apps] - Kube-proxy: add
--bind-address-hard-fail
flag to treat failure to bind to a port as fatal (kubernetes/kubernetes#89350, @SataQiu) [SIG Cluster Lifecycle and Network] - Remove kubescheduler.config.k8s.io/v1alpha1 (kubernetes/kubernetes#89298, @gavinfish) [SIG Scheduling]
- ServiceAppProtocol feature gate is now beta and enabled by default, adding new AppProtocol field to Services and Endpoints. (kubernetes/kubernetes#90023, @robscott) [SIG Apps and Network]
- The Kubelet's
--volume-plugin-dir
option is now available via the Kubelet config file fieldVolumePluginDir
. (kubernetes/kubernetes#88480, @savitharaghunathan) [SIG Node] - A new IngressClass resource has been added to enable better Ingress configuration. (kubernetes/kubernetes#88509, @robscott) [SIG API Machinery, Apps, CLI, Network, Node and Testing]
- API additions to apiserver types (kubernetes/kubernetes#87179, @Jefftree) [SIG API Machinery, Cloud Provider and Cluster Lifecycle]
- Add Scheduling Profiles to kubescheduler.config.k8s.io/v1alpha2 (kubernetes/kubernetes#88087, @alculquicondor) [SIG Scheduling and Testing]
- Added GenericPVCDataSource feature gate to enable using arbitrary custom resources as the data source for a PVC. (kubernetes/kubernetes#88636, @bswartz) [SIG Apps and Storage]
- Added support for multiple sizes huge pages on a container level (kubernetes/kubernetes#84051, @bart0sh) [SIG Apps, Node and Storage]
- Allow user to specify fsgroup permission change policy for pods (kubernetes/kubernetes#88488, @gnufied) [SIG Apps and Storage]
- AppProtocol is a new field on Service and Endpoints resources, enabled with the ServiceAppProtocol feature gate. (kubernetes/kubernetes#88503, @robscott) [SIG Apps and Network]
- BlockVolume and CSIBlockVolume features are now GA. (kubernetes/kubernetes#88673, @jsafrane) [SIG Apps, Node and Storage]
- Consumers of the 'certificatesigningrequests/approval' API must now grant permission to 'approve' CSRs for the 'signerName' specified on the CSR. More information on the new signerName field can be found at https://github.com/kubernetes/enhancements/blob/master/keps/sig-auth/1513-certificate-signing-request/README.md/#signers (kubernetes/kubernetes#88246, @munnerz) [SIG API Machinery, Apps, Auth, CLI, Node and Testing]
- CustomResourceDefinition schemas that use
x-kubernetes-list-map-keys
to specify properties that uniquely identify list items must make those properties required or have a default value, to ensure those properties are present for all list items. See https://kubernetes.io/docs/reference/using-api/api-concepts/#merge-strategy for details. (kubernetes/kubernetes#88076, @eloyekunle) [SIG API Machinery and Testing] - Fixed missing validation of uniqueness of list items in lists with
x-kubernetes-list-type: map
orx-kubernetes-list-type: set
in CustomResources. (kubernetes/kubernetes#84920, @sttts) [SIG API Machinery] - Fixes a regression with clients prior to 1.15 not being able to update podIP in pod status, or podCIDR in node spec, against >= 1.16 API servers (kubernetes/kubernetes#88505, @liggitt) [SIG Apps and Network]
- Ingress: Add Exact and Prefix matching to Ingress PathTypes (kubernetes/kubernetes#88587, @cmluciano) [SIG Apps, Cluster Lifecycle and Network]
- Ingress: Add alternate backends via TypedLocalObjectReference (kubernetes/kubernetes#88775, @cmluciano) [SIG Apps and Network]
- Ingress: allow wildcard hosts in IngressRule (kubernetes/kubernetes#88858, @cmluciano) [SIG Network]
- Introduces optional --detect-local flag to kube-proxy. Currently the only supported value is "cluster-cidr", which is the default if not specified. (kubernetes/kubernetes#87748, @satyasm) [SIG Cluster Lifecycle, Network and Scheduling]
- Kube-controller-manager and kube-scheduler expose profiling by default to match the kube-apiserver. Use
--profiling=false
to disable. (kubernetes/kubernetes#88663, @deads2k) [SIG API Machinery, Cloud Provider and Scheduling] - Kube-scheduler can run more than one scheduling profile. Given a pod, the profile is selected by using its
.spec.SchedulerName
. (kubernetes/kubernetes#88285, @alculquicondor) [SIG Apps, Scheduling and Testing] - Move TaintBasedEvictions feature gates to GA (kubernetes/kubernetes#87487, @skilxn-go) [SIG API Machinery, Apps, Node, Scheduling and Testing]
- Moving Windows RunAsUserName feature to GA (kubernetes/kubernetes#87790, @marosset) [SIG Apps and Windows]
- New flag --endpointslice-updates-batch-period in kube-controller-manager can be used to reduce number of endpointslice updates generated by pod changes. (kubernetes/kubernetes#88745, @mborsz) [SIG API Machinery, Apps and Network]
- New flag
--show-hidden-metrics-for-version
in kubelet can be used to show all hidden metrics that deprecated in the previous minor release. (kubernetes/kubernetes#85282, @serathius) [SIG Node] - Removes ConfigMap as suggestion for IngressClass parameters (kubernetes/kubernetes#89093, @robscott) [SIG Network]
- Scheduler Extenders can now be configured in the v1alpha2 component config (kubernetes/kubernetes#88768, @damemi) [SIG Release, Scheduling and Testing]
- The apiserver/v1alph1 #EgressSelectorConfiguration API is now beta. (kubernetes/kubernetes#88502, @caesarxuchao) [SIG API Machinery]
- The storage.k8s.io/CSIDriver has moved to GA, and is now available for use. (kubernetes/kubernetes#84814, @huffmanca) [SIG API Machinery, Apps, Auth, Node, Scheduling, Storage and Testing]
- VolumePVCDataSource moves to GA in 1.18 release (kubernetes/kubernetes#88686, @j-griffith) [SIG Apps, CLI and Cluster Lifecycle]
Kubernetes API Version: 1.18.20
- Support for the dryRun parameter has been added to the dynamic client. (kubernetes-client/python-base#247, @gravesm)
- The
python2
support will be removed in 18.0.0 beta release. All the tests will usepython3
versions. (kubernetes-client/python-base#238, @Priyankasaggu11929) - The dynamic client now supports customizing http "Accept" header through the
header_params
parameter, which can be used to customizing API server response, e.g. retrieving object metadata only. (kubernetes-client/python-base#236, @Yashks1994)
Kubernetes API Version: 1.18.20
Important Information:
- Python 2 had reached End of Life on January 1, 2020. The Kubernetes Python Client has dropped support for Python 2 from this release (v18.20.0b1) and will no longer provide support to older clients as per the Kubernetes support policy.
Kubernetes API Version: 1.18.17
Important Information:
- The Kubernetes Python client versioning scheme has changed. The version numbers used till Kubernetes Python Client v12.y.z lagged behind the actual Kubernetes minor version numbers. From this release, the client is moving a version format
vY.Z.P
whereY
andZ
are respectively from the Kubernetes versionv1.Y.Z
andP
would incremented due to changes on the Python client side itself. Ref: #1244 - Python 2 had reached End of Life on January 1, 2020. The Kubernetes Python Client has dropped support for Python 2 from this release (v18.0.0) and will no longer provide support to older clients as per the Kubernetes support policy.
Deprecations:
- The following deprecated APIs can no longer be served:
- All resources under
apps/v1beta1
andapps/v1beta2
- useapps/v1
instead daemonsets
,deployments
,replicasets
resources underextensions/v1beta1
- useapps/v1
insteadnetworkpolicies
resources underextensions/v1beta1
- usenetworking.k8s.io/v1
insteadpodsecuritypolicies
resources underextensions/v1beta1
- usepolicy/v1beta1
instead (#85903, @liggitt) [SIG API Machinery, Apps, Cluster Lifecycle, Instrumentation and Testing]
- All resources under
New Feature:
- Support leader election. kubernetes-client/python-base#206
Bug Fix:
- Raise exception when an empty config file is passed to load_kube_config. kubernetes-client/python-base#223
- fix: load cache error when CacheDecoder object is not callable. kubernetes-client/python-base#226
- Fix Watch retries with 410 errors. kubernetes-client/python-base#227
- Automatically handles chunked or non-chunked responses. Fix ResponseNotChunked error from watch. kubernetes-client/python-base#231
API Change:
- Add allowWatchBookmarks, resoureVersionMatch parameters to custom objects. kubernetes-client/gen#180
- Fix bug in reflector that couldn't recover from "Too large resource version" errors (#92537, @wojtek-t) [SIG API Machinery]
- Fixed: log timestamps now include trailing zeros to maintain a fixed width (#91207, @iamchuckss) [SIG Apps and Node]
- Fixed: log timestamps now include trailing zeros to maintain a fixed width (#91207, @iamchuckss) [SIG Apps and Node]
- Resolve regression in metadata.managedFields handling in update/patch requests submitted by older API clients (#92007, @apelisse) [SIG API Machinery and Testing]
- A new IngressClass resource has been added to enable better Ingress configuration. (#88509, @robscott) [SIG API Machinery, Apps, CLI, Network, Node and Testing]
- The CSIDriver API has graduated to storage.k8s.io/v1, and is now available for use. (#84814, @huffmanca) [SIG Storage]
- autoscaling/v2beta2 HorizontalPodAutoscaler added a
spec.behavior
field that allows scale behavior to be configured. Behaviors are specified separately for scaling up and down. In each direction a stabilization window can be specified as well as a list of policies and how to select amongst them. Policies can limit the absolute number of pods added or removed, or the percentage of pods added or removed. (#74525, @gliush) [SIG API Machinery, Apps, Autoscaling and CLI] - Ingress:
spec.ingressClassName
replaces the deprecatedkubernetes.io/ingress.class
annotation, and allows associating an Ingress object with a particular controller.- path definitions added a
pathType
field to allow indicating how the specified path should be matched against incoming requests. Valid values areExact
,Prefix
, andImplementationSpecific
(#88587, @cmluciano) [SIG Apps, Cluster Lifecycle and Network]
- The alpha feature
AnyVolumeDataSource
enables PersistentVolumeClaim objects to use the spec.dataSource field to reference a custom type as a data source (#88636, @bswartz) [SIG Apps and Storage] - The alpha feature
ConfigurableFSGroupPolicy
enables v1 Pods to specify a spec.securityContext.fsGroupChangePolicy policy to control how file permissions are applied to volumes mounted into the pod. (#88488, @gnufied) [SIG Storage] - The alpha feature
ServiceAppProtocol
enables setting anappProtocol
field in ServicePort and EndpointPort definitions. (#88503, @robscott) [SIG Apps and Network] - The alpha feature
ImmutableEphemeralVolumes
enables animmutable
field in both Secret and ConfigMap objects to mark their contents as immutable. (#86377, @wojtek-t) [SIG Apps, CLI and Testing] - The beta feature
ServerSideApply
enables tracking and managing changed fields for all new objects, which means there will bemanagedFields
inmetadata
with the list of managers and their owned fields. - The alpha feature
ServiceAccountIssuerDiscovery
enables publishing OIDC discovery information and service account token verification keys at/.well-known/openid-configuration
and/openid/v1/jwks
endpoints by API servers configured to issue service account tokens. (#80724, @cceckman) [SIG API Machinery, Auth, Cluster Lifecycle and Testing] - CustomResourceDefinition schemas that use
x-kubernetes-list-map-keys
to specify properties that uniquely identify list items must make those properties required or have a default value, to ensure those properties are present for all list items. See https://kubernetes.io/docs/reference/using-api/api-concepts/#merge-strategy for details. (#88076, @eloyekunle) [SIG API Machinery and Testing] - CustomResourceDefinition schemas that use
x-kubernetes-list-type: map
orx-kubernetes-list-type: set
now enable validation that the list items in the corresponding custom resources are unique. (#84920, @sttts) [SIG API Machinery]
To read the full CHANGELOG visit here.
Kubernetes API Version: 1.17.17
Changelog since v17.17.0b1:
- Fix watch stream non-chunked response handling (kubernetes-client/python-base#231, @dhague)
- Fixed a decoding error for BOOTMARK watch events (kubernetes-client/python-base#234, @yliaog)
- Load_kube_config_from_dict() support define custom temp files path (kubernetes-client/python-base#233, @onecer)
- The dynamic client now supports customizing http "Accept" header through the
header_params
parameter, which can be used to customizing API server response, e.g. retrieving object metadata only. (kubernetes-client/python-base#236, @Yashks1994)
Kubernetes API Version: 1.17.17
Changelog since v17.14.0a1:
New Feature:
- Add Python 3.9 to build kubernetes-client/python#1311
- Enable leaderelection kubernetes-client/python#1363
API Change:
- Add allowWatchBookmarks, resoureVersionMatch parameters to custom objects. kubernetes-client/gen#180
Bug Fix:
- fix: load cache error when CacheDecoder object is not callable kubernetes-client/python-base#226
- raise exception when an empty config file is passed to load_kube_config kubernetes-client/python-base#223
- Fix bug with Watch and 410 retries kubernetes-client/python-base#227
Kubernetes API Version: 1.17.14
Important Information:
- The Kubernetes Python client versioning scheme has changed. The version numbers used till Kubernetes Python Client v12.y.z lagged behind the actual Kubernetes minor version numbers. From this release, the client is moving a version format
vY.Z.P
whereY
andZ
are respectively from the Kubernetes versionv1.Y.Z
andP
would incremented due to changes on the Python client side itself. Ref: #1244 - Python 2 had reached End of Life on January 1, 2020. The Kubernetes Python Client will drop support for Python 2 from the next release (v18.0.0) and will no longer provide support to older clients as per the Kubernetes support policy.
API Change:
- Fixed: log timestamps now include trailing zeros to maintain a fixed width (#91207, @iamchuckss) [SIG Apps and Node]
- Resolve regression in metadata.managedFields handling in update/patch requests submitted by older API clients (#92008, @apelisse) [SIG API Machinery and Testing]
- Fix bug where sending a status update completely wipes managedFields for some types. (#90032, @apelisse) [SIG API Machinery and Testing]
- Fixes a regression with clients prior to 1.15 not being able to update podIP in pod status, or podCIDR in node spec, against >= 1.16 API servers (#88505, @liggitt) [SIG Apps and Network]
- CustomResourceDefinitions now validate documented API semantics of
x-kubernetes-list-type
andx-kubernetes-map-type
atomic to reject non-atomic sub-types. (#84722, @sttts) - Kube-apiserver: The
AdmissionConfiguration
type accepted by--admission-control-config-file
has been promoted toapiserver.config.k8s.io/v1
with no schema changes. (#85098, @liggitt) - Fixed EndpointSlice port name validation to match Endpoint port name validation (allowing port names longer than 15 characters) (#84481, @robscott)
- CustomResourceDefinitions introduce
x-kubernetes-map-type
annotation as a CRD API extension. Enables this particular validation for server-side apply. (#84113, @enxebre)
To read the full CHANGELOG visit here.
Kubernetes API Version: 1.16.15
Breaking Change:
kubernetes.config.Configuration()
will now return the default "initial" configuration,kubernetes.config.Configuration.get_default_copy()
will return the default configuration if there is a default set viaConfiguration.set_default(c)
, otherwise, it will also return the default "initial" configuration. OpenAPITools/openapi-generator#4485, OpenAPITools/openapi-generator#5315. **Note: ** This change also affects v12.0.0a1, v12.0.0b1 and v12.0.0.
Bug Fix:
- Prevent 503s from killing the client during discovery kubernetes-client/python-base#187
Kubernetes API Version: 1.16.15
New Feature:
- Implement Port Forwarding kubernetes-client/python-base#210, kubernetes-client/python-base#211, kubernetes-client/python#1237
- Support loading configuration from file-like objects kubernetes-client/python-base#208
- Returns the created k8s objects in
create_from_{dict,yaml}
kubernetes-client/python#1262
Kubernetes API Version: 1.16.14
New Feature:
- Accept and use client certificates from authentication plugins kubernetes-client/python-base#205
Bug Fix:
- Return when object is None in FileOrData class kubernetes-client/python-base#201
Kubernetes API Version: 1.16.14
API Change:
- Resolve regression in metadata.managedFields handling in update/patch requests submitted by older API clients (#91748, @apelisse) [SIG API Machinery and Testing]
- Fix bug where sending a status update completely wipes managedFields for some types. (#90033, @apelisse) [SIG API Machinery and Testing]
- The
MutatingWebhookConfiguration
andValidatingWebhookConfiguration
APIs have been promoted toadmissionregistration.k8s.io/v1
:failurePolicy
default changed fromIgnore
toFail
for v1matchPolicy
default changed fromExact
toEquivalent
for v1timeout
default changed from30s
to10s
for v1sideEffects
default value is removed, and the field made required, and onlyNone
andNoneOnDryRun
are permitted for v1admissionReviewVersions
default value is removed and the field made required for v1 (supported versions for AdmissionReview arev1
andv1beta1
)- The
name
field for specified webhooks must be unique forMutatingWebhookConfiguration
andValidatingWebhookConfiguration
objects created viaadmissionregistration.k8s.io/v1
- The
AdmissionReview
API sent to and received from admission webhooks has been promoted toadmission.k8s.io/v1
. Webhooks can specify a preference for receivingv1
AdmissionReview objects withadmissionReviewVersions: ["v1","v1beta1"]
, and must respond with an API object in the sameapiVersion
they are sent. When webhooks useadmission.k8s.io/v1
, the following additional validation is performed on their responses:response.patch
andresponse.patchType
are not permitted from validating admission webhooksapiVersion: "admission.k8s.io/v1"
is requiredkind: "AdmissionReview"
is requiredresponse.uid: "<value of request.uid>"
is requiredresponse.patchType: "JSONPatch"
is required (ifresponse.patch
is set) (#80231, @liggitt)
- The
CustomResourceDefinition
API type is promoted toapiextensions.k8s.io/v1
with the following changes:- Use of the new
default
feature in validation schemas is limited to v1 spec.scope
is no longer defaulted toNamespaced
and must be explicitly specifiedspec.version
is removed in v1; usespec.versions
insteadspec.validation
is removed in v1; usespec.versions[*].schema
insteadspec.subresources
is removed in v1; usespec.versions[*].subresources
insteadspec.additionalPrinterColumns
is removed in v1; usespec.versions[*].additionalPrinterColumns
insteadspec.conversion.webhookClientConfig
is moved tospec.conversion.webhook.clientConfig
in v1spec.conversion.conversionReviewVersions
is moved tospec.conversion.webhook.conversionReviewVersions
in v1spec.versions[*].schema.openAPIV3Schema
is now required when creating v1 CustomResourceDefinitionsspec.preserveUnknownFields: true
is disallowed when creating v1 CustomResourceDefinitions; it must be specified within schema definitions asx-kubernetes-preserve-unknown-fields: true
- In
additionalPrinterColumns
items, theJSONPath
field was renamed tojsonPath
in v1 (fixes kubernetes/kubernetes#66531) Theapiextensions.k8s.io/v1beta1
version ofCustomResourceDefinition
is deprecated and will no longer be served in v1.19. (#79604, @liggitt)
- Use of the new
- The
ConversionReview
API sent to and received from custom resource CustomResourceDefinition conversion webhooks has been promoted toapiextensions.k8s.io/v1
. CustomResourceDefinition conversion webhooks can now indicate they support receiving and responding withConversionReview
API objects in theapiextensions.k8s.io/v1
version by includingv1
in theconversionReviewVersions
list in their CustomResourceDefinition. Conversion webhooks must respond with a ConversionReview object in the same apiVersion they receive.apiextensions.k8s.io/v1
ConversionReview
responses must specify aresponse.uid
that matches therequest.uid
of the object they were sent. (#81476, @liggitt) - Add scheduling support for RuntimeClasses. RuntimeClasses can now specify nodeSelector constraints & tolerations, which are merged into the PodSpec for pods using that RuntimeClass. (#80825, @tallclair)
- Kubelet should now more reliably report the same primary node IP even if the set of node IPs reported by the CloudProvider changes. (#79391, @danwinship)
- Omit nil or empty field when calculating container hash value to avoid hash changed. For a new field with a non-nil default value in the container spec, the hash would still get changed. (#57741, @dixudx)
- Property
conditions
inapiextensions.v1beta1.CustomResourceDefinitionStatus
andapiextensions.v1.CustomResourceDefinitionStatus
is now optional instead of required. (#64996, @roycaihw) - When the status of a CustomResourceDefinition condition changes, its corresponding
lastTransitionTime
is now updated. (#69655, @CaoShuFeng)
New Feature:
- Adds the ability to load kubeconfig from a dictionary kubernetes-client/python-base#195
- Allow incluster to accept pass-in config kubernetes-client/python-base#193
- Set expiration on token of incluster config and reload the token if it expires kubernetes-client/python-base#191
Bug Fix:
- Fixes a bug in loading kubeconfig when there are no users in the config kubernetes-client/python-base#198
- Retry expired watches kubernetes-client/python-base#133
OpenAPI Generator Changes:
OpenAPI Generator has been updated to v4.3.0 from v3.3.4. Following are links to Python client related changes throughout the OpenAPI releases above v3.3.4 to v4.3.0:
Kubernetes API Version: 1.15.10
API Change:
- Deleting CustomObjects doesn't require passing in the body anymore kubernetes-client/gen#142
New Feature:
- Add ability to the client to be used as Context Manager kubernetes-client/python#1073
- Enable the use of dynamic client kubernetes-client/python#1035
- Add option to refresh gcp token when config is cmd-path kubernetes-client/python-base#175
Bug Fix:
- Add kubernetes.dynamic to setup.py pkg list kubernetes-client/python#1096
- Fixed issue in
__del__
method of theApiClient
that caused an indefinite hang during garbage collection. kubernetes-client/python#1073 - Fix custom object API example kubernetes-client/python#1049
- Fix deprecation warning in E2E tests kubernetes-client/python#1036
- Use
==/!=
to compare str, bytes, and int literals kubernetes-client/python#1007 - Fix apiserver_id 'get' method kubernetes-client/python-base#184
- Fix persist_config flag and function calls kubernetes-client/python-base#169
- Fix memory inneficiencies in the WebSocket client kubernetes-client/python-base#178
- Fix functionality to watch logs when log line is not a JSON-serialized object kubernetes-client/python-base#171
- Detect binary payloads and send the correct opcode kubernetes-client/python-base#152
Deprecation Notice v11.0.0 of the client follows the Kubernetes deprecation policy and will be deprecated as and when Kubernetes version v1.15 gets deprecated.
Bug Fix:
- Fix a fatal bug in package setup kubernetes-client/python#1011
Bug Fix:
- Fix a bug in kubeconfig loader where NoneType gets iterated kubernetes-client/python-base#158
- Fix a bug in kubeconfig loader that False value gets treated as absence kubernetes-client/python-base#161
- Fix a bug in kubeconfig loader where merging valid configs fails if fields are missing kubernetes-client/python-base#163
- Fix azure refresh token apiserver id kubernetes-client/python-base#170
- Support chunked listing to custom object API kubernetes-client/gen#130
New Feature:
- Add returncode method to WSClient kubernetes-client/python-base#160
- Add proxy support to WSClient kubernetes-client/python-base#157
- Add util function to parse canonical quantities kubernetes-client/python#855
New Feature:
- Add dynamic client kubernetes-client/python-base#56
create_from_yaml
supports creation from dict and namespace option kubernetes-client/python#795
Breaking Change:
- The Python client will be generated by openapi-generator, with the following breaking changes kubernetes-client/gen#97
kubernetes.client.apis
package is renamed tokubernetes.client.api
kubernetes
package code now uses absolute import instead of relative import- The
swagger_types
attribute in all models is renamed toopenapi_types
- Python3.4 is no longer supported kubernetes-client/python#807
API Change:
- Introduce
ExtensionsV1beta1RuntimeClassStrategyOptions
andPolicyV1beta1RuntimeClassStrategyOptions
. Add RuntimeClass restrictions & defaulting to PodSecurityPolicy kubernetes/kubernetes#73795 - Introduce
V1WindowsSecurityContextOptions
. Add Windows specific options in Pod Security Context and Container Security Context kubernetes/kubernetes#77147 - Split
V1beta1Webhook
intoV1beta1MutatingWebhook
andV1beta1ValidatingWebhook
kubernetes/kubernetes#78491 - Introduce parameter
allow_watch_bookmarks
in list options for requesting watch bookmarks from apiserver. The implementation in apiserver is hidden behind feature gateWatchBookmark
(currently in Alpha stage) kubernetes/kubernetes#74074 - Add
V1DeleteOptions
parameters (dry_run
,grace_period_seconds
,orphan_dependents
,propagation_policy
) to delete collection APIs kubernetes/kubernetes#77843 - Add ListMeta.RemainingItemCount. When responding a LIST request, if the server has more data available, and if the request does not contain label selectors or field selectors, the server sets the ListOptions.RemainingItemCount to the number of remaining objects kubernetes/kubernetes#75993
- Add
controller_expand_secret_ref
inV1SecretReference
to store CSI volume expansion secrets kubernetes/kubernetes#77516 - Introduce
preemption_policy
field to V1PriorityClass kubernetes/kubernetes#74614 - Add
port
configuration to service reference in Admission webhook configuration, AuditSink webhook configuration, CRD Conversion webhook configuration and kube-aggregator kubernetes/kubernetes#74855 - Introduce
inline_volume_spec
toV1PersistentVolumeSpec
kubernetes/kubernetes#77703 - Add fields
x_kubernetes_embedded_resource
,x_kubernetes_int_or_string
,x_kubernetes_preserve_unknown_fields
to V1beta1JSONSchemaProps kubernetes/kubernetes#77207
Bug Fix:
- Update
_load_azure_token
to handle str and int kubernetes-client/python-base#141 - Correct regex to properly parse rfc3339 microseconds kubernetes-client/python-base#150
Bug Fix:
- Fixed issue in
__del__
method of theApiClient
that caused an indefinite hang during garbage collection. Note TheApiClient
ThreadPool
will no longer be cleaned up automatically during garbage collection, instead theclose
method must be invoked directly, or theApiClient
can be used as a context manager. kubernetes-client/python#1073
Bug Fix:
- Fix content type regression in custom object patch API kubernetes-client/python#866
Security Fix:
- Bump urllib3 version to pick up security fix for CVE-2019-11324 kubernetes-client/python#897
Bug Fix:
- Fix base64 padding for kube config kubernetes-client/python-base#79
- Fix websocket client decoding binary message. Replace non-utf8 data instead of failing kubernetes-client/python-base#104
- Add email scope to GCP provided credential refresh kubernetes-client/python-base#110
- Fix broken urllib3 dependencies kubernetes-client/python#816
New Feature:
- Add method to dynamically set namespace in yaml utility kubernetes-client/python#782
Bug Fix:
- Make watch work with read_namespaced_pod_log kubernetes-client/python-base#93
- Add Rbac support for creating from YAML kubernetes-client/python#767
New Feature:
- Config loader supports loading from multiple kubeconfig files kubernetes-client/python-base#94
- Add a script to fix setup on Windows kubernetes-client/python#766
- Extend YAML load functionality to *LIST and multi-resources kubernetes-client/python#673
API Change:
- Remove the AdmissionregistrationV1alpha1 API group, containing only the InitializationConfiguration type kubernetes/kubernetes#72972
- Promote Lease API to v1 kubernetes/kubernetes#72239
- The Ingress API is now available via
NetworkingV1beta1Api
.ExtensionsV1beta1Api
Ingress objects are deprecated and will no longer be served in Kubernetes v1.18 kubernetes/kubernetes#74057 - Introduce RuntimeClass to NodeV1alpha1Api and NodeV1beta1Api kubernetes/kubernetes#74433
- Graduate PriorityClass API to GA SchedulingV1Api kubernetes/kubernetes#73555
- Introduce CSINodeInfo and CSIDriver to StorageV1beta1Api kubernetes/kubernetes#74283
- The alpha Initializers feature,
admissionregistration.k8s.io/v1alpha1
API version,Initializers
admission plugin, and use of themetadata.initializers
API field have been removed. Discontinue use of the alpha feature and delete any existingInitializerConfiguration
API objects before upgrading. Themetadata.initializers
field will be removed in a future release. The parameterinclude_uninitialized
has been removed. kubernetes/kubernetes#72972
Bug Fix:
- Add fieldSelector parameter to list/watch methods in custom objects spec kubernetes-client/gen#106
Breaking Change:
- Move dependency adal under extra require kubernetes-client/python-base#108
Bug Fix:
- Honor the specified resource version in stream request when watch restarts kubernetes-client/python-base#109
API Change:
- Add timeoutSeconds parameter to CustomObjectsApi list/watch calls kubernetes-client/gen#94
New Feature:
- Avoid creating unused ThreadPools kubernetes-client/gen#91
Bug Fix:
- Refresh GCP auth tokens on API retrieval kubernetes-client/python-base#92
- Fix kubeconfig loading failure when server uri contains trailing slash kubernetes-client/python-base#45
Security Fix:
- Bump urllib3 version to pick up security fix for CVE-2018-20060 kubernetes-client/python#707
API Change:
- Add dynamic audit configuration api: AuditregistrationV1alpha1Api kubernetes/kubernetes#67547
- CSIPersistentVolume feature, i.e. PersistentVolumes with CSIPersistentVolumeSource, is GA. CSIPersistentVolume feature gate is now deprecated and will be removed according to deprecation policy. kubernetes/kubernetes#69929
- Add support for CRD conversion webhook kubernetes/kubernetes#67006
- CRD supports multi-version Schema, Subresources and AdditionalPrintColumns (NOTE that CRDs created prior to 1.13 populated the top-level additionalPrinterColumns field by default. To apply an update that changes to per-version additionalPrinterColumns, the top-level additionalPrinterColumns field must be explicitly set to null). kubernetes/kubernetes#70211
- Add ability to control primary GID of containers through Pod Spec and PodSecurityPolicy kubernetes/kubernetes#67802
- Refactor GlusterFS PV spec. This patch introduces glusterfsPersistentVolumeSource addition to glusterfsVolumeSource. All fields remains same as glusterfsVolumeSource with an addition of a new field called
EndpointsNamespace
to define namespace of endpoint in the spec. kubernetes/kubernetes#60195 - Delete request's body parameter is optional kubernetes/kubernetes#70032
- Make service environment variables optional kubernetes/kubernetes#68754
- TokenReview now supports audience validation of tokens with audiences other than the kube-apiserver. kubernetes/kubernetes#62692
Breaking Change:
- Model v1beta1WebhookClientConfig is renamed to AdmissionregistrationV1beta1WebhookClientConfig, to avoid naming conflict with ApiextensionsV1beta1WebhookClientConfig introduced in: kubernetes/kubernetes#67006
- Delete request's body parameter is optional kubernetes/kubernetes#70032
Bug Fix:
- Refresh GCP auth tokens on API retrieval kubernetes-client/python-base#92
- Fix kubeconfig loading failure when server uri contains trailing slash kubernetes-client/python-base#45
Security Fix:
- Bump urllib3 version to pick up security fix for CVE-2018-20060 kubernetes-client/python#707
Security Fix:
- Bump urllib3 version to pick up security fix for CVE-2018-20060 kubernetes-client/python#707
- Python 3.7 support
- Update to Kubernetes 1.10.10 API
Breaking Change:
- ACTION REQUIRED Rename the currently being-used
async
parameter toasync_req
to support Python 3.7 becauseasync
is a reserved keyword in Python 3.7 kubernetes-client/gen#67 - NOTE Python 3.7 was released after v6.0.0 release. It's not necessary to upgrade your client to v6.1.0 if you do not use Python 3.7+.
API change:
- Add custom object status and scale api kubernetes-client/gen#72
New Feature:
- Add utility to create API resource from yaml file kubernetes-client/python#655
Bug Fix:
- Update ExecProvider to use safe_get() to tolerate kube-config file that sets
args: null
andenv: null
kubernetes-client/python-base#91 - Properly deserialize API server's response when posting a deployment rollback kubernetes/kubernetes#68909
API Change:
- dry-run: CREATE/UPDATE/PATCH methods now support dryRun parameter kubernetes/kubernetes#69359
New Feature:
- Add exec-plugins support in kubeconfig kubernetes-client/python-base#75
Bug Fix:
- Fix reading kubeconfig data with bytes in Python 3 kubernetes-client/python-base#86
API Change:
- Upon receiving a LIST request with expired continue token, the apiserver now returns a continue token together with the 410 "the from parameter is too old " error. If the client does not care about getting a list from a consistent snapshot, the client can use this token to continue listing from the next key, but the returned chunk will be from the latest snapshot kubernetes/kubernetes#67284
- Introduces autoscaling/v2beta2 and custom_metrics/v1beta2, which implement metric selectors for Object and Pods metrics, as well as allowing AverageValue targets on Objects, similar to External metrics kubernetes/kubernetes#64097
- Create "coordination.k8s.io" api group with "Lease" api in it kubernetes/kubernetes#64246
- Added support to restore a volume from a volume snapshot data source: adds TypedLocalObjectReference in the core API and adds DataSource in PersistentVolumeClaimSpec kubernetes/kubernetes#67087
- ProcMount added to SecurityContext and AllowedProcMounts added to PodSecurityPolicy to allow paths in the container's /proc to not be masked kubernetes/kubernetes#64283
- Support both directory and block device for local volume plugin FileSystem VolumeMode kubernetes/kubernetes#63011
- SCTP is now supported as additional protocol (alpha) alongside TCP and UDP in Pod, Service, Endpoint, and NetworkPolicy kubernetes/kubernetes#64973
- RuntimeClass is a new API resource for defining different classes of runtimes that may be used to run containers in the cluster. Pods can select a RunitmeClass to use via the RuntimeClassName field. This feature is in alpha, and the RuntimeClass feature gate must be enabled in order to use it kubernetes/kubernetes#67737
- The PodShareProcessNamespace feature to configure PID namespace sharing within a pod has been promoted to beta kubernetes/kubernetes#66507
- To address the possibility dry-run requests overwhelming admission webhooks that rely on side effects and a reconciliation mechanism, a new field is being added to admissionregistration.k8s.io/v1beta1.ValidatingWebhookConfiguration and admissionregistration.k8s.io/v1beta1.MutatingWebhookConfiguration so that webhooks can explicitly register as having dry-run support. If a dry-run request is made on a resource that triggers a non dry-run supporting webhook, the request will be completely rejected, with "400: Bad Request". Additionally, a new field is being added to the admission.k8s.io/v1beta1.AdmissionReview API object, exposing to webhooks whether or not the request being reviewed is a dry-run kubernetes/kubernetes#66936
- Add custom object status and scale api kubernetes-client/gen#72
- dry-run: DELETE operations now support dryRun parameter kubernetes/kubernetes#65105
- Default extensions/v1beta1 Deployment's ProgressDeadlineSeconds to MaxInt32 kubernetes/kubernetes#66581
New Features:
- Add support for refreshing Azure tokens kubernetes-client/python-base#77
New Features:
- Add Azure support to authentication loading kubernetes-client/python-base#74
Breaking Change:
- ACTION REQUIRED Rename the currently being-used
async
parameter toasync_req
to support Python 3.7 because it's a reserved keyword in Python 3.7 kubernetes-client/gen#67
Bug Fix:
- Watch now properly deserializes custom resource objects and updates resource version kubernetes-client/python-base#64
idp-certificate-authority-data
in kubeconfig is now optional instead of required for OIDC token refresh kubernetes-client/python-base#69
API Change:
- ApiextensionsV1beta1Api: Add PATCH and GET to custom_resource_definition_status kubernetes/kubernetes#63619
- ApiregistrationV1Api and ApiregistrationV1beta1Api: Add PATCH and GET to api_service_status kubernetes/kubernetes#64063
- CertificatesV1beta1Api: Add PATCH and GET to certificate_signing_request_status kubernetes/kubernetes#64063
- SchedulingV1beta1Api: Promote priority_class to beta kubernetes/kubernetes#63100
- PodSecurityPolicy now supports restricting hostPath volume mounts to be readOnly and under specific path prefixes kubernetes/kubernetes#58647
- The Sysctls experimental feature has been promoted to beta (enabled by default via the
Sysctls
feature flag). PodSecurityPolicy and Pod objects now have fields for specifying and controlling sysctls. Alpha sysctl annotations will be ignored by 1.11+ kubelets. All alpha sysctl annotations in existing deployments must be converted to API fields to be effective. kubernetes/kubernetes#63717 - Add CRD Versioning with NOP converter kubernetes/kubernetes#63830
- Volume topology aware dynamic provisioning kubernetes/kubernetes#63233
- Fixed incorrect OpenAPI schema for CustomResourceDefinition objects with a validation schema kubernetes/kubernetes#65256
- Config loader now supports OIDC auth kubernetes-client/python-base#48
- Bug fix: fix expiry time checking in API token refresh kubernetes-client/python-base#55
- Update to Kubernetes 1.10 cluster
- Config loader now raises exception on duplicated name in kubeconfig kubernetes-client/python-base#47
API change:
- CustomObjectsApi: Add PATCH to CustomObjectsApi kubernetes-client/gen#53
- Promoting the apiregistration.k8s.io (aggregation) to GA (ApiregistrationV1Api) kubernetes/kubernetes#58393
- CoreV1Api: remove /proxy legacy API (deprecated since kubernetes v1.2). Use the /proxy subresources on objects that support HTTP proxying kubernetes/kubernetes#59884
- The
PodSecurityPolicy
API has been moved to thepolicy/v1beta1
API group. ThePodSecurityPolicy
API in theextensions/v1beta1
API group is deprecated and will be removed in a future release. Authorizations for using pod security policy resources should change to reference thepolicy
API group after upgrading to 1.11 kubernetes/kubernetes#54933 - StorageV1beta1Api: Introduce new
VolumeAttachment
API Object kubernetes/kubernetes#54463 - V1FlexPersistentVolumeSource: PersistentVolume flexVolume sources can now reference secrets in a namespace other than the PersistentVolumeClaim's namespace kubernetes/kubernetes#56460
- ACTION REQUIRED: VolumeScheduling and LocalPersistentVolume features are beta and enabled by default. The PersistentVolume NodeAffinity alpha annotation is deprecated and will be removed in a future release kubernetes/kubernetes#59391
- Allows HorizontalPodAutoscaler to use global metrics not associated with any Kubernetes object (for example metrics from a hoster service running outside of Kubernetes cluster) kubernetes/kubernetes#60096
- v1.Pod now has a field to configure whether a single process namespace should be shared between all containers in a pod. This feature is in alpha preview. kubernetes/kubernetes#58716
- delete_namespaced_service() now takes an required body (delete option) parameter. Refactor service storage to remove registry wrapper kubernetes/kubernetes#59510
Documentation update:
- Never let cluster-scoped resources skip webhooks kubernetes/kubernetes#58185
- Clarify that ListOptions.Timeout is not conditional on inactivity kubernetes/kubernetes#58562
- Indicate endpoint subsets are an optional field kubernetes/kubernetes#59434
- No changes. The same as
v5.0.0b1
.
- Update to Kubernetes 1.9 cluster
- Label selector for pods is now required and must match the pod template's labels for v1beta2 StatefulSetSpec, ReplicaSetSpec, DaemonSetSpec and DeploymentSpec kubernetes/kubernetes#55357
- The dynamic admission webhook is split into two kinds, mutating and validating. The kinds have changed completely and old code must be ported to admissionregistration.k8s.io/v1beta1 - MutatingWebhookConfiguration and ValidatingWebhookConfiguration kubernetes/kubernetes#55282
- DaemonSet, Deployment, ReplicaSet, and StatefulSet have been promoted to GA and are available in the apps/v1 group version kubernetes/kubernetes#53679
- Introduce new storage.k8s.io/v1alpha1 VolumeAttachment object kubernetes/kubernetes#54463
- Introduce core/v1 RBDPersistentVolumeSource kubernetes/kubernetes#54302
- StatefulSet status now has support for conditions kubernetes/kubernetes#55268
- DaemonSet status now has support for conditions kubernetes/kubernetes#55272
- api change V1PersistentVolumeSpec to V1ScaleIOPersistentVolumeSource #397.
- Make sure PyPI source distribution is complete with all files from the root directory
- Update to Kubernetes 1.8 cluster
- IntOrString is now object thus it can be int or string. #18 #359
- Adding stream package to support calls like exec. The old way of calling them is deprecated. See Troubleshooting).
- config.http_proxy_url is deprecated. use configuration.proxy instead.
- Configuration is not a singleton object anymore. Please use Configuration.set_default to change default configuration.
- Configuration class does not support
ws_streaming_protocol
anymore. In ApiClient.set_default_header setsec-websocket-protocol
to the preferred websocket protocol.
- Fix Operation names for subresources kubernetes/kubernetes#49357
- Add proper GCP config loader and refresher kubernetes-client/python-base#22
- Add ws_streaming_protocol and use v4 by default kubernetes-client/python-base#20
- Respect the KUBECONFIG environment variable if set kubernetes-client/python-base#19
- Allow setting maxsize for PoolManager kubernetes-client/python-base#18
- Restricting the websocket-client to <=0.40 #299
- Update client to kubernetes 1.7
- Support ThirdPartyResources (TPR) and CustomResourceDefinitions (CRD). Note that TPR is deprecated in kubernetes #251 #201
- Better dependency management #136
- Add support for python3.6 #244
- Bugfix: support RFC6902 'json-patch' operations #187
- No changes. The same as
v2.0.0b1
.
- Bugfix: support RFC6902 'json-patch' operations #187
- Bugfix: urllib3 1.21 fails tests, Excluding version 1.21 from dependencies #197
- Add support for attach API calls #180
- Bugfix: token file should not be decoded #182
- Inline primitive models (e.g. v1.Time and resource.Quantity) #179
- Bugfix: urllib3 1.21 fails tests, Excluding version 1.21 from dependencies #197
- Update to kubernetes 1.6 spec #169
- Bugfix: blocking exec call should remove channel metadata #140
- Add close method to websocket api of interactive exec #145
- Bugfix: Missing websocket-client dependency #131
- Support exec calls in both interactive and non-interactive mode #58
- Support insecure-skip-tls-verify config flag #99
- Added example for using yaml files as models #63
- Added end to end tests #41, #94
- Bugfix: Fix ValueError in list_namespaced_config_map #104
- Bugfix: Export missing models #101
- Bugfix: Patch operations #93
- Bugfix: Missing fields in some models #85, kubernetes/kubernetes#39465
- Bugfix: Fixed broken config loader #77
- Add context switch to kube config loader #46
- Add default kube config location #64
- Add support for accessing multiple clusters #7
- Bugfix: Python client does not resolve relative paths in kubeconfig #68
- Bugfix:
read_namespaced_pod_log
get None response #57 - Improved test coverage #54
- Improved client generator #49
- auto-generated client from K8s OpenAPI spec
- kube-config support
- in-cluster config support: Run scripts inside kubernetes cluster
- watch support
Skipped because of a failed initial release.