304 KiB
- v1.34.1
- v1.34.0
- v1.34.0-rc.2
- v1.34.0-rc.1
- v1.34.0-rc.0
- v1.34.0-beta.0
- v1.34.0-alpha.3
- v1.34.0-alpha.2
- v1.34.0-alpha.1
v1.34.1
Downloads for v1.34.1
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | b1262f114376f7bc0532ef688e758657ada0796e958c7b49e1401e8a2789791a7d59e5460c54780131fc8fa7398c6e87a7e59fdc4a84061c15d015c69a07e10d |
kubernetes-src.tar.gz | 5109cd698bd249341357f5a0b7ab3cd078a641747ef1a17e168f650c62af854cc46bf3bca884f43ea33d51e81a2be4e31d0d02af639a3f58d79f3f1322b0e238 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | c977b7ede3a07ec721a874ec127a9b2d2e1edce097e33fc5bfe0a7a2ecf61153c4e514787e89003eeb8d463f47ba0c09f3267669769f0cba873c5265674e056d |
kubernetes-client-darwin-arm64.tar.gz | ae6b112e45e50a9d1ce0738f948f933eed419dde20a70f399cfcf77ebf5179b6af893ae7e1e633f5b99c1f34a499a2238474cc45878afdf250c048ea43c559a2 |
kubernetes-client-linux-386.tar.gz | 3e8aff795fa394343b4d3a943dba25b06b5c122df91fe5893cb354ee605a087f6150cee6225ff60d4b1ed9e0fa02adb9e4ccd8e38cd12337a92cedbdcfaabff2 |
kubernetes-client-linux-amd64.tar.gz | 3abedd362fffd5eb749febdeb59c2edd9902f7f69fb182f879daeb27cc88405983c539513cb74ef9b9587ab3829bde992f22f2067fd181311989345f6e13b867 |
kubernetes-client-linux-arm.tar.gz | 0d28e96ff4bf3f570277f194a975c19e8a1b49e7240908a91278647c44b5f019251dd7774aed5dbbfe7c030ded993701044c90ac97e14de5c51d0e9ae84d2127 |
kubernetes-client-linux-arm64.tar.gz | 279832e1ac95532807aeb68ed951e8099300e3cd4a09f1d829c4b0197e0010d18d1de19e54f73b0ab7f104ee5670ef4897127432fac42867b7a727d75dc8bd48 |
kubernetes-client-linux-ppc64le.tar.gz | 1367d4dfebab6f504612d6aa7e6dd7f6391ec28779c0610ef89c77bb691a5020ff3d863d5414645d62e9dfbf1fe814cf8b3bae3097c210f8e8ad895deb19c291 |
kubernetes-client-linux-s390x.tar.gz | d03ff4bbad2c947a37a6ffc62f3db08cf2cc1d9d702d90b94f80fb9fdcc637c4f96096beb3a466f07ac4ca807d89e81240f15cf7d2ae1c6fbd4a953122728e28 |
kubernetes-client-windows-386.tar.gz | 7929fd442acfa851c1510b52a6c3a11f6d3c2fb318597e68134a1927bac18ab70c6de7d572c0c05ecbc8c5764cf20fc91ab4c1ad604c7cd3707b86c01cb9fd16 |
kubernetes-client-windows-amd64.tar.gz | f73e914d28e0986d4b32bbf0d39c428d3e4d28dac11cf8d2b48eae4f1825511fc8b1b706427a1fe752fc0d280f1b4c539f4261cc31f679f25646ac5234afa7ad |
kubernetes-client-windows-arm64.tar.gz | f03de193bc851a1327cbc7338f019cabe7167775ca597c36637b10332b8892a7a4bcc5daa090349f24347f5210fced19c7a15211c69abb94fee87e88c1efaa30 |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 8fd1e779f4d0188592644e234a6e5b728b9000a2afeb9d8da25131a5a4e54718bb46c4d521c62e26ea971e32745529fbb001c4f011ef2c54091cb5e81b4b90f2 |
kubernetes-server-linux-arm64.tar.gz | 77f68803b34f710c9623f388452494075ca9bb38567e7878176ec12a6d2971d2feba381e99462dc8c6e83ff5064dcffcaa7df736b67208880f5e90d71a831c2c |
kubernetes-server-linux-ppc64le.tar.gz | 6a5378a02b9b27cce9e0bc26399f8c0a8676372407bb618949fa41caacb4bbfbc7ec5487e00d973fbf409abe848a3aed42b2ead2c78753a1dd7c3251daf61745 |
kubernetes-server-linux-s390x.tar.gz | 6b9b4b64907ec817ce93a70faecbfcccf665e6b7681d0c21e26844c9d2645227ee8956c3b6b6a2417725b1e64353d5e1ed7071cf2c8e71ea8551cd47d662c3d8 |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | c9b7d52708c4282757cd7aaa8b059c26f8f427cf8c238dff95cdc85a68d42c28b6e09fbf1aee3fa6f5f377aa395c6b9a73c112c56a6485e22b16a9c8562a8eef |
kubernetes-node-linux-arm64.tar.gz | efe54933eb5e7e6b44c76efe0b4cec911340793ef2eafdd595593fb2537e5704429d3a291793cb69ad459fe14058da491a29a12d963ba34ee4c1475cc0799b0f |
kubernetes-node-linux-ppc64le.tar.gz | 59a7223e167c890d8cb8544b9692182aaccb3814cb203337ea21a87902e0174d6f0e114d015989c42890d3b73cb73bdf8b1b71ef89fd1b0cf615349d10c23f8f |
kubernetes-node-linux-s390x.tar.gz | b648658aaae4812d787b7be04bdfd13dc379316bbcda107eca410ffbdf57713f00bbb68ad4fe9501c3bb26e5d35f589653d4067a5753f681e41f493a28309ea9 |
kubernetes-node-windows-amd64.tar.gz | 4c70f856364a976aa919662f3b3f6f06da3fe7ae156b7bf3fd84de4b5a0b0c70221283220c48c3cc31dddce0f2e0167606126515b1750ca90aaf129f1c9280ce |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.34.0
Changes by Kind
Bug or Regression
- Fixed SELinux warning controller not emitting events on some SELinux label conflicts. (#133745, @jsafrane) [SIG Apps, Storage and Testing]
- Fixed broken shell completion for api resources. (#133783, @vpnachev) [SIG CLI]
- Kube-apiserver: Fixed a 1.34 regression in CustomResourceDefinition handling that incorrectly warned about unrecognized formats on number and integer properties (#133901, @yongruilin) [SIG API Machinery]
- Kube-apiserver: Fixes a 1.34 regression with spurious "Error getting keys" log messages (#133866, @serathius) [SIG API Machinery and Etcd]
- Kube-apiserver: Fixes a possible 1.34 performance regression calculating object size statistics for resources not served from the watch cache, typically only Events (#133879, @serathius) [SIG API Machinery and Etcd]
- Kubeadm: fixed bug where v1beta3's ClusterConfiguration.APIServer.TimeoutForControlPlane is not respected in newer versions of kubeadm where v1beta4 is the default. (#133753, @HirazawaUi) [SIG Cluster Lifecycle]
Dependencies
Added
Nothing has changed.
Changed
Nothing has changed.
Removed
Nothing has changed.
v1.34.0
Downloads for v1.34.0
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 133a1ea99881ac8988b1931908506b8b02e0533c6c6521b67152c00e0ba5c124870a3a5050887827a7d1b1b8cc4b1da9e2b07f76684975585d0947e5d234faa5 |
kubernetes-src.tar.gz | 2fa409c71ce0f98dc540baa0e5058f751ee982cf0b9dfe4d3ed5eea1331586e7a464a631909889f9c0758d364643718a336816343136b603ef59bdf43c7a30d7 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | 20b6c4f9327f4d0b5873429595e2b7bdfec6269e9a39dee69e28ff9f3fd168611f56f378b867c35edc605dac23227b0d95083fdbc676c04f5d8d1142ceff829c |
kubernetes-client-darwin-arm64.tar.gz | c48d5efa26f8313f535a173201c38896fa9147fd46a7d3a085c70dcbb16391a894d4c4f09ecb6d1d7ed081a7d3fdd8f71afadd0253a55808addb383680ef89b7 |
kubernetes-client-linux-386.tar.gz | efc91631134a8cdd543d4e9cf429928b0b7abe2f6212f05ea82ad62830caef74aa4b9b090b45d583912de280e13af87b8b20c0d3fc6fbc43b5c99beb5a9ff8db |
kubernetes-client-linux-amd64.tar.gz | aa5e3a41986e23ad6910eb86e68eb10217db60978dadc88370c669cb9c9e10d1431133cc8f7401b4e9843e0d15120c867f2803121e690ac7c74ee85eabbc13b5 |
kubernetes-client-linux-arm.tar.gz | aeafc3d539a400e2e1a32ed501aca7e265ed817d0d56acf62f306c26c2be0beac6af88b6478a26df865105a2c13f2006cc1e062189f4b6885814133090228e86 |
kubernetes-client-linux-arm64.tar.gz | 24158910deed9d09e99e5fb358bd9758de509f344bfb0b1482b2426e26c1e52f7f97657438fa698b51da10c7444699f7addae58ee67b23f38eb175df0e17661a |
kubernetes-client-linux-ppc64le.tar.gz | b30f3966ab6d2b723956cd400e73a685ea6431230eb1994bbb995af163f6ba7abbda79834dab3f0fc0a6b4a9c9af3582f07689e100841ea012015070cac9cd80 |
kubernetes-client-linux-s390x.tar.gz | b543accac845a9a8d1fccc62e43d44479247f9ed65d7db7e2fcf0004ee02c7eaf9d10ab977040bf77f4f5171974a1d4d8a1852d93668b1f593ad5f957ba84952 |
kubernetes-client-windows-386.tar.gz | 2f60547e2e8800df61c57adfb862031e81ba27cba3edeaf483aa8616820561c6ed9b87778b4e81be14545dcaa35bef9d80c817972039357f8e594a6f4edeeb13 |
kubernetes-client-windows-amd64.tar.gz | a528fdec4aa426f0b72ff96f39727842e6561f4c49e273e6f007934f42ab2992fd75a8fa43c9ae7d9f3345091228d43bc03e3bdf3696d36a56b4fb49d20a6e9d |
kubernetes-client-windows-arm64.tar.gz | 467dcadaa8b48d45caa0a5aca5669317fd501689e4a90219c701adb5e9f46ce66085dd3800321e2377c775992180d76aae2e2b84a4f7bb50f997198def0dd8e6 |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | a9ec9abe6a803d55d56753e1be8549223cd34ebcbec26536cbdc277c5f17a28c4942329e1df01a2bd067b60a0c1c2901e240d5014e9ce445400239bd488582af |
kubernetes-server-linux-arm64.tar.gz | d05fd68c31f30b1853aa927200ce99fc1e7e67b39803be7508c5591b57e74f3496bcd8b50b84afeabd293f41bc647ea4bcb0bf85a7be5b49e8d2604214e5ccda |
kubernetes-server-linux-ppc64le.tar.gz | 173d638506736cfd0bd8ffe7719447895068ed3f3c8a20405548f0db6689bcd63a4f226f6b19e35e7696801c338d9071f2f93392c8ec6316617303350cb44cff |
kubernetes-server-linux-s390x.tar.gz | 80fd0c55c3c1cdbdd47faf9bfcf2f89d36c56bb91c0281c126e8ba84ad36c527f1861646f54dc4258ba6fae0fb8ee23674ed41f811a08758da3fe1337f723748 |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 93ae93af2d39bf00747b66f365781c64880b4ca235031a7ecae7a9d017e04df7ca925f8c005b1da49447cf64cb3f1ecc790db460e60cd1f98f34aae1434ad103 |
kubernetes-node-linux-arm64.tar.gz | 33216af73a02919579985be5d5372ecb305b6fb2013297f3ea36b357d3cf4bce2a07a612e188b76c752aabbe23bdc726645f348f5db43b12893fc80ac65711f3 |
kubernetes-node-linux-ppc64le.tar.gz | 781df3a7785435ed365949850ef3c4555e3531826907d75e2edf102cdef8950176c17c8dc8ad97077908b12895eb2cf2796e27418252cb790a7876484270d33a |
kubernetes-node-linux-s390x.tar.gz | 133c8c011e3f0c6094262efa2cd053e96facdfdb603f90eb51b9ee085c082ac82bcd53863cc517f7ae9e219265f8e66e94e4fbdc21ee01b79b72c993792dde5c |
kubernetes-node-windows-amd64.tar.gz | e5f6dbd19106b4f4d125d048f1351be2b6a06a79622ece31c24a2a27c03268474a42a1b0b85b1de46423a66c0ee9e1060e9bcee709ae1668c7a650b5575ccc76 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.33.0
Urgent Upgrade Notes
(No, really, you MUST read this before you upgrade)
- For metrics
apiserver_cache_list_fetched_objects_total
,apiserver_cache_list_returned_objects_total
,apiserver_cache_list_total
replaceresource_prefix
label with APIgroup
andresource
labels. For metricsetcd_request_duration_seconds
,etcd_requests_total
andetcd_request_errors_total
replacetype
label with APIresource
andgroup
label. For metricapiserver_selfrequest_total
add a APIgroup
label. For metricsapiserver_watch_events_sizes
andapiserver_watch_events_total
replace APIkind
label withresource
label. For metricsapiserver_request_body_size_bytes
,apiserver_storage_events_received_total
,apiserver_storage_list_evaluated_objects_total
,apiserver_storage_list_fetched_objects_total
,apiserver_storage_list_returned_objects_total
,apiserver_storage_list_total
,apiserver_watch_cache_events_dispatched_total
,apiserver_watch_cache_events_received_total
,apiserver_watch_cache_initializations_total
,apiserver_watch_cache_resource_version
,watch_cache_capacity
,apiserver_init_events_total
,apiserver_terminated_watchers_total
,watch_cache_capacity_increase_total
,watch_cache_capacity_decrease_total
,apiserver_watch_cache_read_wait_seconds
,apiserver_watch_cache_consistent_read_total
,apiserver_storage_consistency_checks_total
,etcd_bookmark_counts
,storage_decode_errors_total
extract the API group fromresource
label and put it in newgroup
label. (#131845, @serathius) [SIG API Machinery, Etcd, Instrumentation and Testing] - Kubelet: removed the deprecated flag
--cloud-config
from the command line. (#130161, @carlory) [SIG Cloud Provider, Node and Scalability] - Static pods that reference API objects were denied admission by the kubelet so that static pods would not be silently running even after the mirror pod creation failed. (#131837, @sreeram-venkitesh) [SIG Auth, Node and Testing]
- The Scheduling Framework exposed
NodeInfos
to the PreFilter plugins. The PreFilter plugins now accepted theNodeInfo
list from the arguments. (#130720, @saintube) [SIG Node, Scheduling, Storage and Testing]
Changes by Kind
Deprecation
- Apimachinery: Deprecated
MessageCountMap
andCreateAggregateFromMessageCountMap
. (#132376, @tico88612) - DRA kubelet: gRPC API graduated to v1, v1beta1 was deprecated starting in 1.34. Updating DRA drivers to the
k8s.io/dynamic-resource-allocation/kubeletplugin
helper from 1.34 added support for both API versions. (#132700, @pohly) [SIG Node and Testing] - Deprecated the
preferences
field in kubeconfig in favor ofkuberc
. (#131741, @soltysh) [SIG API Machinery, CLI, Cluster Lifecycle and Testing] - Kubeadm: Consistently prefixed errors with error: when printing them. (#132080, @neolit123)
- Kubeadm: Exposed only the non-deprecated klog flags (-v and -vmodule), in line with KEP https://features.k8s.io/2845. (#131647, @carsontham)
- [cloud-provider] Respected the
exclude-from-external-load-balancers=false
label. (#131085, @kayrus) [SIG Cloud Provider and Network]
API Change
-
Added
omitempty
andopt
tag to the APIv1beta2
AdminAccess type in theDeviceRequestAllocationResult
struct. (#132338, @PatrickLaabs) -
Added a
runtime.ApplyConfiguration
interface implemented by all generated apply configuration types. (#132194, @alvaroaleman) [SIG API Machinery and Instrumentation] -
Added a detailed event for in-place pod vertical scaling completed, improving cluster management and debugging. (#130387, @shiya0705) [SIG API Machinery, Apps, Autoscaling, Node, Scheduling and Testing]
-
Added a mechanism for configurable container restarts: container-level restart rules. This was an alpha feature behind the
ContainerRestartRules
feature gate. (#132642, @yuanwang04) [SIG API Machinery, Apps, Node and Testing] -
Added a new
FileKeyRef
field to containers, allowing them to load variables from files by setting this field.Introduced the
EnvFiles
feature gate to govern activation of this functionality. (#132626, @HirazawaUi) [SIG API Machinery, Apps, Node and Testing] -
Added driver-owned fields in
ResourceSlice
to mark whether the device was shareable among multiple resource claims (or requests) and to specify how each capacity could be shared between different requests.- Added user-owned fields in
ResourceClaim
to specify resource requirements against each device capacity. - Added scheduler-owned field in
ResourceClaim.Status
to specify how much device capacity is reserved for a specific request. - Added an additional identifier to
ResourceClaim.Status
for the device supports multiple allocations. - Added a new constraint type to enforce uniqueness of specified attributes across all allocated devices. (#132522, @sunya-ch) [SIG API Machinery, Apps, Architecture, CLI, Cluster Lifecycle, Network, Node, Release, Scheduling and Testing]
- Added user-owned fields in
-
Added new optional APIs in
ResouceSlice.Basic
andResourceClaim.Status.AllocatedDeviceStatus
. (#130160, @KobayashiD27) [SIG API Machinery, Apps, Architecture, Node, Release, Scheduling and Testing] -
Added support for specifying
controlplane
orcluster
egress selectors in JWT authenticators via theissuer.egressSelectorType
field in theAuthenticationConfiguration.jwt
array. If unset, the previous behavior of using no egress selector is preserved. This functionality requires theStructuredAuthenticationConfigurationEgressSelector
beta feature gate (enabled by default). (#132768, @enj) [SIG API Machinery, Auth and Testing] -
Added support in the Kubelet for monitoring the health of devices allocated via Dynamic Resource Allocation (DRA) and report it in the
pod.status.containerStatuses.allocatedResourcesStatus
field. This required the DRA plugin to implement the new v1alpha1NodeHealth
gRPC service. This feature was controlled by theResourceHealthStatus
feature gate. (#130606, @Jpsassine) [SIG Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Network, Node, Release, Scheduling, Storage and Testing] -
Added support in the kubelet's image pull credential tracking for service account-based verification. When an image was pulled using service account credentials via external credential providers, subsequent Pods using the same service account (UID, name, and namespace) could access the cached image without re-authentication for the lifetime of that service account. (#132771, @aramase) [SIG Auth, Node and Testing]
-
Added validation to reject Pods using the
PodLevelResources
feature on Windows OS due to lack of support. The API server rejected Pods with pod-level resources and aPod.spec.os.name
targeting Windows. Kubelet on nodes running Windows also rejected Pods with pod-level resources at the admission phase. (#133046, @toVersus) [SIG Apps and Node] -
Added warnings when creating headless service with set
loadBalancerIP
,externalIPs
and/orSessionAffinity
. (#132214, @Peac36) -
Allowed
pvc.spec.VolumeAttributesClassName
to change from non-nil to nil. (#132106, @AndrewSirenko) -
Allowed setting the
hostnameOverride
field inPodSpec
to specify any RFC 1123 DNS subdomain as the pod's hostname. TheHostnameOverride
feature gate was introduced to control enablement of this functionality. (#132558, @HirazawaUi) [SIG API Machinery, Apps, Network, Node and Testing] -
Changed underlying logic for
Eviction Manager
helper functions. (#132277, @KevinTMtz) [SIG Node, Scheduling and Testing] -
Changed underlying logic to propagate pod-level hugepage cgroup to containers when they did not specify hugepage resources.
- Added validation to enforce the hugepage aggregated container limits to be smaller than or equal to pod-level limits. This was already enforced with the defaulted requests from the specified limits, however it did not make it clear about both hugepage requests and limits. (#131089, @KevinTMtz) [SIG Apps, Node and Testing]
-
Corrected the documentation to clarify that
podSelector
is optional and described its default behavior. (#131354, @tomoish) -
DRA API: resource.k8s.io/v1alpha3 now only contains DeviceTaintRule. All other types got removed because they became obsolete when introducing the v1beta1 API in 1.32. before updating a cluster where resourceclaims, resourceclaimtemplates, deviceclasses, or resourceslices might have been stored using Kubernetes < 1.32, delete all of those resources before updating and recreate them as needed while running Kubernetes >= 1.32. (#132000, @pohly) [SIG Etcd, Node, Scheduling and Testing]
-
DRA: Starting with Kubernetes 1.34, the alpha-level
resource.k8s.io/admin-access
label has been updated toresource.kubernetes.io/admin-access
. Admins using the alpha feature and updating from 1.33 can set both labels, upgrade, then removeresource.k8s.io/admin-access
when no downgrade is going to happen anymore. (#131996, @ritazh) [SIG Node and Testing] -
DRA: The scheduler plugin prevented abnormal filter runtimes by timing out after 10 seconds. This was configurable via the plugin configuration's
FilterTimeout
. Setting it to zero disabled the timeout and restored the behavior of Kubernetes <= 1.33. (#132033, @pohly) [SIG Node, Scheduling and Testing] -
DRA: When the prioritized list feature was used in a request and the resulting number of allocated devices exceeded the number of allowed devices per claim, the scheduler aborted the attempt to allocate devices early. Previously, it tried to many different combinations, which could take a long time. (#130593, @mortent) [SIG Apps, Node, Scheduling and Testing]
-
DRA: removed support for the v1alpha4 kubelet gRPC API (added in 1.31, superseded in 1.32). DRA drivers using the helper package from Kubernetes >= 1.32 use the v1beta1 API and continue to be supported. (#132574, @pohly)
-
Deprecated
StreamingConnectionIdleTimeout
field of the kubelet config. (#131992, @lalitc375) -
Dynamic Resource Allocation: Graduated core functionality to general availability (GA). This newly stable feature uses the structured parameters flavor of DRA. (#132706, @pohly) [SIG API Machinery, Apps, Auth, Autoscaling, Etcd, Node, Scheduling and Testing]
-
Enabled kube-apiserver support for
PodCertificateRequest
andPodCertificate
projected volumes (behind thePodCertificateRequest
feature gate). (#128010, @ahmedtd) [SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Storage and Testing] -
Extended resources backed by DRA feature allowed cluster operator to specify
extendedResourceName
inDeviceClass
, and application operator to continue using extended resources in pod's requests to request for DRA devices matching the DeviceClass.NodeResourcesFit
plugin scoring didn't work for extended resources backed by DRA. (#130653, @yliaog) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] -
Extended the NodePorts scheduling plugin to consider hostPorts used by restartable init containers. (#132040, @avrittrohwer) [SIG Scheduling and Testing]
-
Fixed a 1.33 regression that causes a nil panic in kube-scheduler when aggregating resource requested across container's spec and status. (#132895, @yue9944882) [SIG Node and Scheduling]
-
Fixed prerelease lifecycle for
PodCertificateRequest
. (#133350, @carlory) -
Introduced OpenAPI format support for
k8s-short-name
andk8s-long-name
in CustomResourceDefinition schemas. (#132504, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage] -
Introduced the
admissionregistration.k8s.io/v1beta1/MutatingAdmissionPolicy
API type. To enable, enable theMutatingAdmissionPolicy
feature gate (which was off by default) and set--runtime-config=admissionregistration.k8s.io/v1beta1=true
on the kube-apiserver. Note that the default stored version remained alpha in 1.34, and whoever enabled beta during 1.34 needed to run a storage migration yourself to ensure you don't depend on alpha data in etcd. (#132821, @cici37) [SIG API Machinery, Etcd and Testing] -
Kube-apiserver: Added support for disabling caching of authorization webhook decisions in the
--authorization-config
file. The new fieldscacheAuthorizedRequests
andcacheUnauthorizedRequests
could be set tofalse
to prevent caching for authorized or unauthorized requests. See the https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. (#129237, @rfranzke) [SIG API Machinery and Auth] -
Kube-apiserver: Promoted the
StructuredAuthenticationConfiguration
feature gate to GA. (#131916, @aramase) [SIG API Machinery, Auth and Testing] -
Kube-apiserver: the AuthenticationConfiguration type accepted in
--authentication-config
files has been promoted toapiserver.config.k8s.io/v1
. (#131752, @aramase) [SIG API Machinery, Auth and Testing] -
Kube-log-runner: Added the
-log-file-size
parameter to rotate log output into a new file once it reached a certain size. Introduced-log-file-age
to enable automatic removal of old output files, and-flush-interval
to support periodic flushing. (#127667, @zylxjtu) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows] -
Kubectl: Graduated kuberc support to beta. A
kuberc
configuration file provided a mechanism for customizingkubectl
behavior (distinct from kubeconfig, which configures cluster access across different clients). (#131818, @soltysh) [SIG CLI and Testing] -
Promoted Job Pod Replacement Policy to general availability. The
JobPodReplacementPolicy
feature gate was locked totrue
and will be removed in a future Kubernetes release. (#132173, @dejanzele) [SIG Apps and Testing] -
Promoted
MutableCSINodeAllocatableCount
to beta. (#132429, @torredil) -
Promoted feature-gate
VolumeAttributesClass
to GA -
Promoted the
APIServerTracing
feature gate to GA. The--tracing-config-file
flag acceptedTracingConfiguration
in versionapiserver.config.k8s.io/v1
(with no changes fromapiserver.config.k8s.io/v1beta1
). (#132340, @dashpole) [SIG API Machinery and Testing] -
Promoted the
AuthorizeWithSelectors
andAuthorizeNodeWithSelectors
feature gates to stable and locked on. (#132656, @liggitt) [SIG API Machinery, Auth and Testing] -
Promoted the
KubeletTracing
feature gate to GA. (#132341, @dashpole) [SIG Instrumentation and Node] -
Promoted the
RelaxedEnvironmentVariableValidation
feature gate to GA and locked it in the enabled state by default. (#132054, @HirazawaUi) [SIG Apps, Architecture, Node and Testing] -
Removed an inaccurate statement about requiring ports when the Pod spec
hostNetwork
field was set. (#130994, @BenTheElder) [SIG Network and Node] -
Removed deprecated
gogo
protocol definitions fromk8s.io/kubelet/pkg/apis/pluginregistration
in favor ofgoogle.golang.org/protobuf
. (#132773, @saschagrunert) -
Removed deprecated gogo protocol definitions from
k8s.io/cri-api
in favor ofgoogle.golang.org/protobuf
. (#128653, @saschagrunert) [SIG API Machinery, Auth, Instrumentation, Node and Testing] -
Replaced Boolean-pointer-helper functions with the
k8s.io/utils/ptr
implementations. (#132794, @PatrickLaabs) [SIG API Machinery, Auth, CLI, Node and Testing] -
Replaced
boolPtrFn
helper functions with the "k8s.io/utils/ptr" implementation. (#132907, @PatrickLaabs) -
Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the apiextensions-apiserver apiextensions. (#132723, @PatrickLaabs) -
Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the apiserver (1/2). (#132751, @PatrickLaabs) [SIG API Machinery and Auth] -
Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the component-base. (#132754, @PatrickLaabs) [SIG API Machinery, Architecture, Instrumentation and Scheduling] -
Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the kube-aggregator apiregistration. (#132701, @PatrickLaabs) -
Simplied validation error message for invalid fields by removing redundant field name. (#132513, @xiaoweim) [SIG API Machinery, Apps, Auth, Node and Scheduling]
-
Simplied validation error message for required fields by removing redundant messages. (#132472, @xiaoweim) [SIG API Machinery, Apps, Architecture, Auth, Cloud Provider, Network, Node and Storage]
-
The
KubeletServiceAccountTokenForCredentialProviders
feature was beta and enabled by default. (#133017, @aramase) [SIG Auth and Node] -
The
conditionType
is "oneof" approved/denied check of CertificateSigningRequest's.status.conditions
field was migrated to declarative validation. If theDeclarativeValidation
feature gate was enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeover
feature gate was enabled, declarative validation was the primary source of errors for migrated fields. (#133013, @aaron-prindle) [SIG API Machinery and Auth] -
The fallback behavior of the Downward API's
resourceFieldRef
field was updated to account for pod-level resources: if container-level limits were not set, pod-level limits were now used before falling back to node allocatable resources. (#132605, @toVersus) [SIG Node, Scheduling and Testing] -
The validation of
replicas
field in the ReplicationController/scale
subresource has been migrated to declarative validation. If theDeclarativeValidation
feature gate is enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeover
feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#131664, @jpbetz) [SIG API Machinery and Apps] -
The validation-gen code generator generated validation code that supported validation ratcheting. (#132236, @yongruilin) [SIG API Machinery, Apps, Auth and Node]
-
Updated
IsDNS1123SubdomainWithUnderscore
so that, when it returned an error, it also returned the correct regex information (dns1123SubdomainFmtWithUnderscore
). (#132034, @ChosenFoam) -
Updated etcd version to v3.6.0. (#131501, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing]
-
Updated the
v1
credential provider configuration to include thetokenAttributes.cacheType
field. This field is required and must be set to eitherServiceAccount
orToken
when configuring a provider that uses a service account to fetch registry credentials. (#132617, @aramase) [SIG Auth, Node and Testing] -
Zero-value
metadata.creationTimestamp
values are now omitted and no longer serialize an explicitnull
in JSON, YAML, and CBOR output (#130989, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Scheduling, Storage and Testing] -
AppArmor
profiles specified in the Pod or containerSecurityContext
were no longer copied to deprecatedAppArmor
annotations (prefixcontainer.apparmor.security.beta.kubernetes.io/
). Anything that inspected the deprecated annotations must be migrated to use theSecurityContext
fields instead. (#131989, @tallclair) -
MultiCIDRServiceAllocator
was locked and enabled by default,DisableAllocatorDualWrite
was enabled by default. (#131318, @aojea) [SIG API Machinery, Apps, Architecture, Auth, Etcd, Network and Testing]
Feature
-
Added 3 new metrics for monitoring async API calls in the scheduler when the
SchedulerAsyncAPICalls
feature gate was enabled:scheduler_async_api_call_execution_total
: tracks executed API calls by call type and result (success/error)scheduler_async_api_call_duration_seconds
: histogram of API call execution duration by call type and resultscheduler_pending_async_api_calls
: gauge showing current number of pending API calls in the queue. (#133120, @utam0k) [SIG Release and Scheduling]
-
Added HPA support to pod-level resource specifications. When the pod-level resource feature was enabled, HPAs configured with
Resource
type metrics calculated the pod resources frompod.Spec.Resources
field, if specified. (#132430, @laoj2) [SIG Apps, Autoscaling and Testing] -
Added Traffic Distribution field to
kubectl describe service
output (#131491, @tchap) [SIG CLI] -
Added
SizeBasedListCostEstimate
feature gate that allowed apiserver to estimate sizes of objects to calculate cost of LIST requests. (#132355, @serathius) [SIG API Machinery and Etcd] -
Added
apiserver_resource_size_estimate_bytes
metric to API server. (#132893, @serathius) [SIG API Machinery, Etcd and Instrumentation] -
Added
started_user_namespaced_pods_total
andstarted_user_namespaced_pods_errors_total
for tracking the successes and failures in creating pods if a user namespace was requested. (#132902, @haircommander) [SIG Node and Testing] -
Added a
--show-swap
option tokubectl top
subcommands (#129458, @iholder101) [SIG CLI] -
Added a
container_swap_limit_bytes
metric to expose the swap limit assigned to containers under theLimitedSwap
swap behavior. (#132348, @iholder101) [SIG Node and Testing] -
Added a delay to node updates after kubelet startup. A random offset, based on the configured
nodeStatusReportFrequency
, helped distribute traffic and load from node status updates more evenly over time. The initial status update could occur up to 50% earlier or later than the regular schedule. (#130919, @mengqiy) -
Added a flag to kubectl version to detect whether a client/server version mismatch was outside the officially supported range. (#127365, @omerap12)
-
Added a new
PreBindPreFlight
function to thePreBindPlugin
interface. All in-treePreBind
plugins have been updated to implementPreBindPreFlight
function. (#132391, @sanposhiho) [SIG Node, Scheduling, Storage and Testing] -
Added a warning when alpha metrics are used with emulated versions. (#132276, @michaelasp) [SIG API Machinery and Architecture]
-
Added alpha metrics for compatibility versioning (#131842, @michaelasp) [SIG API Machinery, Architecture, Instrumentation and Scheduling]
-
Added configurable flags to kube-apiserver for coordinated leader election. (#132433, @michaelasp) [SIG API Machinery and Testing]
-
Added machine readable output options (JSON & YAML) to
kubectl api-resources
. (#132604, @dharmit) [SIG Apps, CLI and Network] -
Added memory tracking to scheduler performance tests to help detect memory leaks and monitored memory usage patterns while running
scheduler_perf
. (#132910, @utam0k) [SIG Scheduling and Testing] -
Added support for CEL expressions with escaped names in the structured authentication config. Using
[...]
to access claims or user data was recommended when names contained characters that would otherwise need escaping. CEL optionals with?
could be used where has was not applicable — for example,claims[?"kubernetes.io"]
oruser.extra[?"domain.io/foo"]
. (#131574, @enj) [SIG API Machinery and Auth] -
Added support for
--cpu
,--memory
flag tokubectl autoscale
, started deprecating--cpu-precent
. (#129373, @googs1025) -
Added support for a new kubectl output format,
kyaml
. KYAML was a strict subset of YAML and should be accepted by any YAML processor. The formatting of KYAML was halfway between JSON and YAML. Because it was more explicit than the default YAML style, it was less error-prone. (#132942, @thockin) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Contributor Experience, Instrumentation, Network, Node, Scheduling, Storage and Testing] -
Added the
DetectCacheInconsistency
feature gate, allowing the API server to periodically verify consistency between itscache
andetcd
. Detected inconsistencies reported via theapiserver_storage_consistency_checks_total
metric and trigger purging of affected cache snapshots. (#132884, @serathius) [SIG API Machinery, Instrumentation and Testing] -
Added the
SizeBasedListCostEstimate
feature gate (enabled by default), which changes how APF seats are assigned toLIST
requests. With this feature, one seat is assigned per 100KB of data loaded into memory at once during aLIST
operation. (#132932, @serathius) -
Added useful endpoints for kube-apiserver. (#132581, @itssimrank) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing]
-
Built Kubernetes using Go 1.24.3. (#131934, @cpanato) [SIG Release and Testing]
-
Built Kubernetes using Go 1.24.4. (#132222, @cpanato) [SIG Release and Testing]
-
Bumped DRA API version to
v1
indeviceattribute
package ink8s.io/dynamic-resource-allocation
. (#133164, @everpeace) -
Bumped
KubeletCgroupDriverFromCRI
to GA and add metric to track out-of-support CRI implementations. (#133157, @haircommander) [SIG Node and Testing] -
CRI API had auth fields in image pulling marked as
debug_redact
. (#133135, @SergeyKanzhelev) -
Changed handling of
CustomResourceDefinitions
with unrecognized formats. Writing a schema with an unrecognized format now triggered a warning (the write was still accepted). (#133136, @yongruilin) -
DRA kubelet: Fixed the kubelet to also clean up
ResourceSlices
in some additional failure scenarios (driver was removed forcibly or crashed and did not restart). (#132058, @pohly) [SIG Node and Testing] -
DRAAdminAccess was enabled by default allowing users to create
ResourceClaims
andResourceClaimTemplates
in privileged mode to grant access to devices that were in use by other users for admin tasks like monitoring health or status of the device. (#133085, @ritazh) [SIG Auth and Node] -
Demoted KEP-5278 feature gates
ClearingNominatedNodeNameAfterBinding
andNominatedNodeNameForExpectation
to alpha from beta. (#133293, @utam0k) [SIG Scheduling and Testing] -
Deprecated
apiserver_storage_objects
and replaced it withapiserver_resource_objects
metric using labels consistent with other metrics. (#132965, @serathius) [SIG API Machinery, Etcd and Instrumentation] -
Eliminated work when creating Services or understanding port purposes, especially for external resources deployed via Helm charts. (#133018, @rushmash91)
-
Enabled compact snapshots in the watch cache based on
etcd
compaction events. (#132876, @serathius) [SIG API Machinery and Etcd] -
Enabled completion for aliases defined in
kubectlrc
. (#131586, @ardaguclu) -
Ensured memory resizing for Guaranteed QoS pods on static Memory policy configurations was gated by
InPlacePodVerticalScalingExclusiveMemory
(defaults:false
). (#132473, @pravk03) [SIG Node, Scheduling and Testing] -
Ensured that non-scheduling related errors (e.g., network errors) did not lengthen the Pod scheduling backoff time. (#128748, @sanposhiho) [SIG Scheduling and Testing]
-
Executed API calls dispatched during pod scheduling asynchronously if the
SchedulerAsyncAPICalls
feature gate was enabled. Out-of-tree plugins usedAPIDispatcher
andAPICacher
from the framework to dispatch their own calls. (#132886, @macsko) [SIG Release, Scheduling and Testing] -
Fixed recording the
kubelet_container_resize_requests_total
metric to include all resize-related updates. (#133060, @natasha41575) -
Graduated
ListFromCacheSnapshot
to beta. (#132901, @serathius) [SIG API Machinery and Etcd] -
Graduated
PodLevelResources
feature to beta and have it on by default. This feature allowed defining CPU and memory resources for an entire pod inpod.spec.resources
. (#132999, @ndixita) -
Graduated
PodObservedGenerationTracking
feature to beta and had it on by default. This feature meant that the top levelstatus.observedGeneration
andstatus.conditions[].observedGeneration
fields in Pods were populated to reflect themetadata.generation
of the podspec at the time that the status or condition was reported. (#132912, @natasha41575) [SIG Apps, Node and Testing] -
Graduated
ResilientWatchCacheInitialization
to GA. (#131979, @serathius) -
Graduated
StreamingCollectionEncodingToJSON
andStreamingCollectionEncodingToProtobuf
to GA. (#132648, @serathius) -
Graduated configurable endpoints for anonymous authentication using the authentication configuration file to stable. (#131654, @vinayakankugoyal) [SIG API Machinery and Testing]
-
Graduated relaxed DNS search string validation to GA. For the Pod API,
.spec.dnsConfig.searches
now allows an underscore (_
) where a dash (-
) would be allowed, and it allows search strings be a single dot.
. (#132036, @adrianmoisey) [SIG Network and Testing] -
Graduated scheduler
QueueingHint
support to GA (general availability) (#131973, @sanposhiho) [SIG Scheduling and Testing] -
Graduated the WinOverlay feature in the kube-proxy to GA. The WinOverlay feature gate was enabled by default. (#133042, @rzlink) [SIG Network and Windows]
-
Graduated the
ConsistentListFromCache
to GA. (#132645, @serathius) -
Graduated the
WatchList
feature gate to beta for kube-apiserver and enabledWatchListClient
for KCM. (#132704, @p0lyn0mial) [SIG API Machinery and Testing] -
Graduated the
WinDSR
feature in the kube-proxy to GA. TheWinDSR
feature gate was enabled by default. (#132108, @rzlink) [SIG Network and Windows] -
If
PreBindPreFlight
returnedSkip
, the scheduler didn't run the plugin atPreBind
. If anyPreBindPreFlight
returnedSuccess
, the scheduler put NominatedNodeName to the pod so that other components (such as the cluster autoscaler) could notice the pod was going to be bound to the node. (#133021, @sanposhiho) [SIG Scheduling and Testing] -
Implemented prioritization of resize requests based on
priorityClass
and QoS class when node resources are insufficient to accommodate all pending resize operations. (#132342, @natasha41575) [SIG Node and Testing] -
Included the namespace in the output of
kubectl delete
for better identification of resources. (#126619, @totegamma) -
Increased APF max seats to 100 for LIST requests. (#133034, @serathius)
-
Introduced a method
GetPCIeRootAttributeByPCIBusID(pciBusID)
for third-party DRA drivers to provide common logic for the standardized device attributeresource.kubernetes.io/pcieRoot
. (#132296, @everpeace) -
Kube-apiserver reported the last configuration hash as a label in
apiserver_authentication_config_controller_last_config_info
metric after successfully loading the authentication configuration file.apiserver_authorization_config_controller_last_config_info
metric after successfully loading the authorization configuration file.apiserver_encryption_config_controller_last_config_info
metric after successfully loading the encryption configuration file. (#132299, @aramase) [SIG API Machinery, Auth and Testing]
-
Kube-apiserver: Each unique set of etcd server overrides specified with
--etcd-servers-overrides
surfaced health checks namedetcd-override-<index>
andetcd-override-readiness-<index>
. These checks were still excluded by the?exclude=etcd
and?exclude=etcd-readiness
directives. (#129438, @pacoxu) [SIG API Machinery and Testing] -
Kube-apiserver: Previously persisted
CustomResourceDefinition
objects with an invalid whitespace-onlycaBundle
could serve requests that did not require conversion. (#132514, @tiffanny29631) -
Kube-apiserver: Promoted the
ExternalServiceAccountTokenSigner
feature to beta, which enabled external signing of service account tokens and fetching of public verifying keys. This was accomplished by enabling the betaExternalServiceAccountTokenSigner
feature gate and specifying the--service-account-signing-endpoint
flag. The flag value could either be the path to a Unix domain socket on the filesystem, or be prefixed with @ to indicate a Unix domain socket in the abstract namespace. (#131300, @HarshalNeelkamal) [SIG API Machinery, Auth and Testing] -
Kube-proxy: Checked whether IPv6 was available on Linux before using it. (#131265, @rikatz)
-
Kubeadm: Added support for ECDSA-P384 as an encryption algorithm type in v1beta4. (#131677, @lalitc375)
-
Kubeadm: Fixed an issue where etcd member promotion failed with an error indicating the member was already promoted. (#130782, @BernardMC)
-
Kubeadm: graduated the
NodeLocalCRISocket
feature gate to beta and enabed it by default. When its enabled, kubeadm will:- Generate a
/var/lib/kubelet/instance-config.yaml
file to customize thecontainerRuntimeEndpoint
field in per-node kubelet configurations. - Remove the
kubeadm.alpha.kubernetes.io/cri-socket
annotation from nodes during upgrade operations. - Remove the
--container-runtime-endpoint
flag from the/var/lib/kubelet/kubeadm-flags.env
file during upgrades. (#131981, @HirazawaUi) [SIG Cluster Lifecycle]
- Generate a
-
Kubeadm: graduated the kubeadm specific feature gate
WaitForAllControlPlaneComponents
to GA. The feature gate is was locked to always be enabled and on node initialization kubeadm performed a health check for all control plane components and not only thekube-apiserver
. (#132594, @neolit123) -
Kubeadm: switched the validation check for Linux kernel version to throw warnings instead of errors. (#131919, @neolit123) [SIG Cluster Lifecycle and Node]
-
Kubelet detected terminal CSI volume mount failures due to exceeded attachment limits on the node and marked the Stateful Pod as Failed, allowing its controller to recreate it. This prevented Pods from getting stuck indefinitely in the
ContainerCreating
state. (#132933, @torredil) [SIG Apps, Node, Storage and Testing] -
Kubelet reported a hash of the credential provider configuration via the
kubelet_credential_provider_config_info
metric. The hash was exposed in thehash
label. (#133016, @aramase) [SIG API Machinery and Auth] -
Kubelet: Extended the
--image-credential-provider-config
flag to accept a directory path in addition to a single file. When a directory was specified, all .json, .yaml, and .yml files in that directory were loaded and merged in lexicographical order. (#131658, @dims) [SIG Auth and Node] -
LeaseLocks could now have custom labels that different holders would overwrite when they became the holder of the underlying lease. (#131632, @DerekFrank)
-
Memory limits could be decreased with a
NotRequired
resize restart policy. When decreasing memory limits,a best-effort check was performed to prevent limits from decreasing below usage and triggering an OOM-kill. (#133012, @tallclair) [SIG Apps, Node and Testing] -
Migrated validation in
CertificateSigningRequest
to use declarative validation. When theDeclarativeValidation
feature gate is enabled, mismatches with existing validation are reported via metrics. IfDeclarativeValidationTakeover
is enabled, declarative validation becomes the primary source of errors for migrated fields. (#132361, @yongruilin) [SIG API Machinery and Auth] -
Moved Recover from volume expansion failure to GA. (#132662, @gnufied) [SIG Apps, Auth, Node, Storage and Testing]
-
Prevented any type of CPU/Memory alignment or hint generation with the Topology Manager from the CPU or Memory Manager when pod-level resources were used in the Pod spec. (#133279, @ffromani) [SIG Node and Testing]
-
Promoted Linux node pressure stall information (PSI) metrics to beta. (#132822, @roycaihw) [SIG Node]
-
Promoted Windows graceful shutdown feature from alpha to beta. (#133062, @zylxjtu)
-
Promoted the Ordered Namespace Deletion test to Conformance. (#132219, @BenTheElder) [SIG API Machinery, Architecture and Testing]
-
Promoted the
KubeletPodResourcesDynamicResources
andKubeletPodResourcesGet
feature gates to beta, which were enabled by default if DRA went to GA. (#132940, @guptaNswati) -
Promoted the feature
OrderedNamespaceDeletion
to GA. (#131514, @cici37) [SIG API Machinery and Testing] -
Removed "endpoint-controller" and "workload-leader-election" FlowSchemas from the default APF configuration.
migrate the lock type used in the leader election in your workloads from configmapsleases/endpointsleases to leases. (#131215, @tosi3k) [SIG API Machinery, Apps, Network, Scalability and Scheduling]
-
Started recording metrics for in-place Pod resize. (#132903, @natasha41575)
-
The Kubernetes API server merged selectors built from
matchLabelKeys
into thelabelSelector
oftopologySpreadConstraints
, aligning Pod Topology Spread behavior with Inter-Pod Affinity. To prevent breaking existing Pods usingmatchLabelKeys
, this scheduler behavior was preserved until v1.34. Upgrades from v1.32 to v1.34 should be done incrementally (v1.32 → v1.33 → v1.34), ensuring Pods created at v1.32 withmatchLabelKeys
are scheduled before reaching v1.34. Controllers relying onmatchLabelKeys
no longer need to handle them directly and can uselabelSelector
instead. The new feature gateMatchLabelKeysInPodTopologySpreadSelectorMerge
, enabled by default, controls this behavior. (#129874, @mochizuki875) [SIG Apps, Node, Scheduling and Testing] -
The PreferSameTrafficDistribution feature gate is now enabled by default, enabling the
PreferSameNode
traffic distribution value for Services. (#132127, @danwinship) [SIG Apps and Network] -
The new
dra_resource_claims_in_use
kubelet metrics reported activeResourceClaims
, overall and by driver. (#131641, @pohly) [SIG Architecture, Instrumentation, Node and Testing] -
The scheduler no longer cleared the
nominatedNodeName
field for Pods. External components, such as Cluster Autoscaler and Karpenter, were responsible for managing this field when needed. (#133276, @macsko) [SIG Scheduling and Testing] -
The validation in the CertificateSigningRequest
/status
and/approval
subresources was migrated to declarative validation. If theDeclarativeValidation
feature gate was enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeover
feature gate was enabled, declarative validation was the primary source of errors for migrated fields. (#133068, @yongruilin) [SIG API Machinery and Auth] -
Updated
kube-controller-manager
events to support contextual logging. (#128351, @mengjiao-liu) -
Updated pause version to
registry.k8s.io/pause:3.10.1
. (#130713, @ArkaSaha30) [SIG Cluster Lifecycle, Node, Scheduling and Testing] -
Updated the Kubernetes build environment to use Go
1.24.5
. (#132896, @cpanato) [SIG Release and Testing] -
Updated the built in
system:monitoring
role with permission to access kubelet metrics endpoints. (#132178, @gavinkflam) [SIG Auth] -
When
RelaxedServiceNameValidation
feature gate is enabled, the names of new Services names are validation withNameIsDNSLabel()
, relaxing the pre-existing validation. (#132339, @adrianmoisey) [SIG Apps, Network and Testing] -
When proxying to an aggregated API server, kube-apiserver used the
EndpointSlices
of theservice
indicated by theAPIServer
, rather than using Endpoints.If you were using the aggregated API server feature, and you were writing out the endpoints for it by hand (rather than letting kube-controller-manager generate
Endpoints
andEndpointSlices
for it automatically based on the Service definition), then you should write out an EndpointSlice object rather than (or in addition to) anEndpoints
object. (#129837, @danwinship) [SIG API Machinery, Network and Testing] -
Whenever a pod was successfully bound to a node, the kube-apiserver cleared the pod's
nominatedNodeName
field. This prevented stale information from affecting external scheduling components. (#132443, @utam0k) [SIG Apps, Node, Scheduling and Testing] -
DRAPrioritizedList
was turned on by default which made it possible to provide a prioritized list of subrequests in aResourceClaim
. (#132767, @mortent) [SIG Node, Scheduling and Testing] -
PodLifecycleSleepAction
was graduated to GA. (#132595, @AxeZhan) [SIG Apps, Node and Testing] -
kube-controller-manager
reported the following metrics forResourceClaims
with admin access:resourceclaim_controller_creates_total
count metric with labelsadmin_access
(true or false),status
(failure or success) to track the total number ofResourceClaims
creation requestsresourceclaim_controller_resource_claims
gauge metric with labelsadmin_access
(true or false),allocated
(true or false) to track the current number ofResourceClaims
. (#132800, @ritazh) [SIG Apps, Auth, Instrumentation and Node]
-
kubeadm
: Started using a named portprobe-port
for all probes in the static pod manifests generated bykubeadm
for thekube-apiserver
,kube-controller-manager
,kube-scheduler
, and related components. If probe port values were previously patched usingkubeadm
patches, the corresponding named port under the container’sports
field must now also be patched. (#132776, @neolit123)
Failing Test
- DRA driver helper: Fixed handling of apiserver restart when running on a Kubernetes version which did not support the
resource.k8s.io
version used by the DRA driver. (#133076, @pohly) [SIG Node and Testing] - Fixed e2e test "[Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits" not to leak Pods and namespaces. (#132674, @jsafrane) [SIG Storage and Testing]
- Kube-apiserver: The --service-account-signing-endpoint flag now only validates the format of abstract socket names (#131509, @liggitt) [SIG API Machinery and Auth]
Bug or Regression
- Added
podSpec
validation for creatingStatefulSet
. (#131790, @chengjoey) [SIG Apps, Etcd and Testing] - Checked for newer resize fields when deciding the recovery feature status in the kubelet. (#131418, @gnufied)
- Clarified help message of
--ignore-not-found
flag. Supported--ignore-not-found
inwatch
operation. (#132542, @gemmahou) - DRA drivers: the resource slice controller sometimes didn't react properly when kubelet or someone else deleted a recently created ResourceSlice. It incorrectly assumed that the ResourceSlice still exists and didn't recreate it. (#132683, @pohly) [SIG Apps, Node and Testing]
- DRA: Ensured that ResourceClaims requesting a fixed number of devices with
adminAccess
were no longer allocated the same device multiple times. (#131299, @nojnhuh) - Disabled reading of disk geometry before calling expansion for ext and xfs filesystems. (#131568, @gnufied)
- Ensured objects are transformed prior to storage in
SharedInformers
if a transformer is provided andWatchList
is activated. (#131799, @valerian-roche) - Fixed API response for
StorageClassList
queries to return a graceful error message, if the providedResourceVersion
is too large. (#132374, @PatrickLaabs) [SIG API Machinery and Etcd] - Fixed ReplicationController reconciliation when the
DeploymentReplicaSetTerminatingReplicas
feature gate was enabled. (#131822, @atiratree) - Fixed a bug in CEL's common.UnstructuredToVal where
==
evaluates to false for identical objects when a field is present but the value is null. This bug does not impact the Kubernetes API. (#131559, @jpbetz) [SIG API Machinery] - Fixed a bug in the Job controller that could result in creating unnecessary Pods for Jobs already marked as finished (either successful or failed). (#130333, @kmala) [SIG Apps and Testing]
- Fixed a bug that caused an unexpected delay in creating Pods for newly created Jobs. (#132109, @linxiulei) [SIG Apps and Testing]
- Fixed a bug that caused duplicate validation when updating a ReplicaSet. (#131873, @gavinkflam) [SIG Apps]
- Fixed a bug that fails to create a replica set when a deployment name is too long. (#132560, @hdp617) [SIG API Machinery and Apps]
- Fixed a bug that the async preemption feature keeps preemptor pods unnecessarily in the queue. (#133167, @sanposhiho) [SIG Scheduling]
- Fixed a panic issue related to kubectl revision history kubernetes/kubectl#1724 (#130503, @tahacodes) [SIG CLI]
- Fixed a possible deadlock in the watch client that could happen if the watch was not stopped. (#131266, @karlkfi) [SIG API Machinery]
- Fixed a regression introduced in 1.33 where some paginated LIST calls fell back to
etcd
instead of being served from cache. (#132244, @hakuna-matatah) - Fixed an incorrect reference to
JoinConfigurationKind
in the error message when no ResetConfiguration is found duringkubeadm reset
with the--config
flag. (#132258, @J3m3) [SIG Cluster Lifecycle] - Fixed an issue that allowed Custom Resources to be created using Server-Side Apply even when their
CustomResourceDefinition
was terminating. (#132467, @sdowell) - Fixed an issue where Windows kube-proxy’s
ModifyLoadBalancer
API updates did not match the HNS state in version 15.4. Support forModifyLoadBalancer
policy began with Kubernetes 1.31+. (#131506, @princepereira) - Fixed an issue where
insufficientResources
was logged as a pointer during pod preemption, making logs more readable. (#132183, @chrisy-x) [SIG Node] - Fixed an issue where the kubelet token cache returned stale tokens when service accounts were recreated with the same name. The cache is now UID-aware. Additionally, the new
TokenRequestServiceAccountUIDValidation
feature gate (Beta, enabled by default) ensures theTokenRequest
UID matches the service account UID when set. (#132803, @aramase) [SIG API Machinery, Auth, Node and Testing] - Fixed bug that prevented the alpha feature
PodTopologyLabelAdmission
from working due to checking for the incorrect label key when copying topology labels. This bug delayed the graduation of the feature to beta by an additional release to allow time for meaningful feedback. (#132462, @munnerz) - Fixed incorrect behavior for AllocationMode: All in ResourceClaim when used in subrequests. (#131660, @mortent) [SIG Node]
- Fixed misleading response codes in admission control metrics. (#132165, @gavinkflam) [SIG API Machinery, Architecture and Instrumentation]
- Fixed runtime cost estimation for
x-int-or-string
custom resource schemas with maximum lengths. (#132837, @JoelSpeed) - Fixed the
allocatedResourceStatuses
field name mismatch in PVC status validation. (#131213, @carlory) - Fixed the
observedGeneration
field in pod resize conditions to accurately reflect the associated pod generation when bothInPlacePodVerticalScaling
andPodObservedGenerationTracking
feature gates are enabled. (#131157, @natasha41575) - Fixed the bug when swap related metrics were not available in
/metrics/resource
endpoint. (#132065, @yuanwang04) [SIG Node and Testing] - Fixed the problem of validation error when specifying resource requirements at the container level for a resource not supported at the pod level. It implicitly interpreted the pod-level value as 0. (#132551, @chao-liang) [SIG Apps]
- Fixed validation for Job with
suspend=true
, andcompletions=0
to set the Complete condition. (#132614, @mimowo) [SIG Apps and Testing] - HPA status displayed memory metrics using Ki. (#132351, @googs1025) [SIG Apps and Autoscaling]
- Improved the error message shown when a Pod using user namespaces was created on a runtime that did not support user namespaces. (#131623, @rata)
- Kube-apiserver: Defaulted empty
spec.jobTemplate.spec.podFailurePolicy.rules[*].onPodConditions[*].status
fields for CronJob objects as documented, avoiding validation failures during write requests. (#131525, @carlory) - Kube-apiserver: Fixed OIDC discovery document publishing when external service account token signing was enabled. (#131493, @hoskeri) [SIG API Machinery, Auth and Testing]
- Kube-proxy: Removed the iptables CLI wait interval flag. (#131961, @cyclinder)
- Kube-scheduler: in Kubernetes 1.33, the number of devices that can be allocated per ResourceClaim was accidentally reduced to 16. Now the supported number of devices per ResourceClaim is 32 again. (#131662, @mortent) [SIG Node]
- Kubeadm: Fixed a bug where the default args for etcd were not correct when a local etcd image was used and the etcd version was less than 3.6.0. (#133023, @carlory)
- Kubelet: Closed a loophole that allowed static Pods to reference arbitrary ResourceClaims. Even though these Pods failed to run due to a sanity check, such references are now explicitly disallowed. (#131844, @pohly) [SIG Apps, Auth and Node]
- Kubelet: Fixed a bug that caused an unexpected
NodeResizeError
condition to appear in the PVC status when the CSI driver did not support node volume expansion and the PVC had theReadWriteMany
access mode. (#131495, @carlory) - Modified the node-local
podresources
API endpoint to consider only active pods. Since this changes long-standing behavior, theKubeletPodResourcesListUseActivePods
feature gate (enabled by default) can be disabled to restore the previous behavior. Users encountering regressions are encouraged to file an issue if they rely on the old behavior. (#132028, @ffromani) [SIG Node and Testing] - Pods were not allowed to mix the usage of
user-namespaces
(hostUsers: false
) andvolumeDevices
. Kubernetes returned an error in this case. (#132868, @rata) - Reduced the 5s delay before tainting
node.kubernetes.io/unreachable:NoExecute
when a Node became unreachable. (#120816, @tnqn) [SIG Apps and Node] - Removed defunct
make vet
target, please usemake lint
instead (#132509, @yongruilin) [SIG Testing] - Removed the deprecated flag
--wait-interval
for theip6tables-legacy-restore
binary. (#132352, @PatrickLaabs) - ReplicaSets and Deployments should always count
.status.availableReplicas
at the correct time without a delay. This results in faster reconciliation of Deployment conditions and faster, unblocked Deployment rollouts. (#132121, @atiratree) [SIG Apps] - Resolved a bug where DaemonSet updates unnecessarily triggered duplicate validation due to overlapping calls to
ValidateDaemonSet
and ValidateDaemonSetUpdate. This redundancy has been removed to prevent repeated validation runs. (#132548, @gavinkflam) - Skipped pod backoff entirely when the
PodMaxBackoffDuration
kube-scheduler option was set to zero and theSchedulerPopFromBackoffQ
feature gate was enabled. (#131965, @macsko) - Stopped expanding PVCs annotated with node-expand-not-required. (#131907, @gnufied) [SIG API Machinery, Etcd, Node, Storage and Testing]
- Stopped expanding the volume on the node if controller-side expansion was already completed. (#131868, @gnufied)
- Stopped logging error events when waiting for expansion on the kubelet. (#131408, @gnufied)
- Stopped removing the CSI JSON file if the volume was already mounted during subsequent errors. (#131311, @gnufied)
- The
baseline
andrestricted
pod security admission levels blocked setting thehost
field on probe and lifecycle handlers. (#125271, @tssurya) [SIG Auth, Node and Testing] - The garbage collection controller no longer raced with changes to
ownerReferences
when deleting orphaned objects. (#132632, @sdowell) [SIG API Machinery and Apps] - The shorthand for --output flag in kubectl explain was accidentally deleted, but has been added back. (#131962, @superbrothers) [SIG CLI]
- Updated Windows
kube-proxy
to align with Linux behavior by correctly honoring the port specified inEndpointSlice
for internal traffic routing. (#132647, @princepereira) [SIG Network and Windows] - Updated
kube-proxy
withnftables
to reject or drop traffic to services with no endpoints from filter chains at priority 0 (NF_IP_PRI_FILTER
). (#132456, @aroradaman) - Updated
kubectl get job
to display theSuccessCriteriaMet
status for listed jobs. (#132832, @Goend) [SIG Apps and CLI] - Updated the HPA controller so that it no longer emitted a
FailedRescale
event if a scale operation initially failed due to a conflict but succeeded after a retry; it now emitted aSuccessfulRescale
event in this case. AFailedRescale
event was still emitted if all retries were exhausted. (#132007, @AumPatel1) [SIG Apps and Autoscaling] Statefulset
respectedminReadySeconds
. (#130909, @Edwinhr716)kubectl create|delete|get|replace --raw
commands now honored the server root paths specified in the kubeconfig file. (#131165, @liggitt)
Other (Cleanup or Flake)
- Added a warning to
kubectl attach
, notifying / reminding users that commands and output are available via thelog
subresource of that Pod. (#127183, @mochizuki875) [SIG Auth, CLI, Node and Security] - Added support for encoding and decoding types that implement the standard library interfaces
json.Marshaler
,json.Unmarshaler
,encoding.TextMarshaler
, orencoding.TextUnmarshaler
to and from CBOR by transcoding. (#132935, @benluddy) - Bumped kube-dns to v1.26.4. (#132012, @pacoxu)
- Bumped the cel-go dependency to v0.25.0. The changeset is available at: https://github.com/google/cel-go/compare/v0.23.2...v0.25.0. (#131444, @erdii) [SIG API Machinery, Auth, Cloud Provider and Node]
- By default, binaries like kube-apiserver were built with the
grpcnotrace
tag enabled. Used theDBG
flag to enable Golang tracing if needed. (#132210, @dims) - Changed Job controller to use the controller UID index for Pod lookups to improve performance. (#132305, @xigang)
- Changed apiserver to treat failures decoding a mutating webhook patch as failures to call the webhook so they trigger the webhook failurePolicy and count against metrics like
webhook_fail_open_count
(#131627, @dims) [SIG API Machinery] - Crane digest gcr.io/k8s-staging-e2e-test-images/agnhost:2.56 (#132117, @yashsingh74) [SIG Network and Testing]
- DRA kubelet- Updated logging to use
driverName
instead ofpluginName
, aligning with the rest of the Kubernetes components. (#132096, @pohly) [SIG Node and Testing] - DRA kubelet: Simplified recovery from mistakes like scheduling a Pod onto a node where the required driver was not running, as the kubelet no longer unnecessarily blocked Pod deletion. (#131968, @pohly) [SIG Node and Testing]
- Fixed some missing white spaces in the flag descriptions and logs. (#131562, @logica0419) [SIG Network]
- Hack/update-codegen.sh now automatically ensured goimports and protoc. (#131459, @BenTheElder)
- Increased test coverage for kubelet package to 92.3%. (#132484, @ylink-lfs)
- Kube-apiserver: removed the deprecated
apiserver_encryption_config_controller_automatic_reload_success_total
andapiserver_encryption_config_controller_automatic_reload_failure_total
metrics in favor ofapiserver_encryption_config_controller_automatic_reloads_total
. (#132238, @aramase) [SIG API Machinery, Auth and Testing] - Kube-scheduler: removed the deprecated scheduler_scheduler_cache_size metric in favor of scheduler_cache_size (#131425, @carlory) [SIG Scheduling]
- Kubeadm: fixed missing space when printing the warning about pause image mismatch. (#131563, @logica0419) [SIG Cluster Lifecycle]
- Kubeadm: made the coredns deployment manifest use named ports consistently for the liveness and readiness probes. (#131587, @neolit123) [SIG Cluster Lifecycle]
- Kubectl interactive delete: treat empty newline input as N (#132251, @ardaguclu) [SIG CLI]
- Masked access to Linux thermal interrupt information exposed via
/proc
and/sys
. (#131018, @saschagrunert) - Migrated Memory Manager to contextual logging. (#130727, @swatisehgal)
- Migrated
pkg/kubelet/status
to use contextual logging. (#130852, @Chulong-Li) - Migrated
pkg/kubelet/volumemanager
to contextual logging. (#131306, @Chulong-Li) - Migrated
pkg/kubelet/winstats
to contextual logging. (#131001, @Chulong-Li) - NONW (#132890, @atiratree) [SIG Apps]
- Promoted the
SeparateTaintEvictionController
feature gate to GA; it is now enabled unconditionally. (#122634, @carlory) [SIG API Machinery, Apps, Node and Testing] - Promoted the
apiserver_authentication_config_controller_automatic_reloads_total
andapiserver_authentication_config_controller_automatic_reload_last_timestamp_seconds
metrics to BETA. (#131798, @aramase) [SIG API Machinery, Auth and Instrumentation] - Promoted the
apiserver_authorization_config_controller_automatic_reloads_total
andapiserver_authorization_config_controller_automatic_reload_last_timestamp_seconds
metrics to BETA. (#131768, @aramase) [SIG API Machinery, Auth and Instrumentation] - Promoted two
EndpointSlice
tests to conformance to ensure that service proxy implementations rely onEndpointSlices
instead ofEndpoints
. (#132019, @danwinship) [SIG Architecture, Network and Testing] - Reduced excessive logging in the Volume Binding scheduler plugin by lowering the verbosity of high-frequency messages from
V(4)
toV(5)
. (#132840, @ppmechlinski) [SIG Autoscaling, Scheduling and Storage] - Removed deprecated gogo protocol definitions from
k8s.io/externaljwt
in favor ofgoogle.golang.org/protobuf
. (#132772, @saschagrunert) [SIG Auth] - Removed deprecated gogo protocol definitions from
k8s.io/kms/apis
in favor ofgoogle.golang.org/protobuf
. (#132833, @saschagrunert) [SIG API Machinery, Auth and Testing] - Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/deviceplugin
in favor ofgoogle.golang.org/protobuf
. (#133028, @saschagrunert) [SIG Node and Testing] - Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/podresources
in favor ofgoogle.golang.org/protobuf
. (#133027, @saschagrunert) [SIG Node and Testing] - Removed general available feature-gate
DevicePluginCDIDevices
. (#132083, @carlory) [SIG Node and Testing] - Removed generally available feature-gate
PodDisruptionConditions
. (#129501, @carlory) [SIG Apps] - Removed support for API streaming from the REST client. (#132285, @p0lyn0mial)
- Removed support for API streaming from the
List()
method of the typed client. (#132257, @p0lyn0mial) [SIG API Machinery and Testing] - Removed support for API streaming from the dynamic client’s
List() method
. (#132229, @p0lyn0mial) [SIG API Machinery, CLI and Testing] - Removed support for API streaming from the metadata client’s
List() method
. (#132149, @p0lyn0mial) [SIG API Machinery and Testing] - Removed the
kubernetes.io/initial-events-list-blueprint
annotation from the synthetic "Bookmark" event in watch stream requests. (#132326, @p0lyn0mial) - Removed the deprecated
--register-schedulable
command line argument from the kubelet. (#122384, @carlory) [SIG Cloud Provider, Node and Scalability] - Replaced
toPtr
helper functions with the "k8s.io/utils/ptr" implementations. (#132806, @PatrickLaabs) [SIG Apps, Testing and Windows] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for ./test/e2e and ./test/utils. (#132763, @PatrickLaabs) [SIG Autoscaling and Testing] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for ./test/e2e. (#132764, @PatrickLaabs) [SIG Auth, Network, Node, Storage and Testing] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for ./test/e2e. (#132765, @PatrickLaabs) [SIG API Machinery, Apps, CLI and Testing] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for ./test/integration. (#132762, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for apiextensions apiservers validation tests. (#132726, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for apiextensions-apiserver pkg/controller. (#132724, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for apiextensions-apiserver pkg/registry. (#132725, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for pkg/apis (1/2). (#132778, @PatrickLaabs) [SIG Apps and Network] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for pkg/apis (2/2). (#132779, @PatrickLaabs) [SIG Apps, Auth and Storage] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for pkg/controller (1/2). (#132781, @PatrickLaabs) [SIG API Machinery, Apps and Network] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for pkg/controller (2/2). (#132784, @PatrickLaabs) [SIG API Machinery, Apps, Network, Node and Storage] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for pod-security-admission tests. (#132741, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the apiextensions-apiservers integration tests. (#132721, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the apiserver (2/2). (#132752, @PatrickLaabs) [SIG API Machinery and Auth] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the cli-runtime. (#132750, @PatrickLaabs) [SIG CLI and Release] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the cloud-provider. (#132720, @PatrickLaabs) [SIG Cloud Provider and Network] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the components-helper of the apimachinery. (#132413, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the controller-manager. (#132753, @PatrickLaabs) [SIG API Machinery and Cloud Provider] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the csr. (#132699, @PatrickLaabs) [SIG API Machinery and Auth] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the e2e_node. (#132755, @PatrickLaabs) [SIG Node and Testing] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the kubeapiserver. (#132529, @PatrickLaabs) [SIG API Machinery and Architecture] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the pkg/security and plugin/pkg. (#132777, @PatrickLaabs) [SIG Auth, Node and Release] - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the pod-security-admission admissiontests. (#132742, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the pod-security-admission policy. (#132743, @PatrickLaabs) - Replaced deprecated package
k8s.io/utils/pointer
withk8s.io/utils/ptr
for the reflector. (#132698, @PatrickLaabs) - Replaced timer ptr helper function with the
k8s.io/utils/ptr
implementations. (#133030, @PatrickLaabs) [SIG API Machinery and Auth] - The deprecated
LegacySidecarContainers
feature gate was completely removed. (#131463, @gjkim42) [SIG Node and Testing] - Types: Code and Status moved from pkg/scheduler/framework to staging repo.
Users should update import path for these types from
k8s.io/kubernetes/pkg/scheduler/framework
tok8s.io/kube-scheduler/framework
. (#132087, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing] - Types: CycleState, StateData, StateKey and ErrNotFound moved from pkg/scheduler/framework to k8s.io/kube-scheduler/framework. Type CycleState that is passed to each plugin in scheduler framework is changed to the new interface CycleState (in k8s.io/kube-scheduler/framework) (#131887, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]
- Types:
ClusterEvent
,ActionType
,EventResource
,ClusterEventWithHint
,QueueingHint
andQueueingHintFn
moved frompkg/scheduler/framework
tok8s.io/kube-scheduler/framework
. (#132190, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing] - Types:
NodeInfo
,PodInfo
,QueuedPodInfo
,PodResource
,AffinityTerm
,WeightedAffinityTerm
,Resource
,ImageStateSummary
,ProtocolPort
andHostPortInfo
were moved frompkg/scheduler/framework
to staging repo. Users should update import path for these types fromk8s.io/kubernetes/pkg/scheduler/framework
tok8s.io/kube-scheduler/framework
and update use of fields (to use getter/setter functions instead) where needed. (#132457, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing] - Updated CNI plugins to v1.7.1 (#131602, @adrianmoisey) [SIG Cloud Provider, Node and Testing]
- Updated
conntrack
reconciler to consider a Service’s target port during cleanup of stale flow entries. (#130542, @aroradaman) - Updated
kubeadm
to use theInitialCorruptCheck=true
etcd feature gate instead of the deprecated--experimental-initial-corrupt-check
flag. Also replaced the use of--experimental-watch-progress-notify-interval
with its graduated counterpart--watch-progress-notify-interval
. (#132838, @AwesomePatrol) - Updated cri-tools to v1.33.0. (#131406, @saschagrunert) [SIG Cloud Provider]
- Updated etcd version to v3.6.1. (#132284, @ArkaSaha30) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing]
- Updated the etcd client library to v3.6.4. (#133226, @ivanvc) [SIG API Machinery, Auth, Cloud Provider and Node]
- Upgraded CoreDNS to v1.12.1. (#131151, @yashsingh74) [SIG Cloud Provider and Cluster Lifecycle]
- Upgraded functionality of
kubectl kustomize
as described at https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize%2Fv5.7.0. (#132593, @koba1t) - Validated APIVersion fields of the
HorizontalPodAutoscaler
to ensure that API objects were created and functioned properly. (#132537, @lalitc375) [SIG Etcd and Testing]
Dependencies
Added
- buf.build/gen/go/bufbuild/protovalidate/protocolbuffers/go: 63bb56e
- github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp: v1.26.0
- github.com/bufbuild/protovalidate-go: v0.9.1
- github.com/envoyproxy/go-control-plane/envoy: v1.32.4
- github.com/envoyproxy/go-control-plane/ratelimit: v0.1.0
- github.com/go-jose/go-jose/v4: v4.0.4
- github.com/golang-jwt/jwt/v5: v5.2.2
- github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus: v1.0.1
- github.com/grpc-ecosystem/go-grpc-middleware/v2: v2.3.0
- github.com/spiffe/go-spiffe/v2: v2.5.0
- github.com/zeebo/errs: v1.4.0
- go.etcd.io/raft/v3: v3.6.0
- go.opentelemetry.io/contrib/detectors/gcp: v1.34.0
- go.opentelemetry.io/otel/sdk/metric: v1.34.0
- go.yaml.in/yaml/v2: v2.4.2
- go.yaml.in/yaml/v3: v3.0.4
- sigs.k8s.io/structured-merge-diff/v6: v6.3.0
Changed
- cel.dev/expr: v0.19.1 → v0.24.0
- cloud.google.com/go/compute/metadata: v0.5.0 → v0.6.0
- github.com/Microsoft/hnslib: v0.0.8 → v0.1.1
- github.com/cncf/xds/go: b4127c9 → 2f00578
- github.com/coredns/corefile-migration: v1.0.25 → v1.0.26
- github.com/cpuguy83/go-md2man/v2: v2.0.4 → v2.0.6
- github.com/emicklei/go-restful/v3: v3.11.0 → v3.12.2
- github.com/envoyproxy/go-control-plane: v0.13.0 → v0.13.4
- github.com/envoyproxy/protoc-gen-validate: v1.1.0 → v1.2.1
- github.com/fsnotify/fsnotify: v1.7.0 → v1.9.0
- github.com/fxamacker/cbor/v2: v2.7.0 → v2.9.0
- github.com/golang/glog: v1.2.2 → v1.2.4
- github.com/google/cel-go: v0.23.2 → v0.26.0
- github.com/google/gnostic-models: v0.6.9 → v0.7.0
- github.com/grpc-ecosystem/grpc-gateway/v2: v2.24.0 → v2.26.3
- github.com/ishidawataru/sctp: 7ff4192 → ae8eb7f
- github.com/jonboulle/clockwork: v0.4.0 → v0.5.0
- github.com/modern-go/reflect2: v1.0.2 → 35a7c28
- github.com/spf13/cobra: v1.8.1 → v1.9.1
- github.com/spf13/pflag: v1.0.5 → v1.0.6
- github.com/vishvananda/netlink: 62fb240 → v1.3.1
- github.com/vishvananda/netns: v0.0.4 → v0.0.5
- go.etcd.io/bbolt: v1.3.11 → v1.4.2
- go.etcd.io/etcd/api/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/client/pkg/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/client/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/pkg/v3: v3.5.21 → v3.6.4
- go.etcd.io/etcd/server/v3: v3.5.21 → v3.6.4
- go.etcd.io/gofail: v0.1.0 → v0.2.0
- go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful: v0.42.0 → v0.44.0
- go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc: v0.58.0 → v0.60.0
- go.opentelemetry.io/contrib/propagators/b3: v1.17.0 → v1.19.0
- go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/exporters/otlp/otlptrace: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/metric: v1.33.0 → v1.35.0
- go.opentelemetry.io/otel/sdk: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/trace: v1.33.0 → v1.35.0
- go.opentelemetry.io/otel: v1.33.0 → v1.35.0
- go.opentelemetry.io/proto/otlp: v1.4.0 → v1.5.0
- google.golang.org/genproto/googleapis/api: e6fa225 → a0af3ef
- google.golang.org/genproto/googleapis/rpc: e6fa225 → a0af3ef
- google.golang.org/grpc: v1.68.1 → v1.72.1
- k8s.io/gengo/v2: 1244d31 → 85fd79d
- k8s.io/kube-openapi: c8a335a → f3f2b99
- k8s.io/system-validators: v1.9.1 → v1.10.1
- k8s.io/utils: 3ea5e8c → 4c0f3b2
- sigs.k8s.io/json: 9aa6b5e → cfa47c3
- sigs.k8s.io/kustomize/api: v0.19.0 → v0.20.1
- sigs.k8s.io/kustomize/cmd/config: v0.19.0 → v0.20.1
- sigs.k8s.io/kustomize/kustomize/v5: v5.6.0 → v5.7.1
- sigs.k8s.io/kustomize/kyaml: v0.19.0 → v0.20.1
- sigs.k8s.io/yaml: v1.4.0 → v1.6.0
Removed
- cloud.google.com/go/accessapproval: v1.7.4
- cloud.google.com/go/accesscontextmanager: v1.8.4
- cloud.google.com/go/aiplatform: v1.58.0
- cloud.google.com/go/analytics: v0.22.0
- cloud.google.com/go/apigateway: v1.6.4
- cloud.google.com/go/apigeeconnect: v1.6.4
- cloud.google.com/go/apigeeregistry: v0.8.2
- cloud.google.com/go/appengine: v1.8.4
- cloud.google.com/go/area120: v0.8.4
- cloud.google.com/go/artifactregistry: v1.14.6
- cloud.google.com/go/asset: v1.17.0
- cloud.google.com/go/assuredworkloads: v1.11.4
- cloud.google.com/go/automl: v1.13.4
- cloud.google.com/go/baremetalsolution: v1.2.3
- cloud.google.com/go/batch: v1.7.0
- cloud.google.com/go/beyondcorp: v1.0.3
- cloud.google.com/go/bigquery: v1.58.0
- cloud.google.com/go/billing: v1.18.0
- cloud.google.com/go/binaryauthorization: v1.8.0
- cloud.google.com/go/certificatemanager: v1.7.4
- cloud.google.com/go/channel: v1.17.4
- cloud.google.com/go/cloudbuild: v1.15.0
- cloud.google.com/go/clouddms: v1.7.3
- cloud.google.com/go/cloudtasks: v1.12.4
- cloud.google.com/go/compute: v1.23.3
- cloud.google.com/go/contactcenterinsights: v1.12.1
- cloud.google.com/go/container: v1.29.0
- cloud.google.com/go/containeranalysis: v0.11.3
- cloud.google.com/go/datacatalog: v1.19.2
- cloud.google.com/go/dataflow: v0.9.4
- cloud.google.com/go/dataform: v0.9.1
- cloud.google.com/go/datafusion: v1.7.4
- cloud.google.com/go/datalabeling: v0.8.4
- cloud.google.com/go/dataplex: v1.14.0
- cloud.google.com/go/dataproc/v2: v2.3.0
- cloud.google.com/go/dataqna: v0.8.4
- cloud.google.com/go/datastore: v1.15.0
- cloud.google.com/go/datastream: v1.10.3
- cloud.google.com/go/deploy: v1.17.0
- cloud.google.com/go/dialogflow: v1.48.1
- cloud.google.com/go/dlp: v1.11.1
- cloud.google.com/go/documentai: v1.23.7
- cloud.google.com/go/domains: v0.9.4
- cloud.google.com/go/edgecontainer: v1.1.4
- cloud.google.com/go/errorreporting: v0.3.0
- cloud.google.com/go/essentialcontacts: v1.6.5
- cloud.google.com/go/eventarc: v1.13.3
- cloud.google.com/go/filestore: v1.8.0
- cloud.google.com/go/firestore: v1.14.0
- cloud.google.com/go/functions: v1.15.4
- cloud.google.com/go/gkebackup: v1.3.4
- cloud.google.com/go/gkeconnect: v0.8.4
- cloud.google.com/go/gkehub: v0.14.4
- cloud.google.com/go/gkemulticloud: v1.1.0
- cloud.google.com/go/gsuiteaddons: v1.6.4
- cloud.google.com/go/iam: v1.1.5
- cloud.google.com/go/iap: v1.9.3
- cloud.google.com/go/ids: v1.4.4
- cloud.google.com/go/iot: v1.7.4
- cloud.google.com/go/kms: v1.15.5
- cloud.google.com/go/language: v1.12.2
- cloud.google.com/go/lifesciences: v0.9.4
- cloud.google.com/go/logging: v1.9.0
- cloud.google.com/go/longrunning: v0.5.4
- cloud.google.com/go/managedidentities: v1.6.4
- cloud.google.com/go/maps: v1.6.3
- cloud.google.com/go/mediatranslation: v0.8.4
- cloud.google.com/go/memcache: v1.10.4
- cloud.google.com/go/metastore: v1.13.3
- cloud.google.com/go/monitoring: v1.17.0
- cloud.google.com/go/networkconnectivity: v1.14.3
- cloud.google.com/go/networkmanagement: v1.9.3
- cloud.google.com/go/networksecurity: v0.9.4
- cloud.google.com/go/notebooks: v1.11.2
- cloud.google.com/go/optimization: v1.6.2
- cloud.google.com/go/orchestration: v1.8.4
- cloud.google.com/go/orgpolicy: v1.12.0
- cloud.google.com/go/osconfig: v1.12.4
- cloud.google.com/go/oslogin: v1.13.0
- cloud.google.com/go/phishingprotection: v0.8.4
- cloud.google.com/go/policytroubleshooter: v1.10.2
- cloud.google.com/go/privatecatalog: v0.9.4
- cloud.google.com/go/pubsub: v1.34.0
- cloud.google.com/go/pubsublite: v1.8.1
- cloud.google.com/go/recaptchaenterprise/v2: v2.9.0
- cloud.google.com/go/recommendationengine: v0.8.4
- cloud.google.com/go/recommender: v1.12.0
- cloud.google.com/go/redis: v1.14.1
- cloud.google.com/go/resourcemanager: v1.9.4
- cloud.google.com/go/resourcesettings: v1.6.4
- cloud.google.com/go/retail: v1.14.4
- cloud.google.com/go/run: v1.3.3
- cloud.google.com/go/scheduler: v1.10.5
- cloud.google.com/go/secretmanager: v1.11.4
- cloud.google.com/go/security: v1.15.4
- cloud.google.com/go/securitycenter: v1.24.3
- cloud.google.com/go/servicedirectory: v1.11.3
- cloud.google.com/go/shell: v1.7.4
- cloud.google.com/go/spanner: v1.55.0
- cloud.google.com/go/speech: v1.21.0
- cloud.google.com/go/storagetransfer: v1.10.3
- cloud.google.com/go/talent: v1.6.5
- cloud.google.com/go/texttospeech: v1.7.4
- cloud.google.com/go/tpu: v1.6.4
- cloud.google.com/go/trace: v1.10.4
- cloud.google.com/go/translate: v1.10.0
- cloud.google.com/go/video: v1.20.3
- cloud.google.com/go/videointelligence: v1.11.4
- cloud.google.com/go/vision/v2: v2.7.5
- cloud.google.com/go/vmmigration: v1.7.4
- cloud.google.com/go/vmwareengine: v1.0.3
- cloud.google.com/go/vpcaccess: v1.7.4
- cloud.google.com/go/webrisk: v1.9.4
- cloud.google.com/go/websecurityscanner: v1.6.4
- cloud.google.com/go/workflows: v1.12.3
- cloud.google.com/go: v0.112.0
- github.com/BurntSushi/toml: v0.3.1
- github.com/census-instrumentation/opencensus-proto: v0.4.1
- github.com/client9/misspell: v0.3.4
- github.com/cncf/udpa/go: 269d4d4
- github.com/ghodss/yaml: v1.0.0
- github.com/go-kit/kit: v0.9.0
- github.com/go-logfmt/logfmt: v0.4.0
- github.com/go-stack/stack: v1.8.0
- github.com/golang-jwt/jwt/v4: v4.5.2
- github.com/golang/mock: v1.1.1
- github.com/google/shlex: e7afc7f
- github.com/grpc-ecosystem/grpc-gateway: v1.16.0
- github.com/konsorten/go-windows-terminal-sequences: v1.0.1
- github.com/kr/logfmt: b84e30a
- github.com/opentracing/opentracing-go: v1.1.0
- go.etcd.io/etcd/client/v2: v2.305.21
- go.etcd.io/etcd/raft/v3: v3.5.21
- go.uber.org/atomic: v1.7.0
- golang.org/x/lint: d0100b6
- google.golang.org/appengine: v1.4.0
- google.golang.org/genproto: ef43131
- honnef.co/go/tools: ea95bdf
- sigs.k8s.io/structured-merge-diff/v4: v4.6.0
v1.34.0-rc.2
Downloads for v1.34.0-rc.2
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | f7bdadc269da91b2892d45a493bc673bd7a2f309e52d0af00e08c28ec15fd52fecfb0f53e1eb32098a910ca4cb5f4824f50ffa855fd1ca1f8ad4426223633227 |
kubernetes-src.tar.gz | 6272b6ac799dae382779592c890e838ce1c0264a4b300a501ba3952329d177f9b07b9e1ddb2636327d8e95b572ee2da9d08824c6d88d7c3a8342323360b6d1df |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | 453293b8fe62dfea905bb7d6859e684ae46ebd1c32d454e06d424a3adf78f3c05d8e5d3b82fcfac7707ccf55ce05e1936b3808e2190ae33fedf6f58b8300d1e6 |
kubernetes-client-darwin-arm64.tar.gz | 4ac21ca50bf0ace0f876c43658e34715ea49671542db9fad15028b4e49ddd078ddb449f674bd76bfc39d5854bb12864e4811554148381b207582b510ed73ae11 |
kubernetes-client-linux-386.tar.gz | 300a21a090e564290f200203ef276f1829f1cb8a59ea4cfdfc78f5bf08a092d5241d19926f6958c8d5677aba57a2871f20e1764c15d3d223249e741c04666b58 |
kubernetes-client-linux-amd64.tar.gz | d283a216e442eed1664f32cdb5a2cad47011bc5ee49cbfd072a9cfd9f9970e578aed3f90cfebe5a45fc6194fd720ebb035ebb4cb5a151f638899133d88c2a41b |
kubernetes-client-linux-arm.tar.gz | 08e500b65bac726f984fde0f2d3af74ad6d3f2e6c2b58c34b0732503960b715c011f81cfdc9a6ef9f77adbc585f0f5b2b94993dd705a2cde20e9baec3cb11e9f |
kubernetes-client-linux-arm64.tar.gz | 111702bec96f578ef6aaa9f42ba77146d5246f50e5d307275261fcbf9bdb7a569a9963400165659436dfdbed5640ad22cebd8603dcef4de671eed5072919b96c |
kubernetes-client-linux-ppc64le.tar.gz | 98a48f18d9038f4553d1e0cd0e23c19f5e5dfaaabe7d35fcff1cd79340e6c38f0967d9a94c18c3e177790170acc7663bd98a3f6e6b9eeb05ce4d302d7d9bcbee |
kubernetes-client-linux-s390x.tar.gz | b2006580603819b01b9300eaa9bae34133ee3ca2ee86314ca890aba472a81b833bb0ef4e9eb07b46a8ae0074d5b0c9c826129d338720dae63752c0d92736002b |
kubernetes-client-windows-386.tar.gz | ee20616424acf66d0499f1228016324a634da3e53ed2728d33269fb06cafb96b7d2c8585a253ba9b05d43a51ee72a034a73000d3672ba1239b7cf75be9d10089 |
kubernetes-client-windows-amd64.tar.gz | 1f3a69ccac5cd00be47a4e89adfcd4bcbfe203895e98d8cc51282620a414a269891337cead1763ff7160b75b93fe48689d2cfd2467b8872f6e5fdc095fae0660 |
kubernetes-client-windows-arm64.tar.gz | b619d292bc6427328a319c9ffc5e3e22039b89e8a875fa73c8cc2c6c767a066d6b1dd1984178a7035dd2eb38a468089f6259a6ba72506e32ab1249354a2590f0 |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | ec025926ab67e9307763266fbf178b533af679c3e371297dafd204981d1ecc9fd6cff34986a6580b2106d2ddab7f78ad66b1e01b223b612f0847c530922a41b2 |
kubernetes-server-linux-arm64.tar.gz | 0cf717718ed42283e8065d80afa18589dd2cb16f985811f25f8bf27302f4cbe5eb07bd264562a17798678047631584c10cd015c94982a91e7cd971cea8833b27 |
kubernetes-server-linux-ppc64le.tar.gz | d2e91d34fb64832ee3142289adbe61a025de832f5b594e93046b6ec4e3d5c557fd564236e095d7673a243dbfe59cd6d56475d97bc741dfb899c7db9036e8af5a |
kubernetes-server-linux-s390x.tar.gz | f36021108f5e5c9c8223dd1044579c6321fab4567ab6fdbb476ce81791ae5c09672f2121e9156f9166f8fd774a0d8ecddb4915093038ff617d2a0f3014f2a0cf |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | eda824ac2a18a02a655bdf23137c9196698a6688acb97f147f97ee430054a2d93da1ebdd5a75a5862435d311aeb3841e4e6592290831a8cb51da4f99a463777d |
kubernetes-node-linux-arm64.tar.gz | e0bd74348eb3c6d973b9a71c2114e9141eec6dc8448b38669261c7233254ece002e77971dc5de41ddbb1f34f9e2597f9429b0939123de889ee39e9dfee465633 |
kubernetes-node-linux-ppc64le.tar.gz | 737d536c7f3b458fc222e8ff600f3b4d71cb6f832cdea7900f0d0b4ceb473aa018cb6848b69b2c4609fe6a9d2681a666927678d98ce0fb959ad1a54c2bf046ac |
kubernetes-node-linux-s390x.tar.gz | 1a5dee2a9816128069fb3bde1bfec5f07e521425c1daa4b5538a18369850c186cff0a3e2a5f6f29325b83f275de86b26e4b5eea6b70297fb406a5d98eb77c8db |
kubernetes-node-windows-amd64.tar.gz | 51026e3f0ae4820fee2be15bef726deab5f8bc5e1ad33b5ca6f208e453a5bfd4ec161210d0ade1252ef899200b973f547e768d2d48a74b1af1514cdd9902d590 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.34.0-rc.1
Changes by Kind
Feature
Documentation
- Document how to contribute to staging repositories by redirecting to the main kubernetes repo (#133570, @BenTheElder) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage]
Bug or Regression
- Changed the node restrictions to disallow the node to change it's ownerReferences. (#133467, @natherz97) [SIG Auth]
- DRA: fixed a data race which, depending on timing, could have led to broken allocation of devices backing extended resources (#133587, @pohly) [SIG Node]
- Fixes a regression in 1.34 release candidates where object storage count metrics could include all instances of all types instead of only the object count for a particular type (#133604, @serathius) [SIG API Machinery and Etcd]
Dependencies
Added
Nothing has changed.
Changed
Nothing has changed.
Removed
Nothing has changed.
v1.34.0-rc.1
Downloads for v1.34.0-rc.1
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 0685ab08c9f1c9696b66d17c6bb480c5e880b217b4cdd239f5c3884f2bdbf0052544724d9e366e5ce51d86008176bfccf6406b088b0d97336f8e1d436894aea8 |
kubernetes-src.tar.gz | 845873a513e35e3b54c68b578825a47252591558b53781948de660494355e8d3b658a337f2bb096634b47a7f72a6bec2ed02285b1fd08d772d562011f310a8c4 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | b24ab87ffd978869c4b2d20190695225a6cdc827c2db5ca9774dfbdc7d879b57e7474b1fcd006fe8169ed37a020e194a99134aaebd90188c86ce85ffde71b2ab |
kubernetes-client-darwin-arm64.tar.gz | 0c8826535a3836d55405acce38c3a58e4fbd488c8933e9eced8e59deeba26ae583908062d809ff4b319c891a9ef7ac2bb736e3b7c665b7f9a47e65387f0ec964 |
kubernetes-client-linux-386.tar.gz | 4c6d920d2ab1003fcb5fc4b815337fd3b571256d64471fa0613a1d1f394f3ca55b9ac4f80bdb3921fd57ffc2887181f004abb252c23f0ed42e26a1bdbe26e9ca |
kubernetes-client-linux-amd64.tar.gz | e1a0e3c2552fef6a21acef1ce1fb0f9a15c6b86c6b7b1c34fa8e6b60d2b341fe8fd3208555474cf4a1f2f4cffd90d175f866e508900ddf3d47178a24f6f6ae64 |
kubernetes-client-linux-arm.tar.gz | bc4d687d8a8aa906a1e91e36dca875283aec2ec42c9a45db8c23dd38e7b9fb30e48c6bbf118c582717d3c0dc28cb1b198b90b167790ebbdaa9e33c7a29500187 |
kubernetes-client-linux-arm64.tar.gz | c1a460ec2698034181261d8678fb4ae4addbd21b80850539b7c38bed402f664dabaab76c0aff23a283516aeddc45658ab1b619d82d17590ca9f8e3d9a0268d8d |
kubernetes-client-linux-ppc64le.tar.gz | 6ff03ab89e77ef519f5dd81ff547ca3267b71a6fe6b876409282b39e90f7af1531d20d50266487d7ab75a9154cb9260d546b8dcd5868180175c76c538baa93cb |
kubernetes-client-linux-s390x.tar.gz | 4b25feee780e0b6cfb7b9b9f263cea678ee2436ae4d674babaa5729abe065d07f1e8faa44b8881272716d703cffa7ee3712d6f9405f5ee825828ad9ca7d9d675 |
kubernetes-client-windows-386.tar.gz | 9a561196c73f4a2208347eb2bc8b98d462049798ea48961d3cc19ab9165d1985825f16014d6f4ba5ec19019e9c4dee7975415b7ef58d52d775b16838478b9708 |
kubernetes-client-windows-amd64.tar.gz | 9a8540a961c27395748c1d69988d4e93135b620e99a76cdbad403e42af41ef174eff50f590c0226d7431084134cf8b8aa7afb267024660ce8116117e7dde96d5 |
kubernetes-client-windows-arm64.tar.gz | 5f7388b575dbf909423bc7b08e9a2b580d74c2827fd7740120d28f14b7d7cf1266c213dcda73268ad5acc030b1ef0f0a6c1d6683173661a37ddf34822306564a |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | cb719756e1e15e8b2dd656aae888d3b70478d12b9384636b8d6f2cd685f76dc8e79e94b8ee3f428e9e2f4503dc3a103b6918c9a5825c099723a14a314668fb5f |
kubernetes-server-linux-arm64.tar.gz | bf187239d1f2108e96d89503af0d8eed89608470470beb781dce0393263919d18c7ae3e6cb94c00d37413d295af135752c6d63de6abe11c717e96a4b2c1b549d |
kubernetes-server-linux-ppc64le.tar.gz | c140f4784438140ac65c672185c579e7b6fc5839bbcfa03390110726655b07e02b6c0a0adfc96446b4d4a8659c1831da74bfd5d83fc8a6d8cd2d6fcbf8750ed8 |
kubernetes-server-linux-s390x.tar.gz | cc1fe349b9b39b52bbe0e2172049a60ce97dc4e2d4d23007c07ccc8692d01c0ee22012c74e1712d19dd50d6a8c391a9894f7e0a02e3596389083f360c6744743 |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | daffae5fe6930b631fbfb68a9a3f9b7128c98a0a5916afde8de513b8967a4334c4cdb74a87ba0ab75e193e6fdfcfcf74136eaca059b3095be5e06c2828f2ab11 |
kubernetes-node-linux-arm64.tar.gz | 0c4bc0530eea7b136b9a6977fa0212f43123f5215ab9e6c53739688890e2a88d7c4aee75cd09d1f7f03d645fa756b48bbea30b46b255527ba2bcc5f954fffab4 |
kubernetes-node-linux-ppc64le.tar.gz | 7c6da33a3f82e2e14274d7be6a329277ee4ee483e0d2e228d3500fc57201f6b6220e1fed3c4214c46ca2c660257c83cdd0157724f17cafd79b4ac47f98c2ce84 |
kubernetes-node-linux-s390x.tar.gz | 8ee20942b91808026b9e54c8964422cb7a6dcf4c081b26bf41ea910721dfdccb449eab7b7ea2e11ef0260693f7c48411e65c4b18ab8d0045d243020b674f93d4 |
kubernetes-node-windows-amd64.tar.gz | b9b112456539ef0dd4b08178cdf3c56e1723746fdbad2dddb3ca18075e1258591b4f9937cfc884fb64f5ef275b82c8f5a3d25e29307753bdb574f18bd56da358 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.34.0-rc.0
Changes by Kind
Bug or Regression
- Fixes an issue that caused kube-apiserver to panic in 1.34.0-rc.0 (#133412, @richabanker) [SIG API Machinery and Etcd]
- Make podcertificaterequestcleaner role feature-gated (#133409, @carlory) [SIG Auth]
Dependencies
Added
Nothing has changed.
Changed
Nothing has changed.
Removed
Nothing has changed.
v1.34.0-rc.0
Downloads for v1.34.0-rc.0
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 3a40163a162b703ca49714789d751c741cc09a4921e1dd1a3e51cd1e45285c43aa84c153a9130b105220defe573ecc9bc2f9e69e7ead50f470110eba0f3eb2e7 |
kubernetes-src.tar.gz | f1e769b6bd1c24e88a445ba58c30448b4f138c36b4acb1de04616630eb8d74b01986c94d7ed2022943425e0e9ea8043253fe3f32a696c510187ccae2deb81334 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | c5b135c912d5d942cdeff31b23f3d7865aa40252730e367f8170d70fbb2c695efbc04648787b8d36ec788ce761f71adde0c8bd92ab1bec714ded7e5b43f1e70e |
kubernetes-client-darwin-arm64.tar.gz | d2dc774dbf6ec52a6e848be7ede8d3640ec3969d6b79462ab5b06c654d65046961fecf7b0dee7861af7895beb65c90867f7f0b370d0437322f92d2afbe7ff999 |
kubernetes-client-linux-386.tar.gz | c5df62de030efad772ff72ce96776229a4cdf7c80c6e8625f46f32d7fe064b84021432eda05aa48d8dfd3b38f5d8bb1f0fec010fa39bdcc437d48f7dc02ce20c |
kubernetes-client-linux-amd64.tar.gz | 789c6ffc56ed8772fdd7142865cd788d0975dbeb759533d00768c6ac964973d5553aaac8341c8d55604e70abdfdb3c5b1b91cf7f2a6fc08ccc4a5a0d93e76127 |
kubernetes-client-linux-arm.tar.gz | f82bb1bc87d8288f54de7f5dbb54ff6e29dea210e0632348b3912cff326a78047da4dd05581dd29be2d9f7756eab1f2af1a9bf45818e378b22ccaf7c265803c1 |
kubernetes-client-linux-arm64.tar.gz | 977cd13d6ad03c3e3b820d69d9136acb90e0efc13253a6233cf2c0d819c0b68734672ab623a7496080417c750ee04d3ce276e41d541cd07deb31ff90b6c19ee7 |
kubernetes-client-linux-ppc64le.tar.gz | 6bb7a7935989c301727e355b3db6774d2ca057f317c166ceddb3aee1d4d5c553b62dc28f851b8acf0dda73f64d41aec77e41721e9cd5c1d9e8ffb7afc318ff6c |
kubernetes-client-linux-s390x.tar.gz | e922a13265a591f989e6026321c792221663f09f062a5f7866fb4c1efa28a91216bc7f297b4c778eac8784f773d642ed873bcd6d97dfcff6897631a17c3d35d7 |
kubernetes-client-windows-386.tar.gz | 963016b3be20076dd94f46aac858d2e4fe3a973d54a574b0289c8e5e20ec192680b3e4cf9f813f17658f892c96adabfd467cb8a7ad6332007e4aea07a828572c |
kubernetes-client-windows-amd64.tar.gz | 01432a7dcdcd99c0c8e00bd9085dde13fb07a7091c19592bd7b7323932af56f47d2554b4806fc5ff867f7f04428a4572e0149bec32f7b9e1b3dc2dc0e63792d6 |
kubernetes-client-windows-arm64.tar.gz | 38fefd2b9c6a5b37b461e1787ee824d8208bd76f375bb0f5740e4dc2ede98baa30532021629cfc9ccb04b854ce19c7ccde245e4edd3a7482336d70ea47dd09d4 |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 4a63efa6876bc66683650361a071ddca8c201a653a3947e3939f68d32835b76357a5c63bebfdbd9e2420b485b9dfe42ea03ad6b230960207c21a98d96f24ddda |
kubernetes-server-linux-arm64.tar.gz | 0965a31c7db0dcbbe8160c420df3ca12923fa1bfc720103b93f3ba238c529667933477df0f190737595402173f38b1785179f468047d504e4a1bfbe969951df9 |
kubernetes-server-linux-ppc64le.tar.gz | b62515af8f866bcde5866b10def38c63bb0ef50d84dcac1b536dad85d04b10285e38bafd79e0d80fcab8820455597164e4202cc4848b1cc03137a967a1ca5597 |
kubernetes-server-linux-s390x.tar.gz | 17eaa46f21730ad8e809b827c053030249e8cfff812fbd0a2252650ef1b90ae4c98c57d54972317d806fcad7c77444f69c97436d1f652b7ac0a6ba908acee09a |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 97bb8e23f59afae0f0a5d4a9b594dca25e76fc426d1e05d13582df44f207b913f82eb1b36e2669a267f0d8171978049e623556395a94f63ad30a873d41bb0a47 |
kubernetes-node-linux-arm64.tar.gz | caa6625eec52dee92dec7f33936e7a5f3ba8166e1150b6c747048b74f1bb574dcc097fb7ce7a634f122d42a7fbdbf81e5b4a483a71adeed2c2937af8977114a8 |
kubernetes-node-linux-ppc64le.tar.gz | cab3bd432093fb03bdc6497f94dd501e412fb90eca9b350319239fcca5687012561f7342114b52e09bad61e6eea3109158ef92add94809d4b56f9aa3470e9e93 |
kubernetes-node-linux-s390x.tar.gz | 0c95a03a6539f99de244213359c6d4f42ebf6aea79c26c8cfb82d319b7c27dd5ca4050cc58ef27f999fba334fc67629a0b96bb7af66721309a203b1f0aec6467 |
kubernetes-node-windows-amd64.tar.gz | 9f2e1f5e6227e41d0c681e07a2edc3eb4da4b6ba20125a4aad6b94c2023d29238257244b243e508c17c5693a8168da5bf66cf744a9610799d77adbed29363c45 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.34.0-beta.0
Changes by Kind
Deprecation
- DRA kubelet: gRPC API graduated to v1, v1beta1 is deprecated starting in 1.34. Updating DRA drivers to the k8s.io/dynamic-resource-allocation/kubeletplugin helper from 1.34 adds support for both API versions. (#132700, @pohly) [SIG Node and Testing]
API Change
-
Add a new
FileKeyRef
field to containers, allowing them to load variables from files by setting this field.Introduce the EnvFiles feature gate to govern activation of this functionality. (#132626, @HirazawaUi) [SIG API Machinery, Apps, Node and Testing]
-
Add driver-owned fields in ResourceSlice to mark whether the device is shareable among multiple resource claims (or requests) and to specify how each capacity can be shared between different requests.
- Add user-owned fields in ResourceClaim to specify resource requirements against each device capacity.
- Add scheduler-owned field in ResourceClaim.Status to specify how much device capacity is reserved for a specific request.
- Add an additional identifier to ResourceClaim.Status for the device supports multiple allocations.
- Add a new constraint type to enforce uniqueness of specified attributes across all allocated devices. (#132522, @sunya-ch) [SIG API Machinery, Apps, Architecture, CLI, Cluster Lifecycle, Network, Node, Release, Scheduling and Testing]
-
Add new optional APIs in ResouceSlice.Basic and ResourceClaim.Status.AllocatedDeviceStatus. (#130160, @KobayashiD27) [SIG API Machinery, Apps, Architecture, Node, Release, Scheduling and Testing]
-
Added a mechanism for configurable container restarts: container level restart rules. This is an alpha feature behind the
ContainerRestartRules
feature gate. (#132642, @yuanwang04) [SIG API Machinery, Apps, Node and Testing] -
Added detailed event for in-place pod vertical scaling completed, improving cluster management and debugging (#130387, @shiya0705) [SIG API Machinery, Apps, Autoscaling, Node, Scheduling and Testing]
-
Added validation to reject Pods using the
PodLevelResources
feature on Windows OS due to lack of support. The API server rejects Pods with Pod-level resources and aPod.spec.os.name
targeting Windows. Kubelet on nodes running Windows also rejects Pods with Pod-level resources at admission phase. (#133046, @toVersus) [SIG Apps and Node] -
Adds warnings when creating headless service with set loadBalancerIP,externalIPs and/or SessionAffinity (#132214, @Peac36) [SIG Network]
-
Allow pvc.spec.VolumeAttributesClassName to go from non-nil to nil (#132106, @AndrewSirenko) [SIG Apps]
-
Allows setting the
hostnameOverride
field inPodSpec
to specify any RFC 1123 DNS subdomain as the pod's hostname. TheHostnameOverride
feature gate has been introduced to control enablement of this functionality. (#132558, @HirazawaUi) [SIG API Machinery, Apps, Network, Node and Testing] -
AppArmor profiles specified in the pod or container SecurityContext are no longer copied to deprecated AppArmor annotations (prefix
container.apparmor.security.beta.kubernetes.io/
). Anything that inspects the deprecated annotations must be migrated to use the SecurityContext fields instead. (#131989, @tallclair) [SIG Node] -
Changes underlying logic to propagate Pod level hugepage cgroup to containers when they do not specify hugepage resources.
- Adds validation to enforce the hugepage aggregated container limits to be smaller or equal to pod-level limits. This was already enforced with the defaulted requests from the specified limits, however it did not make it clear about both hugepage requests and limits. (#131089, @KevinTMtz) [SIG Apps, Node and Testing]
-
DRA: the scheduler plugin now prevents abnormal filter runtimes by timing out after 10 seconds. This is configurable via the plugin configuration's
FilterTimeout
. Setting it to zero disables the timeout and restores the behavior of Kubernetes <= 1.33. (#132033, @pohly) [SIG Node, Scheduling and Testing] -
DRA: when the prioritized list feature is used in a request and the resulting number of allocated devices exceeds the number of allowed devices per claim, the scheduler aborts the attempt to allocate devices early. Previously it tried to many different combinations, which can take a long time. (#130593, @mortent) [SIG Apps, Node, Scheduling and Testing]
-
Dynamic Resource Allocation: graduated core functionality to general availability (GA). This newly stable feature uses the structured parameters flavor of DRA. (#132706, @pohly) [SIG API Machinery, Apps, Auth, Autoscaling, Etcd, Node, Scheduling and Testing]
-
Enable kube-apiserver support for PodCertificateRequest and PodCertificate projected volumes (behind the PodCertificateRequest feature gate). (#128010, @ahmedtd) [SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Storage and Testing]
-
Extended resources backed by DRA feature allows cluster operator to specify extendedResourceName in DeviceClass, and application operator to continue using extended resources in pod's requests to request for DRA devices matching the DeviceClass.
NodeResourcesFit plugin scoring won't work for extended resources backed by DRA (#130653, @yliaog) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing]
-
Fix prerelease lifecycle for PodCertificateRequest (#133350, @carlory) [SIG Auth]
-
Fixes a 1.33 regression that can cause a nil panic in kube-scheduler when aggregating resource requests across container's spec and status. (#132895, @yue9944882) [SIG Node and Scheduling]
-
Introduced the admissionregistration.k8s.io/v1beta1/MutatingAdmissionPolicy API type. To enable, enable the
MutatingAdmissionPolicy
feature gate (which is off by default) and set--runtime-config=admissionregistration.k8s.io/v1beta1=true
on the kube-apiserver. Note that the default stored version remains alpha in 1.34 and whoever enabled beta during 1.34 needs to run a storage migration yourself to ensure you don't depend on alpha data in etcd. (#132821, @cici37) [SIG API Machinery, Etcd and Testing] -
No, changes underlying logic for Eviction Manager helper functions (#132277, @KevinTMtz) [SIG Node, Scheduling and Testing]
-
Promote MutableCSINodeAllocatableCount to Beta. (#132429, @torredil) [SIG Storage]
-
Promoted feature-gate
VolumeAttributesClass
to GA -
Promoted the
APIServerTracing
feature gate to GA. The--tracing-config-file
flag now acceptsTracingConfiguration
in versionapiserver.config.k8s.io/v1
(with no changes fromapiserver.config.k8s.io/v1beta1
). (#132340, @dashpole) [SIG API Machinery and Testing] -
Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/pluginregistration
in favor ofgoogle.golang.org/protobuf
. (#132773, @saschagrunert) [SIG Node] -
The Kubelet can now monitor the health of devices allocated via Dynamic Resource Allocation (DRA) and report it in the
pod.status.containerStatuses.allocatedResourcesStatus
field. This requires the DRA plugin to implement the new v1alpha1NodeHealth
gRPC service. This feature is controlled by theResourceHealthStatus
feature gate. (#130606, @Jpsassine) [SIG Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Network, Node, Release, Scheduling, Storage and Testing] -
The KubeletServiceAccountTokenForCredentialProviders feature is now beta and enabled by default. (#133017, @aramase) [SIG Auth and Node]
-
The conditionType is "oneof" approved/denied check of CertificateSigningRequest's
.status.conditions
field has been migrated to declarative validation. If theDeclarativeValidation
feature gate is enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeover
feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#133013, @aaron-prindle) [SIG API Machinery and Auth] -
The fallback behavior of the Downward API's
resourceFieldRef
field has been updated to account for pod-level resources: if container-level limits are not set, pod-level limits are now used before falling back to node allocatable resources. (#132605, @toVersus) [SIG Node, Scheduling and Testing] -
The kubelet's image pull credential tracking now supports service account-based verification. When an image is pulled using service account credentials via external credential providers, subsequent pods using the same service account (UID, name, and namespace) can access the cached image without re-authentication for the lifetime of that service account. (#132771, @aramase) [SIG Auth, Node and Testing]
Feature
-
API calls dispatched during pod scheduling are now executed asynchronously if the SchedulerAsyncAPICalls feature gate is enabled. Out-of-tree plugins can use APIDispatcher and APICacher from the framework to dispatch their own calls. (#132886, @macsko) [SIG Release, Scheduling and Testing]
-
Add
started_user_namespaced_pods_total
andstarted_user_namespaced_pods_errors_total
for tracking the successes and failures in creating pods if a user namespace is requested. (#132902, @haircommander) [SIG Node and Testing] -
Add apiserver_resource_size_estimate_bytes metric to apiserver (#132893, @serathius) [SIG API Machinery, Etcd and Instrumentation]
-
Add memory tracking to scheduler performance tests to help detect memory leaks and monitor memory usage patterns while running scheduler_perf (#132910, @utam0k) [SIG Scheduling and Testing]
-
Added 3 new metrics for monitoring async API calls in the scheduler when the SchedulerAsyncAPICalls feature gate is enabled:
- scheduler_async_api_call_execution_total: tracks executed API calls by call type and result (success/error)
- scheduler_async_api_call_duration_seconds: histogram of API call execution duration by call type and result
- scheduler_pending_async_api_calls: gauge showing current number of pending API calls in the queue (#133120, @utam0k) [SIG Release and Scheduling]
-
Added machine readable output options (JSON & YAML) to kubectl api-resources (#132604, @dharmit) [SIG Apps, CLI and Network]
-
Added support for a new kubectl output format,
kyaml
. KYAML is a strict subset of YAML and should be accepted by any YAML processor. The formatting of KYAML is halfway between JSON and YAML. Because it is more explicit than the default YAML style, it should be less error-prone. (#132942, @thockin) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Contributor Experience, Instrumentation, Network, Node, Scheduling, Storage and Testing] -
Adds HPA support to pod-level resource specifications. When the pod-level resource feature is enabled, HPAs configured with
Resource
type metrics will calculate the pod resources frompod.Spec.Resources
field, if specified. (#132430, @laoj2) [SIG Apps, Autoscaling and Testing] -
Adds a
container_swap_limit_bytes
metric to expose the swap limit assigned to containers under theLimitedSwap
swap behavior. (#132348, @iholder101) [SIG Node and Testing] -
Adds useful endpoints for kube-apiserver (#132581, @itssimrank) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing]
-
Bump KubeletCgroupDriverFromCRI to GA and add metric to track out of support CRI implementations (#133157, @haircommander) [SIG Node and Testing]
-
CRI API has auth fields in image pulling marked as debug_redact. (#133135, @SergeyKanzhelev) [SIG Node]
-
Changed handling of CustomResourceDefinitions with unrecognized formats. Writing a schema with an unrecognized formats now triggers a warning (the write is still accepted). (#133136, @yongruilin) [SIG API Machinery]
-
DRAAdminAccess is enabled by default allowing users to create ResourceClaims and ResourceClaimTemplates in privileged mode to grant access to devices that are in use by other users for admin tasks like monitor health or status of the device. (#133085, @ritazh) [SIG Auth and Node]
-
DRAPrioritizedList is now turned on by default which makes it possible to provide a prioritized list of subrequests in a ResourceClaim. (#132767, @mortent) [SIG Node, Scheduling and Testing]
-
Demote KEP-5278 feature gates ClearingNominatedNodeNameAfterBinding and NominatedNodeNameForExpectation to Alpha from Beta (#133293, @utam0k) [SIG Scheduling and Testing]
-
Deprecate apiserver_storage_objects and replace it with apiserver_resource_objects metric using labels consistent with other metrics (#132965, @serathius) [SIG API Machinery, Etcd and Instrumentation]
-
Ensure memory resizing for Guaranteed QOS pods on static Memory policy configured is gated by
InPlacePodVerticalScalingExclusiveMemory
(defaults tofalse
). (#132473, @pravk03) [SIG Node, Scheduling and Testing] -
Fix recording the kubelet_container_resize_requests_total metric to include all resize-related updates. (#133060, @natasha41575) [SIG Node]
-
Graduate ListFromCacheSnapshot to Beta (#132901, @serathius) [SIG API Machinery and Etcd]
-
Graduate
PodLevelResources
feature to beta and have it on by default. This feature allows defining CPU and memory resources for an entire pod inpod.spec.resources
. (#132999, @ndixita) [SIG Node] -
Graduate
PodObservedGenerationTracking
feature to beta and have it on by default. This feature means that the top levelstatus.observedGeneration
andstatus.conditions[].observedGeneration
fields in pods will now be populated to reflect themetadata.generation
of the podspec at the time that the status or condition is being reported. (#132912, @natasha41575) [SIG Apps, Node and Testing] -
Graduate the WinDSR feature in the kube-proxy to GA. The
WinDSR
feature gate is now enabled by default. (#132108, @rzlink) [SIG Network and Windows] -
Graduate the WinOverlay feature in the kube-proxy to GA. The WinOverlay feature gate is now enabled by default. (#133042, @rzlink) [SIG Network and Windows]
-
Graduates the
WatchList
feature gate to Beta for kube-apiserver and enablesWatchListClient
for KCM. (#132704, @p0lyn0mial) [SIG API Machinery and Testing] -
If PreBindPreFlight returns Skip, the scheduler doesn't run the plugin at PreBind. If any PreBindPreFlight returns Success, the scheduler puts NominatedNodeName to the pod so that other components (such as the cluster autoscaler) can notice the pod is going to be bound to the node. (#133021, @sanposhiho) [SIG Scheduling and Testing]
-
Increase APF max seats to 100 for LIST requests (#133034, @serathius) [SIG API Machinery]
-
Introduce a method 'GetPCIeRootAttributeByPCIBusID(pciBusID)' for third-party DRA drivers to provide common logic for the standardized device attribute 'resource.kubernetes.io/pcieRoot' (#132296, @everpeace) [SIG Node]
-
It will promote windows graceful shutdown feature from alpha to beta. (#133062, @zylxjtu) [SIG Windows]
-
Kube-apiserver now reports the last configuration hash as a label in
apiserver_authentication_config_controller_last_config_info
metric after successfully loading the authentication configuration file.apiserver_authorization_config_controller_last_config_info
metric after successfully loading the authorization configuration file.apiserver_encryption_config_controller_last_config_info
metric after successfully loading the encryption configuration file. (#132299, @aramase) [SIG API Machinery, Auth and Testing]
-
Kube-apiserver: previously persisted CustomResourceDefinition objects with an invalid whitespace-only
caBundle
can now serve requests that do not require conversion. (#132514, @tiffanny29631) [SIG API Machinery] -
Kube-controller-manager now reports the following metrics for ResourceClaims with admin access:
resourceclaim_controller_creates_total
count metric with labels admin_access (true or false), status (failure or success) to track the total number of ResourceClaims creation requestsresourceclaim_controller_resource_claims
gauge metric with labels admin_access (true or false), allocated (true or false) to track the current number of ResourceClaims (#132800, @ritazh) [SIG Apps, Auth, Instrumentation and Node]
-
Kubelet now detects terminal CSI volume mount failures due to exceeded attachment limits on the node and marks the stateful pod as Failed, allowing its controller to recreate it. This prevents pods from getting stuck indefinitely in the
ContainerCreating
state. (#132933, @torredil) [SIG Apps, Node, Storage and Testing] -
Kubelet now reports a hash of the credential provider configuration via the
kubelet_credential_provider_config_info
metric. The hash is exposed in thehash
label. (#133016, @aramase) [SIG API Machinery and Auth] -
Memory limits can now be decreased with a NotRequired resize restart policy. When decreasing memory limits, perform a best-effort check to prevent limits from decreasing below usage and triggering an OOM-kill. (#133012, @tallclair) [SIG Apps, Node and Testing]
-
Move Recover from volume expansion failure GA (#132662, @gnufied) [SIG Apps, Auth, Node, Storage and Testing]
-
PodLifecycleSleepAction is graduated to GA (#132595, @AxeZhan) [SIG Apps, Node and Testing]
-
Prevents any type of CPU/Memory alignment or hint generation with the Topology manager from the CPU or Memory manager when Pod Level resources are used in the pod spec. (#133279, @ffromani) [SIG Node and Testing]
-
Promoted Linux node pressure stall information (PSI) metrics to beta. (#132822, @roycaihw) [SIG Node]
-
Start recording metrics for in-place pod resize. (#132903, @natasha41575) [SIG Node]
-
The scheduler no longer clears the
nominatedNodeName
field for Pods. External components, such as Cluster Autoscaler and Karpenter, are responsible for managing this field when needed. (#133276, @macsko) [SIG Scheduling and Testing] -
The validation in the CertificateSigningRequest
/status
and/approval
subresource has been migrated to declarative validation. If theDeclarativeValidation
feature gate is enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeover
feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#133068, @yongruilin) [SIG API Machinery and Auth] -
This will promote the
KubeletPodResourcesDynamicResources
andKubeletPodResourcesGet
feature gates to Beta which will be enabled by default if DRA goes to GA. (#132940, @guptaNswati) -
Update pause version to registry.k8s.io/pause:3.10.1 (#130713, @ArkaSaha30) [SIG Cluster Lifecycle, Node, Scheduling and Testing]
-
Use DRA API version to "v1" in "deviceattribute" package in "k8s.io/dynamic-resource-allocation" module (#133164, @everpeace) [SIG Node]
-
When proxying to an aggregated API server, kube-apiserver now uses the EndpointSlices of the
service
indicated by theAPIServer
, rather than using Endpoints.If you are using the aggregated API server feature, and you are writing out the endpoints for it by hand (rather than letting kube-controller-manager generate Endpoints and EndpointSlices for it automatically based on the Service definition), then you should write out an EndpointSlice object rather than (or in addition to) an Endpoints object. (#129837, @danwinship) [SIG API Machinery, Network and Testing]
-
Whenever a pod is successfully bound to a node, the kube-apiserver now clears the pod's
nominatedNodeName
field. This prevents stale information from affecting external scheduling components. (#132443, @utam0k) [SIG Apps, Node, Scheduling and Testing]
Failing Test
- DRA driver helper: fixed handling of apiserver restart when running on a Kubernetes version which does not support the resource.k8s.io version used by the DRA driver. (#133076, @pohly) [SIG Node and Testing]
Bug or Regression
- Fix bug that prevents the alpha feature PodTopologyLabelAdmission to not work due to checking for the incorrect label key when copying topology labels. This bug delays the graduation of the feature to beta by an additional release to allow time for meaningful feedback. (#132462, @munnerz) [SIG Node]
- Fix runtime cost estimation for x-int-or-string custom resource schemas with maximum lengths (#132837, @JoelSpeed) [SIG API Machinery]
- Fixed a bug that the async preemption feature keeps preemptor pods unnecessarily in the queue. (#133167, @sanposhiho) [SIG Scheduling]
- Kubeadm: fix a bug where the default args for etcd are not correct when a local etcd image is used and the etcd version is less than 3.6.0. (#133023, @carlory) [SIG Cluster Lifecycle]
- Pods can't mix the usage of user-namespaces (
hostUsers: false
) and volumeDevices. Kubernetes now returns an error in this case. (#132868, @rata) [SIG Apps] - ReplicaSets and Deployments should always count
.status.availableReplicas
at the correct time without a delay. This results in faster reconciliation of Deployment conditions and faster, unblocked Deployment rollouts. (#132121, @atiratree) [SIG Apps] - The
baseline
andrestricted
pod security admission levels now block setting thehost
field on probe and lifecycle handlers (#125271, @tssurya) [SIG Auth, Node and Testing] - The garbage collection controller no longer races with changes to ownerReferences when deleting orphaned objects. (#132632, @sdowell) [SIG API Machinery and Apps]
Other (Cleanup or Flake)
- APIVersion fields of the HorizontalPodAutoscaler API are now validated to ensure created API objects function properly (#132537, @lalitc375) [SIG Etcd and Testing]
- Added support for encoding and decoding types that implement the standard library interfaces json.Marshaler, json.Unmarshaler, encoding.TextMarshaler, or encoding.TextUnmarshaler to and from CBOR by transcoding. (#132935, @benluddy) [SIG API Machinery]
- Kubeadm: instead of passing the etcd flag --experimental-initial-corrupt-check, set the InitialCorruptCheck=true etcd feature gate, and instead of passing the --experimental-watch-progress-notify-interval flag, pass its graduated variant --watch-progress-notify-interval. (#132838, @AwesomePatrol) [SIG Cluster Lifecycle]
- Migrate Memory Manager to contextual logging (#130727, @swatisehgal) [SIG Node]
- Migrate pkg/kubelet/volumemanager to contextual logging (#131306, @Chulong-Li) [SIG Node]
- Migrate pkg/kubelet/winstats to contextual logging (#131001, @Chulong-Li) [SIG Node]
- Removed deprecated gogo protocol definitions from
k8s.io/kms/apis
in favor ofgoogle.golang.org/protobuf
. (#132833, @saschagrunert) [SIG API Machinery, Auth and Testing] - Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/deviceplugin
in favor ofgoogle.golang.org/protobuf
. (#133028, @saschagrunert) [SIG Node and Testing] - Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/podresources
in favor ofgoogle.golang.org/protobuf
. (#133027, @saschagrunert) [SIG Node and Testing] - Removed general avaliable feature-gate DevicePluginCDIDevices (#132083, @carlory) [SIG Node and Testing]
- Replaces timer ptr helper function with the "k8s.io/utils/ptr" implementations. (#133030, @PatrickLaabs) [SIG API Machinery and Auth]
- The deprecated
LegacySidecarContainers
feature gate is completely removed. (#131463, @gjkim42) [SIG Node and Testing] - Types: NodeInfo, PodInfo, QueuedPodInfo, PodResource, AffinityTerm, WeightedAffinityTerm, Resource, ImageStateSummary, ProtocolPort and HostPortInfo moved from pkg/scheduler/framework to staging repo. Users should update import path for these types from "k8s.io/kubernetes/pkg/scheduler/framework" to "k8s.io/kube-scheduler/framework" and update use of fields (to use getter/setter functions instead) where needed. (#132457, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]
- Updates the etcd client library to v3.6.4 (#133226, @ivanvc) [SIG API Machinery, Auth, Cloud Provider and Node]
- Upgrades functionality of
kubectl kustomize
as described at https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize%2Fv5.7.0 (#132593, @koba1t) [SIG CLI]
Dependencies
Added
Nothing has changed.
Changed
- cel.dev/expr: v0.23.1 → v0.24.0
- github.com/fxamacker/cbor/v2: v2.8.0 → v2.9.0
- github.com/google/cel-go: v0.25.0 → v0.26.0
- go.etcd.io/bbolt: v1.4.0 → v1.4.2
- go.etcd.io/etcd/api/v3: v3.6.1 → v3.6.4
- go.etcd.io/etcd/client/pkg/v3: v3.6.1 → v3.6.4
- go.etcd.io/etcd/client/v3: v3.6.1 → v3.6.4
- go.etcd.io/etcd/pkg/v3: v3.6.1 → v3.6.4
- go.etcd.io/etcd/server/v3: v3.6.1 → v3.6.4
- sigs.k8s.io/kustomize/api: v0.19.0 → v0.20.1
- sigs.k8s.io/kustomize/cmd/config: v0.19.0 → v0.20.1
- sigs.k8s.io/kustomize/kustomize/v5: v5.6.0 → v5.7.1
- sigs.k8s.io/kustomize/kyaml: v0.19.0 → v0.20.1
- sigs.k8s.io/structured-merge-diff/v6: v6.2.0 → v6.3.0
- sigs.k8s.io/yaml: v1.5.0 → v1.6.0
Removed
- github.com/google/shlex: e7afc7f
v1.34.0-beta.0
Downloads for v1.34.0-beta.0
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | e1a1cf79f95354bae349afa992f72cf8cb23aa9a016f67599de1f0c31572a00cd84f541163d0da3205ecfe421901a88dc2c9012cec91d45fa2f094d524059f92 |
kubernetes-src.tar.gz | 7e2c9837dd9be43df835d999024d516d52d211ee7e65f995da8e6c45442c8a8b6e5bc3e13a9279fc401c58b3ad1ba2b0b37abba3719e0605dfb5cb5c752d7df7 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | 1a3944812f26c37de6418f84d14e97366a1d2e268d8d61619f98f92778f3f3a9e30e4fd092ea0963ee19524284815803511e3d143c9f1b7df77f06728eddcefd |
kubernetes-client-darwin-arm64.tar.gz | 01bcf3e380e9b18e7db316c0a7968b9293ff0cee6bd6395f8b3a8fcfbd9bc660b3016cfa636498c28d35a0e8a221f56303bd34b136d044df2356f3085aa4e613 |
kubernetes-client-linux-386.tar.gz | 847526c7c2d2559f16ad1f6172d07590b4f35051a7bcf741c98067ace09fc92c52241f74a8c1d7ad1f4b713b26d8abc7059b47d97f4a8d9afc87d465b837dfd4 |
kubernetes-client-linux-amd64.tar.gz | 260d78b743af5e7a6563cf26df7a4a4e75987f1bce96de3cec020d47f1a2586a39f3058cc1668a0b77266bb131490c74c55eaf669766918c8379e3c9818abebe |
kubernetes-client-linux-arm.tar.gz | f4dcc3597f2e005b51c4f3fc8323e119582fd00626ddaea6f2602810fd64fb65d1c1a795519d458b2c74ef5bd52467e6cd77b01972e858bb97d12f4ef2c81839 |
kubernetes-client-linux-arm64.tar.gz | 4cc18be405d27f797ccd93b2f3ae0fe985450a0cf6f35e023c91e4a116b8443e32ba99e07bbc93c8dc4d9739c5adbb888cbc16ba457e362975e907057d0f38c1 |
kubernetes-client-linux-ppc64le.tar.gz | 06eca6eb5dc82304566fc7194f1ae6f002a70dd031357608bbf65e9449840dcb55b37b1c61ff13e40f0eb95a0456bb6e5d692b14f806cd7e694ef71cb720bfb1 |
kubernetes-client-linux-s390x.tar.gz | ed6db8acb534c557e3619628b78c1de5abcb31bda04e418296acc4fde54e23bba1ee42b4db9daefdf5622b09e3c9d4916461b85da10058d822251ac3da2eebca |
kubernetes-client-windows-386.tar.gz | 0302f1dea8c321f254b9aeb87882c82b28a4be74b4718f73840769e06c21a4a240d285ec89d94657522e49bd7550eda44a8e7312d83198c4b4f60990609beaae |
kubernetes-client-windows-amd64.tar.gz | 28dcf914521f31ed11d258fe1ff516eac9f7e1ed317bc55a816a2bca2ef41ce18140c296ea0c22e1a3808f82979ce8970e91951a982c33dd18e3fedb840ca4ad |
kubernetes-client-windows-arm64.tar.gz | ed50434e96f2fd80abaf3b9fa6befa96f829c086ac6b87d0d9f6ce9d6d3e10a22eb17928902b42b95ad4709a936e791d189b338af46fbe91d5391fde7c1f2904 |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 2862b8ed25f52542558fe48a6a584b02644a731decec878cfa0cee00173476f354d70a04efb84d084b87fe303291092d06e795e42e13a40c339699982a90044a |
kubernetes-server-linux-arm64.tar.gz | 1c00a6559f4f6c6190fe2265fb88cad4ac448eb3223dbd809976e3c85139d04b9cc02b4a9b80e9b42a2e4ee4a7a03a7a303ced49bc9673bff7be7cde7bb5f7a5 |
kubernetes-server-linux-ppc64le.tar.gz | 7a998922d3fff36914ee690a5937d7b592f1916f68f7a31311065b25e7035cd38572df062e90680d56299b93be278c2fa24a370547270c07add274cf4a420d2f |
kubernetes-server-linux-s390x.tar.gz | 555b5690e99d0470ea7ca1bc4aebfda68a1126859962876db897b3024d5d7e352a3beeae4f2f3cba28a0d1b3c6edcf7094395492ff36fbc7d2d7a1e87ebb5fca |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 4b029d2f1022c4fd84ad1afaeeff9ae4fd80593c90f3f30a633df04bde68fac182c72bd906575b779eff01cc2e7d18884d9b5b0a3259a02e3131976a4339d1e1 |
kubernetes-node-linux-arm64.tar.gz | c65b44be119997d321d13d6f9d08e42b1576fb9515cbf646c730f72e4e80a47afa1e59ea55cf8a8de1aa93a9db586ecb7101b2f59633460f4a4381ded987051b |
kubernetes-node-linux-ppc64le.tar.gz | 837442a3311c2382b417e2d8cbf9638f9abc22f8584519becd44e9a161ef2cecee686a76977391f2c20b0477d5417d657ec29b9f0ab81e059a64f9566065f37b |
kubernetes-node-linux-s390x.tar.gz | 3c8232cd07d8869258cc4a7793fee524ec26847d32c4c6efe966946b81df6e36450acbfcbe199296b2ad79201875d00e7a8af8ceacc2c9681fdae9b4a11c2c0e |
kubernetes-node-windows-amd64.tar.gz | 768c4cd582f4b708451d5f3fdacf048de7550251e468a9e255f1c5180602d7abca5f86f22a16089309e35c0f5eee18c9133cebe24830461e3471bc180efc3769 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.34.0-alpha.3
Changes by Kind
API Change
- Added
tokenAttributes.cacheType
field to v1 credential provider config. This field is required to be set to either ServiceAccount or Token when configuring a provider that uses service account to fetch registry credentials. (#132617, @aramase) [SIG Auth, Node and Testing] - JWT authenticators specified via the
AuthenticationConfiguration.jwt
array can now optionally specify either thecontrolplane
orcluster
egress selector by setting theissuer.egressSelectorType
field. When unset, the prior behavior of using no egress selector is retained. The StructuredAuthenticationConfigurationEgressSelector beta feature (default on) must be enabled to use this functionality. (#132768, @enj) [SIG API Machinery, Auth and Testing] - Promoted the
KubeletTracing
feature gate to GA. (#132341, @dashpole) [SIG Instrumentation and Node] - Replaces boolPtrFn helper functions with the "k8s.io/utils/ptr" implementation. (#132907, @PatrickLaabs) [SIG Architecture]
- Simplied validation error message for invalid fields by removing redundant field name. (#132513, @xiaoweim) [SIG API Machinery, Apps, Auth, Node and Scheduling]
- The
AuthorizeWithSelectors
andAuthorizeNodeWithSelectors
feature gates are promoted to stable and locked on. (#132656, @liggitt) [SIG API Machinery, Auth and Testing]
Feature
- Add DetectCacheInconsistency feature gate that allows apiserver to periodically compare consistency between cache and etcd. Inconsistency is reported to
apiserver_storage_consistency_checks_total
metric and results in cache snapshots being purged. (#132884, @serathius) [SIG API Machinery, Instrumentation and Testing] - Add SizeBasedListCostEstimate feature gate, enabled by default, changing method of assigning APF seats to LIST request. Assign one seat per 100KB of data loaded to memory at once to handle LIST request. (#132932, @serathius) [SIG API Machinery]
- Add warning on use of alpha metrics with emulated versions. (#132276, @michaelasp) [SIG API Machinery and Architecture]
- Compact snapshots in watch cache based on etcd compaction (#132876, @serathius) [SIG API Machinery and Etcd]
- Graduate
ConsistentListFromCache
to GA (#132645, @serathius) [SIG API Machinery] - Kubeadm: started using a named port 'probe-port' for all probes in the static pod manifests for kube-apiserver, kube-controller-manager, kube-scheduler and etc. If you have previously patched the port values in probes with kubeadm patches, you must now also patch the named port value in the pod container under 'ports'. (#132776, @neolit123) [SIG Cluster Lifecycle]
- Kubernetes is now built using Go 1.24.5 (#132896, @cpanato) [SIG Release and Testing]
- New PreBindPreFlight function is added to PreBindPlugin interface. In-tree PreBind plugins now implement PreBindPreFlight function. (#132391, @sanposhiho) [SIG Node, Scheduling, Storage and Testing]
- Prioritize resize requests by priorityClass and qos class when there is not enough room on the node to accept all the resize requests. (#132342, @natasha41575) [SIG Node and Testing]
- Promote Ordered Namespace Deletion to Conformance (#132219, @BenTheElder) [SIG API Machinery, Architecture and Testing]
Bug or Regression
- CLI:
kubectl get job
now displays the SuccessCriteriaMet status for the listed jobs. (#132832, @Goend) [SIG Apps and CLI] - Change the node-local podresources API endpoint to only consider of active pods. Because this fix changes a long-established behavior, users observing a regressions can use the KubeletPodResourcesListUseActivePods feature gate (default on) to restore the old behavior. Please file an issue if you encounter problems and have to use the Feature Gate. (#132028, @ffromani) [SIG Node and Testing]
- Fix kubelet token cache returning stale tokens when service accounts are recreated with the same name. The token cache is now UID-aware and the new
TokenRequestServiceAccountUIDValidation
feature gate (Beta, enabled by default) validates the TokenRequest UID when set matches the service account UID. (#132803, @aramase) [SIG API Machinery, Auth, Node and Testing] - Fixed a bug that caused duplicate validation when updating a DaemonSet. (#132548, @gavinkflam) [SIG Apps]
- Kube-proxy nftables now reject/drop traffic to service with no endpoints from filter chains at priority 0 (NF_IP_PRI_FILTER) (#132456, @aroradaman) [SIG Network]
- When both InPlacePodVerticalScaling and PodObservedGenerationTracking feature gates are set, fix the
observedGeneration
field exposed in the pod resize conditions to more accurately reflect which pod generation is associated with the condition. (#131157, @natasha41575) [SIG Node] - Windows kube-proxy: ensures that Windows kube-proxy aligns with Linux behavior and correctly honors the EndpointSlice-provided port for internal traffic routing. (#132647, @princepereira) [SIG Network and Windows]
Other (Cleanup or Flake)
- Kubeadm: instead of passing the etcd flag --experimental-initial-corrupt-check, set the InitialCorruptCheck=true etcd feature gate, and instead of passing the --experimental-watch-progress-notify-interval flag, pass its graduated variant --watch-progress-notify-interval. (#132838, @AwesomePatrol) [SIG Cluster Lifecycle]
- Masked off access to Linux thermal interrupt info in
/proc
and/sys
. (#131018, @saschagrunert) [SIG Node] - NONW (#132890, @atiratree) [SIG Apps]
- Promoted two EndpointSlice tests to conformance, to require that service proxy implementations are based on EndpointSlices rather than Endpoints. (#132019, @danwinship) [SIG Architecture, Network and Testing]
- Reduced excessive logging from the volume binding scheduler plugin by lowering verbosity of high-frequency messages from V(4) to V(5). (#132840, @ppmechlinski) [SIG Autoscaling, Scheduling and Storage]
Dependencies
Added
- sigs.k8s.io/structured-merge-diff/v6: v6.2.0
Changed
- k8s.io/kube-openapi: d90c4fd → f3f2b99
Removed
- sigs.k8s.io/structured-merge-diff/v4: v4.7.0
v1.34.0-alpha.3
Downloads for v1.34.0-alpha.3
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | ec76c311b4aa0bcc97d4a83e6586a14081129343721bf844f0907ec2e14cad1ba4d0db04b667de963043c0fd4b410f7fe90788c10f070fa3b8ad0aa340e2dc5f |
kubernetes-src.tar.gz | b99cf04b86438285c24872e6ec2fdc03998a95b88e502e457ea03fba01beb870ef34e57055f7a14a016ae102906a1ed32ea20ddada31c9c1fa467c47b203d1f9 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | 5f2b298b4f1c27e06e79258b2ac840a36f70d46bd95b776d01bee89c1821b8a1138556224d4c23b8e582ca1676e0125bda8ebc93e8db0a92ede240efa169b01f |
kubernetes-client-darwin-arm64.tar.gz | 719d4d81d85cf7f73e6f461e17c1559768f4e084753d0b210603e920b2ee6d687350e7ba5ae0bfa160630c02159e2900936ebde03104050f2eb6906b24573694 |
kubernetes-client-linux-386.tar.gz | 07ec8bd3d5308431bb4cf17dc8937ad13b95a2aab35fa0389479776228cc0f47756d1791d2371a66fa8f045d1894ac6d0dec4e42a3f96e443ea961cd2e7477ee |
kubernetes-client-linux-amd64.tar.gz | 5c4613fa4b8de852147a24e7c80894f1588e93023cff4bfe58725e2b141f5417662bcf837272c41eeaf8a91382eca3e6015b27cca099e516ba2e08214521279a |
kubernetes-client-linux-arm.tar.gz | 1204c3f108b5e83a081b31af13d9e3185f0ff3c9547213ecbd854293b89661f5060c2b10a2c73d8bb6d5099438287dedbcdf88f33de6bc95a060e2d634d80652 |
kubernetes-client-linux-arm64.tar.gz | 763d07a3a3f69b42047686e81e6cc137f9ef4b7ab2f50cc7bfbb26b8a15e011549501893e5cb9b77de0008cc77631fd8f37d113c0f0ee6a17e6435da06c269a2 |
kubernetes-client-linux-ppc64le.tar.gz | ad4f45f8402014da35a3ff1daa5cfaafedd2d7e579bff1a0a87f49647e2d8488eb2b791776de3e4d5ac25631f13ec9c0bc64e7e0edd9f9049619659b9ebf9305 |
kubernetes-client-linux-s390x.tar.gz | aba923f458d8f8d4c27b0144f40cac186663884447a5a67c20d2fb59d0c9ebd83e8d7480555365562e97c88992d28ffdd20378ce18412465a0356b2c20fa5dff |
kubernetes-client-windows-386.tar.gz | b5b1a854e0298f2f401627ecec5bd61fad8ccb7f77a42b5c34e6c0dc8f4f5e7485d13525f2775b160b15277d591d46c1633acddea60dd2b20949794f0f80a4e5 |
kubernetes-client-windows-amd64.tar.gz | 75b60210f1e6994abc4da9fceb23290438be81c094e27b2025c96addde4cbc034348dde0d50098db22aeceed3e3d6dd855d8d740d36e0f16932ca4ae537542d0 |
kubernetes-client-windows-arm64.tar.gz | f997fa3ba6081273b46e6a71a98fcee06c0df36e045fd43eb38454b28dcf3863e8e5f053cc14057f9cfd53267ae611477f5410a2305d56b7a60a88f4c0cb36bd |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 3313f4746bdfaf7bd86bd72d035c552ae800426f5546eb23b83bdb3178e378d3aa5c4a59bc2b5ce5d97755432879812a293f582ca1dec3733e95adc5a5c07524 |
kubernetes-server-linux-arm64.tar.gz | add5d69f2d48656649d1712c476a9de99ef2fcf4473d982b78b834e5ad544cf947a9fc35324552cd38e3824ea96194a81d76bc99111bfc725b9aa9212da8e88d |
kubernetes-server-linux-ppc64le.tar.gz | f2038f7382e660e8c97c4efa05adcb3d785ccd550597a50aa9d98e04e9bf1f29b5ac0c5d3d686f01870d64949dc43cf83e176c718fddc20f84ed38bd44f8ba54 |
kubernetes-server-linux-s390x.tar.gz | 077708405b4b22ebeaee8feeddbe1134374008129cc0cc40830434fa762f549f5950c1c2f76b72ddfab2ccc972e3325cb360a13acdbe54729a1eae0324b60b08 |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 9c0a3e76311789bfbaa3d8e27c289e5b5ab142ab0269dd5922016d2e3e8be6ddffd60ba1a57d6deb2571e4826bec1aab81c98a973d633b263ac316275ee01251 |
kubernetes-node-linux-arm64.tar.gz | 1289b5e39164eaac2acce143dbb389341966e06b8b0261eb0eb4eb774848dd34f35b78d22b56d1613d5a6801868881415af62aa15ff8b1cbedbec9cad0567591 |
kubernetes-node-linux-ppc64le.tar.gz | 235d060ddd4c3da0b58fdb64a6a25b03690b7eb9c2888201b86d269f29d2a4e70000cea9711dff472626e78b56e228b9ffd16ab89442c54991de44bc8c3d9344 |
kubernetes-node-linux-s390x.tar.gz | 8e9ca919e77e0ff226e92c036ac35ab284aa07fdd2e01b01bb4352d04acd567f40edc4caf934092cb3c1b04ac4ea281ef6681b6589d9e43ea25ae038381e95ad |
kubernetes-node-windows-amd64.tar.gz | 421cf6c68c5e0603f67dd44ac0d4d02c6feb3e60e9608268cdc4b498718c99b2cef4842fb7df60feaa99dc18d650164a0fcc31fbf896653ea4b6d126e0683d14 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.34.0-alpha.2
Changes by Kind
API Change
- DRA: the v1alpha4 kubelet gRPC API (added in 1.31, superseded in 1.32) is no longer supported. DRA drivers using the helper package from Kubernetes >= 1.32 use the v1beta1 API and continue to be supported. (#132574, @pohly) [SIG Node]
- Deprecate StreamingConnectionIdleTimeout field of the kubelet config. (#131992, @lalitc375) [SIG Node]
- Removed deprecated gogo protocol definitions from
k8s.io/cri-api
in favor ofgoogle.golang.org/protobuf
. (#128653, @saschagrunert) [SIG API Machinery, Auth, Instrumentation, Node and Testing] - Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the apiextensions-apiserver apiextensions. (#132723, @PatrickLaabs) [SIG API Machinery]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the component-base. (#132754, @PatrickLaabs) [SIG API Machinery, Architecture, Instrumentation and Scheduling]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the kube-aggregator apiregistration. (#132701, @PatrickLaabs) [SIG API Machinery]
- Replaces Boolean-pointer-helper functions with the "k8s.io/utils/ptr" implementations. (#132794, @PatrickLaabs) [SIG API Machinery, Auth, CLI, Node and Testing]
- Replaces deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the apiserver (1/2). (#132751, @PatrickLaabs) [SIG API Machinery and Auth]
- Simplied validation error message for required fields by removing redundant messages. (#132472, @xiaoweim) [SIG API Machinery, Apps, Architecture, Auth, Cloud Provider, Network, Node and Storage]
Feature
- Add configurable flags to kube-apiserver for coordinated leader election. (#132433, @michaelasp) [SIG API Machinery and Testing]
- Add support for --cpu, --memory flag to kubectl autoscale, start deprecating --cpu-precent. (#129373, @googs1025) [SIG CLI]
- Added SizeBasedListCostEstimate feature gate that allows apiserver to estimate sizes of objects to calculate cost of LIST requests (#132355, @serathius) [SIG API Machinery and Etcd]
- DRA kubelet: the kubelet now also cleans up ResourceSlices in some additional failure scenarios (driver gets removed forcibly or crashes and does not restart). (#132058, @pohly) [SIG Node and Testing]
- Graduate
StreamingCollectionEncodingToJSON
andStreamingCollectionEncodingToProtobuf
to GA (#132648, @serathius) [SIG API Machinery] - Kubeadm: graduated the kubeadm specific feature gate WaitForAllControlPlaneComponents to GA. The feature gate is now locked to always enabled and on node initialization kubeadm will perform a health check for all control plane components and not only the kube-apiserver. (#132594, @neolit123) [SIG Cluster Lifecycle]
- Static pods that reference API objects are now denied admission by the kubelet so that static pods would not be silently running even after the mirror pod creation fails. (#131837, @sreeram-venkitesh) [SIG Auth, Node and Testing]
- The new
dra_resource_claims_in_use
kubelet metrics informs about active ResourceClaims, overall and by driver. (#131641, @pohly) [SIG Architecture, Instrumentation, Node and Testing] - When
RelaxedServiceNameValidation
feature gate is enabled, the names of new Services names are validation withNameIsDNSLabel()
, relaxing the pre-existing validation. (#132339, @adrianmoisey) [SIG Apps, Network and Testing]
Failing Test
- Fixed e2e test "[Driver: csi-hostpath] [Testpattern: Dynamic PV (filesystem volmode)] volumeLimits should support volume limits]" not to leak Pods and namespaces. (#132674, @jsafrane) [SIG Storage and Testing]
Bug or Regression
- Add podSpec validation for create StatefulSet (#131790, @chengjoey) [SIG Apps, Etcd and Testing]
- Clarify help message of --ignore-not-found flag. Support --ignore-not-found in
watch
operation. (#132542, @gemmahou) [SIG CLI] - DRA drivers: the resource slice controller sometimes didn't react properly when kubelet or someone else deleted a recently created ResourceSlice. It incorrectly assumed that the ResourceSlice still exists and didn't recreate it. (#132683, @pohly) [SIG Apps, Node and Testing]
- Ensure objects are transformed prior to storage in SharedInformers if a transformer is provided and
WatchList
is activated (#131799, @valerian-roche) [SIG API Machinery] - Fix validation for Job with suspend=true, and completions=0 to set the Complete condition. (#132614, @mimowo) [SIG Apps and Testing]
- Fixed a bug that fails to create a replica set when a deployment name is too long. (#132560, @hdp617) [SIG API Machinery and Apps]
- Fixed the bug when swap related metrics were not available in
/metrics/resource
endpoint. (#132065, @yuanwang04) [SIG Node and Testing] - Fixed the problem of validation error when specifying resource requirements at the container level for a resource not supported at the pod level. It implicitly interpreted the pod-level value as 0. (#132551, @chao-liang) [SIG Apps]
- HPA status now displays memory metrics using Ki (#132351, @googs1025) [SIG Apps and Autoscaling]
- Removed defunct
make vet
target, please usemake lint
instead (#132509, @yongruilin) [SIG Testing] - Statefulset now respects minReadySeconds (#130909, @Edwinhr716) [SIG Apps]
Other (Cleanup or Flake)
- Removed deprecated gogo protocol definitions from
k8s.io/externaljwt
in favor ofgoogle.golang.org/protobuf
. (#132772, @saschagrunert) [SIG Auth] - Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for ./test/e2e and ./test/utils. (#132763, @PatrickLaabs) [SIG Autoscaling and Testing]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for ./test/e2e. (#132764, @PatrickLaabs) [SIG Auth, Network, Node, Storage and Testing]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for ./test/e2e. (#132765, @PatrickLaabs) [SIG API Machinery, Apps, CLI and Testing]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for ./test/integration (#132762, @PatrickLaabs) [SIG Testing]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for apiextensions apiservers validation tests. (#132726, @PatrickLaabs) [SIG API Machinery]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for apiextensions-apiserver pkg/controller. (#132724, @PatrickLaabs) [SIG API Machinery]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for apiextensions-apiserver pkg/registry. (#132725, @PatrickLaabs) [SIG API Machinery]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for pkg/apis (1/2). (#132778, @PatrickLaabs) [SIG Apps and Network]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for pkg/apis (2/2). (#132779, @PatrickLaabs) [SIG Apps, Auth and Storage]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for pkg/controller (1/2). (#132781, @PatrickLaabs) [SIG API Machinery, Apps and Network]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for pkg/controller (2/2). (#132784, @PatrickLaabs) [SIG API Machinery, Apps, Network, Node and Storage]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for pod-security-admission tests. (#132741, @PatrickLaabs) [SIG Auth]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the apiextensions-apiservers integration tests. (#132721, @PatrickLaabs) [SIG API Machinery]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the cli-runtime. (#132750, @PatrickLaabs) [SIG CLI and Release]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the cloud-provider. (#132720, @PatrickLaabs) [SIG Cloud Provider and Network]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the components-helper of the apimachinery. (#132413, @PatrickLaabs) [SIG API Machinery]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the controller-manager. (#132753, @PatrickLaabs) [SIG API Machinery and Cloud Provider]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the csr. (#132699, @PatrickLaabs) [SIG API Machinery and Auth]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the e2e_node. (#132755, @PatrickLaabs) [SIG Node and Testing]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the kubeapiserver. (#132529, @PatrickLaabs) [SIG API Machinery and Architecture]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the pkg/security and plugin/pkg. (#132777, @PatrickLaabs) [SIG Auth, Node and Release]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the pod-security-admission admissiontests. (#132742, @PatrickLaabs) [SIG Auth]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the pod-security-admission policy. (#132743, @PatrickLaabs) [SIG Auth]
- Replaced deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the reflector. (#132698, @PatrickLaabs) [SIG API Machinery]
- Replaces deprecated package 'k8s.io/utils/pointer' with 'k8s.io/utils/ptr' for the apiserver (2/2). (#132752, @PatrickLaabs) [SIG API Machinery and Auth]
- Replaces toPtr helper functions with the "k8s.io/utils/ptr" implementations. (#132806, @PatrickLaabs) [SIG Apps, Testing and Windows]
- Types: ClusterEvent, ActionType, EventResource, ClusterEventWithHint, QueueingHint and QueueingHintFn moved from pkg/scheduler/framework to k8s.io/kube-scheduler/framework. (#132190, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]
- Types: Code and Status moved from pkg/scheduler/framework to staging repo. Users should update import path for these types from "k8s.io/kubernetes/pkg/scheduler/framework" to "k8s.io/kube-scheduler/framework" (#132087, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]
- Update etcd version to v3.6.1 (#132284, @ArkaSaha30) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing]
Dependencies
Added
- go.yaml.in/yaml/v2: v2.4.2
- go.yaml.in/yaml/v3: v3.0.4
Changed
- github.com/emicklei/go-restful/v3: v3.11.0 → v3.12.2
- github.com/google/gnostic-models: v0.6.9 → v0.7.0
- k8s.io/kube-openapi: 8b98d1e → d90c4fd
- sigs.k8s.io/json: 9aa6b5e → cfa47c3
- sigs.k8s.io/yaml: v1.4.0 → v1.5.0
Removed
Nothing has changed.
v1.34.0-alpha.2
Downloads for v1.34.0-alpha.2
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 566db0b881557117fd7038bb5f25c46c727d2cc6a7cf3de0afc720eeeecfce947ae0e1b5162173a3ebfb915cfcc2c05fe8ab61db4551ac882a2756ad333d6337 |
kubernetes-src.tar.gz | 3ccccf95776d0639455cead6d74a04e1af8f244915c583213b70f688ffd0cb291752da48589134eac5392ff1f6fb5046803d1e35f70475bcf74ded85c587df49 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | 058f6b47787adabfbb191ef80888633cddf5e2e36be6bb113da7db2c239c2691ad5467d381b09ca78bf9c54397a7eb0d54f2025ba7314c504eee4537787982b1 |
kubernetes-client-darwin-arm64.tar.gz | 1e22f2b5c699e991daa282aaa1475d37e1614e4d90022dadc205b64c988c5050005a2347d0e93c9b0804c0db1fd0eb1f8eb4f86a0811638ccd9324cda95265fa |
kubernetes-client-linux-386.tar.gz | dacff605a6be45b4844b5120e420aedeea422297de1c9d5b5bc5926cc730efdc13f9881c75cb346159cb8a4e0a4364070299ffcc41494dbdd8ece6f698238658 |
kubernetes-client-linux-amd64.tar.gz | 38f5c80ad4cf1c8e422d5ac54cf6e5ea93425bd4fe4dd8d9ac011734e2b187769f74da749240bea1cc3a850ea6530dcbc27979af8fc9d86b3ec3299362c54e03 |
kubernetes-client-linux-arm.tar.gz | e8e116b2603e961d6090da8755d61c895a5ec7e9b6bf0bfc52a6a2b45c2111c73f7c30496dfdc624778c9ce74aa116206c0b3adcc41b046d06d8301a55218679 |
kubernetes-client-linux-arm64.tar.gz | ece12bddbae26f6d63e39482985a43429b768d82bc6c1b523724c134d98f52ae41c64f66d267d53400566bf0428021228c9cf9b0b663399ab27c08304bbe193f |
kubernetes-client-linux-ppc64le.tar.gz | 4346923ea8eae6e51c07fa53a6a6f72d75ca6a50db5ae255c9902f4bd7af0a1cde359f9d6c2a84253c74e4d32f32ee81abe8b1dfaabb0206f871c57ba1eacb73 |
kubernetes-client-linux-s390x.tar.gz | e7f93440b0497bab07db1f5bf70be61148abe555a8aa83712201128056a0e53c0273a7269ba92c65af0095bb9e69d3bfe85359720969bca1399d21e0b04b1264 |
kubernetes-client-windows-386.tar.gz | 5a43893f34cac36608a7817c1116c43b71411ef75d71188886672941db7d8080efcb94e183b0beadc852b36b12986eb356bdde4c4a7729e284e214ba8cf43fea |
kubernetes-client-windows-amd64.tar.gz | 52f3514824ab0a152eaf588722f56e6d12366ecf8479e1cd11f0e878ed7c9b0b5ec528cdb7dd0f03273eef704adeaa3cce3918e89bd7a4c15480130aa5c6b5f3 |
kubernetes-client-windows-arm64.tar.gz | 5f31dfc54626f31feff6373a7282cf624779a79b2178f0d7ff4e977652c5f8bc2b2c64de1b6db22eda9c563a4980b3b72b134ff2a1743a5b196ab3eeb6f5e452 |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | b13750ef0157384cf353ef6a4471fd17706c3bf3bd7bed2c84efc57f8863f3c7306a09813d8788fcd97d0e7e0929f4c136e2ac047c30fef2c45d4fb3d0bbe8ff |
kubernetes-server-linux-arm64.tar.gz | 84d004c4df9c46a280abfca2af02d5601d07fa8e1355b4ebfc2dcc069829804650a1097f97254c4f4ad0423b7f4828c76dfd2a56348aa1339f5518bbb9257c8e |
kubernetes-server-linux-ppc64le.tar.gz | f1cb4b333fc9bc696a3a75b4b0a846fe9f207c79fcfac438f2d3e3a709d23039c3f1507ea6e03dff2b5a4ef737052c613d354efe3b034384544ebf99551be7ea |
kubernetes-server-linux-s390x.tar.gz | ded6953d4d2b04f589a24f5e6e21aa3630d9a12f5562d8c8e6301660b1fa04782523500d74bb5399a8cb0d6102546bd1000591c3dd8464d98a3d3399576a20e7 |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | e4e4e2ac9acb4d36aded75ee4e841947b8eec2e66b08d11b01b662c5372be51cd746b9a87248a03be45c49de9aa53a31904b38a3e1253f0aaecc5e5b774cb4d7 |
kubernetes-node-linux-arm64.tar.gz | 40318c61e6b060c18d2cd80143d83bab9178275f099e65b82161334eb9970ec9151b581654151799532564c92c4a3730abeb00a9e88ddcfddd66ed69d09c9921 |
kubernetes-node-linux-ppc64le.tar.gz | 778ca04559776b3e03537e13ff9f2136ae7fdb71c2a130e9734761cb2ad278f1af9e7285a132f2f77f49566f0c302ef8ca7f3694f84e48c93f5585236718cd8e |
kubernetes-node-linux-s390x.tar.gz | b6b0865359b6c767b233374918263d05cfd8fb52130b67ca7db2dcc01df119efbff89041a6310dbed77c96aa8faeb5a50bd1c184ccd9e5441eb09c1cb6df8e03 |
kubernetes-node-windows-amd64.tar.gz | 9374a3ec4ea2d417a63fef4809e982b9cc62f98ef67cd0bcabb7b673f1efaa82c66724bf605e658d0905cf9ee61f61f1ab00a077a330ee1e4197c06c582d9a37 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.34.0-alpha.1
Changes by Kind
Deprecation
- Apimachinery: deprecated MessageCountMap and CreateAggregateFromMessageCountMap (#132376, @tico88612) [SIG API Machinery]
API Change
- Add a
runtime.ApplyConfiguration
interface that is implemented by all generated applyconfigs (#132194, @alvaroaleman) [SIG API Machinery and Instrumentation] - Added omitempty and opt tag to the API v1beta2 AdminAccess type in the DeviceRequestAllocationResult struct. (#132338, @PatrickLaabs) [SIG Auth]
- Introduces OpenAPI format support for
k8s-short-name
andk8s-long-name
. (#132504, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage] - Promoted Job Pod Replacement Policy to general availability. The
JobPodReplacementPolicy
feature gate is now locked to true, and will be removed in a future release of Kubernetes. (#132173, @dejanzele) [SIG Apps and Testing] - This PR corrects that documentation, making it clear to users that podSelector is optional and describes its default behavior. (#131354, @tomoish) [SIG Network]
Feature
- Added a delay to node updates after kubelet startup. A random offset, based on the configured
nodeStatusReportFrequency
, helps spread the traffic and load (due to node status updates) more evenly over time. The initial status update can be up to 50% earlier or 50% later than the regular schedule. (#130919, @mengqiy) [SIG Node] - Included namespace in the output of the kubectl delete for clearer identification of resources. (#126619, @totegamma) [SIG CLI]
- Kube-apiserver: each unique set of etcd server overrides specified with
--etcd-servers-overrides
now surface health checks namedetcd-override-<index>
andetcd-override-readiness-<index>
. These checks are still excluded by?exclude=etcd
and?exclude=etcd-readiness
directives. (#129438, @pacoxu) [SIG API Machinery and Testing]
Bug or Regression
- Fix regression introduced in 1.33 - where some Paginated LIST calls are falling back to etcd instead of serving from cache. (#132244, @hakuna-matatah) [SIG API Machinery]
- Fixed API response for StorageClassList queries and returns a graceful error message, if the provided ResourceVersion is too large. (#132374, @PatrickLaabs) [SIG API Machinery and Etcd]
- Fixed an issue which allowed Custom Resources to be created with Server-Side Apply even when its CustomResourceDefinition was terminating. (#132467, @sdowell) [SIG API Machinery]
- Removed the deprecated flag '--wait-interval' for the ip6tables-legacy-restore binary. (#132352, @PatrickLaabs) [SIG Network]
Other (Cleanup or Flake)
- Conntrack reconciler now considers service's target port during cleanup of stale flow entries. (#130542, @aroradaman) [SIG Network]
- Job controller uses controller UID index for pod lookups. (#132305, @xigang) [SIG Apps]
- Removed the deprecated
--register-schedulable
command line argument from the kubelet. (#122384, @carlory) [SIG Cloud Provider, Node and Scalability] - Removes the
kubernetes.io/initial-events-list-blueprint
annotation from the synthetic "Bookmark" event for the watch stream requests. (#132326, @p0lyn0mial) [SIG API Machinery]
Dependencies
Added
- go.yaml.in/yaml/v2: v2.4.2
- go.yaml.in/yaml/v3: v3.0.3
Changed
- k8s.io/kube-openapi: c8a335a → 8b98d1e
- sigs.k8s.io/yaml: v1.4.0 → v1.5.0
Removed
Nothing has changed.
v1.34.0-alpha.1
Downloads for v1.34.0-alpha.1
Source Code
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 4125206915e9f0cd7bffd77021f210901bade4747d84855c8210922c82e2085628a05b81cef137e347b16a05828f99ac2a27a8f8f19a14397011031454736ea0 |
kubernetes-src.tar.gz | c1dfe0a1df556adcad5881a7960da5348feacc23894188b94eb75be0b156912ab8680b94e2579a96d9d71bff74b1c813b8592de6926fba8e5a030a88d8b4b208 |
Client Binaries
filename | sha512 hash |
---|---|
kubernetes-client-darwin-amd64.tar.gz | 22c4d1031297ea1833b3cd3e6805008c34b66f932ead3818db3eb2663a71510a8cdb53a05852991d54e354800ee97a2aad4afc31726d956f38c674929ce10778 |
kubernetes-client-darwin-arm64.tar.gz | 6be320d2075d8a7835751c019556059ff2fca704d0bbeeff181248492d8ed6fcc2d6d6b68c509e4453431100b06a20268e61b9e434b638a78ebfad68e7c41276 |
kubernetes-client-linux-386.tar.gz | e63ac6b7127591068626a3d7caf0e1bae6390106f6c93efae34b18e38af257f1521635eb2adf76c40ad0f0d9a5397947bbb0215087d4d2e87ce6f253b6aec1a4 |
kubernetes-client-linux-amd64.tar.gz | 12dc8dc4997b71038c377bfd9869610110cebb20afcb051e85c86832f75bc8e7eabbb08b5caa00423c5f8df68210ad5ca140a61d4a8e9ad8640f648250205752 |
kubernetes-client-linux-arm.tar.gz | 0a7f8df6abfe9971f778add6771135d7079c245b18dd941eacf1230f75f461e7d8302142584aa4d60062c8cfd4e021f21ae5aa428d82b5fbe3697bda0e5854ff |
kubernetes-client-linux-arm64.tar.gz | b1442640ac1e45268e9916d0c51e711b7640fd2594ecad05a0d990c19db2e0dcde53cc90fb13588a2b926e25c831f62bf5461fa9c8e6a03a83573cc1c3791903 |
kubernetes-client-linux-ppc64le.tar.gz | e5a028da7fcb24aee85d010741c864fa4e5a3d6c87223b5c397686107a53dd2801a8c75cf9e1046ab28c97b06a5457aa6b3e4f809cd46cbe4858f78b2cb6a4df |
kubernetes-client-linux-s390x.tar.gz | 4d3fce13d8f29e801c4d7355f83ded4d2e4abcc0b788f09d616ef7f89bd04e9d92d0b32e6e365118e618b32020d8b43e4cbd59a82262cc787b98f42e7df4ddbc |
kubernetes-client-windows-386.tar.gz | 3bbe15f8856cab69c727b02766024e1bb430add8ad18216929a96d7731d255c5d5bb6b678a4d4e7a021f2e976633b69c0516c2260dcc0bee7d2447f64bd52fe8 |
kubernetes-client-windows-amd64.tar.gz | 1833d8b09d5524df91120115667f897df47ad66edb57d2570e022234794c4d0d09212fca9b0b64e21ccc8ce6dcd41080bf9198c81583949cb8001c749f25e8a0 |
kubernetes-client-windows-arm64.tar.gz | c0819674e11923b38d2df7cb9955929247a5b0752c93fc5215300da3514c592348cbe649a5c6fd6ac63500c6d68cf61a2733c099788164547e3f7738afe78ecf |
Server Binaries
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | acd0b0b6723789780fd536894a965001056e94e92e2070edacdb53d2d879f56a90cc2c1ad0ff6d634ed74ef4debcefa01eee9f675cc4c70063da6cc52cc140d3 |
kubernetes-server-linux-arm64.tar.gz | 31321659424b4847ec456ae507486efe57c8e903c2bc450df65ffc3bc90011ba050e8351ab32133943dfebd9d6e8ad47f2546a7cdc47e424cdaf0dc7247e08c3 |
kubernetes-server-linux-ppc64le.tar.gz | fe81aa313be46ed5cc91507e58bc165e98722921d33473c29d382dceb948b1ffc0437d74825277a7da487f9390dec64f6a70617b05e0441c106fa87af737b90c |
kubernetes-server-linux-s390x.tar.gz | 69a54f40e7a8684a6a1606f0463266d83af615f70a55d750031d82601c8070f4f9161048018c78e0859faa631ec9984fc20af3bc17240c8fc9394c6cbffacaf9 |
Node Binaries
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 797a5df349e571330e8090bd78f024d659d0d46e8a7352210b80ac594ef50dc2f3866240b75f7c0d2e08fa526388d0dfdcb91b4686f01b547c860a2d0a9846a7 |
kubernetes-node-linux-arm64.tar.gz | 552a114facbd42c655574953186ba15a91c061b3db9ad25e665892c355347bf841e1bf716f8e28a16f1f1b37492911103212ec452bf5e663f8fcf26fae3ccc6a |
kubernetes-node-linux-ppc64le.tar.gz | 7f08bad1921127fdceba7deb58d305e0b599de7ab588da936ff753ab4c6410b5db0634d71094e97ee1baeaccc491370c88268f6a540eedb556c90fb1ce350eda |
kubernetes-node-linux-s390x.tar.gz | 4d1ac168b4591bf5ed7773d87eb47e64eb322adb6fd22b89f4f79c9849aee70188f0fa04a18775feff6f9baf95277499c56cd471a56240a87f9810c82434ba35 |
kubernetes-node-windows-amd64.tar.gz | 896e508aa1c0bb3249c01554aea0ea25d65c4d9740772f8c053ded411b89a34a1c1e954e62fad10a1366cb0a9534af9b3d4e0a46acd956b47eb801e900dfcbe6 |
Container Images
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Changelog since v1.33.0
Urgent Upgrade Notes
(No, really, you MUST read this before you upgrade)
- For metrics
apiserver_cache_list_fetched_objects_total
,apiserver_cache_list_returned_objects_total
,apiserver_cache_list_total
replaceresource_prefix
label with APIgroup
andresource
labels. For metricsetcd_request_duration_seconds
,etcd_requests_total
andetcd_request_errors_total
replacetype
label with APIresource
andgroup
label. For metricapiserver_selfrequest_total
add a APIgroup
label. For metricsapiserver_watch_events_sizes
andapiserver_watch_events_total
replace APIkind
label withresource
label. For metricsapiserver_request_body_size_bytes
,apiserver_storage_events_received_total
,apiserver_storage_list_evaluated_objects_total
,apiserver_storage_list_fetched_objects_total
,apiserver_storage_list_returned_objects_total
,apiserver_storage_list_total
,apiserver_watch_cache_events_dispatched_total
,apiserver_watch_cache_events_received_total
,apiserver_watch_cache_initializations_total
,apiserver_watch_cache_resource_version
,watch_cache_capacity
,apiserver_init_events_total
,apiserver_terminated_watchers_total
,watch_cache_capacity_increase_total
,watch_cache_capacity_decrease_total
,apiserver_watch_cache_read_wait_seconds
,apiserver_watch_cache_consistent_read_total
,apiserver_storage_consistency_checks_total
,etcd_bookmark_counts
,storage_decode_errors_total
extract the API group fromresource
label and put it in newgroup
label. (#131845, @serathius) [SIG API Machinery, Etcd, Instrumentation and Testing] - Kubelet: removed the deprecated flag
--cloud-config
from the command line. (#130161, @carlory) [SIG Cloud Provider, Node and Scalability] - Scheduling Framework exposes NodeInfos to the PreFilterPlugins. The PreFilterPlugins need to accept the NodeInfo list from the arguments. (#130720, @saintube) [SIG Node, Scheduling, Storage and Testing]
Changes by Kind
Deprecation
- Deprecate preferences field in kubeconfig in favor of kuberc (#131741, @soltysh) [SIG API Machinery, CLI, Cluster Lifecycle and Testing]
- Kubeadm: consistently print an 'error: ' prefix before errors. (#132080, @neolit123) [SIG Cluster Lifecycle]
- Kubeadm: only expose non-deprecated klog flags, 'v' and 'vmodule', to align with KEP https://features.k8s.io/2845 (#131647, @carsontham) [SIG Cluster Lifecycle]
- [cloud-provider] respect the "exclude-from-external-load-balancers=false" label (#131085, @kayrus) [SIG Cloud Provider and Network]
API Change
-
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:
([#131996](https://github.com/kubernetes/kubernetes/pull/131996), [@ritazh](https://github.com/ritazh)) [SIG Node and Testing]- DRA API: resource.k8s.io/v1alpha3 now only contains DeviceTaintRule. All other types got removed because they became obsolete when introducing the v1beta1 API in 1.32. before updating a cluster where resourceclaims, resourceclaimtemplates, deviceclasses, or resourceslices might have been stored using Kubernetes < 1.32, delete all of those resources before updating and recreate them as needed while running Kubernetes >= 1.32. (#132000, @pohly) [SIG Etcd, Node, Scheduling and Testing]
-
Extends the nodeports scheduling plugin to consider hostPorts used by restartable init containers. (#132040, @avrittrohwer) [SIG Scheduling and Testing]
-
Kube-apiserver: Caching of authorization webhook decisions for authorized and unauthorized requests can now be disabled in the
--authorization-config
file by setting the new fieldscacheAuthorizedRequests
orcacheUnauthorizedRequests
tofalse
explicitly. See https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. (#129237, @rfranzke) [SIG API Machinery and Auth] -
Kube-apiserver: Promoted the
StructuredAuthenticationConfiguration
feature gate to GA. (#131916, @aramase) [SIG API Machinery, Auth and Testing] -
Kube-apiserver: the AuthenticationConfiguration type accepted in
--authentication-config
files has been promoted toapiserver.config.k8s.io/v1
. (#131752, @aramase) [SIG API Machinery, Auth and Testing] -
Kube-log-runner: rotating log output into a new file when reaching a certain file size can be requested via the new
-log-file-size
parameter.-log-file-age
enables automatical removal of old output files. Periodic flushing can be requested through-flush-interval
. (#127667, @zylxjtu) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows] -
Kubectl: graduated
kuberc
support to beta. Akuberc
configuration file provides a mechanism for customizing kubectl behavior (separate from kubeconfig, which configured cluster access across different clients). (#131818, @soltysh) [SIG CLI and Testing] -
Promote the RelaxedEnvironmentVariableValidation feature gate to GA and lock it in the default enabled state. (#132054, @HirazawaUi) [SIG Apps, Architecture, Node and Testing]
-
Remove inaccurate statement about requiring ports from pod spec hostNetwork field (#130994, @BenTheElder) [SIG Network and Node]
-
TBD (#131318, @aojea) [SIG API Machinery, Apps, Architecture, Auth, Etcd, Network and Testing]
-
The validation of
replicas
field in the ReplicationController/scale
subresource has been migrated to declarative validation. If theDeclarativeValidation
feature gate is enabled, mismatches with existing validation are reported via metrics. If theDeclarativeValidationTakeover
feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#131664, @jpbetz) [SIG API Machinery and Apps] -
The validation-gen code generator generates validation code that supports validation ratcheting. (#132236, @yongruilin) [SIG API Machinery, Apps, Auth and Node]
-
Update etcd version to v3.6.0 (#131501, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing]
-
When the IsDNS1123SubdomainWithUnderscore function returns an error, it will return the correct regex information dns1123SubdomainFmtWithUnderscore. (#132034, @ChosenFoam) [SIG Network]
-
Zero-value
metadata.creationTimestamp
values are now omitted and no longer serialize an explicitnull
in JSON, YAML, and CBOR output (#130989, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Scheduling, Storage and Testing]
Feature
-
Add a flag to
kubectl version
that detects whether a client/server version mismatch is outside the officially supported range. (#127365, @omerap12) [SIG CLI] -
Add support for CEL expressions with escaped names in structured authentication config. Using
[
for accessing claims or user data is preferred when names contain characters that would need to be escaped. CEL optionals via?
can be used in places wherehas
cannot be used, i.e.claims[?"kubernetes.io"]
oruser.extra[?"domain.io/foo"]
. (#131574, @enj) [SIG API Machinery and Auth] -
Added Traffic Distribution field to
kubectl describe service
output (#131491, @tchap) [SIG CLI] -
Added a
--show-swap
option tokubectl top
subcommands (#129458, @iholder101) [SIG CLI] -
Added alpha metrics for compatibility versioning (#131842, @michaelasp) [SIG API Machinery, Architecture, Instrumentation and Scheduling]
-
Enabling completion for aliases defined in kuberc (#131586, @ardaguclu) [SIG CLI]
-
Graduate ResilientWatchCacheInitialization to GA (#131979, @serathius) [SIG API Machinery]
-
Graduate configurable endpoints for anonymous authentication using the authentication configuration file to stable. (#131654, @vinayakankugoyal) [SIG API Machinery and Testing]
-
Graduated relaxed DNS search string validation to GA. For the Pod API,
.spec.dnsConfig.searches
now allows an underscore (_
) where a dash (-
) would be allowed, and it allows search strings be a single dot.
. (#132036, @adrianmoisey) [SIG Network and Testing] -
Graduated scheduler
QueueingHint
support to GA (general availability) (#131973, @sanposhiho) [SIG Scheduling and Testing] -
Kube-apiserver: Promoted
ExternalServiceAccountTokenSigner
feature to beta, which enables external signing of service account tokens and fetching of public verifying keys, by enabling the betaExternalServiceAccountTokenSigner
feature gate and specifying--service-account-signing-endpoint
. The flag value can either be the location of a Unix domain socket on a filesystem, or be prefixed with an @ symbol and name a Unix domain socket in the abstract socket namespace. (#131300, @HarshalNeelkamal) [SIG API Machinery, Auth and Testing] -
Kube-controller-manager events to support contextual logging. (#128351, @mengjiao-liu) [SIG API Machinery]
-
Kube-proxy: Check if IPv6 is available on Linux before using it (#131265, @rikatz) [SIG Network]
-
Kubeadm: add support for ECDSA-P384 as an encryption algorithm type in v1beta4. (#131677, @lalitc375) [SIG Cluster Lifecycle]
-
Kubeadm: fixed issue where etcd member promotion fails with an error saying the member was already promoted (#130782, @BernardMC) [SIG Cluster Lifecycle]
-
Kubeadm: graduated the
NodeLocalCRISocket
feature gate to beta and enabed it by default. When its enabled, kubeadm will:- Generate a
/var/lib/kubelet/instance-config.yaml
file to customize thecontainerRuntimeEndpoint
field in per-node kubelet configurations. - Remove the
kubeadm.alpha.kubernetes.io/cri-socket
annotation from nodes during upgrade operations. - Remove the
--container-runtime-endpoint
flag from the/var/lib/kubelet/kubeadm-flags.env
file during upgrades. (#131981, @HirazawaUi) [SIG Cluster Lifecycle]
- Generate a
-
Kubeadm: switched the validation check for Linux kernel version to throw warnings instead of errors. (#131919, @neolit123) [SIG Cluster Lifecycle and Node]
-
Kubelet: the
--image-credential-provider-config
flag previously only accepted an individual file, but can now specify a directory path as well; when a directory is specified, all .json/.yaml/.yml files in the directory are loaded and merged in lexicographical order. (#131658, @dims) [SIG Auth and Node] -
Kubernetes api-server now merges selectors built from matchLabelKeys into the labelSelector of topologySpreadConstraints, aligning Pod Topology Spread with the approach used by Inter-Pod Affinity.
To avoid breaking existing pods that use matchLabelKeys, the current scheduler behavior will be preserved until it is removed in v1.34. Therefore, do not upgrade your scheduler directly from v1.32 to v1.34. Instead, upgrade step-by-step (from v1.32 to v1.33, then to v1.34), ensuring that any pods created at v1.32 with matchLabelKeys are either removed or already scheduled by the time you reach v1.34.
If you maintain controllers that previously relied on matchLabelKeys (for instance, to simulate scheduling), you likely no longer need to handle matchLabelKeys directly. Instead, you can just rely on the labelSelector field going forward.
Additionally, a new feature gate
MatchLabelKeysInPodTopologySpreadSelectorMerge
, which is enabled by default, has been added to control this behavior. (#129874, @mochizuki875) [SIG Apps, Node, Scheduling and Testing] -
Kubernetes is now built using Go 1.24.3 (#131934, @cpanato) [SIG Release and Testing]
-
Kubernetes is now built using Go 1.24.4 (#132222, @cpanato) [SIG Release and Testing]
-
LeaseLocks can now have custom Labels that different holders will overwrite when they become the holder of the underlying lease. (#131632, @DerekFrank) [SIG API Machinery]
-
Non-scheduling related errors (e.g., network errors) don't lengthen the Pod scheduling backoff time. (#128748, @sanposhiho) [SIG Scheduling and Testing]
-
Promote feature OrderedNamespaceDeletion to GA. (#131514, @cici37) [SIG API Machinery and Testing]
-
Removed "endpoint-controller" and "workload-leader-election" FlowSchemas from the default APF configuration.
migrate the lock type used in the leader election in your workloads from configmapsleases/endpointsleases to leases. (#131215, @tosi3k) [SIG API Machinery, Apps, Network, Scalability and Scheduling]
-
The PreferSameTrafficDistribution feature gate is now enabled by default, enabling the
PreferSameNode
traffic distribution value for Services. (#132127, @danwinship) [SIG Apps and Network] -
Updated the built in
system:monitoring
role with permission to access kubelet metrics endpoints. (#132178, @gavinkflam) [SIG Auth]
Failing Test
- Kube-apiserver: The --service-account-signing-endpoint flag now only validates the format of abstract socket names (#131509, @liggitt) [SIG API Machinery and Auth]
Bug or Regression
- Check for newer resize fields when deciding recovery feature's status in kubelet (#131418, @gnufied) [SIG Storage]
- DRA: ResourceClaims requesting a fixed number of devices with
adminAccess
will no longer be allocated the same device multiple times. (#131299, @nojnhuh) [SIG Node] - Disable reading of disk geometry before calling expansion for ext and xfs filesystems (#131568, @gnufied) [SIG Storage]
- Do not expand PVCs annotated with node-expand-not-required (#131907, @gnufied) [SIG API Machinery, Etcd, Node, Storage and Testing]
- Do not expand volume on the node, if controller expansion is finished (#131868, @gnufied) [SIG Storage]
- Do not log error event when waiting for expansion on the kubelet (#131408, @gnufied) [SIG Storage]
- Do not remove CSI json file if volume is already mounted on subsequent errors (#131311, @gnufied) [SIG Storage]
- Fix ReplicationController reconciliation when the DeploymentReplicaSetTerminatingReplicas feature gate is enabled (#131822, @atiratree) [SIG Apps]
- Fix a bug causing unexpected delay of creating pods for newly created jobs (#132109, @linxiulei) [SIG Apps and Testing]
- Fix a bug in Job controller which could result in creating unnecessary Pods for a Job which is already recognized as finished (successful or failed). (#130333, @kmala) [SIG Apps and Testing]
- Fix the allocatedResourceStatuses Field name mismatch in PVC status validation (#131213, @carlory) [SIG Apps]
- Fixed a bug in CEL's common.UnstructuredToVal where
==
evaluates to false for identical objects when a field is present but the value is null. This bug does not impact the Kubernetes API. (#131559, @jpbetz) [SIG API Machinery] - Fixed a bug that caused duplicate validation when updating a ReplicaSet. (#131873, @gavinkflam) [SIG Apps]
- Fixed a panic issue related to kubectl revision history kubernetes/kubectl#1724 (#130503, @tahacodes) [SIG CLI]
- Fixed a possible deadlock in the watch client that could happen if the watch was not stopped. (#131266, @karlkfi) [SIG API Machinery]
- Fixed an incorrect reference to
JoinConfigurationKind
in the error message when no ResetConfiguration is found duringkubeadm reset
with the--config
flag. (#132258, @J3m3) [SIG Cluster Lifecycle] - Fixed an issue where
insufficientResources
was logged as a pointer during pod preemption, making logs more readable. (#132183, @chrisy-x) [SIG Node] - Fixed incorrect behavior for AllocationMode: All in ResourceClaim when used in subrequests. (#131660, @mortent) [SIG Node]
- Fixed misleading response codes in admission control metrics. (#132165, @gavinkflam) [SIG API Machinery, Architecture and Instrumentation]
- Fixes an issue where Windows kube-proxy's ModifyLoadBalancer API updates did not match HNS state in version 15.4. ModifyLoadBalancer policy is supported from Kubernetes 1.31+. (#131506, @princepereira) [SIG Windows]
- HPA controller will no longer emit a 'FailedRescale' event if a scale operation initially fails due to a conflict but succeeds after a retry; a 'SuccessfulRescale' event will be emitted instead. A 'FailedRescale' event is still emitted if retries are exhausted. (#132007, @AumPatel1) [SIG Apps and Autoscaling]
- Improve error message when a pod with user namespaces is created and the runtime doesn't support user namespaces. (#131623, @rata) [SIG Node]
- Kube-apiserver: Fixes OIDC discovery document publishing when external service account token signing is enabled (#131493, @hoskeri) [SIG API Machinery, Auth and Testing]
- Kube-apiserver: cronjob objects now default empty
spec.jobTemplate.spec.podFailurePolicy.rules[*].onPodConditions[*].status
fields as documented, avoiding validation failures during write requests. (#131525, @carlory) [SIG Apps] - Kube-proxy: Remove iptables cli wait interval flag (#131961, @cyclinder) [SIG Network]
- Kube-scheduler: in Kubernetes 1.33, the number of devices that can be allocated per ResourceClaim was accidentally reduced to 16. Now the supported number of devices per ResourceClaim is 32 again. (#131662, @mortent) [SIG Node]
- Kubelet: close a loophole where static pods could reference arbitrary ResourceClaims. The pods created by the kubelet then don't run due to a sanity check, but such references shouldn't be allowed regardless. (#131844, @pohly) [SIG Apps, Auth and Node]
- Kubelet: fix a bug where the unexpected NodeResizeError condition was in PVC status when the csi driver does not support node volume expansion and the pvc has the ReadWriteMany access mode. (#131495, @carlory) [SIG Storage]
- Reduce 5s delay of tainting
node.kubernetes.io/unreachable:NoExecute
when a Node becomes unreachable (#120816, @tnqn) [SIG Apps and Node] - Skip pod backoff completely when PodMaxBackoffDuration kube-scheduler option is set to zero and SchedulerPopFromBackoffQ feature gate is enabled. (#131965, @macsko) [SIG Scheduling]
- The shorthand for --output flag in kubectl explain was accidentally deleted, but has been added back. (#131962, @superbrothers) [SIG CLI]
kubectl create|delete|get|replace --raw
commands now honor server root paths specified in the kubeconfig file. (#131165, @liggitt) [SIG API Machinery]
Other (Cleanup or Flake)
- Added a warning to
kubectl attach
, notifying / reminding users that commands and output are available via thelog
subresource of that Pod. (#127183, @mochizuki875) [SIG Auth, CLI, Node and Security] - Bump cel-go dependency to v0.25.0. The changeset is available at: https://github.com/google/cel-go/compare/v0.23.2...v0.25.0 (#131444, @erdii) [SIG API Machinery, Auth, Cloud Provider and Node]
- Bump kube dns to v1.26.4 (#132012, @pacoxu) [SIG Cloud Provider]
- By default the binaries like kube-apiserver are built with "grpcnotrace" tag enabled. Please use DBG flag if you want to enable golang tracing. (#132210, @dims) [SIG Architecture]
- Changed apiserver to treat failures decoding a mutating webhook patch as failures to call the webhook so they trigger the webhook failurePolicy and count against metrics like
webhook_fail_open_count
(#131627, @dims) [SIG API Machinery] - DRA kubelet: logging now uses
driverName
like the rest of the Kubernetes components, instead ofpluginName
. (#132096, @pohly) [SIG Node and Testing] - DRA kubelet: recovery from mistakes like scheduling a pod onto a node with the required driver not running is a bit simpler now because the kubelet does not block pod deletion unnecessarily. (#131968, @pohly) [SIG Node and Testing]
- Fixed some missing white spaces in the flag descriptions and logs. (#131562, @logica0419) [SIG Network]
- Hack/update-codegen.sh now automatically ensures goimports and protoc (#131459, @BenTheElder) [SIG API Machinery]
- Kube-apiserver: removed the deprecated
apiserver_encryption_config_controller_automatic_reload_success_total
andapiserver_encryption_config_controller_automatic_reload_failure_total
metrics in favor ofapiserver_encryption_config_controller_automatic_reloads_total
. (#132238, @aramase) [SIG API Machinery, Auth and Testing] - Kube-scheduler: removed the deprecated scheduler_scheduler_cache_size metric in favor of scheduler_cache_size (#131425, @carlory) [SIG Scheduling]
- Kubeadm: fixed missing space when printing the warning about pause image mismatch. (#131563, @logica0419) [SIG Cluster Lifecycle]
- Kubeadm: made the coredns deployment manifest use named ports consistently for the liveness and readiness probes. (#131587, @neolit123) [SIG Cluster Lifecycle]
- Kubectl interactive delete: treat empty newline input as N (#132251, @ardaguclu) [SIG CLI]
- Migrate pkg/kubelet/status to contextual logging (#130852, @Chulong-Li) [SIG Node]
- Promote
apiserver_authentication_config_controller_automatic_reloads_total
andapiserver_authentication_config_controller_automatic_reload_last_timestamp_seconds
metrics to BETA. (#131798, @aramase) [SIG API Machinery, Auth and Instrumentation] - Promote
apiserver_authorization_config_controller_automatic_reloads_total
andapiserver_authorization_config_controller_automatic_reload_last_timestamp_seconds
metrics to BETA. (#131768, @aramase) [SIG API Machinery, Auth and Instrumentation] - Promoted the
SeparateTaintEvictionController
feature gate to GA; it is now enabled unconditionally. (#122634, @carlory) [SIG API Machinery, Apps, Node and Testing] - Removed generally available feature-gate
PodDisruptionConditions
. (#129501, @carlory) [SIG Apps] - Removes support for API streaming from the
List() method
of the dynamic client. (#132229, @p0lyn0mial) [SIG API Machinery, CLI and Testing] - Removes support for API streaming from the
List() method
of the metadata client. (#132149, @p0lyn0mial) [SIG API Machinery and Testing] - Removes support for API streaming from the
List() method
of the typed client. (#132257, @p0lyn0mial) [SIG API Machinery and Testing] - Removes support for API streaming from the rest client. (#132285, @p0lyn0mial) [SIG API Machinery]
- Types: CycleState, StateData, StateKey and ErrNotFound moved from pkg/scheduler/framework to k8s.io/kube-scheduler/framework. Type CycleState that is passed to each plugin in scheduler framework is changed to the new interface CycleState (in k8s.io/kube-scheduler/framework) (#131887, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]
- Updated CNI plugins to v1.7.1 (#131602, @adrianmoisey) [SIG Cloud Provider, Node and Testing]
- Updated cri-tools to v1.33.0. (#131406, @saschagrunert) [SIG Cloud Provider]
- Upgrade CoreDNS to v1.12.1 (#131151, @yashsingh74) [SIG Cloud Provider and Cluster Lifecycle]
Dependencies
Added
- buf.build/gen/go/bufbuild/protovalidate/protocolbuffers/go: 63bb56e
- github.com/GoogleCloudPlatform/opentelemetry-operations-go/detectors/gcp: v1.26.0
- github.com/bufbuild/protovalidate-go: v0.9.1
- github.com/envoyproxy/go-control-plane/envoy: v1.32.4
- github.com/envoyproxy/go-control-plane/ratelimit: v0.1.0
- github.com/go-jose/go-jose/v4: v4.0.4
- github.com/golang-jwt/jwt/v5: v5.2.2
- github.com/grpc-ecosystem/go-grpc-middleware/providers/prometheus: v1.0.1
- github.com/grpc-ecosystem/go-grpc-middleware/v2: v2.3.0
- github.com/spiffe/go-spiffe/v2: v2.5.0
- github.com/zeebo/errs: v1.4.0
- go.etcd.io/raft/v3: v3.6.0
- go.opentelemetry.io/contrib/detectors/gcp: v1.34.0
- go.opentelemetry.io/otel/sdk/metric: v1.34.0
Changed
- cel.dev/expr: v0.19.1 → v0.23.1
- cloud.google.com/go/compute/metadata: v0.5.0 → v0.6.0
- github.com/Microsoft/hnslib: v0.0.8 → v0.1.1
- github.com/cncf/xds/go: b4127c9 → 2f00578
- github.com/coredns/corefile-migration: v1.0.25 → v1.0.26
- github.com/cpuguy83/go-md2man/v2: v2.0.4 → v2.0.6
- github.com/envoyproxy/go-control-plane: v0.13.0 → v0.13.4
- github.com/envoyproxy/protoc-gen-validate: v1.1.0 → v1.2.1
- github.com/fsnotify/fsnotify: v1.7.0 → v1.9.0
- github.com/fxamacker/cbor/v2: v2.7.0 → v2.8.0
- github.com/golang/glog: v1.2.2 → v1.2.4
- github.com/google/cel-go: v0.23.2 → v0.25.0
- github.com/grpc-ecosystem/grpc-gateway/v2: v2.24.0 → v2.26.3
- github.com/ishidawataru/sctp: 7ff4192 → ae8eb7f
- github.com/jonboulle/clockwork: v0.4.0 → v0.5.0
- github.com/modern-go/reflect2: v1.0.2 → 35a7c28
- github.com/spf13/cobra: v1.8.1 → v1.9.1
- github.com/spf13/pflag: v1.0.5 → v1.0.6
- github.com/vishvananda/netlink: 62fb240 → v1.3.1
- github.com/vishvananda/netns: v0.0.4 → v0.0.5
- go.etcd.io/bbolt: v1.3.11 → v1.4.0
- go.etcd.io/etcd/api/v3: v3.5.21 → v3.6.1
- go.etcd.io/etcd/client/pkg/v3: v3.5.21 → v3.6.1
- go.etcd.io/etcd/client/v3: v3.5.21 → v3.6.1
- go.etcd.io/etcd/pkg/v3: v3.5.21 → v3.6.1
- go.etcd.io/etcd/server/v3: v3.5.21 → v3.6.1
- go.etcd.io/gofail: v0.1.0 → v0.2.0
- go.opentelemetry.io/contrib/instrumentation/github.com/emicklei/go-restful/otelrestful: v0.42.0 → v0.44.0
- go.opentelemetry.io/contrib/instrumentation/google.golang.org/grpc/otelgrpc: v0.58.0 → v0.60.0
- go.opentelemetry.io/contrib/propagators/b3: v1.17.0 → v1.19.0
- go.opentelemetry.io/otel/exporters/otlp/otlptrace/otlptracegrpc: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/exporters/otlp/otlptrace: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/metric: v1.33.0 → v1.35.0
- go.opentelemetry.io/otel/sdk: v1.33.0 → v1.34.0
- go.opentelemetry.io/otel/trace: v1.33.0 → v1.35.0
- go.opentelemetry.io/otel: v1.33.0 → v1.35.0
- go.opentelemetry.io/proto/otlp: v1.4.0 → v1.5.0
- google.golang.org/genproto/googleapis/api: e6fa225 → a0af3ef
- google.golang.org/genproto/googleapis/rpc: e6fa225 → a0af3ef
- google.golang.org/grpc: v1.68.1 → v1.72.1
- k8s.io/gengo/v2: 1244d31 → 85fd79d
- k8s.io/system-validators: v1.9.1 → v1.10.1
- k8s.io/utils: 3ea5e8c → 4c0f3b2
- sigs.k8s.io/structured-merge-diff/v4: v4.6.0 → v4.7.0
Removed
- cloud.google.com/go/accessapproval: v1.7.4
- cloud.google.com/go/accesscontextmanager: v1.8.4
- cloud.google.com/go/aiplatform: v1.58.0
- cloud.google.com/go/analytics: v0.22.0
- cloud.google.com/go/apigateway: v1.6.4
- cloud.google.com/go/apigeeconnect: v1.6.4
- cloud.google.com/go/apigeeregistry: v0.8.2
- cloud.google.com/go/appengine: v1.8.4
- cloud.google.com/go/area120: v0.8.4
- cloud.google.com/go/artifactregistry: v1.14.6
- cloud.google.com/go/asset: v1.17.0
- cloud.google.com/go/assuredworkloads: v1.11.4
- cloud.google.com/go/automl: v1.13.4
- cloud.google.com/go/baremetalsolution: v1.2.3
- cloud.google.com/go/batch: v1.7.0
- cloud.google.com/go/beyondcorp: v1.0.3
- cloud.google.com/go/bigquery: v1.58.0
- cloud.google.com/go/billing: v1.18.0
- cloud.google.com/go/binaryauthorization: v1.8.0
- cloud.google.com/go/certificatemanager: v1.7.4
- cloud.google.com/go/channel: v1.17.4
- cloud.google.com/go/cloudbuild: v1.15.0
- cloud.google.com/go/clouddms: v1.7.3
- cloud.google.com/go/cloudtasks: v1.12.4
- cloud.google.com/go/compute: v1.23.3
- cloud.google.com/go/contactcenterinsights: v1.12.1
- cloud.google.com/go/container: v1.29.0
- cloud.google.com/go/containeranalysis: v0.11.3
- cloud.google.com/go/datacatalog: v1.19.2
- cloud.google.com/go/dataflow: v0.9.4
- cloud.google.com/go/dataform: v0.9.1
- cloud.google.com/go/datafusion: v1.7.4
- cloud.google.com/go/datalabeling: v0.8.4
- cloud.google.com/go/dataplex: v1.14.0
- cloud.google.com/go/dataproc/v2: v2.3.0
- cloud.google.com/go/dataqna: v0.8.4
- cloud.google.com/go/datastore: v1.15.0
- cloud.google.com/go/datastream: v1.10.3
- cloud.google.com/go/deploy: v1.17.0
- cloud.google.com/go/dialogflow: v1.48.1
- cloud.google.com/go/dlp: v1.11.1
- cloud.google.com/go/documentai: v1.23.7
- cloud.google.com/go/domains: v0.9.4
- cloud.google.com/go/edgecontainer: v1.1.4
- cloud.google.com/go/errorreporting: v0.3.0
- cloud.google.com/go/essentialcontacts: v1.6.5
- cloud.google.com/go/eventarc: v1.13.3
- cloud.google.com/go/filestore: v1.8.0
- cloud.google.com/go/firestore: v1.14.0
- cloud.google.com/go/functions: v1.15.4
- cloud.google.com/go/gkebackup: v1.3.4
- cloud.google.com/go/gkeconnect: v0.8.4
- cloud.google.com/go/gkehub: v0.14.4
- cloud.google.com/go/gkemulticloud: v1.1.0
- cloud.google.com/go/gsuiteaddons: v1.6.4
- cloud.google.com/go/iam: v1.1.5
- cloud.google.com/go/iap: v1.9.3
- cloud.google.com/go/ids: v1.4.4
- cloud.google.com/go/iot: v1.7.4
- cloud.google.com/go/kms: v1.15.5
- cloud.google.com/go/language: v1.12.2
- cloud.google.com/go/lifesciences: v0.9.4
- cloud.google.com/go/logging: v1.9.0
- cloud.google.com/go/longrunning: v0.5.4
- cloud.google.com/go/managedidentities: v1.6.4
- cloud.google.com/go/maps: v1.6.3
- cloud.google.com/go/mediatranslation: v0.8.4
- cloud.google.com/go/memcache: v1.10.4
- cloud.google.com/go/metastore: v1.13.3
- cloud.google.com/go/monitoring: v1.17.0
- cloud.google.com/go/networkconnectivity: v1.14.3
- cloud.google.com/go/networkmanagement: v1.9.3
- cloud.google.com/go/networksecurity: v0.9.4
- cloud.google.com/go/notebooks: v1.11.2
- cloud.google.com/go/optimization: v1.6.2
- cloud.google.com/go/orchestration: v1.8.4
- cloud.google.com/go/orgpolicy: v1.12.0
- cloud.google.com/go/osconfig: v1.12.4
- cloud.google.com/go/oslogin: v1.13.0
- cloud.google.com/go/phishingprotection: v0.8.4
- cloud.google.com/go/policytroubleshooter: v1.10.2
- cloud.google.com/go/privatecatalog: v0.9.4
- cloud.google.com/go/pubsub: v1.34.0
- cloud.google.com/go/pubsublite: v1.8.1
- cloud.google.com/go/recaptchaenterprise/v2: v2.9.0
- cloud.google.com/go/recommendationengine: v0.8.4
- cloud.google.com/go/recommender: v1.12.0
- cloud.google.com/go/redis: v1.14.1
- cloud.google.com/go/resourcemanager: v1.9.4
- cloud.google.com/go/resourcesettings: v1.6.4
- cloud.google.com/go/retail: v1.14.4
- cloud.google.com/go/run: v1.3.3
- cloud.google.com/go/scheduler: v1.10.5
- cloud.google.com/go/secretmanager: v1.11.4
- cloud.google.com/go/security: v1.15.4
- cloud.google.com/go/securitycenter: v1.24.3
- cloud.google.com/go/servicedirectory: v1.11.3
- cloud.google.com/go/shell: v1.7.4
- cloud.google.com/go/spanner: v1.55.0
- cloud.google.com/go/speech: v1.21.0
- cloud.google.com/go/storagetransfer: v1.10.3
- cloud.google.com/go/talent: v1.6.5
- cloud.google.com/go/texttospeech: v1.7.4
- cloud.google.com/go/tpu: v1.6.4
- cloud.google.com/go/trace: v1.10.4
- cloud.google.com/go/translate: v1.10.0
- cloud.google.com/go/video: v1.20.3
- cloud.google.com/go/videointelligence: v1.11.4
- cloud.google.com/go/vision/v2: v2.7.5
- cloud.google.com/go/vmmigration: v1.7.4
- cloud.google.com/go/vmwareengine: v1.0.3
- cloud.google.com/go/vpcaccess: v1.7.4
- cloud.google.com/go/webrisk: v1.9.4
- cloud.google.com/go/websecurityscanner: v1.6.4
- cloud.google.com/go/workflows: v1.12.3
- cloud.google.com/go: v0.112.0
- github.com/BurntSushi/toml: v0.3.1
- github.com/census-instrumentation/opencensus-proto: v0.4.1
- github.com/client9/misspell: v0.3.4
- github.com/cncf/udpa/go: 269d4d4
- github.com/ghodss/yaml: v1.0.0
- github.com/go-kit/kit: v0.9.0
- github.com/go-logfmt/logfmt: v0.4.0
- github.com/go-stack/stack: v1.8.0
- github.com/golang-jwt/jwt/v4: v4.5.2
- github.com/golang/mock: v1.1.1
- github.com/grpc-ecosystem/grpc-gateway: v1.16.0
- github.com/konsorten/go-windows-terminal-sequences: v1.0.1
- github.com/kr/logfmt: b84e30a
- github.com/opentracing/opentracing-go: v1.1.0
- go.etcd.io/etcd/client/v2: v2.305.21
- go.etcd.io/etcd/raft/v3: v3.5.21
- go.uber.org/atomic: v1.7.0
- golang.org/x/lint: d0100b6
- google.golang.org/appengine: v1.4.0
- google.golang.org/genproto: ef43131
- honnef.co/go/tools: ea95bdf