| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 478ae8101675fa873a3ad84c81c91604e70bdb947e3379564907916c8a3a1d4a0b7d2077e1d2701f18f2509a6fce0997d93a441ef6d1a17a2e90fdffdd4c13ec |
| kubernetes-src.tar.gz | dc9fc72736999bc40fdf28a7668c8e183effe135893c98f0773b0a50fe018c2f49156026c490f201def57645bf6172c81e07c1c6cb2d80bfb6b246c94fb4c5aa |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | e7d510566442afd96dd3759764b573719469bb0ef00086d536bd7af0b8af29ddf150e6ece5ae95856daaaf7f2454f45755ac300648c692508e445aca7a8bd0de |
| kubernetes-client-darwin-arm64.tar.gz | cd3b216a5418ef2eb00aeb74bf0ebae34c41aa16419bd5bbe5cbb5d394570a38f54c88294aaa5bd7c27ef28c4f1aee2b5658beb4cd025258b6bbd522e8d499bc |
| kubernetes-client-linux-386.tar.gz | 50250aefecc03afe5a6b1be8dffbd58efb4814fed2aae299ac3bbd3b32a40b47697897bafcc36f31f226c5fd2b185cb970e64674aa9ee60412e122128487598d |
| kubernetes-client-linux-amd64.tar.gz | a1469924896411ab3365628b301d2bbacaf235908cea47308498c9c351a17462ab4154928ef6f91cee849ff52600e394f2abe70f5165371ccfe6638446699d2c |
| kubernetes-client-linux-arm.tar.gz | df921ad2702a8bc90b8797d97e5ddba5d7d077d18f3b9e53a4594a432f628f52842ee5e26f70c16a82b4decf7c72cba1d04c43163c85026f9b0610fbde63e183 |
| kubernetes-client-linux-arm64.tar.gz | 0b332e13c9bb52093f57c4f2ae4ab103bc7f51e4c5dad2859300e7ece09ef303a9345ed3aea4d050b287f52dd8ed8d7cf9185c9e40ea5cc900c8d34e63eec83d |
| kubernetes-client-linux-ppc64le.tar.gz | 07789dc2ec7e8439774d88437f0b1ee35d6b60a8bd23055b93dcf1461de5ae69aba0e0e99a0202892f6c70217388646e1592b087f048bb57e5ab10b1b0dfa956 |
| kubernetes-client-linux-s390x.tar.gz | 6563b8d452d29e7f155563294478e39dba7311dd086cf9fb0bc62c94a139b7f5d81a5716880d8072cd864948988e68f2dcd607a8ec79e339224ed5f4bcd48dc9 |
| kubernetes-client-windows-386.tar.gz | 522f96799bdaacdd1d10ab4c3a58d8fd86e45e6326c3b6538cc079ca951c28916bd1c8c9bb1d98f6257be0ba1ed91e97614407fe11a1c4bbea2c2052ba0feca7 |
| kubernetes-client-windows-amd64.tar.gz | 149145263071c8e1a4d73efe4d1c868286e7cea37629f1c076d2f2683e6b63fb3387d867f3283c9950a3b5b830f005019fa03874e4d53dfa9ad489aaaa9f535b |
| kubernetes-client-windows-arm64.tar.gz | 2cffd56e01eaf24ace819cf9f4ef94187185978c8fa1192fd9d47236824ccfe745fe649d38c4351a016e0406bcfd1944178cb93af67b5e69015c04ab2ca5bf7c |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 23af53c49de841a0d5c19d9525d820cecc9d55367c132296a5f381d051438bf06dcddff3d0236df8ba6011a6aa5d0ffc31960d277c7f53a0ad98e66d6f8d6a0a |
| kubernetes-server-linux-arm64.tar.gz | fd245273c6ace20abc893f868d678c4a24c0dbe7d5340087f852d245e59329e66f79afce489dc1b396908d2f005b132eca8d15a7664508fe923627bb2eddee18 |
| kubernetes-server-linux-ppc64le.tar.gz | 68c48db8537c0470d2245740b8cdf3225efafc48a96646e369137e35931bd43324caf1394ee4b31774b0f43d44e6a4eaa5976186248a114d0e0feb2cb8953edc |
| kubernetes-server-linux-s390x.tar.gz | dd71c4b5ab213452d41059772de3b0db2c71fc6f958280694b2c1b20151bded5b6beb1b03a40dc683ce2d587e9a8bbf3bf486b3965064945803af4f10557558e |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 179278fecb65d246443f58cef00ca2f2a9d0ac6fbdb310994f0ac7fca249f7bdc1c79ea7f3e5455c1e2d2460f5447d006bfa579f97b502ee7034b2a1927f934a |
| kubernetes-node-linux-arm64.tar.gz | 01178703c84e0f671770e53024e3cc53f540c0cf93b0804d35884a777c3e3bc44c44d62b6fd25204348986fa589969a9255c0ef04235a0bb9d5560b09867aa0b |
| kubernetes-node-linux-ppc64le.tar.gz | 05d1ae963d5c4a382d380cb4f4cdfa924fa8a311953b5eaefe66b8696cebf14bffb13bda8ea784ca5fa1dd073c82ee148faa9a50911449cefad16fe2e800d7c1 |
| kubernetes-node-linux-s390x.tar.gz | b7501e91153d062c7c545ef9900faf9b29826b6ff5ec5320f6a799d3d3b479f6ae79092909a1905e055b72dd540a9c8fb02b2d0655f6957cd0b4b7b2e9c18909 |
| kubernetes-node-windows-amd64.tar.gz | f54c606e8ecc29b4ba4ef4570f679352f66cbae1f1bd4f49db5e18227b00ed0e6d8dd47422390fd2a3b87d837cf39dae58a260208096169a3aabef9e874c7586 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
- ACTION REQUIRED:
Removed the --pod-infra-container-image flag from kubelet command line. For non-kubeadm clusters, users must manually remove this flag from their kubelet configuration to prevent startup failures before upgrading kubelet. For kubeadm clusters, if users pass extra arguments to the kubelet like --pod-infra-container-image, it will be written to the kubelet env file during the init phase. kubeadm does not remove it during the init or join phase, so users must manually remove it from extraArgs in the kubelet configuration file. (#133779, @carlory) [sig/node]
- ACTION REQUIRED:
vendor: Updated k8s.io/system-validators to v1.12.1. The cgroups validator now throws an error instead of a warning if cgroups v1 is detected on the host and the provided KubeletVersion is v1.35 or newer.
kubeadm: Started using k8s.io/system-validators v1.12.1 in kubeadm v1.35. During kubeadm init, kubeadm join, and kubeadm upgrade, the SystemVerification preflight check throws an error if cgroups v1 is detected and the detected kubelet version is v1.35 or newer. For older versions of kubelet, a preflight warning is displayed.
To allow cgroups v1 with kubeadm and kubelet version v1.35 or newer, you must:
- Ignore the error from the SystemVerification preflight check by
kubeadm. - Edit the
kube-system/kubelet-configConfigMap and add thefailCgroupV1: falsefield before upgrading. (#134744, @neolit123) [SIG Cluster Lifecycle and Node] [sig/node,sig/cluster-lifecycle]
- ACTION REQUIRED:
failCgroupV1will be set to true from 1.35. This means that nodes will not start on a cgroup v1 by default. This puts cgroup v1 into a deprecated state. (#134298, @kannon92) [sig/node] - Marked
ipvsmode in kube-proxy as deprecated, which will be removed in a future version of Kubernetes. Users are encouraged to migrate tonftables. (#134539, @adrianmoisey) [sig/network]
- Added
ObservedGenerationto CustomResourceDefinition conditions. (#134984, @michaelasp) [sig/api-machinery] - Added
WithOriginwithinapis/core/validationwith adjusted tests. (#132825, @PatrickLaabs) [sig/apps] - Added scoring for the prioritized list feature so nodes that best satisfy the highest-ranked subrequests were chosen. (#134711, @mortent) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing]
- Added the
--min-compatibility-versionflag tokube-apiserver,kube-controller-manager, andkube-scheduler. (#133980, @siyuanfoundation) [SIG API Machinery, Architecture, Cluster Lifecycle, Etcd, Scheduling and Testing] [sig/scheduling,sig/api-machinery,sig/cluster-lifecycle,sig/testing,sig/architecture,sig/etcd] - Added the
StorageVersionMigrationv1beta1API and removed thev1alpha1API.
ACTION REQUIRED: The v1alpha1 API is no longer supported. Users must remove any v1alpha1 resources before upgrading. (#134784, @michaelasp) [SIG API Machinery, Apps, Auth, Etcd and Testing] [sig/api-machinery,sig/auth,sig/apps,sig/testing,sig/etcd]
- Added validation to ensure
log-flush-frequencyis a positive value, returning an error instead of causing a panic. (#133540, @BenTheElder) [SIG Architecture, Instrumentation, Network and Node] [sig/network,sig/node,sig/instrumentation,sig/architecture] - All containers are restarted when a source container in a restart policy rule exits. This alpha feature is gated behind
RestartAllContainersOnContainerExit. (#134345, @yuanwang04) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing] - CSI drivers can now opt in to receive service account tokens via the secrets field instead of volume context by setting
spec.serviceAccountTokenInSecrets: truein the CSIDriver object. This prevents tokens from being exposed in logs and other outputs. The feature is gated by theCSIServiceAccountTokenSecretsfeature gate (beta inv1.35). (#134826, @aramase) [SIG API Machinery, Auth, Storage and Testing] [sig/storage,sig/api-machinery,sig/auth,sig/testing] - Changed kuberc configuration schema. Two new optional fields added to kuberc configuration,
credPluginPolicyandcredPluginAllowlist. This is documented in KEP-3104 and documentation is added to the website by kubernetes/website#52877 (#134870, @pmengelbert) [SIG API Machinery, Architecture, Auth, CLI, Instrumentation and Testing] [sig/api-machinery,sig/auth,sig/cli,sig/instrumentation,sig/testing,sig/architecture] - DRA device taints:
DeviceTaintRulestatus provides information about the rule, including whether Pods still need to be evicted (EvictionInProgresscondition). The newly addedNoneeffect can be used to preview what aDeviceTaintRulewould do if it used theNoExecuteeffect and to taint devices (device health) without immediately affecting scheduling or running Pods. (#134152, @pohly) [SIG API Machinery, Apps, Auth, Node, Release, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/testing,sig/release] - DRA: The
DynamicResourceAllocationfeature gate for the core functionality (GA inv1.34) has now been locked to enabled-by-default and cannot be disabled anymore. (#134452, @pohly) [SIG Auth, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/auth,sig/testing] - Enabled
kubectl get -o kyamlby default. To disable it, setKUBECTL_KYAML=false. (#133327, @thockin) [sig/cli] - Enabled in-place resizing of pod-level resources.
- Added
ResourcesinPodStatusto capture resources set in the pod-level cgroup. - Added
AllocatedResourcesinPodStatusto capture resources requested in thePodSpec. (#132919, @ndixita) [SIG API Machinery, Apps, Architecture, Auth, CLI, Instrumentation, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/cli,sig/instrumentation,sig/testing,sig/architecture] - Enabled the
NominatedNodeNameForExpectationfeature in kube-scheduler by default. - Enabled the
ClearingNominatedNodeNameAfterBindingfeature in kube-apiserver by default. (#135103, @ania-borowiec) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Scheduling, Storage and Testing] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/autoscaling,sig/auth,sig/apps,sig/cli,sig/instrumentation,sig/testing,sig/architecture,sig/cloud-provider] - Enhanced discovery responses to merge API groups and resources from all peer apiservers when the
UnknownVersionInteroperabilityProxyfeature is enabled. (#133648, @richabanker) [SIG API Machinery, Auth, Cloud Provider, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/auth,sig/testing,sig/cloud-provider] - Extended
core/v1Tolerationto support numeric comparison operators (Gt,Lt). (#134665, @helayoty) [SIG API Machinery, Apps, Node, Scheduling, Testing and Windows] [sig/scheduling,sig/node,sig/api-machinery,sig/apps,sig/windows,sig/testing] - Feature gate dependencies are now explicit, and validated at startup. A feature can no longer be enabled if it depends on a disabled feature. In particular, this means that
AllAlpha=truewill no longer work without enabling disabled-by-default beta features that are depended on (either withAllBeta=trueor explicitly enumerating the disabled dependencies). (#133697, @tallclair) [SIG API Machinery, Architecture, Cluster Lifecycle and Node] [sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/architecture] - Generated OpenAPI model packages for API types into
zz_generated.model_name.gofiles, accessible via theOpenAPIModelName()function. This allows API authors to declare desired OpenAPI model packages instead of relying on the Go package path of API types. (#131755, @jpbetz) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling, Storage and Testing] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/apps,sig/cli,sig/instrumentation,sig/testing,sig/architecture,sig/cloud-provider] - Implemented constrained impersonation as described in KEP-5284. (#134803, @enj) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing]
- Introduced a new declarative validation tag
+k8s:customUniqueto control listmap uniqueness. (#134279, @yongruilin) [SIG API Machinery and Auth] [sig/api-machinery,sig/auth] - Introduced a structured and versioned
v1alpha1response for thestatuszendpoint. (#134313, @richabanker) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing] [sig/network,sig/scheduling,sig/node,sig/api-machinery,sig/instrumentation,sig/testing,sig/architecture] - Introduced a structured and versioned
v1alpha1response format for theflagzendpoint. (#134995, @yongruilin) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing] [sig/network,sig/scheduling,sig/node,sig/api-machinery,sig/instrumentation,sig/testing,sig/architecture] - Introduced the GangScheduling kube-scheduler plugin to support "all-or-nothing" scheduling using the
scheduling.k8s.io/v1alpha1Workload API. (#134722, @macsko) [SIG API Machinery, Apps, Auth, CLI, Etcd, Scheduling and Testing] [sig/scheduling,sig/api-machinery,sig/auth,sig/apps,sig/cli,sig/testing,sig/etcd] - Introduced the Node Declared Features capability (alpha), which includes:
- A new
Node.Status.DeclaredFeaturesfield for publishing node-specific features. - A
component-helperslibrary for feature registration and inference. - A
NodeDeclaredFeaturesscheduler plugin to match pods with nodes that provide required features. - A
NodeDeclaredFeatureValidatoradmission plugin to validate pod updates against a node's declared features. (#133389, @pravk03) [SIG API Machinery, Apps, Node, Release, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/apps,sig/testing,sig/release] - Introduced the
scheduling.k8s.io/v1alpha1Workload API to express workload-level scheduling requirements and allow the kube-scheduler to act on them. (#134564, @macsko) [SIG API Machinery, Apps, CLI, Etcd, Scheduling and Testing] [sig/scheduling,sig/api-machinery,sig/apps,sig/cli,sig/testing,sig/etcd] - Introduced the alpha
MutableSchedulingDirectivesForSuspendedJobsfeature gate (disabled by default), which allows mutating a Job's scheduling directives while the Job is suspended. It also updates the Job controller to clears thestatus.startTimefield for suspended Jobs. (#135104, @mimowo) [SIG Apps and Testing] [sig/apps,sig/testing] - Kube-apiserver: Fixed a
v1.34regression inCustomResourceDefinitionhandling that incorrectly warned about unrecognized formats on number and integer properties. (#133896, @yongruilin) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Contributor Experience, Network, Node and Scheduling] [sig/network,sig/scheduling,sig/node,sig/api-machinery,sig/contributor-experience,sig/auth,sig/apps,sig/cli,sig/architecture,sig/cloud-provider] - Kube-apiserver: Fixed a possible panic validating a custom resource whose
CustomResourceDefinitionindicates a status subresource exists, but which does not define astatusproperty in theopenAPIV3Schema. (#133721, @fusida) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Release, Scheduling, Storage and Testing] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/autoscaling,sig/auth,sig/apps,sig/cli,sig/instrumentation,sig/testing,sig/release,sig/architecture] - Kubernetes API Go types removed runtime use of the
github.com/gogo/protobuflibrary, and are no longer registered into the global gogo type registry. Kubernetes API Go types were not suitable for use with thegoogle.golang.org/protobuflibrary, and no longer implementProtoMessage()by default to avoid accidental incompatible use. If removal of these marker methods impacts your use, it can be re-enabled for one more release with akubernetes_protomessage_one_more_releasebuild tag, but will be removed inv1.36. (#134256, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/apps,sig/cli,sig/instrumentation,sig/architecture] - Made node affinity in Persistent Volume mutable. (#134339, @huww98) [SIG API Machinery, Apps and Node] [sig/node,sig/api-machinery,sig/apps]
- Moved the
ImagePullIntentandImagePulledRecordobjects used by the kubelet to track image pulls to thev1beta1API version. (#132579, @stlaz) [SIG Auth and Node] [sig/node,sig/auth] - Pod resize now only allows CPU and memory resources; other resource types are forbidden. (#135084, @tallclair) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing]
- Prevented Pods from being scheduled onto nodes that lack the required CSI driver. (#135012, @gnufied) [SIG API Machinery, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/api-machinery,sig/testing]
- Promoted HPA configurable tolerance to beta. The
HPAConfigurableTolerancefeature gate has now been enabled by default. (#133128, @jm-franc) [SIG API Machinery and Autoscaling] [sig/api-machinery,sig/autoscaling] - Promoted ReplicaSet and Deployment
.status.terminatingReplicastracking to beta. TheDeploymentReplicaSetTerminatingReplicasfeature gate is now enabled by default. (#133087, @atiratree) [SIG API Machinery, Apps and Testing] [sig/api-machinery,sig/apps,sig/testing] - Promoted
PodObservedGenerationTrackingto GA. (#134948, @natasha41575) [SIG API Machinery, Apps, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/apps,sig/testing] - Promoted the
JobManagedByfeature to general availability. TheJobManagedByfeature gate was locked totrueand will be removed in a future Kubernetes release. (#135080, @dejanzele) [SIG API Machinery, Apps and Testing] [sig/api-machinery,sig/apps,sig/testing] - Promoted the
MaxUnavailableStatefulSetfeature to beta and enabling it by default. (#133153, @helayoty) [SIG API Machinery and Apps] [sig/api-machinery,sig/apps] - Removed the
StrictCostEnforcementForVAPandStrictCostEnforcementForWebhooksfeature gates, which were locked sincev1.32. (#134994, @liggitt) [SIG API Machinery, Auth, Node and Testing] [sig/node,sig/api-machinery,sig/auth,sig/testing] - Scheduler: Added the
bindingTimeoutargument to the DynamicResources plugin configuration, allowing customization of the wait duration inPreBindfor device binding conditions. Defaults to 10 minutes whenDRADeviceBindingConditionsandDRAResourceClaimDeviceStatusare both enabled. (#134905, @fj-naji) [SIG Node and Scheduling] [sig/scheduling,sig/node] - The DRA device taints and toleration feature received a separate feature gate,
DRADeviceTaintRules, which controlled support forDeviceTaintRules. This allowed disabling it while keepingDRADeviceTaintsenabled so that tainting viaResourceSlicescontinued to work. (#135068, @pohly) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/testing] - The Pod Certificates feature moved to beta. The
PodCertificateRequestfeature gate is set disabled by default. To use the feature, users must enable the certificates API groups inv1beta1and enable thePodCertificateRequestfeature gate. TheUserAnnotationsfield was added to thePodCertificateProjectionAPI and the correspondingUnverifiedUserAnnotationsfield was added to thePodCertificateRequestAPI. (#134624, @yt2985) [SIG API Machinery, Apps, Auth, Etcd, Instrumentation, Node and Testing] [sig/node,sig/api-machinery,sig/auth,sig/apps,sig/instrumentation,sig/testing,sig/etcd] - The
KubeletEnsureSecretPulledImagesfeature was promoted to Beta and enabled by default. (#135228, @aramase) [SIG Auth, Node and Testing] [sig/node,sig/auth,sig/testing] - The
PreferSameZoneandPreferSameNodevalues for the ServicetrafficDistributionfield graduated to general availability. ThePreferClosevalue is now deprecated in favor of the more explicitPreferSameZone. (#134457, @danwinship) [SIG API Machinery, Apps, Network and Testing] [sig/network,sig/api-machinery,sig/apps,sig/testing] - Updated
ResourceQuotato count device class requests within aResourceClaimas two additional quotas when theDRAExtendedResourcefeature is enabled: requests.deviceclass.resource.k8s.io/<deviceclass>is charged based on the worst-case number of devices requested.- Device classes mapping to an extended resource now consume
requests.<extended resource name>. (#134210, @yliaog) [SIG API Machinery, Apps, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/apps,sig/testing] - Updated storage version for
MutatingAdmissionPolicytov1beta1. (#133715, @cici37) [SIG API Machinery, Etcd and Testing] [sig/api-machinery,sig/testing,sig/etcd] - Updated the Partitionable Devices feature to support referencing counter sets across ResourceSlices within the same resource pool. Devices from incomplete pools were no longer considered for allocation. This change introduced backwards-incompatible updates to the alpha feature, requiring any ResourceSlices using it to be removed before upgrading or downgrading between v1.34 and v1.35. (#134189, @mortent) [SIG API Machinery, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/api-machinery,sig/testing]
- Upgraded the
PodObservedGenerationTrackingfeature to beta inv1.34and removed the alpha version description from the OpenAPI specification. (#133883, @yangjunmyfm192085) [sig/apps]
- Added
k8s-short-nameandk8s-long-nameformat validation tags to enforce DNS label and DNS subdomain compliance. (#133894, @lalitc375) [sig/api-machinery] - Added
kubectl kuberc viewandkubectl kuberc setcommands to perform operations against thekubercfile. (#135003, @ardaguclu) [SIG CLI and Testing] [sig/cli,sig/testing] - Added
kubeletstress test for pod cleanup when rejection due toVolumeAttachmentLimitExceeded. (#133357, @torredil) [SIG Node and Storage] [sig/storage,sig/node] - Added
pathssection to kubeletstatuszendpoint. (#133239, @Peac36) [sig/node] - Added a
sourcelabel to theresourceclaim_controller_resource_claimsmetric. Added thescheduler_resourceclaim_creates_totalmetric forDRAExtendedResource. (#134523, @bitoku) [SIG Apps, Instrumentation, Node and Scheduling] [sig/scheduling,sig/node,sig/apps,sig/instrumentation] - Added a counter metric
kubelet_image_manager_ensure_image_requests_total{present_locally, pull_policy, pull_required}that exposes details aboutkubeletensuring an image exists on the node. (#132644, @stlaz) [SIG Auth and Node] [sig/node,sig/auth] - Added additional event emissions during Pod resizing to provide clearer visibility when a Pod’s resize status changes. (#134825, @natasha41575) [sig/node]
- Added configurable per-device health check timeouts to the DRA health monitoring API. (#135147, @harche) [SIG Node] [sig/node]
- Added metrics for the
MaxUnavailablefeature inStatefulSet. (#130951, @Edwinhr716) [SIG Apps and Instrumentation] [sig/apps,sig/instrumentation] - Added paths section to scheduler
statuszendpoint. (#132606, @Peac36) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing] [sig/network,sig/scheduling,sig/node,sig/api-machinery,sig/instrumentation,sig/testing,sig/architecture] - Added remote runtime and image
Close()method to be able to close the connection. (#133211, @saschagrunert) [SIG Node] [sig/node] - Added support for tracing in
kubectlwith the--profile=traceflag. (#134709, @tchap) [sig/cli] - Added support for validating UUID format. (#133948, @lalitc375) [sig/api-machinery]
- Added the
-nflag as a shorthand for--namespacein thekubectl config set-contextcommand. (#134384, @tchap) [SIG CLI and Testing] [sig/cli,sig/testing] - Added the
ChangeContainerStatusOnKubeletRestartfeature gate, which defaults to disabled. When the feature gate is disabled,kubeletdoes not change the Pod status upon restart, and Pods do not re-run startup probes after thekubeletrestarts. (#134746, @HirazawaUi) [SIG Node and Testing] [sig/node,sig/testing] - Added the
CloudControllerManagerWatchBasedRoutesReconciliationfeature gate. (#131220, @lukasmetzner) [SIG API Machinery and Cloud Provider] [sig/api-machinery,sig/cloud-provider] - Added the
UserNamespacesHostNetworkSupportfeature gate. This gate is disabled by default, and when enabled, allowedhostNetworkpods to use user namespaces. (#134893, @HirazawaUi) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing] - After fixing regressions detected in
v1.34, theSchedulerAsyncAPICallsfeature gate was re-enabled by default. (#135059, @macsko) [sig/scheduling] - Changed
WaitForNamedCacheSynctoWaitForNamedCacheSyncWithContext. (#133904, @aditigupta96) [SIG API Machinery, Apps, Auth and Network] [sig/network,sig/api-machinery,sig/auth,sig/apps] - DRA: the resource.k8s.io API now uses the v1 API version (introduced in 1.34) as default storage version. Downgrading to 1.33 is not supported. (#133876, @kei01234kei) [SIG API Machinery, Etcd and Testing] [sig/api-machinery,sig/testing,sig/etcd]
- Enabled the
MutableCSINodeAllocatableCountfeature gate by default in beta. (#134647, @torredil) [sig/storage] - Enabled the
WatchListClientfeature gate. (#134180, @p0lyn0mial) [SIG API Machinery, Apps, Auth, CLI, Instrumentation, Node and Testing] [sig/node,sig/api-machinery,sig/auth,sig/apps,sig/cli,sig/instrumentation,sig/testing] - Enabled the feature gate
ContainerRestartRulesby default. TheContainerRestartRulesfeature has been promoted to beta. Fixed a bug in this feature that caused probes to continue to run even if the container has terminated and is not restartable. (#134631, @yuanwang04) [sig/node] - Graduated the
PodTopologyLabelsAdmissionfeature gate to Beta and enabled it by default. Pods now receivetopology.kubernetes.io/zoneandtopology.kubernetes.io/regionlabels automatically when their assigned Node has these labels. (#135158, @andrewsykim) [sig/node] - Graduated the fine-grained supplemental groups policy (KEP-3619) to GA. (#135088, @everpeace) [SIG Node and Testing] [sig/node,sig/testing]
- Graduated the image volume source feature to Beta and enabled it by default. (#135195, @haircommander) [SIG Apps, Instrumentation, Node and Testing] [sig/node,sig/apps,sig/instrumentation,sig/testing]
- Implemented opportunistic batching (KEP-5598) to optimize scheduling for pods with identical scheduling requirements. (#135231, @bwsalmon) [SIG Node, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing]
- Implemented scoring for DRA-backed extended resources. (#134058, @bart0sh) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing]
- Improved throughput in the
real-FIFOqueue used byinformersandcontrollersby adding batch handling for processing watch events. (#132240, @yue9944882) [SIG API Machinery, Scheduling and Storage] [sig/scheduling,sig/storage,sig/api-machinery] - Introduced end-to-end tests to verify component invariant metrics across the entire test suite. (#133394, @BenTheElder) [sig/testing]
- Introduced new kubelet metrics for the Ensure Secret Pulled Images KEP, including:
kubelet_imagemanager_ondisk_pullintentsfor tracking pull intent records on diskkubelet_imagemanager_ondisk_pulledrecordsfor tracking pulled image records on diskkubelet_imagemanager_image_mustpull_checks_total{result}for counting image must-pull verification checks. (#132812, @stlaz) [SIG Auth and Node] [sig/node,sig/auth]- Introduced the
--as-user-extrapersistent flag inkubectl, which allows passing extra arguments during impersonation. (#134378, @ardaguclu) [SIG CLI and Testing] [sig/cli,sig/testing] - K8s.io/apimachinery: Introduced a helper function to compare
resourceVersionstrings between two objects of the same resource. (#134330, @michaelasp) [SIG API Machinery, Apps, Auth, Instrumentation, Network, Node, Scheduling, Storage and Testing] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/auth,sig/apps,sig/instrumentation,sig/testing] - KEP-5440: Enabled support for resizing resources while a Job is suspended. This feature is alpha. (#132441, @kannon92) [SIG Apps and Testing] [sig/apps,sig/testing]
- Kube-apiserver: Made the subresources
pods/exec,pods/attach, andpods/portforwardrequirecreatepermission for both SPDY and Websocket API requests. Previously, SPDY requests requiredcreatepermission, but Websocket requests only requiredgetpermission. This change is gated by theAuthorizePodWebsocketUpgradeCreatePermissionfeature-gate, which is enabled by default.
Before upgrading to 1.35, ensure any custom ClusterRoles and Roles intended to grant pods/exec, pods/attach, or pods/portforward permission include the create verb. (#134577, @seans3) [SIG API Machinery, Auth, Node and Testing] [sig/node,sig/api-machinery,sig/auth,sig/testing]
- Kubeadm: Added error printing during retries related to the
WaitForAllControlPlaneComponentsfunctionality at verbosity level 5. (#134433, @neolit123) [sig/cluster-lifecycle] - Kubeadm: Added the
HTTPEndpointsfield toClusterConfiguration.Etcd.ExternalEtcdto configure HTTP endpoints for etcd communication in v1beta4. This separates HTTP traffic (e.g.,/metrics,/health) from gRPC traffic, improving access control. Mirrors etcd’s--listen-client-http-urlsbehavior; if not set, theEndpointsfield handles both traffic types. (#134890, @SataQiu) [sig/cluster-lifecycle] - Kubeadm: Graduated the kubeadm-specific feature gate
ControlPlaneKubeletLocalModeto GA and locked it to enabled by default. To opt out, patch theserverfield in/etc/kubernetes/kubelet.conf. Deprecated the subphase ofkubeadm join phase control-plane-joincalledetcd, which is now hidden and replaced by subphase with identical functionalityetcd-join. Theetcdsubphase will be removed in a future release. The subphasekubelet-wait-bootstrapofkubeadm joinis no longer experimental and will now always run. (#134106, @neolit123) [sig/cluster-lifecycle] - Kubernetes is now built using Go 1.25.1 (#134095, @dims) [SIG Release and Testing] [sig/testing,sig/release]
- Kubernetes is now built using Go 1.25.4 (#135492, @cpanato) [SIG Release and Testing] [sig/testing,sig/release]
- Kubernetes now uses Go Language Version 1.25, including https://go.dev/blog/container-aware-gomaxprocs (#134120, @BenTheElder) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling and Storage] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/release,sig/architecture,sig/cloud-provider]
- Locked down the
AllowOverwriteTerminationGracePeriodSecondsfeature gate. (#133792, @HirazawaUi) [sig/node] - Locked the (generally available) feature gate
ExecProbeTimeoutto true. (#134635, @vivzbansal) [SIG Node and Testing] [sig/node,sig/testing] - Metrics: Excluded
dryRunrequests fromapiserver_request_sli_duration_seconds. (#131092, @aldudko) [SIG API Machinery and Instrumentation] [sig/api-machinery,sig/instrumentation] - Migrated validation in
resource.k8s.ioto declarative validation. When theDeclarativeValidationfeature gate is enabled, mismatches with existing validation are reported via metrics. whenDeclarativeValidationTakeoverfeature gate is enabled, declarative validation becomes the primary source of errors for migrated fields. (#134072, @yongruilin) [SIG API Machinery, Apps and Auth] [sig/api-machinery,sig/auth,sig/apps] - Moved the Pod Certificates feature to beta. Added
UserAnnotationsto thePodCertificateProjectionAPI andUnverifiedUserAnnotationsto thePodCertificateRequestAPI. ThePodCertificateRequestfeature gate remains disabled by default and requires enabling the v1beta1 certificates API groups. (#134790, @yt2985) [SIG Auth, Instrumentation and Testing] [sig/auth,sig/instrumentation,sig/testing] - Promoted
ImageGCMaximumAgeto stable. (#134736, @haircommander) [SIG Node and Testing] [sig/node,sig/testing] - Promoted
InPlacePodVerticalScalingto GA. (#134949, @natasha41575) [SIG API Machinery, Node and Scheduling] [sig/scheduling,sig/node,sig/api-machinery] - Promoted
kubectlcommand headers to stable. (#134777, @soltysh) [SIG CLI and Testing] [sig/cli,sig/testing] - Promoted the
EnvFilesfeature gate to beta and is enabled by default. Additionally, the syntax specification for environment variables has been restricted to a subset of POSIX shell syntax (all variable values must be wrapped in single quotes). (#134414, @HirazawaUi) [SIG Node and Testing] [sig/node,sig/testing] - Promoted the
HostnameOverridefeature gate to beta and enabled it by default. (#134729, @HirazawaUi) [SIG Network and Node] [sig/network,sig/node] - Promoted the
KubeletCrashLoopBackOffMaxfeature gate to beta and enabled it by default. (#135044, @hankfreund) [sig/node] - Selected a single device class deterministically when multiple device classes were available for an extended resource. (#135037, @yliaog) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing]
- The JWT authenticator in
kube-apiservernow reports the following metrics when theStructuredAuthenticationConfigurationfeature gate is enabled: apiserver_authentication_jwt_authenticator_jwks_fetch_last_timestamp_secondsapiserver_authentication_jwt_authenticator_jwks_fetch_last_key_set_info. (#123642, @aramase) [SIG API Machinery, Auth and Testing] [sig/api-machinery,sig/auth,sig/testing]- The scheduler now clears the
nominatedNodeNamefield for Pods upon scheduling or binding failure. External components, such as Cluster Autoscaler and Karpenter, should not overwrite this field. (#135007, @ania-borowiec) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] - Updated
applyconfiguration-gento generate extract functions for all subresources. (#132665, @mrIncompetent) [sig/api-machinery] - Updated
applyconfiguration-gento preserve struct and field comments from source types in the generated code. (#132663, @mrIncompetent) [sig/api-machinery] - Updated
kubectl describe podsto include the involved object’sfieldPath(e.g., container name) in event messages, providing better context for debugging multi-container Pods. Note: This changes the previous message format for events that include afieldPath. (#133627, @itzPranshul) [sig/cli] - Updated sandbox ordering to use by attempt count or creation time. (#130551, @yylt) [sig/node]
- Updated the Kubernetes build to use Go
1.25.4. (#135187, @BenTheElder) [sig/release] - Updated underlying images and dependencies to be compatible with Go version
1.25.3. (#134611, @cpanato) [SIG Architecture, Cloud Provider, Etcd, Release, Storage and Testing] [sig/storage,sig/testing,sig/release,sig/architecture,sig/cloud-provider,sig/etcd] kubeadm: Added a preflight checkContainerRuntimeVersionto validate if the installed container runtime supports theRuntimeConfiggRPC method. If unsupported,kubeadmprints a warning message.
Starting with Kubernetes v1.36, kubelet might refuse to start if the CRI runtime does not support this feature. More information can be found at the Kubernetes blog. (#134906, @carlory) [sig/cluster-lifecycle]
- Kubernetes is now built using Go
1.25.5. (#135609, @cpanato) [SIG Release and Testing] [sig/testing,sig/release]
- Promoted the
--chunk-sizeflag to stable. The kubectldescribe,get,drain, andeventscommands can use--chunk-sizeflag to set chunk size. (#134481, @soltysh) [sig/cli]
- Added support for Pods to reference the same
PersistentVolumeClaimacross multiple volumes. (#122140, @huww98) [SIG Node, Storage and Testing] [sig/storage,sig/node,sig/testing] - Added support for the
ShareIDfield of theDRAConsumableCapacityfeature in the Kubelet Plugin API. (#134520, @sunya-ch) [SIG Node and Testing] [sig/node,sig/testing] - Added the correct error when eviction is blocked due to the failSafe mechanism of the
DisruptionController. (#133097, @kei01234kei) [SIG Apps and Node] [sig/node,sig/apps] - Changed
kubectl execsyntax to require--before the command. The formkubectl exec [POD] [COMMAND]is no longer supported; usekubectl exec [POD] -- [COMMAND]instead. (#133841, @yangjunmyfm192085) [sig/testing] - DRA API: Fixed the
tolerationsfield in exact and sub requests to drop properly when theDRADeviceTaintsAPI is disabled. (#132927, @pohly) - DRA Device Taints: Fixed toleration of
NoExecute. Prior to this enhancement, tolerating aNoExecutedid not work because the scheduler did not inform the eviction controller about the toleration, so the scheduled pod got evicted almost immediately. (#134479, @pohly) [SIG Apps, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/apps,sig/testing] - Deprecated metrics will be hidden as per the metrics deprecation policy. https://kubernetes.io/docs/reference/using-api/deprecation-policy/#deprecating-a-metric . (#133436, @richabanker) [SIG Architecture, Instrumentation and Network] [sig/network,sig/instrumentation,sig/architecture]
- Disabled the
SchedulerAsyncAPICallsfeature gate to mitigate a bug where its interaction with asynchronous preemption could degradekube-schedulerperformance, especially under highkube-apiserverload. (#134400, @macsko) [sig/scheduling] - Dropped
DeviceBindingConditionsfields when theDRADeviceBindingConditionsfeature gate is not enabled and not in use. (#134964, @sunya-ch) - Extended resources requested by initContainers which are allocated using an automatic ResourceClaim now match the behavior of legacy device plugins, reusing the same resources requested by later sidecar initContainers or regular containers when possible, to minimize the total number of devices requested by the pod. (#134882, @yliaog) [SIG Apps, CLI, Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/apps,sig/cli,sig/testing]
- Fixed SELinux warning controller not emitting events on some SELinux label conflicts. (#133425, @jsafrane) [SIG Apps, Storage and Testing] [sig/storage,sig/apps,sig/testing]
- Fixed
replicaCountcalculation exceeding maxint32. (#126979, @omerap12) [SIG Apps and Autoscaling] [sig/autoscaling,sig/apps] - Fixed a Windows kube-proxy (winkernel) issue where stale
RemoteEndpointsremained when a Deployment was referenced by multiple Services due to premature clearing of theterminatedEndpointsmap. (#135146, @princepereira) [SIG Network and Windows] [sig/network,sig/windows] - Fixed a bug in
ValidatingAdmissionPolicywhere schemas withadditionalProperties: truecould cause the kube-controller-manager to crash with a nil pointer exception. (#135155, @jpbetz) [sig/api-machinery] - Fixed a bug in
kube-proxynftablesmode (GA as ofv1.33) which fails to determine if traffic originates from a local source on the node. The issue was caused by using the wrong metaiifinstead ofiifnamefor name based matches. (#134024, @jack4it) [sig/network] - Fixed a bug in
kube-schedulerwhere pending pod preemption caused preemptor pods to be retried more frequently. (#134245, @macsko) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] - Fixed a bug that caused apiservers to send an inappropriate Content-Type request header to authorization, token authentication, imagepolicy admission, and audit webhooks when the alpha client-go feature gate "ClientsPreferCBOR" is enabled. (#132960, @benluddy) [SIG API Machinery and Node] [sig/node,sig/api-machinery]
- Fixed a bug that caused duplicate validation when updating
PersistentVolumeClaims,VolumeAttachmentsandVolumeAttributesClasses. (#132549, @gavinkflam) [sig/storage] - Fixed a bug that caused duplicate validation when updating
RoleandRoleBindingresources. (#132550, @gavinkflam) [sig/auth] - Fixed a bug that prevented allocating the same device that was previously consuming the
CounterSetwhen bothDRAConsumableCapacityandDRAPartitionableDeviceswere enabled. (#134103, @sunya-ch) [sig/node] - Fixed a bug that prevents scheduling the next pod when using the
DRAConsumableCapacityfeature. (#133706, @sunya-ch) [sig/node] - Fixed a bug to prevent segmentation fault from occurring when updating deeply nested JSON fields. (#134381, @kon-angelo) [SIG API Machinery and CLI] [sig/api-machinery,sig/cli]
- Fixed a bug where 64-bit IPv6
ServiceCIDRsallocated addresses outside the subnet range. (#134193, @hoskeri) [sig/network] - Fixed a bug where Job status updates fail after resuming a Job that was previously started and suspended.
The error message was:
status.startTime: Required value: startTime cannot be removed for unsuspended job. (#134769, @dejanzele) [SIG Apps and Testing] [sig/apps,sig/testing] - Fixed a bug where
AllocationMode: Allwould not succeed if a resource pool containedResourceSlicesthat were not targeting the current node. (#134466, @mortent) [sig/node] - Fixed a bug where a deleted Pod in the binding phase continued to occupy space on the node in
kube-scheduler. (#134157, @macsko) [SIG Scheduling and Testing] [sig/scheduling,sig/testing] - Fixed a bug where high latency
kube-apiservercaused scheduling throughput degradation. (#134154, @macsko) [sig/scheduling] - Fixed a bug where the health of a DRA resource was not reported in the Pod status if the resource claim was generated from a template or used a different local name in the Pod spec. (#134875, @Jpsassine) [SIG Node and Testing] [sig/node,sig/testing]
- Fixed a long-standing issue where
kubeletrejected Pods withNodeAffinityFaileddue to a stale informer cache. (#134445, @natasha41575) [sig/node] - Fixed a panic in
kubectl api-resourcesthat occurred when the Discovery Client failed. (#134833, @rikatz) [sig/cli] - Fixed a possible data race during metrics registration. (#134390, @liggitt) [SIG Architecture and Instrumentation] [sig/instrumentation,sig/architecture]
- Fixed a spurious
namespace not founderror in defaultv1.30+configurations when usingValidatingAdmissionPolicyorMutatingAdmissionPolicyto intercept namespaced objects in newly-created namespaces. (#135359, @liggitt) [sig/api-machinery] - Fixed a startup probe race condition that caused main containers to remain stuck in "Initializing" state when sidecar containers with startup probes had failed initially but succeeded on restart in pods with
restartPolicy=Never. (#133072, @AadiDev005) [SIG Node and Testing] [sig/node,sig/testing] - Fixed an issue in asynchronous preemption: Scheduler now checks if preemption is ongoing for a Pod before initiating new preemption calls. (#134730, @ania-borowiec) [SIG Scheduling and Testing] [sig/scheduling,sig/testing]
- Fixed an issue that prevented restart policies and restart rules from being applied to static pods. (#135031, @yuanwang04) [sig/node]
- Fixed an issue where requests for a config
FromClassin theResourceClaimstatus were not referenced. (#134793, @LionelJouin) [sig/node] - Fixed an issue where the
kubelet/configzendpoint reported an incorrect value forkubeletconfig.cgroupDriverwhen the cgroup driver setting was received from the container runtime. (#134743, @marquiz) [sig/node] - Fixed an issue where the default
serviceCIDRcontroller did not log events because the event broadcaster was shutdown during initialization. (#133338, @aojea) [sig/network] - Fixed an issue with setting
distinctAttribute=nilwhen theDRAConsumableCapacityfeature gate is disabled. (#134962, @sunya-ch) [sig/node] - Fixed broken shell completion for API resources. (#133771, @marckhouzam) [sig/cli]
- Fixed incorrect behavior of preemptor pod when preemption of the victim takes long to complete. The preemptor pod should not be circling in scheduling cycles until preemption is finished. (#134294, @ania-borowiec) [SIG Scheduling and Testing] [sig/scheduling,sig/testing]
- Fixed missing
kubelet_volume_stats_*metrics. (#133890, @huww98) [SIG Instrumentation and Node] [sig/node,sig/instrumentation] - Fixed occasional schedule delays when a static
PersistentVolumeis created. (#133929, @huww98) [SIG Scheduling and Storage] [sig/scheduling,sig/storage] - Fixed resource claims deallocation for extended resource when Pod completes. (#134312, @alaypatel07) [SIG Apps, Node and Testing] [sig/node,sig/apps,sig/testing]
- Fixed the kubelet to honor the
userNamespaces.idsPerPodconfiguration, which was previously ignored. (#133373, @AkihiroSuda) [SIG Node and Testing] [sig/node,sig/testing] - Fixed the replacement tag in APIs so it no longer acted as a selector for storage version. (#135197, @Jefftree) [sig/api-machinery]
- Fixed validation error when
ConfigFlagsincludesCertFileand/orKeyFilewhile the original configuration also containsCertFileDataand/orKeyFileData. (#133917, @n2h9) [SIG API Machinery and CLI] [sig/api-machinery,sig/cli] - Improved performance of
EndpointandEndpointSlicecontrollers when there are a large number of services in a single namespace by making pod-to-service lookup asynchronous. (#134739, @shyamjvs) [SIG Apps and Network] [sig/network,sig/apps] - Improved the
FreeDiskSpaceFailedwarning event to provide more actionable details when image garbage collection fails to free enough disk space. Example:Insufficient free disk space on the node's image filesystem (95.0% of 10.0 GiB used). Failed to free sufficient space by deleting unused images. Consider resizing the disk or deleting unused files.. (#132578, @drigz) [sig/node] - Introduced support for using an implicit extended resource name derived from the device class (
deviceclass.resource.kubernetes.io/<device-class-name>) to request DRA devices matching that class. (#133363, @yliaog) [SIG Node, Scheduling and Testing] [sig/scheduling,sig/node,sig/testing] - Kube-apiserver: Fixed a
v1.34regression with spurious "Error getting keys" log messages. (#133817, @serathius) [SIG API Machinery and Etcd] [sig/api-machinery,sig/etcd] - Kube-apiserver: Fixed a possible
v1.34performance regression calculating object size statistics for resources not served from the watch cache, typically onlyEvents. (#133873, @serathius) [SIG API Machinery and Etcd] [sig/api-machinery,sig/etcd] - Kube-apiserver: Improved validation error messages for custom resources with CEL validation rules to include the value that failed validation. (#132798, @cbandy) [sig/api-machinery]
- Kube-apiserver: Made sure that when
--requestheader-client-ca-fileand--client-ca-filecontain overlapping certificates,--requestheader-allowed-namesmust be specified so that regular client certificates cannot set authenticating proxy headers for arbitrary users. (#131411, @ballista01) [SIG API Machinery, Auth and Security] [sig/api-machinery,sig/auth,sig/security] - Kube-apiserver: Resolved an issue causing unnecessary warning log messages about enabled alpha APIs during API server startup. (#135327, @michaelasp) [sig/api-machinery]
- Kube-controller-manager: Fixed a possible data race in the garbage collection controller. (#134379, @liggitt) [SIG API Machinery and Apps] [sig/api-machinery,sig/apps]
- Kube-controller-manager: Resolved potential issues handling pods with incorrect uids in their
ownerReference. (#134654, @liggitt) [sig/apps] - Kubeadm: Added missing cluster-info context validation to prevent panics when the user has a malformed kubeconfig in the cluster-info ConfigMap that excludes a valid current context. (#134715, @neolit123) [sig/cluster-lifecycle]
- Kubeadm: Ensured waiting for
apiserveruses a local client that doesn't reach to the control plane endpoint and instead reaches directly to the local API server endpoint. (#134265, @neolit123) [sig/cluster-lifecycle] - Kubeadm: Fixed
KUBEADM_UPGRADE_DRYRUN_DIRnot honored in upgrade phase when writing kubelet config files. (#134007, @carlory) [sig/cluster-lifecycle] - Kubeadm: Fixed a bug where
ClusterConfiguration.APIServer.TimeoutForControlPlanefromv1beta3was not respected in newer kubeadm versions wherev1beta4is the default. (#133513, @tom1299) [sig/cluster-lifecycle] - Kubeadm: Fixed a bug where the node registration information for a given node was not fetched correctly during
kubeadm upgrade nodeand the node name can end up being incorrect in cases where the node name is not the same as the host name. (#134319, @neolit123) [sig/cluster-lifecycle] - Kubeadm: Fixed a preflight check that could fail hostname construction in IPv6 setups. (#134588, @liggitt) [SIG API Machinery, Auth, Cloud Provider, Cluster Lifecycle and Testing] [sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/testing,sig/cloud-provider]
- Kubelet: Fixed a concurrent map write error when creating a pod with an empty volume while the
LocalStorageCapacityIsolationFSQuotaMonitoringfeature gate is enabled. (#135174, @carlory) [sig/storage] - Kubelet: Fixed an internal deadlock that caused the connection to a DRA driver to become unusable after being idle for 30 minutes. (#133926, @pohly) [sig/node]
- Made legacy watch calls (
ResourceVersion= 0 or unset) that generate init-events weigh higher inAPI Priority and Fairness (APF)seat usage. Properly accounting for their cost protects the API server from CPU overload. Users might see increased throttling of such calls as a result. (#134601, @shyamjvs) [sig/api-machinery] - Namespace is now included in the
--dry-run=clientoutput forHorizontalPodAutoscaler (HPA)objects. (#134263, @ardaguclu) [SIG CLI and Testing] [sig/cli,sig/testing] - Populated
involvedObject.apiVersionon Events created for Nodes and Pods. (#134545, @novahe) [SIG Cloud Provider, Network, Node, Scalability and Testing] [sig/network,sig/scalability,sig/node,sig/testing,sig/cloud-provider] - Promoted VAC API test to conformance. (#133615, @carlory) [SIG Architecture, Storage and Testing] [sig/storage,sig/testing,sig/architecture]
- Removed
BlockOwnerDeletionfromResourceClaimcreated fromResourceClaimTemplateand fromextendedResourceClaimcreated by thescheduler. (#134956, @yliaog) [SIG Apps, Node and Scheduling] [sig/scheduling,sig/node,sig/apps] - Removed an incorrect
SessionAffinitywarning that appeared when a headless service was created or updated. (#134054, @Peac36) [sig/network] - Slow container runtime initialization no longer causes the System WatchDog to kill the kubelet. The Device Manager was treated as unhealthy until it began listening on its port. (#135153, @SergeyKanzhelev) [sig/node]
- Typed workqueue now cleans up goroutines before shutting down (#135072, @Jefftree) [SIG API Machinery] [sig/api-machinery]
- Updated
kubectl scaleto return a consistent error message when a specified resource is not found. Previously, it returned:error: no objects passed to scale <GroupResource> "<ResourceName>" not found. It now matches the format used by other commands (e.g.,kubectl get):Error from server (NotFound): <GroupResource> "<ResourceName>" not found. (#134017, @mochizuki875) [sig/cli] kube-controller-manager: Fixed av1.34regression that triggered a spurious rollout of existing StatefulSets when upgrading the control plane fromv1.33tov1.34. This fix is guarded by theStatefulSetSemanticRevisionComparisonfeature gate, which is enabled by default. (#135017, @liggitt) [sig/apps]kube-scheduler: Pod statuses no longer include specific taint keys or values when scheduling fails due to untolerated taints. (#134740, @hoskeri) [sig/scheduling]- Fixes a bug where
MutatingAdmissionPolicywould fail to apply to objects with duplicate list items (like env vars). (#135560, @lalitc375 [SIG API Machinery] [sig/api-machinery] - K8s.io/client-go: Fixes a regression in 1.34+ which prevented informers from using configured Transformer functions. (#135580, @serathius [SIG API Machinery] [sig/api-machinery]
- Added the
Stepfield to the testing framework to allow volume expansion in configurable step sizes for tests. (#134760, @Rishita-Golla) [SIG Storage and Testing] [sig/storage,sig/testing] - Bumped addon manager to use
kubectlversionv1.32.2. (#130548, @Jefftree) [SIG Cloud Provider, Scalability and Testing] [sig/scalability,sig/testing,sig/cloud-provider] - Dropped support for
certificates/v1beta1CertificateSigningRequestinkubectl. (#134782, @scaliby) [sig/cli] - Dropped support for
discovery/v1beta1EndpointSliceinkubectl. (#134913, @scaliby) [sig/cli] - Dropped support for
networking/v1beta1Ingressinkubectl. (#135108, @scaliby) [sig/cli] - Dropped support for
networking/v1beta1Ingressinkubectl. (#135176, @scaliby) [sig/cli] - Dropped support for
policy/v1beta1PodDisruptionBudget in kubectl. (#134685, @scaliby) [sig/cli] - Eliminated and prevented future use of the
md5algorithm in favor of more appropriate hashing algorithms. (#133511, @BenTheElder) [SIG Apps, Architecture, CLI, Cluster Lifecycle, Network, Node, Security, Storage and Testing] [sig/network,sig/storage,sig/node,sig/cluster-lifecycle,sig/apps,sig/cli,sig/testing,sig/architecture,sig/security] - Fixed
nfaccttest cases on s390x. (#133603, @saisindhuri91) [sig/network] - Fixed formatting of various Go API deprecations for
GoDocandpkgsite, and enabled a linter to detect misformatted deprecations. (#133571, @BenTheElder) [SIG API Machinery, Architecture, CLI, Instrumentation and Testing] [sig/api-machinery,sig/cli,sig/instrumentation,sig/testing,sig/architecture] - Improved HPA performance when using container-specific resource metrics by optimizing container lookup logic to exit early once the target container is found, reducing unnecessary iterations through all containers in a pod. (#133415, @AadiDev005) [SIG Apps and Autoscaling] [sig/autoscaling,sig/apps]
- Increased the coverage to 89.8%. (#132607, @ylink-lfs) [sig/node]
- Kube-apiserver: Fixed an issue where passing invalid
DeleteOptionsincorrectly returned a 500 status instead of 400. (#133358, @ostrain) [sig/api-machinery] - Kubeadm: Updated the supported
etcdversion tov3.5.23for supported control plane versionsv1.31,v1.32, andv1.33. (#134692, @joshjms) [SIG Cluster Lifecycle and Etcd] [sig/cluster-lifecycle,sig/etcd] - Kubeadm: stopped applying the
--pod-infra-container-imageflag for the kubelet. The flag has been deprecated and no longer served a purpose in the kubelet as the logic was migrated to CRI (Container Runtime Interface). During upgrade, kubeadm will attempt to remove the flag from the file/var/lib/kubelet/kubeadm-flags.env. (#133778, @carlory) [SIG Cloud Provider and Cluster Lifecycle] [sig/cluster-lifecycle,sig/cloud-provider] - Migrated the
CPUManagerto contextual logging. (#125912, @ffromani) [sig/node] - Moved Types in
k/k/pkg/scheduler/framework:Handle,Plugin,PreEnqueuePlugin,QueueSortPlugin,EnqueueExtensions,PreFilterExtensions,PreFilterPlugin,FilterPlugin,PostFilterPlugin,PreScorePlugin,ScorePlugin,ReservePlugin,PreBindPlugin,PostBindPlugin,PermitPlugin,BindPlugin,PodActivator,PodNominator,PluginsRunner,LessFunc,ScoreExtensions,NodeToStatusReader,NodeScoreList,NodeScore,NodePluginScores,PluginScore,NominatingMode,NominatingInfo,WaitingPod,PreFilterResult,PostFilterResult,Extender,NodeInfoLister,StorageInfoLister,SharedLister,ResourceSliceLister,DeviceClassLister,ResourceClaimTracker,SharedDRAManager
to package k8s.io/kube-scheduler/framework. Users should update import paths. The interfaces don't change.
Type Parallelizer in k/k/pkg/scheduler/framework/parallelism has been split into interface Parallelizer (in k8s.io/kube-scheduler/framework) and struct Parallelizer (location unchanged in k/k). Plugin developers should update the import path to staging repo. (#133172, @ania-borowiec) [SIG Node, Release, Scheduling, Storage and Testing] [sig/scheduling,sig/storage,sig/node,sig/testing,sig/release]
- Moved the CPU Manager static policy option
strict-cpu-reservationto the GA version. (#134388, @psasnal) [sig/node] - Promoted the Topology Manager policy option
max-allowable-numa-nodesto GA version. (#134614, @ffromani) [sig/node] - Reduced event spam during volume operation errors in the Portworx in-tree driver. (#135081, @gohilankit) [sig/storage]
- Removed
rsyncas a dependency to build Kubernetes. (#134656, @BenTheElder) [SIG Release and Testing] [sig/testing,sig/release] - Removed container name from messages for container created and started events. (#134043, @HirazawaUi) [sig/node]
- Removed deprecated gogo protocol definitions from
k8s.io/kubelet/pkg/apis/drain favor ofgoogle.golang.org/protobuf. (#133026, @saschagrunert) [SIG API Machinery and Node] [sig/node,sig/api-machinery] - Removed general available feature-gate
SizeMemoryBackedVolumes. (#133720, @carlory) [SIG Node, Storage and Testing] [sig/storage,sig/node,sig/testing] - Removed the
ComponentSLIsfeature gate, as it was promoted to stable in the Kubernetesv1.32release. (#133742, @carlory) [SIG Architecture and Instrumentation] [sig/instrumentation,sig/architecture] - Removed the
KUBECTL_OPENAPIV3_PATCHenvironment variable, as aggregated discovery has been stable sincev1.30. (#134130, @ardaguclu) [sig/cli] - Removed the
UserNamespacesPodSecurityStandardsfeature gate. The minimum supported Kubernetes version forkubeletis nowv1.31, so the gate is no longer needed. (#132157, @haircommander) [SIG Auth, Node and Testing] [sig/node,sig/auth,sig/testing] - Removed the
VolumeAttributesClassresource from thestorage.k8s.io/v1alpha1API inv1.35. (#134625, @liggitt) [SIG API Machinery, Etcd, Storage and Testing] [sig/storage,sig/api-machinery,sig/testing,sig/etcd] - Specified the deprecated version of
apiserver_storage_objectsmetric in metrics docs. (#134028, @richabanker) [SIG API Machinery, Etcd and Instrumentation] [sig/api-machinery,sig/instrumentation,sig/etcd] - Substantially simplified building Kubernetes by making the process run a pre-built container image directly without running
rsyncd. (#134510, @BenTheElder) [SIG Release and Testing] [sig/testing,sig/release] - Tests: Switched to https://go.dev/doc/go1.25#container-aware-gomaxprocs from
go.uber.org/automaxprocs. (#133492, @BenTheElder) [sig/testing] - The
AggregatedDiscoveryRemoveBetaTypefeature gate was deprecated and locked totrue. (#134230, @Jefftree) [sig/api-machinery] - The
SystemdWatchdogfeature gate has been locked to default and will be removed in future release. The systemd watchdog functionality inkubeletcan be enabled via systemd without any feature gate configuration. See the systemd watchdog documentation for more information. (#134691, @SergeyKanzhelev) [sig/node] - Updated CNI plugins to v1.8.0. (#133837, @saschagrunert) [SIG Cloud Provider, Node and Testing] [sig/node,sig/testing,sig/cloud-provider]
- Updated
etcdtov3.6.5. (#134251, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing] [sig/api-machinery,sig/cluster-lifecycle,sig/testing,sig/cloud-provider,sig/etcd] - Updated
kubectl auth reconcileto retry reconciliation when a conflict error occurs. (#133323, @liggitt) [SIG Auth and CLI] [sig/auth,sig/cli] - Updated
kubectl getandkubectl describehuman-readable output to no longer show counts for referenced tokens and secrets. (#117160, @liggitt) [SIG CLI and Testing] [sig/cli,sig/testing] - Updated cri-tools to v1.34.0. (#133636, @saschagrunert) [SIG Cloud Provider] [sig/cloud-provider]
- Updated the Go version of Kubernetes to
1.25.3. (#134598, @BenTheElder) [sig/release] - Updated the
/statuszpage forkube-proxyto include a list of exposed endpoints, making debugging and introspection easier. (#133190, @aman4433) [SIG Network and Node] [sig/network,sig/node] - Updated the
kubectl waitcommand description by removing theExperimentalprefix, as the command has been stable for a long time. (#133731, @ardaguclu) [sig/cli] - Updated the etcd client library to
v3.6.5. (#134780, @joshjms) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage] [sig/network,sig/scheduling,sig/storage,sig/node,sig/api-machinery,sig/cluster-lifecycle,sig/auth,sig/cli,sig/instrumentation,sig/architecture,sig/cloud-provider] - Updated the short description of the
kubectl waitcommand by removing theExperimentalprefix, as the command has been stable for a long time. (#133907, @ardaguclu) [sig/cli] - Upgraded CoreDNS to v1.12.4. (#133968, @yashsingh74) [SIG Cloud Provider and Cluster Lifecycle] [sig/cluster-lifecycle,sig/cloud-provider]
- Upgraded
CoreDNStov1.12.3. (#132288, @thevilledev) [SIG Cloud Provider and Cluster Lifecycle] [sig/cluster-lifecycle,sig/cloud-provider] kubeadm: Removed theWaitForAllControlPlaneComponentsfeature gate, which graduated to GA inv1.34and was locked to enabled by default. (#134781, @neolit123) [sig/cluster-lifecycle]kubeadm: Updated the supported etcd version tov3.5.24for control plane versionsv1.32,v1.33, andv1.34. (#134779, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing] [sig/api-machinery,sig/cluster-lifecycle,sig/testing,sig/cloud-provider,sig/etcd]etcd: Update etcd tov3.6.6`. (#135271, @bzsuni) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing] [sig/api-machinery,sig/cluster-lifecycle,sig/testing,sig/cloud-provider,sig/etcd]- Fix a bug in the kube-apiserver where a malformed Service without name can cause high CPU usage. The bug is present on the new Cluster IP allocators enabled with the feature MultiCIDRServiceAllocator (enabled by default since 1.33)
- cyphar.com/go-pathrs: v0.2.1
- github.com/Masterminds/semver/v3: v3.4.0
- github.com/gkampitakis/ciinfo: v0.3.2
- github.com/gkampitakis/go-diff: v1.3.2
- github.com/gkampitakis/go-snaps: v0.5.15
- github.com/goccy/go-yaml: v1.18.0
- github.com/joshdk/go-junit: v1.0.0
- github.com/maruel/natural: v1.1.1
- github.com/mfridman/tparse: v0.18.0
- github.com/moby/sys/atomicwriter: v0.1.0
- github.com/tidwall/gjson: v1.18.0
- github.com/tidwall/match: v1.1.1
- github.com/tidwall/pretty: v1.2.1
- github.com/tidwall/sjson: v1.2.5
- go.uber.org/automaxprocs: v1.6.0
- golang.org/x/tools/go/expect: v0.1.1-deprecated
- golang.org/x/tools/go/packages/packagestest: v0.1.1-deprecated
- cloud.google.com/go/compute/metadata: v0.6.0 → v0.7.0
- github.com/aws/aws-sdk-go-v2/config: v1.27.24 → v1.29.14
- github.com/aws/aws-sdk-go-v2/credentials: v1.17.24 → v1.17.67
- github.com/aws/aws-sdk-go-v2/feature/ec2/imds: v1.16.9 → v1.16.30
- github.com/aws/aws-sdk-go-v2/internal/configsources: v1.3.13 → v1.3.34
- github.com/aws/aws-sdk-go-v2/internal/endpoints/v2: v2.6.13 → v2.6.34
- github.com/aws/aws-sdk-go-v2/internal/ini: v1.8.0 → v1.8.3
- github.com/aws/aws-sdk-go-v2/service/internal/accept-encoding: v1.11.3 → v1.12.3
- github.com/aws/aws-sdk-go-v2/service/internal/presigned-url: v1.11.15 → v1.12.15
- github.com/aws/aws-sdk-go-v2/service/sso: v1.22.1 → v1.25.3
- github.com/aws/aws-sdk-go-v2/service/ssooidc: v1.26.2 → v1.30.1
- github.com/aws/aws-sdk-go-v2/service/sts: v1.30.1 → v1.33.19
- github.com/aws/aws-sdk-go-v2: v1.30.1 → v1.36.3
- github.com/aws/smithy-go: v1.20.3 → v1.22.3
- github.com/containerd/containerd/api: v1.8.0 → v1.9.0
- github.com/containerd/ttrpc: v1.2.6 → v1.2.7
- github.com/containerd/typeurl/v2: v2.2.2 → v2.2.3
- github.com/coredns/corefile-migration: v1.0.26 → v1.0.29
- github.com/cyphar/filepath-securejoin: v0.4.1 → v0.6.0
- github.com/docker/docker: v26.1.4+incompatible → v28.2.2+incompatible
- github.com/go-logr/logr: v1.4.2 → v1.4.3
- github.com/google/cadvisor: v0.52.1 → v0.53.0
- github.com/google/pprof: d1b30fe → 27863c8
- github.com/onsi/ginkgo/v2: v2.21.0 → v2.27.2
- github.com/onsi/gomega: v1.35.1 → v1.38.2
- github.com/opencontainers/cgroups: v0.0.1 → v0.0.3
- github.com/opencontainers/runc: v1.2.5 → v1.3.0
- github.com/opencontainers/runtime-spec: v1.2.0 → v1.2.1
- github.com/opencontainers/selinux: v1.11.1 → v1.13.0
- github.com/prometheus/client_golang: v1.22.0 → v1.23.2
- github.com/prometheus/client_model: v0.6.1 → v0.6.2
- github.com/prometheus/common: v0.62.0 → v0.66.1
- github.com/prometheus/procfs: v0.15.1 → v0.16.1
- github.com/rogpeppe/go-internal: v1.13.1 → v1.14.1
- github.com/spf13/cobra: v1.9.1 → v1.10.0
- github.com/spf13/pflag: v1.0.6 → v1.0.9
- github.com/stretchr/testify: v1.10.0 → v1.11.1
- go.etcd.io/bbolt: v1.4.2 → v1.4.3
- go.etcd.io/etcd/api/v3: v3.6.4 → v3.6.5
- go.etcd.io/etcd/client/pkg/v3: v3.6.4 → v3.6.5
- go.etcd.io/etcd/client/v3: v3.6.4 → v3.6.5
- go.etcd.io/etcd/pkg/v3: v3.6.4 → v3.6.5
- go.etcd.io/etcd/server/v3: v3.6.4 → v3.6.5
- go.opentelemetry.io/contrib/instrumentation/net/http/otelhttp: v0.58.0 → v0.61.0
- go.opentelemetry.io/otel/metric: v1.35.0 → v1.36.0
- go.opentelemetry.io/otel/sdk/metric: v1.34.0 → v1.36.0
- go.opentelemetry.io/otel/sdk: v1.34.0 → v1.36.0
- go.opentelemetry.io/otel/trace: v1.35.0 → v1.36.0
- go.opentelemetry.io/otel: v1.35.0 → v1.36.0
- go.yaml.in/yaml/v2: v2.4.2 → v2.4.3
- golang.org/x/crypto: v0.36.0 → v0.45.0
- golang.org/x/mod: v0.21.0 → v0.29.0
- golang.org/x/net: v0.38.0 → v0.47.0
- golang.org/x/oauth2: v0.27.0 → v0.30.0
- golang.org/x/sync: v0.12.0 → v0.18.0
- golang.org/x/sys: v0.31.0 → v0.38.0
- golang.org/x/telemetry: bda5523 → 078029d
- golang.org/x/term: v0.30.0 → v0.37.0
- golang.org/x/text: v0.23.0 → v0.31.0
- golang.org/x/tools: v0.26.0 → v0.38.0
- google.golang.org/genproto/googleapis/rpc: a0af3ef → 200df99
- google.golang.org/grpc: v1.72.1 → v1.72.2
- google.golang.org/protobuf: v1.36.5 → v1.36.8
- gopkg.in/evanphx/json-patch.v4: v4.12.0 → v4.13.0
- k8s.io/gengo/v2: 85fd79d → ec3ebc5
- k8s.io/kube-openapi: f3f2b99 → 589584f
- k8s.io/system-validators: v1.10.1 → v1.12.1
- k8s.io/utils: 4c0f3b2 → bc988d5
- sigs.k8s.io/json: cfa47c3 → 2d32026
- gopkg.in/yaml.v2: v2.4.0
#135499 [sig/network,sig/testing]