CHANGELOG/CHANGELOG-1.34.md
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 0f2aa80502133686cb31e0b9073e29a4fbdd803545c3e75c5ed1329d29bad79505a681406f3e41220863444637a4328c59a8cd1d59af30959acd3ffb8d8387a4 |
| kubernetes-src.tar.gz | 3c572d1d96eb2c2b78f04eada567ab68f132d9a7de856a9eba1e78f18536e68ef0c22b22d3342cde3e27ea02348f6432643b6758612ec0d3f87e257204227fde |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 5b2e7a2d0d0548176196c2a4a040a72bedb3e180a64aed245aabfd7e94589cba2e445aa6518262e6f94192ee22ef9ea127c505b9135668c760e4f7867c2427f9 |
| kubernetes-client-darwin-arm64.tar.gz | 05b213d1c25d4d2cb930da2f311e4e06e2b5169487f994d9c45416c8e10fbfeba0196eab417abe1580b3124c050bc57cfd205fd6ca688d4b559a52d2f9fc2871 |
| kubernetes-client-linux-386.tar.gz | e0df1822dc68b779d47939f13d62032579b10ca9bcbc1073ea6c13fd03833b6c13acdb0a3c396affec099b5f49cbca2e5214deab2bf0bd8f0c8db9f2cd8cb0b5 |
| kubernetes-client-linux-amd64.tar.gz | a9de2b5a5b71a5d52b712940a268f643fb57edc25889f4e7fd52b04aadc56c2ae06c2e002c3f40cbb10dc1c4e459dce84f62879f12517c27ec53b4b71b2f871d |
| kubernetes-client-linux-arm.tar.gz | baaf0aeabbc8c8730f766d95a9794576cec0e639a2cec43fdc423d7d9588140f716cf371411af8095e73457411a3aae3b75c0fdae15704424859b8e58a102d0b |
| kubernetes-client-linux-arm64.tar.gz | d5bf70f3a075a0c3444a870af6e0f2883923800d879830d1046c392a2964968db780eed6cb12692acdeca9c91ee284e48821b4b02b8119a3d710644fe34f9260 |
| kubernetes-client-linux-ppc64le.tar.gz | 43a7adbd05431e4c57bec23c8d906b31fe73630d6309d4288653d74ef0a8c8bfb3387de22961eec9fce4e04081e913313e722b4af68b77142c1a192a51fba97d |
| kubernetes-client-linux-s390x.tar.gz | e135b73f4abecd299adfc301f2b66f95eb906510bd082d1e1bdf9f6407cfeb3b991dc7e61d670fee30d7db5be02c57e80a4336a34ca674c27b2dd19525ed65ff |
| kubernetes-client-windows-386.tar.gz | 71ceedfdbc707ace0bf32a494858da874fb9ef339f2ed087d69848229aa8fc0602c835520f47152534eab78491b897e62a7d0d75a5645d9ddfe5ba0fd43512c9 |
| kubernetes-client-windows-amd64.tar.gz | 7a79734a417b21ff560fb5ba320d7933ebc3b57487aa88917bdc35058ea97fbbe41472b77089de229b7faab4138abfa745f4a9c5d431040df57ace1bb1fac254 |
| kubernetes-client-windows-arm64.tar.gz | 936952860da255119b4898cc4a173d12202d3274f6023f835caf48399ffbf231cf800a1dc582a93570f7b06bc659837b05a12e201accc89477ced52a42cc8eda |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | baaf8dd4ff110a384e9dfe3db54a85a04223074fd13da32a38f9883a12b93bcd26ae4d666bbc2f37724f0a6631f3d2e4ddb97caaf909906711a824afd70cec81 |
| kubernetes-server-linux-arm64.tar.gz | 06fa3ac02fa8e90f406d2a054c85d11ad8e323b70aaf158acc0e68da3296490168ec2c7ee6f61bf4e3b14adad5f33f62feeeaf5974b9417b2d34a771e013d4f3 |
| kubernetes-server-linux-ppc64le.tar.gz | 50df4a88def50c79701d3c4673ff8279cc99986959af20c2d0ef8ea315f75b0d85366bbf968b437fa2c47a295e000138b4c016424035c0dcfaa6cd2c94c24b9c |
| kubernetes-server-linux-s390x.tar.gz | c501350351444499fefde864f2fc58c59db1a3f4b3dc36a632063769d091450ebc058851d50a25ed6f89a0617778a97248479c5b189d696867d76ca56897c263 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 75db53a192c4f81e6810e4544675ba474a39fb3381b20cbeceb175091a217387d73df6d648034be4c7c07c294d97985d77204b6b54b0ed9bedb89fb879c56f3e |
| kubernetes-node-linux-arm64.tar.gz | d40e5ddcbb1a8570247f850a00b21dfd32379c90235f2435de0fd8b844a235a2af48c5ce615b574d26d7e2e0f9b96b1b433adc42dd666f214855bc4023690840 |
| kubernetes-node-linux-ppc64le.tar.gz | 06414bf0322fb393723c8ced35c7ab0319f6d3f7e5a675589c8b84929eb9c081f5b8855166659cb5cdd4f8bec511efc105ec961bd4f7aba2b9be00d5867d35d4 |
| kubernetes-node-linux-s390x.tar.gz | cbb6f4079ed525e1903a8a0522e6967c34fa661c2d85874f1749f2dec86f3ed8b1d3d5b7579569bbfb05007996b70fb6df3f6c34eb1b14f88e8b4e60637141ef |
| kubernetes-node-windows-amd64.tar.gz | fdc3bbe9e42c21fc6482b73de21db86c50eeb58e9f9270cb9372cbad189624c5a954a9102893006af3d79686581cbdeb9942ef571e422e6ea08980ed1ca70aee |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 16349b7825a7e047b6dced5f0f673a49bbce3e8a22390e4c93502701a7e9de5943de673855ca20aa33bf7c2f937d17b021f35826fc002533c987f3621c24f238 |
| kubernetes-src.tar.gz | 8b066310812ad647ff3be8d3774f6812d58c10a6f7e9c00a752e6bd21006be938b88787b5ba10b18f69cfb98955fc001712e9c146bd0387ff830dd6d6f3d1d8c |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 695ba299dd0c9f845fb705ca05320e89074278e9b1c483f3d4c0f458de4f5bbbca3acf60f3f1a565c16765dac3e4859a2ba21dc367a119d7705f22380a76885a |
| kubernetes-client-darwin-arm64.tar.gz | 33ad60db13681b31e2a67fe858cd9fb19bdfff2bd839f24bc05702e2c037db49f973b3726f3bd95ad48aa00c60fd2eca2e55e2ef2a3e2b549896bacb507b3796 |
| kubernetes-client-linux-386.tar.gz | c2f2068596d7ce430679ecca9a1dde22027a07c48aed84f0d9b2032c1c94f42f4867cf3b4029926fc90f3712550de1de388e34a8312750c2e79b2c2aa85ce9b0 |
| kubernetes-client-linux-amd64.tar.gz | ee1300791c93d3ddfe8317c7304840b2504f435d2685daa5bc99da612e1524b930745a410a61af17efcb7d1a6876a900c259192d4afc443d44e92b55db5bed7e |
| kubernetes-client-linux-arm.tar.gz | d74c907ee3eb8b8e85d10ee2db139dc6c4270ff0a5033364d200bad872841e7a879097c780b54fcd0388d44a146d00bff3f1da0faee045b6266d2a77fac93f07 |
| kubernetes-client-linux-arm64.tar.gz | e7ef745c29481f0af328cf0b896b1c137aa086ccab4674d6ca3dc2e6b19d13cf64bcfe10c0dbe0df5bd323f51497b2233203bdc57fc550335327479c203047ad |
| kubernetes-client-linux-ppc64le.tar.gz | b6ac9ec325b4753f3a418bfdb060a37a2f41ff11c51f349f700c458de32d71d63688a5e7cdedc571bea48b23f7178293196220b99863f29fbd490dfda81b2dc0 |
| kubernetes-client-linux-s390x.tar.gz | 289d576b50b9d31810aac25c633b331cec4dfff07baa8ea0eaa703aeec63f1db66bd200aa48fdd039d1910777dea6890496d227d5f539a6d81f21ceb4653b6ac |
| kubernetes-client-windows-386.tar.gz | 9dc3c8bb42516f3929f0236c2c8eb8beec205b4e66083f2481552f91b7c75c1be4e94698aa456dca930793494a4fca473c2d2cae10235ab4bf3f87d89f0ba371 |
| kubernetes-client-windows-amd64.tar.gz | 067be680f209af23b1c6fbdd66a5ff08ab0cf88b3e68b728f22e2f964a827c130aed7403da4b95685e9ad9ece427be839c53a35b561dddb86f59072cdc4a51e0 |
| kubernetes-client-windows-arm64.tar.gz | 4bd1db72f49567173b25f4844a6e4e8bb8ab34bf785ae4f299e480e82140776d68f94b56c8611df8b403fad50f10e580f8d97e32e28f722cd847fad284a951d9 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 163b4bac9cbb965235a63d6301ef25d21af30f81cc424e602781249f2892cf14d26d0d5cca5549bbc70efb604360d4f61af80b724f648f951d0e7bcecce4b4d0 |
| kubernetes-server-linux-arm64.tar.gz | d5b1c6b3112f7f0ec790fae39705c2944093802243d58e11ce00e8d76c33dd9854ea7aa290dc77d977b7dc74665923a9fc9050c134864f12f0a81c545cad89d9 |
| kubernetes-server-linux-ppc64le.tar.gz | 9cf5c7354a827f87bd99627c7df692c615856776bc86387cc097304aaf10937b840a4e5a224d96654216fa88a18c39e5ee7f95b4469d473cb586a2713f0203dc |
| kubernetes-server-linux-s390x.tar.gz | 3f12bfa6d5fcf57e47bee0435c5289387f6cee85b0e20978b2824f99f3ce29e0482d67a6edb2dd2fdc821d94729805c101d9a598e406a442da3517b4a14169a0 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 41374670b0637d7e769131b82f9867a35db34a8f86329d3667fb47ba0a6b086083462a779a4d31206d1575c53779cbca26286e7e73246b901166e9f66994f4ed |
| kubernetes-node-linux-arm64.tar.gz | 5b60d2154921fb8c5efbefc7179fa6d2c1ed9042609c4294ae891caf3f90bf62c528136880973c97f3be6d780838405f872ddd9560d48580174abd4ef8c0f83f |
| kubernetes-node-linux-ppc64le.tar.gz | ec18dac86d3911866ef7d865e76394fbf05c4c3c3e00e78f033d971db260d4d072479f397dd390f951d9e3cc5079150a416bd234e34fdd03f9a20ac10eb6896e |
| kubernetes-node-linux-s390x.tar.gz | f0745f95af86c752288e1ef1ac2db29d9315b21e7e7109e09c7586bf83f03620847861f990515d7ebf4afa919a0af7067d12e57800ebab19727163fceb985d23 |
| kubernetes-node-windows-amd64.tar.gz | 2c78021cabec8baf97f52c29bfc90ae17d332551d63f36e9be1f62cc5ecfdd244a491cf5fd2c8d4babbeef8a1ac39700a8406ce631b3048b2cac0b5b01b66529 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Nothing has changed.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 48d22b19369f111f881dd838e7aec9ee9e8126aa759d6063d8c29249656e83317d7ebec1e0705106e3bff79e8642058919ba8f27751c34697d7234a4cbce1d7b |
| kubernetes-src.tar.gz | ec48476a800aa4642660b81bd76f190a102cd00e0fb769d05c40abbbfb8d0ebb53e35c559e7fe4dc43d439b5f097742909cb84641085b32879b5fbd05a44a330 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 59b9f619e4f52dd55e18570d7737ceee0b811e370f1d7c67983cdc17e073ee24a0d195db550c41a8143ee85c357d4209c5364edc3480bb4c8fb4d43b846307ff |
| kubernetes-client-darwin-arm64.tar.gz | 330b4e805eeae5d982dc8c5a62efb5bd40920816d7ea3183a4ad942236f055f043dcf2a40bea4a68ec7fb3d47b5e6aa0de70f51a6cb338e75e7d9d129066c148 |
| kubernetes-client-linux-386.tar.gz | fea3171371c1920b388f7f1703f5d71cc6045bcfd92a05798a9d9b00e8438c4e1f869150c05cecbed188dd6e2669bc5d5f76d243456694ddb7afc71abfc186a0 |
| kubernetes-client-linux-amd64.tar.gz | 293977e3cb48e669a1354d643a61ff736337e6869a6ce5e109428fadda8e1fcf8597ebdbedfafd60fd096e1521fab4dfade6430c1911d1f4f05f7737dc5c453a |
| kubernetes-client-linux-arm.tar.gz | 61e497246df84a6deeb83cef12ea2e1ca5290c71c4eae5c7440ef671fd0b902c092955c27f22096faf59da12efb3c509c40e125c4f035e863b52d8be7d942395 |
| kubernetes-client-linux-arm64.tar.gz | a6e50ef7c702bb4ea9ae23049f9b9f21836f1a80576b7a29915d780b23f61bc712748767c951a437552a182349f55132c67a620fedde6401c2e4af58de078078 |
| kubernetes-client-linux-ppc64le.tar.gz | 5ced80759ee08119cfa949093f8e0b12b85644441910d0541ad5470cc2d020bc99fcc3f35adf17ec7b964d72204aa6a10abf024a0a66f8625b31936f7ae83079 |
| kubernetes-client-linux-s390x.tar.gz | ab3910271a897294ceb95f351f80ab54e230d66dcb26c667fbb0f6270e10e101878d5592b8b02b670cd7cabbf158dc88b7e9ff7a127d277a61d5973a1282f9c1 |
| kubernetes-client-windows-386.tar.gz | e5fa8d5785ea446f16be40e4049c77b8facf80fe5e428af3e8fbe4aca6d33ed70179b8102e18e03b5c293d0cf3a7800c0384e756aed0f80d82e7984424002e6d |
| kubernetes-client-windows-amd64.tar.gz | c940a0e1789eeec35bc6a8bdadf5ddd9686e05727c0e6115f0a23e5dbec3000fd9c5c4de13a1995bbf895888b31d3e50e05b83b06d633a443ace861d26bdd1f7 |
| kubernetes-client-windows-arm64.tar.gz | 52e4887ca90f6404e87ec5e18ca8c462b17d0182feef978953418fd2c4252d08cad7b489c8511d16f847c95d4c848bd7cc4a1ac9233964cd46bfbc63e48b9330 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | c7970e1e061a1c07acfa23d9166aeae583d27cbe2fdf14f0d7c17d2425a7292a7347775413258635ca458c5fd84e8f48e63ff6e12fb37489d9cf2106e8c721a2 |
| kubernetes-server-linux-arm64.tar.gz | f81d5329098b6b8cfc8f3582b80d852117fc7a279fef0e85539defa4d7403ac390f82c6be9fd0075f0ff589ea8099cf6d437818671654a180a8be21ffc622fb0 |
| kubernetes-server-linux-ppc64le.tar.gz | b8e6cf18f5435fd7cf7b21a231d3bf37cce30cc52761544c9a41ddfe64e288461d133504d2adc2dce11863925f1dadb4facb4815802af3be0baf36e277228b62 |
| kubernetes-server-linux-s390x.tar.gz | 0435f27dd4f4d7f35016cfdcee82c6f42dd36b5cac6cf60d0f0e7a7914374b2e95dbdd3df9b58fa3ab5820a01075f41a5a82f6aee1e01d9f239dd40d6b04cd24 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 11baab6d40a273b32d5d07c143cdcc41929e3173fe6ec76d68857c1339f1122b4f57d314ea95af09af8591438fd200e915d5978fc297bd7e176b6e0ccc9017e5 |
| kubernetes-node-linux-arm64.tar.gz | 7722d3ad88f46d50fa9621629323b200bbdd15d60525f75c527ccad00831b599352472409ee499542b6ff9591368b14147562d81c6db5a98245443bd7894543d |
| kubernetes-node-linux-ppc64le.tar.gz | 78d316979095172ca4baaf099f9fb13dc4ebfe201c1b79b4f539cf556e81df488c42f84bc1002347b3175fe97aac8d3f94d58bcde96af8dedbe05156534f6e61 |
| kubernetes-node-linux-s390x.tar.gz | c6d01163659c29a980695de7065050b60edb750bf09e3215300f78764b3649cdf70a2f23546f1cf6a188aa1331e03cc50cd89285a08b2015c090aed4c70bb85e |
| kubernetes-node-windows-amd64.tar.gz | b71e5ff931804b8bb2d3c2fed3829cb26b306824ba23a8bd6f700cce42e1e111f4bcdedb0f5654bd9dbfee132cc5b19ddc922f2e3bd28bf681032ca5b57cbf5b |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Nothing has changed.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 9cfee27d587171a603fff8cdea1547f21121347837b9c69d7ad9b23267338d6e94f200605ac878db17fd5923ff6863be61f3b738a37a713c6db2cf5ba0679902 |
| kubernetes-src.tar.gz | bb17785569083ad79d384994f960a4e2ceadfea8132ebfbd9cdf2251bdaff6d8f15f7708b6e3270bcfd68b35de190e66e0a4f692b3e9fdcb05ca9cea16437874 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | d54016baa54cf847d68b56bee5f73f8453e2f7ea2fade04fb0a2dd4dabb2ac343e604d2ceae48fb16338c6fb4d92a6eb46b4294dda54500fc93800992a6c1c1d |
| kubernetes-client-darwin-arm64.tar.gz | 7770047fb7040e9f8f59daea877cc6fa1c9c7444e397b5d6252389d35b766ea3efe52677048d9b6710e9f866994635b985d64f631e396ba36b2689a77c75f7a0 |
| kubernetes-client-linux-386.tar.gz | e039b5830c10a358ab9ffdbc3551a62aa64c30d7db41a2b60644fdbb0205028817235d239ec318e086fbae0615f8337e938524f813fcca93579dc1f91e395e27 |
| kubernetes-client-linux-amd64.tar.gz | 018d0a75b74b55942a0777afc7edf64ca98c004e6e12f9dc93ad75c26cb58089104ba0f9ceae2f0be5a6f6854948c705b0eb828f0960302a0ff84d57c464fc09 |
| kubernetes-client-linux-arm.tar.gz | 051b2e99affa27a7c419d6d1bd3c9e37b3cc467720250890ee1c94188e3bca9d074a6c168ba0f13034690fb716d259797131f187d5a277b2215031f4f5588551 |
| kubernetes-client-linux-arm64.tar.gz | 7b26519145a69ca0a14497ae476b8061b2f07b69f0cf4669490ed36b9161507c2457018181c50ba6c86c55f6b68dcd6faeff832ad5e30f3845a11fc996db2146 |
| kubernetes-client-linux-ppc64le.tar.gz | cc3101ac0ee9d86ee03f95eb7a95533aac6d5d11e1e80af66e0d7b899a86884dfd85a4c1b2796060b2424cfaea6ed30cee05864fd305df64e0f0e037e6514217 |
| kubernetes-client-linux-s390x.tar.gz | ddf4f06b81bcb453aa86d5a12dbed95ab08d88c9ea75b0b14ca1185a5f12c276f80867f0172dc51f45b75bd1dce2ab91d9c7c80b95cd32532da5b3da8affd373 |
| kubernetes-client-windows-386.tar.gz | 7595f1e24db62223d30ff9d255675e3c199dff61a0d201467202219e638cbbd3544cf8a094dd85db5fc5026f09ca6939f6b5fdc6876448af5d082f10fd60a8c0 |
| kubernetes-client-windows-amd64.tar.gz | 59b5232d9e586cddb4ecc4a40e9fe6341fdf2a6c402291f6765e4ea81c93e30534a118af8a89b19b4ac3c0b67f40dc7016d47698ee3183b3b108aa63c03b701e |
| kubernetes-client-windows-arm64.tar.gz | cf39ef9668d6850bae2a618b2fe1705c5587682297bb14e447d081f3be71b07be16f8193c7e1c84c33070a16ecb250fa4604678ca988bd439d6ced4a8f119587 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 65c75e81e3ea488f6d42b493cad64d7577ddfa1e5372037a1c841ac069039997d359b5b2f2d44e7665bf04c48ed0065cf9d4c9801b1e63bb6a1b099ef00d4863 |
| kubernetes-server-linux-arm64.tar.gz | a1fad7060ed67b5634f32f3256a295179dd887dab5c82b8550c2eb62c69df34cfbb311c8f93e7608d558eba32b9e2ddc23976db39e512fd747cc6bf9b4c1765f |
| kubernetes-server-linux-ppc64le.tar.gz | 35e174beff38bad364c15bada88884fb0dc212b16eb3640e1881f016eb0903fe37448f2cd241b0a1bce074ae4cb62a877ad5fec9d2848d1b6070ff4509093de8 |
| kubernetes-server-linux-s390x.tar.gz | 1b638410b0cd16b7c7a489d379017a05ef2c059cec4ea02e9405091c8e45c9c073a6369f0d2ec9a75073f4d6d549a6c2603d460d86916a9605591df241fb85a7 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | b51886e190080f47d0b2556c6aa431bfbe9e5aa7b1e90eada43e86065e4fbfc5db265adae00207fc5953c1ee13afc585c9db2701c8297c273b9b555aa0c068f1 |
| kubernetes-node-linux-arm64.tar.gz | b4bd87d1f7f923905e5b9577f1778a4a0da22ce62de477968016fee0dbc619a38e725768c9f5247c1cc50414a853fc43d7970cf704b0125f528d008ccd25ba71 |
| kubernetes-node-linux-ppc64le.tar.gz | e06c3956395ec6b35715e619ec80c89f846478678893808cdc4e6c3e6fcc938bc7bcef2a0ce3bfc2a940a4ac31a2d4457f3f76ff1c1b9fc0e9b48f46a97cc72f |
| kubernetes-node-linux-s390x.tar.gz | a47085861e4b87ef485d07172ced528f3fa3722d472c971c866582a9fed2241320023621d7da0a36b75913df6982c81f6b6388f6684e123ad481a6d7f89a8367 |
| kubernetes-node-windows-amd64.tar.gz | 9acbdb187c6e56872bb72372eea5a63ff17b7f485526e2907cae5a97d755d7a534ebb0f2fb893c00a343189e8f9ece184b36d30f03f0d89dc58a7c4355634d85 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
$ followed by a multi-byte character (#136490, @AutuSnow) [SIG Architecture and Node]status property in the openAPIV3Schema (#135363, @fusida) [SIG API Machinery]Nothing has changed.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 33627a4aaf07c7c24ab9f26ce0577a6bcb702a1d4dbe207fd133cbc0dd1777f11093ffb82105a33913ed80444253cd5589e5fc1e25844590f1ea3bc10cdb5966 |
| kubernetes-src.tar.gz | 7105f135a374a6458bd16dfdac8a2c13341091f32462964c8d968d0c09c8e608730280174492f31f09099aacf39ac1191883fa1ba7bbb029b8e083cd225ced7f |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 4a8980595de9271614cae688d232552b60ecfa2ab802ec939ae3ebbd71f55d92b66c3f785bcaf7b079bae3638f308969804d1972d4f026c102f653de9c59a647 |
| kubernetes-client-darwin-arm64.tar.gz | 43ff65398af0a3c0e195b194aadc8dbd39722105948084c8238d7d5014f3e85acf4c3e03f8770242a1844352eb67724752f08b47e98efd320db98b187a9e859f |
| kubernetes-client-linux-386.tar.gz | a203affe4ad63722bc568de35fab9defa0a71f79d1484bd1a74552503bc93803532e5a396894cc10355d238ef8d0457ea520bd11d0b261bb048bb79fddb29070 |
| kubernetes-client-linux-amd64.tar.gz | 7cbec147966596b1d07e42d4d2c2ca286fb135ab6352c55d1e0884c1a7f3bb5fc37ff98224fca1221d6a317835fef06c249f3aa57072f0d55b33fe68eb94b815 |
| kubernetes-client-linux-arm.tar.gz | c3e9254149a45801f57a21de11f93e19784608679063a7bf0bd9e3bf5fc0524b6b451f834ec5c0fba8ff80244814ac69ac2c733cebaed474661b3e06ee9bb2ac |
| kubernetes-client-linux-arm64.tar.gz | 02ebf150cfa3d69e0143e6efbe131c84c514de55c5baf3e0422fd6b24b9a8289f9fb1c1d409852ccca3105fcbb481a4717289535e95904449268a99773d2ead5 |
| kubernetes-client-linux-ppc64le.tar.gz | 19d6c784509cfc3ada94c750c560b6253c569b3c316c908459adf3d3db685a75c6447f30943b30f1ea0b5c269914c510f2104755ad188882cb5be005d7cbea5c |
| kubernetes-client-linux-s390x.tar.gz | b90be4990ee37bdb2ed94c2cccaec81a4a0e06cb3fa9007af7ca1e30fb33def2214055fd447cd9e68a150a17443b42482f0d05ef79cb142ea038efa3bb7214af |
| kubernetes-client-windows-386.tar.gz | 0c59b6d2254c4f739a6ecb0d72908ed4ff278f6d025b09ff6e7fba118c2c4977e647258fa494973ea4269bfb51aaba0af09fb3b5cae4f69545168cd897a2c7c6 |
| kubernetes-client-windows-amd64.tar.gz | 5f20e21bbb36a3219def2217c44ebe9527f3f4ba2f299197006c389f759b44dbd10ea77755cc0dae3e198f32557591e830fbed92dc22d9457131c86e84ce235f |
| kubernetes-client-windows-arm64.tar.gz | 7abac810edbe183b1f261c619b0b6c978b0656a89da1bf876dc9f24db33c73e82bdd3728486870ad66525ac84da1a975e840f12484a415b2159a9469a2cebd6c |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 6dacc62cf3def4873c680bd308fa88eb0ee857e4ca4e19723921172f7e6d4f7f774ea7742d59fa051807856896affb4fe86e55fc2612e2c3f729e5e10cde3200 |
| kubernetes-server-linux-arm64.tar.gz | 788e89509219b22e08ec436bc4ba39ccf47237b78253bdb26b1d2287c22d2edabacb8f2102d657fd259e3c7d2d2b671ba33ca60383beabd480873bcc30773d7b |
| kubernetes-server-linux-ppc64le.tar.gz | f915c019937547fee93f28472a670b7fa94bd37df2d52d9a02ecb1b7a13242157f24d51661652a071109ae144721f09fd5b1ba4734239faed957cba5bf6eb8b9 |
| kubernetes-server-linux-s390x.tar.gz | 936005a894cef3a573af7d4b8f0605ede7ecae3418e20983e99cf1f8f8d8bcfa775007e49fcf5e05067fa667d25ec7df0862c4b97165f6c35997af8dbeef5878 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 15e7c285b2a399c9d4587fba182e2ce302a93de20a283f76e5d5fa1ba81eb1f735a8f3f1b264071bb4154c9d51d884cf69240b8f1183763d3db73bacac699946 |
| kubernetes-node-linux-arm64.tar.gz | 7f8ce155ce2b6ac6997fbadf44ba11d1e5adc5dde54c6dc06933e0df25eafbd3d53c18e83674e4ea5fa061c7a7d136b58a58d99f6c9c69514f4f68541fd9f7a7 |
| kubernetes-node-linux-ppc64le.tar.gz | 70699409281648cc44d602635cd4b7c5f096aea9b1a2a219743e519b10bbc218af77639494cade6ea7d85d89cb617f07e5a130b471e17f36710fa2b3c66ca07c |
| kubernetes-node-linux-s390x.tar.gz | f9c19823231c26f9b17c5c8ff47839eeda595595ce02240ad33ef6c619c86d322e31231d642d9e4170ba73fdb6242a853b0709d815c3ed0e3d8db1678c4a8b8a |
| kubernetes-node-windows-amd64.tar.gz | 54f77a6306b7fd3cf3a2f6b470086a3d24d6f36b614847844d3bf6e821bdfa67f1a79863f6a56e9e6952017543c76626b33dbec77f2735d35f020bd5db138a27 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Nothing has changed.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 021433b7de611498e31819f53e450fc28c8f9ba83808e2cdf89c235567071f9083cbb7ff8d23ab9aa694ccf252daee71b6a7b01f0e21285b63ad0fcabac4fa16 |
| kubernetes-src.tar.gz | 62d13370dd2c00179c56eb5f20a1d6579c5a378109704b028cf18baeecb2ce8668cdde78ab83da19988d3c5b3c2194526d65619924aaeb7011c5006f889d54e3 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 8f907d4af4e70ca04eec7ac37e796ec9d5482b5c01311cb22811c2e4257aef4466ad08df6c629b9e403ae8d9be47887f5777b5e88b9b7ffb5f213f6c1654d783 |
| kubernetes-client-darwin-arm64.tar.gz | 60dea17783926c611e7007d7c1c8ebb9bae46b18c50400a4ae3a8a1c2c44aed6bf9e4e965e61b97c3d727c261169fde6370477888a4bcfb9be02c3315c880ba9 |
| kubernetes-client-linux-386.tar.gz | ed421b143b69eaf6f4f61e78d73af3a613bebd6188708092b175a0f3715a36393aa5c902cb8023f46e5c0d67c2d36a3e1c08a003d46977dcd4a32631b7002d57 |
| kubernetes-client-linux-amd64.tar.gz | a9656e446054151390279b5d2a57cdc52cc0546ae5dcac17c370cc4435d93486da9d9603f560cfca64233ad2f9642dd41219c2f308196491af194faefe2cf2ae |
| kubernetes-client-linux-arm.tar.gz | cb83ed2eea829d1fc5bbd8f0acfeb40a3db544298f1eb47ed4a1e2ed54880c213eef65dae5d2c25948a1e557a1061cbc2512d9ea7284f6e0a58e167455ca04c2 |
| kubernetes-client-linux-arm64.tar.gz | ffbe3367b61531db26494388776f53fe9c83793dc7bab83c3435e5d884846ac25f8e9b8132be083bcdc120462d00ea108dcc033790ff50be20ccb396de6ab786 |
| kubernetes-client-linux-ppc64le.tar.gz | d19b03f051ea3549f117ab40042ff8817f53cf50ae7c6a32300529fac5beb7c06890f5ca57c0f1785b2dfdd2e9d67a78409bb90e5e0bd2465896ab0ff63442ac |
| kubernetes-client-linux-s390x.tar.gz | ac43a42c63b299b3e56dab1ef4cd8e3a6b88fa359609634776cd596833cd64e3a1ec64e09df73b7d8424979c2cb5d477db490640abaf5bf9caca991fcaae1bc6 |
| kubernetes-client-windows-386.tar.gz | caa45ee27bffc1b7e8aca0c76f794d9d4cfc33da58182134dcd39e2a4fa6204c5c6ebbbd6f301fd25cc0048ac6e33c6c4618e2a988311d8a7b949a2a57a79f33 |
| kubernetes-client-windows-amd64.tar.gz | 15721127d8956011a3e5615ca8e29313b6c790ef1f0b914b1603787062c90614bec1d986d8b84930a3ad51b849312a87051cf29ce7c10bf9836c6ac1a07aaebc |
| kubernetes-client-windows-arm64.tar.gz | 42fc0311183f236e161e42be790305454295dd60aac21ce16e8487814de8b999cbee479bea367b093b15f1a76c260b0f62c792fc302a725fbcd39bd968fe4c38 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 016b09cb70b4335201095b96cd564059eece9ece9e945e045b4558afa9dbd99840cd7a48ed6c06a888276c939c8dc30afc8a7435689c9efd295a9f9de1f477c3 |
| kubernetes-server-linux-arm64.tar.gz | b5a74b68e3e88f420ff6bae262f0611a80360672a05170b71613babb4fd072f36b2f067347feb16f0a9c1b20bca01fc8c07d83e3a55ecd133615c9fa6e5066ca |
| kubernetes-server-linux-ppc64le.tar.gz | bc4e7f1986a802cd35e725854daa18dd68528629d31751e7b62ec292d17cc98ce883e369d05cf55063964a27f5482e548cd22879d9e8954f41a81c68b3452bdd |
| kubernetes-server-linux-s390x.tar.gz | 2df1a9e454b47cecf13cf79197d426178dd0a57f2a05b1e28223ea0b4fc7cadd7016a751e1f02ac08f286b0b5aec6f8ea7ca086829ab86131a21c01223a586f7 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 7a0e3fa6a6afd29e7191b4fabd1cb994458804c8a5cf1b622da77bcd6773244d23bf7f9e0e4b0b6f1485f33dd6d8908ea7e1faad4ba6c02d9c2fba3ce99ba888 |
| kubernetes-node-linux-arm64.tar.gz | 71f2b692631c8cb541eb9e8950cafb4c28e2b7fc0ee70ded18ca904cc5c8d56e47cbe6d5a4ebac5c41d6386e1b709da213b6eb9e1a56a608e635fda2aa1fa796 |
| kubernetes-node-linux-ppc64le.tar.gz | 87dc3249735fd66bf07f7249dc84c184895f696ac1954ec99d41ef80329c0feec9120966e98f26c99402a1417ef738334121e515c6153b5d28862eecff026f00 |
| kubernetes-node-linux-s390x.tar.gz | 6817f55f9aba80221d61043d3a8374ecf52777b94da7f6e3edad5f23813ee9a5117e26c94b020176fe667b3d295a06914ccb1d5be8f5bc527fe39e84ab8e93e7 |
| kubernetes-node-windows-amd64.tar.gz | 82041b0cc8652b232aff3ead79c8e19260ecc19d7164f852a4982f0ae70c2a7ac8d4ae0c3f8f01f1825ac1645e4ed9049f908a1931522a3f7b16dc456c54f42a |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
iif instead of iifname for name based matches. (#134118, @jack4it) [SIG Network]StatefulSetSemanticRevisionComparison feature gate, which is enabled by default. (#135087, @liggitt) [SIG Apps]Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | b1262f114376f7bc0532ef688e758657ada0796e958c7b49e1401e8a2789791a7d59e5460c54780131fc8fa7398c6e87a7e59fdc4a84061c15d015c69a07e10d |
| kubernetes-src.tar.gz | 5109cd698bd249341357f5a0b7ab3cd078a641747ef1a17e168f650c62af854cc46bf3bca884f43ea33d51e81a2be4e31d0d02af639a3f58d79f3f1322b0e238 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | c977b7ede3a07ec721a874ec127a9b2d2e1edce097e33fc5bfe0a7a2ecf61153c4e514787e89003eeb8d463f47ba0c09f3267669769f0cba873c5265674e056d |
| kubernetes-client-darwin-arm64.tar.gz | ae6b112e45e50a9d1ce0738f948f933eed419dde20a70f399cfcf77ebf5179b6af893ae7e1e633f5b99c1f34a499a2238474cc45878afdf250c048ea43c559a2 |
| kubernetes-client-linux-386.tar.gz | 3e8aff795fa394343b4d3a943dba25b06b5c122df91fe5893cb354ee605a087f6150cee6225ff60d4b1ed9e0fa02adb9e4ccd8e38cd12337a92cedbdcfaabff2 |
| kubernetes-client-linux-amd64.tar.gz | 3abedd362fffd5eb749febdeb59c2edd9902f7f69fb182f879daeb27cc88405983c539513cb74ef9b9587ab3829bde992f22f2067fd181311989345f6e13b867 |
| kubernetes-client-linux-arm.tar.gz | 0d28e96ff4bf3f570277f194a975c19e8a1b49e7240908a91278647c44b5f019251dd7774aed5dbbfe7c030ded993701044c90ac97e14de5c51d0e9ae84d2127 |
| kubernetes-client-linux-arm64.tar.gz | 279832e1ac95532807aeb68ed951e8099300e3cd4a09f1d829c4b0197e0010d18d1de19e54f73b0ab7f104ee5670ef4897127432fac42867b7a727d75dc8bd48 |
| kubernetes-client-linux-ppc64le.tar.gz | 1367d4dfebab6f504612d6aa7e6dd7f6391ec28779c0610ef89c77bb691a5020ff3d863d5414645d62e9dfbf1fe814cf8b3bae3097c210f8e8ad895deb19c291 |
| kubernetes-client-linux-s390x.tar.gz | d03ff4bbad2c947a37a6ffc62f3db08cf2cc1d9d702d90b94f80fb9fdcc637c4f96096beb3a466f07ac4ca807d89e81240f15cf7d2ae1c6fbd4a953122728e28 |
| kubernetes-client-windows-386.tar.gz | 7929fd442acfa851c1510b52a6c3a11f6d3c2fb318597e68134a1927bac18ab70c6de7d572c0c05ecbc8c5764cf20fc91ab4c1ad604c7cd3707b86c01cb9fd16 |
| kubernetes-client-windows-amd64.tar.gz | f73e914d28e0986d4b32bbf0d39c428d3e4d28dac11cf8d2b48eae4f1825511fc8b1b706427a1fe752fc0d280f1b4c539f4261cc31f679f25646ac5234afa7ad |
| kubernetes-client-windows-arm64.tar.gz | f03de193bc851a1327cbc7338f019cabe7167775ca597c36637b10332b8892a7a4bcc5daa090349f24347f5210fced19c7a15211c69abb94fee87e88c1efaa30 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 8fd1e779f4d0188592644e234a6e5b728b9000a2afeb9d8da25131a5a4e54718bb46c4d521c62e26ea971e32745529fbb001c4f011ef2c54091cb5e81b4b90f2 |
| kubernetes-server-linux-arm64.tar.gz | 77f68803b34f710c9623f388452494075ca9bb38567e7878176ec12a6d2971d2feba381e99462dc8c6e83ff5064dcffcaa7df736b67208880f5e90d71a831c2c |
| kubernetes-server-linux-ppc64le.tar.gz | 6a5378a02b9b27cce9e0bc26399f8c0a8676372407bb618949fa41caacb4bbfbc7ec5487e00d973fbf409abe848a3aed42b2ead2c78753a1dd7c3251daf61745 |
| kubernetes-server-linux-s390x.tar.gz | 6b9b4b64907ec817ce93a70faecbfcccf665e6b7681d0c21e26844c9d2645227ee8956c3b6b6a2417725b1e64353d5e1ed7071cf2c8e71ea8551cd47d662c3d8 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | c9b7d52708c4282757cd7aaa8b059c26f8f427cf8c238dff95cdc85a68d42c28b6e09fbf1aee3fa6f5f377aa395c6b9a73c112c56a6485e22b16a9c8562a8eef |
| kubernetes-node-linux-arm64.tar.gz | efe54933eb5e7e6b44c76efe0b4cec911340793ef2eafdd595593fb2537e5704429d3a291793cb69ad459fe14058da491a29a12d963ba34ee4c1475cc0799b0f |
| kubernetes-node-linux-ppc64le.tar.gz | 59a7223e167c890d8cb8544b9692182aaccb3814cb203337ea21a87902e0174d6f0e114d015989c42890d3b73cb73bdf8b1b71ef89fd1b0cf615349d10c23f8f |
| kubernetes-node-linux-s390x.tar.gz | b648658aaae4812d787b7be04bdfd13dc379316bbcda107eca410ffbdf57713f00bbb68ad4fe9501c3bb26e5d35f589653d4067a5753f681e41f493a28309ea9 |
| kubernetes-node-windows-amd64.tar.gz | 4c70f856364a976aa919662f3b3f6f06da3fe7ae156b7bf3fd84de4b5a0b0c70221283220c48c3cc31dddce0f2e0167606126515b1750ca90aaf129f1c9280ce |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Nothing has changed.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 133a1ea99881ac8988b1931908506b8b02e0533c6c6521b67152c00e0ba5c124870a3a5050887827a7d1b1b8cc4b1da9e2b07f76684975585d0947e5d234faa5 |
| kubernetes-src.tar.gz | 2fa409c71ce0f98dc540baa0e5058f751ee982cf0b9dfe4d3ed5eea1331586e7a464a631909889f9c0758d364643718a336816343136b603ef59bdf43c7a30d7 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 20b6c4f9327f4d0b5873429595e2b7bdfec6269e9a39dee69e28ff9f3fd168611f56f378b867c35edc605dac23227b0d95083fdbc676c04f5d8d1142ceff829c |
| kubernetes-client-darwin-arm64.tar.gz | c48d5efa26f8313f535a173201c38896fa9147fd46a7d3a085c70dcbb16391a894d4c4f09ecb6d1d7ed081a7d3fdd8f71afadd0253a55808addb383680ef89b7 |
| kubernetes-client-linux-386.tar.gz | efc91631134a8cdd543d4e9cf429928b0b7abe2f6212f05ea82ad62830caef74aa4b9b090b45d583912de280e13af87b8b20c0d3fc6fbc43b5c99beb5a9ff8db |
| kubernetes-client-linux-amd64.tar.gz | aa5e3a41986e23ad6910eb86e68eb10217db60978dadc88370c669cb9c9e10d1431133cc8f7401b4e9843e0d15120c867f2803121e690ac7c74ee85eabbc13b5 |
| kubernetes-client-linux-arm.tar.gz | aeafc3d539a400e2e1a32ed501aca7e265ed817d0d56acf62f306c26c2be0beac6af88b6478a26df865105a2c13f2006cc1e062189f4b6885814133090228e86 |
| kubernetes-client-linux-arm64.tar.gz | 24158910deed9d09e99e5fb358bd9758de509f344bfb0b1482b2426e26c1e52f7f97657438fa698b51da10c7444699f7addae58ee67b23f38eb175df0e17661a |
| kubernetes-client-linux-ppc64le.tar.gz | b30f3966ab6d2b723956cd400e73a685ea6431230eb1994bbb995af163f6ba7abbda79834dab3f0fc0a6b4a9c9af3582f07689e100841ea012015070cac9cd80 |
| kubernetes-client-linux-s390x.tar.gz | b543accac845a9a8d1fccc62e43d44479247f9ed65d7db7e2fcf0004ee02c7eaf9d10ab977040bf77f4f5171974a1d4d8a1852d93668b1f593ad5f957ba84952 |
| kubernetes-client-windows-386.tar.gz | 2f60547e2e8800df61c57adfb862031e81ba27cba3edeaf483aa8616820561c6ed9b87778b4e81be14545dcaa35bef9d80c817972039357f8e594a6f4edeeb13 |
| kubernetes-client-windows-amd64.tar.gz | a528fdec4aa426f0b72ff96f39727842e6561f4c49e273e6f007934f42ab2992fd75a8fa43c9ae7d9f3345091228d43bc03e3bdf3696d36a56b4fb49d20a6e9d |
| kubernetes-client-windows-arm64.tar.gz | 467dcadaa8b48d45caa0a5aca5669317fd501689e4a90219c701adb5e9f46ce66085dd3800321e2377c775992180d76aae2e2b84a4f7bb50f997198def0dd8e6 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | a9ec9abe6a803d55d56753e1be8549223cd34ebcbec26536cbdc277c5f17a28c4942329e1df01a2bd067b60a0c1c2901e240d5014e9ce445400239bd488582af |
| kubernetes-server-linux-arm64.tar.gz | d05fd68c31f30b1853aa927200ce99fc1e7e67b39803be7508c5591b57e74f3496bcd8b50b84afeabd293f41bc647ea4bcb0bf85a7be5b49e8d2604214e5ccda |
| kubernetes-server-linux-ppc64le.tar.gz | 173d638506736cfd0bd8ffe7719447895068ed3f3c8a20405548f0db6689bcd63a4f226f6b19e35e7696801c338d9071f2f93392c8ec6316617303350cb44cff |
| kubernetes-server-linux-s390x.tar.gz | 80fd0c55c3c1cdbdd47faf9bfcf2f89d36c56bb91c0281c126e8ba84ad36c527f1861646f54dc4258ba6fae0fb8ee23674ed41f811a08758da3fe1337f723748 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 93ae93af2d39bf00747b66f365781c64880b4ca235031a7ecae7a9d017e04df7ca925f8c005b1da49447cf64cb3f1ecc790db460e60cd1f98f34aae1434ad103 |
| kubernetes-node-linux-arm64.tar.gz | 33216af73a02919579985be5d5372ecb305b6fb2013297f3ea36b357d3cf4bce2a07a612e188b76c752aabbe23bdc726645f348f5db43b12893fc80ac65711f3 |
| kubernetes-node-linux-ppc64le.tar.gz | 781df3a7785435ed365949850ef3c4555e3531826907d75e2edf102cdef8950176c17c8dc8ad97077908b12895eb2cf2796e27418252cb790a7876484270d33a |
| kubernetes-node-linux-s390x.tar.gz | 133c8c011e3f0c6094262efa2cd053e96facdfdb603f90eb51b9ee085c082ac82bcd53863cc517f7ae9e219265f8e66e94e4fbdc21ee01b79b72c993792dde5c |
| kubernetes-node-windows-amd64.tar.gz | e5f6dbd19106b4f4d125d048f1351be2b6a06a79622ece31c24a2a27c03268474a42a1b0b85b1de46423a66c0ee9e1060e9bcee709ae1668c7a650b5575ccc76 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
apiserver_cache_list_fetched_objects_total, apiserver_cache_list_returned_objects_total, apiserver_cache_list_total replace resource_prefix label with API group and resource labels.
For metrics etcd_request_duration_seconds, etcd_requests_total and etcd_request_errors_total replace type label with API resource and group label.
For metric apiserver_selfrequest_total add a API group label.
For metrics apiserver_watch_events_sizes and apiserver_watch_events_total replace API kind label with resource label.
For metrics apiserver_request_body_size_bytes, apiserver_storage_events_received_total, apiserver_storage_list_evaluated_objects_total, apiserver_storage_list_fetched_objects_total, apiserver_storage_list_returned_objects_total, apiserver_storage_list_total, apiserver_watch_cache_events_dispatched_total, apiserver_watch_cache_events_received_total, apiserver_watch_cache_initializations_total, apiserver_watch_cache_resource_version, watch_cache_capacity, apiserver_init_events_total, apiserver_terminated_watchers_total, watch_cache_capacity_increase_total, watch_cache_capacity_decrease_total, apiserver_watch_cache_read_wait_seconds, apiserver_watch_cache_consistent_read_total, apiserver_storage_consistency_checks_total, etcd_bookmark_counts, storage_decode_errors_total extract the API group from resource label and put it in new group label. (#131845, @serathius) [SIG API Machinery, Etcd, Instrumentation and Testing]--cloud-config from the command line. (#130161, @carlory) [SIG Cloud Provider, Node and Scalability]NodeInfos to the PreFilter plugins. The PreFilter plugins now accepted the NodeInfo list from the arguments. (#130720, @saintube) [SIG Node, Scheduling, Storage and Testing]MessageCountMap and CreateAggregateFromMessageCountMap. (#132376, @tico88612)k8s.io/dynamic-resource-allocation/kubeletplugin helper from 1.34 added support for both API versions. (#132700, @pohly) [SIG Node and Testing]preferences field in kubeconfig in favor of kuberc. (#131741, @soltysh) [SIG API Machinery, CLI, Cluster Lifecycle and Testing]exclude-from-external-load-balancers=false label. (#131085, @kayrus) [SIG Cloud Provider and Network]Added omitempty and opt tag to the API v1beta2 AdminAccess type in the DeviceRequestAllocationResult struct. (#132338, @PatrickLaabs)
Added a runtime.ApplyConfiguration interface implemented by all generated apply configuration types. (#132194, @alvaroaleman) [SIG API Machinery and Instrumentation]
Added a detailed event for in-place pod vertical scaling completed, improving cluster management and debugging. (#130387, @shiya0705) [SIG API Machinery, Apps, Autoscaling, Node, Scheduling and Testing]
Added a mechanism for configurable container restarts: container-level restart rules. This was an alpha feature behind the ContainerRestartRules feature gate. (#132642, @yuanwang04) [SIG API Machinery, Apps, Node and Testing]
Added a new FileKeyRef field to containers, allowing them to load variables from files by setting this field.
Introduced the EnvFiles feature gate to govern activation of this functionality. (#132626, @HirazawaUi) [SIG API Machinery, Apps, Node and Testing]
Added driver-owned fields in ResourceSlice to mark whether the device was shareable among multiple resource claims (or requests) and to specify how each capacity could be shared between different requests.
ResourceClaim to specify resource requirements against each device capacity.ResourceClaim.Status to specify how much device capacity is reserved for a specific request.ResourceClaim.Status for the device supports multiple allocations.Added new optional APIs in ResouceSlice.Basic and ResourceClaim.Status.AllocatedDeviceStatus. (#130160, @KobayashiD27) [SIG API Machinery, Apps, Architecture, Node, Release, Scheduling and Testing]
Added support for specifying controlplane or cluster egress selectors in JWT authenticators via the issuer.egressSelectorType field in the AuthenticationConfiguration.jwt array. If unset, the previous behavior of using no egress selector is preserved. This functionality requires the StructuredAuthenticationConfigurationEgressSelector beta feature gate (enabled by default). (#132768, @enj) [SIG API Machinery, Auth and Testing]
Added support in the Kubelet for monitoring the health of devices allocated via Dynamic Resource Allocation (DRA) and report it in the pod.status.containerStatuses.allocatedResourcesStatus field. This required the DRA plugin to implement the new v1alpha1 NodeHealth gRPC service. This feature was controlled by the ResourceHealthStatus feature gate. (#130606, @Jpsassine) [SIG Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Network, Node, Release, Scheduling, Storage and Testing]
Added support in the kubelet's image pull credential tracking for service account-based verification. When an image was pulled using service account credentials via external credential providers, subsequent Pods using the same service account (UID, name, and namespace) could access the cached image without re-authentication for the lifetime of that service account. (#132771, @aramase) [SIG Auth, Node and Testing]
Added validation to reject Pods using the PodLevelResources feature on Windows OS due to lack of support. The API server rejected Pods with pod-level resources and a Pod.spec.os.name targeting Windows. Kubelet on nodes running Windows also rejected Pods with pod-level resources at the admission phase. (#133046, @toVersus) [SIG Apps and Node]
Added warnings when creating headless service with set loadBalancerIP,externalIPs and/or SessionAffinity. (#132214, @Peac36)
Allowed pvc.spec.VolumeAttributesClassName to change from non-nil to nil. (#132106, @AndrewSirenko)
Allowed setting the hostnameOverride field in PodSpec to specify any RFC 1123 DNS subdomain as the pod's hostname. The HostnameOverride feature gate was introduced to control enablement of this functionality. (#132558, @HirazawaUi) [SIG API Machinery, Apps, Network, Node and Testing]
Changed underlying logic for Eviction Manager helper functions. (#132277, @KevinTMtz) [SIG Node, Scheduling and Testing]
Changed underlying logic to propagate pod-level hugepage cgroup to containers when they did not specify hugepage resources.
Corrected the documentation to clarify that podSelector is optional and described its default behavior. (#131354, @tomoish)
DRA API: resource.k8s.io/v1alpha3 now only contains DeviceTaintRule. All other types got removed because they became obsolete when introducing the v1beta1 API in 1.32. before updating a cluster where resourceclaims, resourceclaimtemplates, deviceclasses, or resourceslices might have been stored using Kubernetes < 1.32, delete all of those resources before updating and recreate them as needed while running Kubernetes >= 1.32. (#132000, @pohly) [SIG Etcd, Node, Scheduling and Testing]
DRA: Starting with Kubernetes 1.34, the alpha-level resource.k8s.io/admin-access label has been updated to resource.kubernetes.io/admin-access. Admins using the alpha feature and updating from 1.33 can set both labels, upgrade, then remove resource.k8s.io/admin-access when no downgrade is going to happen anymore. (#131996, @ritazh) [SIG Node and Testing]
DRA: The scheduler plugin prevented abnormal filter runtimes by timing out after 10 seconds. This was configurable via the plugin configuration's FilterTimeout. Setting it to zero disabled the timeout and restored the behavior of Kubernetes <= 1.33. (#132033, @pohly) [SIG Node, Scheduling and Testing]
DRA: When the prioritized list feature was used in a request and the resulting number of allocated devices exceeded the number of allowed devices per claim, the scheduler aborted the attempt to allocate devices early. Previously, it tried to many different combinations, which could take a long time. (#130593, @mortent) [SIG Apps, Node, Scheduling and Testing]
DRA: removed support for the v1alpha4 kubelet gRPC API (added in 1.31, superseded in 1.32). DRA drivers using the helper package from Kubernetes >= 1.32 use the v1beta1 API and continue to be supported. (#132574, @pohly)
Deprecated StreamingConnectionIdleTimeout field of the kubelet config. (#131992, @lalitc375)
Dynamic Resource Allocation: Graduated core functionality to general availability (GA). This newly stable feature uses the structured parameters flavor of DRA. (#132706, @pohly) [SIG API Machinery, Apps, Auth, Autoscaling, Etcd, Node, Scheduling and Testing]
Enabled kube-apiserver support for PodCertificateRequest and PodCertificate projected volumes (behind the PodCertificateRequest feature gate). (#128010, @ahmedtd) [SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Storage and Testing]
Extended resources backed by DRA feature allowed cluster operator to specify extendedResourceName in DeviceClass, and application operator to continue using extended resources in pod's requests to request for DRA devices matching the DeviceClass.
NodeResourcesFit plugin scoring didn't work for extended resources backed by DRA. (#130653, @yliaog) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing]
Extended the NodePorts scheduling plugin to consider hostPorts used by restartable init containers. (#132040, @avrittrohwer) [SIG Scheduling and Testing]
Fixed a 1.33 regression that causes a nil panic in kube-scheduler when aggregating resource requested across container's spec and status. (#132895, @yue9944882) [SIG Node and Scheduling]
Fixed prerelease lifecycle for PodCertificateRequest. (#133350, @carlory)
Introduced OpenAPI format support for k8s-short-name and k8s-long-name in CustomResourceDefinition schemas. (#132504, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage]
Introduced the admissionregistration.k8s.io/v1beta1/MutatingAdmissionPolicy API type. To enable, enable the MutatingAdmissionPolicy feature gate (which was off by default) and set --runtime-config=admissionregistration.k8s.io/v1beta1=true on the kube-apiserver.
Note that the default stored version remained alpha in 1.34, and whoever enabled beta during 1.34 needed to run a storage migration yourself to ensure you don't depend on alpha data in etcd. (#132821, @cici37) [SIG API Machinery, Etcd and Testing]
Kube-apiserver: Added support for disabling caching of authorization webhook decisions in the --authorization-config file. The new fields cacheAuthorizedRequests and cacheUnauthorizedRequests could be set to false to prevent caching for authorized or unauthorized requests. See the https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. (#129237, @rfranzke) [SIG API Machinery and Auth]
Kube-apiserver: Promoted the StructuredAuthenticationConfiguration feature gate to GA. (#131916, @aramase) [SIG API Machinery, Auth and Testing]
Kube-apiserver: the AuthenticationConfiguration type accepted in --authentication-config files has been promoted to apiserver.config.k8s.io/v1. (#131752, @aramase) [SIG API Machinery, Auth and Testing]
Kube-log-runner: Added the -log-file-size parameter to rotate log output into a new file once it reached a certain size. Introduced -log-file-age to enable automatic removal of old output files, and -flush-interval to support periodic flushing. (#127667, @zylxjtu) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows]
Kubectl: Graduated kuberc support to beta. A kuberc configuration file provided a mechanism for customizing kubectl behavior (distinct from kubeconfig, which configures cluster access across different clients). (#131818, @soltysh) [SIG CLI and Testing]
Promoted Job Pod Replacement Policy to general availability. The JobPodReplacementPolicy feature gate was locked to true and will be removed in a future Kubernetes release. (#132173, @dejanzele) [SIG Apps and Testing]
Promoted MutableCSINodeAllocatableCount to beta. (#132429, @torredil)
Promoted feature-gate VolumeAttributesClass to GA
Promoted the APIServerTracing feature gate to GA. The --tracing-config-file flag accepted TracingConfiguration in version apiserver.config.k8s.io/v1 (with no changes from apiserver.config.k8s.io/v1beta1). (#132340, @dashpole) [SIG API Machinery and Testing]
Promoted the AuthorizeWithSelectors and AuthorizeNodeWithSelectors feature gates to stable and locked on. (#132656, @liggitt) [SIG API Machinery, Auth and Testing]
Promoted the KubeletTracing feature gate to GA. (#132341, @dashpole) [SIG Instrumentation and Node]
Promoted the RelaxedEnvironmentVariableValidation feature gate to GA and locked it in the enabled state by default. (#132054, @HirazawaUi) [SIG Apps, Architecture, Node and Testing]
Removed an inaccurate statement about requiring ports when the Pod spec hostNetwork field was set. (#130994, @BenTheElder) [SIG Network and Node]
Removed deprecated gogo protocol definitions from k8s.io/kubelet/pkg/apis/pluginregistration in favor of google.golang.org/protobuf. (#132773, @saschagrunert)
Removed deprecated gogo protocol definitions from k8s.io/cri-api in favor of google.golang.org/protobuf. (#128653, @saschagrunert) [SIG API Machinery, Auth, Instrumentation, Node and Testing]
Replaced Boolean-pointer-helper functions with the k8s.io/utils/ptr implementations. (#132794, @PatrickLaabs) [SIG API Machinery, Auth, CLI, Node and Testing]
Replaced boolPtrFn helper functions with the "k8s.io/utils/ptr" implementation. (#132907, @PatrickLaabs)
Replaced deprecated package k8s.io/utils/pointer with k8s.io/utils/ptr for the apiextensions-apiserver apiextensions. (#132723, @PatrickLaabs)
Replaced deprecated package k8s.io/utils/pointer with k8s.io/utils/ptr for the apiserver (1/2). (#132751, @PatrickLaabs) [SIG API Machinery and Auth]
Replaced deprecated package k8s.io/utils/pointer with k8s.io/utils/ptr for the component-base. (#132754, @PatrickLaabs) [SIG API Machinery, Architecture, Instrumentation and Scheduling]
Replaced deprecated package k8s.io/utils/pointer with k8s.io/utils/ptr for the kube-aggregator apiregistration. (#132701, @PatrickLaabs)
Simplied validation error message for invalid fields by removing redundant field name. (#132513, @xiaoweim) [SIG API Machinery, Apps, Auth, Node and Scheduling]
Simplied validation error message for required fields by removing redundant messages. (#132472, @xiaoweim) [SIG API Machinery, Apps, Architecture, Auth, Cloud Provider, Network, Node and Storage]
The KubeletServiceAccountTokenForCredentialProviders feature was beta and enabled by default. (#133017, @aramase) [SIG Auth and Node]
The conditionType is "oneof" approved/denied check of CertificateSigningRequest's .status.conditions field was migrated to declarative validation.
If the DeclarativeValidation feature gate was enabled, mismatches with existing validation are reported via metrics.
If the DeclarativeValidationTakeover feature gate was enabled, declarative validation was the primary source of errors for migrated fields. (#133013, @aaron-prindle) [SIG API Machinery and Auth]
The fallback behavior of the Downward API's resourceFieldRef field was updated to account for pod-level resources: if container-level limits were not set, pod-level limits were now used before falling back to node allocatable resources. (#132605, @toVersus) [SIG Node, Scheduling and Testing]
The validation of replicas field in the ReplicationController /scale subresource has been migrated to declarative validation.
If the DeclarativeValidation feature gate is enabled, mismatches with existing validation are reported via metrics.
If the DeclarativeValidationTakeover feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#131664, @jpbetz) [SIG API Machinery and Apps]
The validation-gen code generator generated validation code that supported validation ratcheting. (#132236, @yongruilin) [SIG API Machinery, Apps, Auth and Node]
Updated IsDNS1123SubdomainWithUnderscore so that, when it returned an error, it also returned the correct regex information (dns1123SubdomainFmtWithUnderscore). (#132034, @ChosenFoam)
Updated etcd version to v3.6.0. (#131501, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing]
Updated the v1 credential provider configuration to include the tokenAttributes.cacheType field. This field is required and must be set to either ServiceAccount or Token when configuring a provider that uses a service account to fetch registry credentials. (#132617, @aramase) [SIG Auth, Node and Testing]
Zero-value metadata.creationTimestamp values are now omitted and no longer serialize an explicit null in JSON, YAML, and CBOR output (#130989, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Scheduling, Storage and Testing]
AppArmor profiles specified in the Pod or container SecurityContext were no longer copied to deprecated AppArmor annotations (prefix container.apparmor.security.beta.kubernetes.io/). Anything that inspected the deprecated annotations must be migrated to use the SecurityContext fields instead. (#131989, @tallclair)
MultiCIDRServiceAllocator was locked and enabled by default, DisableAllocatorDualWrite was enabled by default. (#131318, @aojea) [SIG API Machinery, Apps, Architecture, Auth, Etcd, Network and Testing]
Added 3 new metrics for monitoring async API calls in the scheduler when the SchedulerAsyncAPICalls feature gate was enabled:
scheduler_async_api_call_execution_total: tracks executed API calls by call type and result (success/error)scheduler_async_api_call_duration_seconds: histogram of API call execution duration by call type and resultscheduler_pending_async_api_calls: gauge showing current number of pending API calls in the queue. (#133120, @utam0k) [SIG Release and Scheduling]Added HPA support to pod-level resource specifications. When the pod-level resource feature was enabled, HPAs configured with Resource type metrics calculated the pod resources from pod.Spec.Resources field, if specified. (#132430, @laoj2) [SIG Apps, Autoscaling and Testing]
Added Traffic Distribution field to kubectl describe service output (#131491, @tchap) [SIG CLI]
Added SizeBasedListCostEstimate feature gate that allowed apiserver to estimate sizes of objects to calculate cost of LIST requests. (#132355, @serathius) [SIG API Machinery and Etcd]
Added apiserver_resource_size_estimate_bytes metric to API server. (#132893, @serathius) [SIG API Machinery, Etcd and Instrumentation]
Added started_user_namespaced_pods_total and started_user_namespaced_pods_errors_total for tracking the successes and failures in creating pods if a user namespace was requested. (#132902, @haircommander) [SIG Node and Testing]
Added a --show-swap option to kubectl top subcommands (#129458, @iholder101) [SIG CLI]
Added a container_swap_limit_bytes metric to expose the swap limit assigned to containers under the LimitedSwap swap behavior. (#132348, @iholder101) [SIG Node and Testing]
Added a delay to node updates after kubelet startup. A random offset, based on the configured nodeStatusReportFrequency, helped distribute traffic and load from node status updates more evenly over time. The initial status update could occur up to 50% earlier or later than the regular schedule. (#130919, @mengqiy)
Added a flag to kubectl version to detect whether a client/server version mismatch was outside the officially supported range. (#127365, @omerap12)
Added a new PreBindPreFlight function to the PreBindPlugin interface. All in-tree PreBind plugins have been updated to implement PreBindPreFlight function. (#132391, @sanposhiho) [SIG Node, Scheduling, Storage and Testing]
Added a warning when alpha metrics are used with emulated versions. (#132276, @michaelasp) [SIG API Machinery and Architecture]
Added alpha metrics for compatibility versioning (#131842, @michaelasp) [SIG API Machinery, Architecture, Instrumentation and Scheduling]
Added configurable flags to kube-apiserver for coordinated leader election. (#132433, @michaelasp) [SIG API Machinery and Testing]
Added machine readable output options (JSON & YAML) to kubectl api-resources. (#132604, @dharmit) [SIG Apps, CLI and Network]
Added memory tracking to scheduler performance tests to help detect memory leaks and monitored memory usage patterns while running scheduler_perf. (#132910, @utam0k) [SIG Scheduling and Testing]
Added support for CEL expressions with escaped names in the structured authentication config. Using [...] to access claims or user data was recommended when names contained characters that would otherwise need escaping. CEL optionals with ? could be used where has was not applicable — for example, claims[?"kubernetes.io"] or user.extra[?"domain.io/foo"]. (#131574, @enj) [SIG API Machinery and Auth]
Added support for --cpu, --memory flag to kubectl autoscale, started deprecating --cpu-precent. (#129373, @googs1025)
Added support for a new kubectl output format, kyaml. KYAML was a strict subset of YAML and should be accepted by any YAML processor. The formatting of KYAML was halfway between JSON and YAML. Because it was more explicit than the default YAML style, it was less error-prone. (#132942, @thockin) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Contributor Experience, Instrumentation, Network, Node, Scheduling, Storage and Testing]
Added the DetectCacheInconsistency feature gate, allowing the API server to periodically verify consistency between its cache and etcd. Detected inconsistencies reported via the apiserver_storage_consistency_checks_total metric and trigger purging of affected cache snapshots. (#132884, @serathius) [SIG API Machinery, Instrumentation and Testing]
Added the SizeBasedListCostEstimate feature gate (enabled by default), which changes how APF seats are assigned to LIST requests. With this feature, one seat is assigned per 100KB of data loaded into memory at once during a LIST operation. (#132932, @serathius)
Added useful endpoints for kube-apiserver. (#132581, @itssimrank) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing]
Built Kubernetes using Go 1.24.3. (#131934, @cpanato) [SIG Release and Testing]
Built Kubernetes using Go 1.24.4. (#132222, @cpanato) [SIG Release and Testing]
Bumped DRA API version to v1 in deviceattribute package in k8s.io/dynamic-resource-allocation. (#133164, @everpeace)
Bumped KubeletCgroupDriverFromCRI to GA and add metric to track out-of-support CRI implementations. (#133157, @haircommander) [SIG Node and Testing]
CRI API had auth fields in image pulling marked as debug_redact. (#133135, @SergeyKanzhelev)
Changed handling of CustomResourceDefinitions with unrecognized formats. Writing a schema with an unrecognized format now triggered a warning (the write was still accepted). (#133136, @yongruilin)
DRA kubelet: Fixed the kubelet to also clean up ResourceSlices in some additional failure scenarios (driver was removed forcibly or crashed and did not restart). (#132058, @pohly) [SIG Node and Testing]
DRAAdminAccess was enabled by default allowing users to create ResourceClaims and ResourceClaimTemplates in privileged mode to grant access to devices that were in use by other users for admin tasks like monitoring health or status of the device. (#133085, @ritazh) [SIG Auth and Node]
Demoted KEP-5278 feature gates ClearingNominatedNodeNameAfterBinding and NominatedNodeNameForExpectation to alpha from beta. (#133293, @utam0k) [SIG Scheduling and Testing]
Deprecated apiserver_storage_objects and replaced it with apiserver_resource_objects metric using labels consistent with other metrics. (#132965, @serathius) [SIG API Machinery, Etcd and Instrumentation]
Eliminated work when creating Services or understanding port purposes, especially for external resources deployed via Helm charts. (#133018, @rushmash91)
Enabled compact snapshots in the watch cache based on etcd compaction events. (#132876, @serathius) [SIG API Machinery and Etcd]
Enabled completion for aliases defined in kubectlrc. (#131586, @ardaguclu)
Ensured memory resizing for Guaranteed QoS pods on static Memory policy configurations was gated by InPlacePodVerticalScalingExclusiveMemory (defaults: false). (#132473, @pravk03) [SIG Node, Scheduling and Testing]
Ensured that non-scheduling related errors (e.g., network errors) did not lengthen the Pod scheduling backoff time. (#128748, @sanposhiho) [SIG Scheduling and Testing]
Executed API calls dispatched during pod scheduling asynchronously if the SchedulerAsyncAPICalls feature gate was enabled.
Out-of-tree plugins used APIDispatcher and APICacher from the framework to dispatch their own calls. (#132886, @macsko) [SIG Release, Scheduling and Testing]
Fixed recording the kubelet_container_resize_requests_total metric to include all resize-related updates. (#133060, @natasha41575)
Graduated ListFromCacheSnapshot to beta. (#132901, @serathius) [SIG API Machinery and Etcd]
Graduated PodLevelResources feature to beta and have it on by default. This feature allowed defining CPU and memory resources for an entire pod in pod.spec.resources. (#132999, @ndixita)
Graduated PodObservedGenerationTracking feature to beta and had it on by default. This feature meant that the top level status.observedGeneration and status.conditions[].observedGeneration fields in Pods were populated to reflect the metadata.generation of the podspec at the time that the status or condition was reported. (#132912, @natasha41575) [SIG Apps, Node and Testing]
Graduated ResilientWatchCacheInitialization to GA. (#131979, @serathius)
Graduated StreamingCollectionEncodingToJSON and StreamingCollectionEncodingToProtobuf to GA. (#132648, @serathius)
Graduated configurable endpoints for anonymous authentication using the authentication configuration file to stable. (#131654, @vinayakankugoyal) [SIG API Machinery and Testing]
Graduated relaxed DNS search string validation to GA. For the Pod API, .spec.dnsConfig.searches
now allows an underscore (_) where a dash (-) would be allowed, and it allows search strings be a single dot .. (#132036, @adrianmoisey) [SIG Network and Testing]
Graduated scheduler QueueingHint support to GA (general availability) (#131973, @sanposhiho) [SIG Scheduling and Testing]
Graduated the WinOverlay feature in the kube-proxy to GA. The WinOverlay feature gate was enabled by default. (#133042, @rzlink) [SIG Network and Windows]
Graduated the ConsistentListFromCache to GA. (#132645, @serathius)
Graduated the WatchList feature gate to beta for kube-apiserver and enabled WatchListClient for KCM. (#132704, @p0lyn0mial) [SIG API Machinery and Testing]
Graduated the WinDSR feature in the kube-proxy to GA. The WinDSR feature gate was enabled by default. (#132108, @rzlink) [SIG Network and Windows]
If PreBindPreFlight returned Skip, the scheduler didn't run the plugin at PreBind.
If any PreBindPreFlight returned Success, the scheduler put NominatedNodeName to the pod
so that other components (such as the cluster autoscaler) could notice the pod was going to be bound to the node. (#133021, @sanposhiho) [SIG Scheduling and Testing]
Implemented prioritization of resize requests based on priorityClass and QoS class when node resources are insufficient to accommodate all pending resize operations. (#132342, @natasha41575) [SIG Node and Testing]
Included the namespace in the output of kubectl delete for better identification of resources. (#126619, @totegamma)
Increased APF max seats to 100 for LIST requests. (#133034, @serathius)
Introduced a method GetPCIeRootAttributeByPCIBusID(pciBusID) for third-party DRA drivers to provide common logic for the standardized device attribute resource.kubernetes.io/pcieRoot. (#132296, @everpeace)
Kube-apiserver reported the last configuration hash as a label in
apiserver_authentication_config_controller_last_config_info metric after successfully loading the authentication configuration file.apiserver_authorization_config_controller_last_config_info metric after successfully loading the authorization configuration file.apiserver_encryption_config_controller_last_config_info metric after successfully loading the encryption configuration file. (#132299, @aramase) [SIG API Machinery, Auth and Testing]Kube-apiserver: Each unique set of etcd server overrides specified with --etcd-servers-overrides surfaced health checks named etcd-override-<index> and etcd-override-readiness-<index>. These checks were still excluded by the ?exclude=etcd and ?exclude=etcd-readiness directives. (#129438, @pacoxu) [SIG API Machinery and Testing]
Kube-apiserver: Previously persisted CustomResourceDefinition objects with an invalid whitespace-only caBundle could serve requests that did not require conversion. (#132514, @tiffanny29631)
Kube-apiserver: Promoted the ExternalServiceAccountTokenSigner feature to beta, which enabled external signing of service account tokens and fetching of public verifying keys. This was accomplished by enabling the beta ExternalServiceAccountTokenSigner feature gate and specifying the --service-account-signing-endpoint flag. The flag value could either be the path to a Unix domain socket on the filesystem, or be prefixed with @ to indicate a Unix domain socket in the abstract namespace. (#131300, @HarshalNeelkamal) [SIG API Machinery, Auth and Testing]
Kube-proxy: Checked whether IPv6 was available on Linux before using it. (#131265, @rikatz)
Kubeadm: Added support for ECDSA-P384 as an encryption algorithm type in v1beta4. (#131677, @lalitc375)
Kubeadm: Fixed an issue where etcd member promotion failed with an error indicating the member was already promoted. (#130782, @BernardMC)
Kubeadm: graduated the NodeLocalCRISocket feature gate to beta and enabed it by default. When its enabled, kubeadm will:
/var/lib/kubelet/instance-config.yaml file to customize the containerRuntimeEndpoint field in per-node kubelet configurations.kubeadm.alpha.kubernetes.io/cri-socket annotation from nodes during upgrade operations.--container-runtime-endpoint flag from the /var/lib/kubelet/kubeadm-flags.env file during upgrades. (#131981, @HirazawaUi) [SIG Cluster Lifecycle]Kubeadm: graduated the kubeadm specific feature gate WaitForAllControlPlaneComponents to GA. The feature gate is was locked to always be enabled and on node initialization kubeadm performed a health check for all control plane components and not only the kube-apiserver. (#132594, @neolit123)
Kubeadm: switched the validation check for Linux kernel version to throw warnings instead of errors. (#131919, @neolit123) [SIG Cluster Lifecycle and Node]
Kubelet detected terminal CSI volume mount failures due to exceeded attachment limits on the node and marked the Stateful Pod as Failed, allowing its controller to recreate it. This prevented Pods from getting stuck indefinitely in the ContainerCreating state. (#132933, @torredil) [SIG Apps, Node, Storage and Testing]
Kubelet reported a hash of the credential provider configuration via the kubelet_credential_provider_config_info metric. The hash was exposed in the hash label. (#133016, @aramase) [SIG API Machinery and Auth]
Kubelet: Extended the --image-credential-provider-config flag to accept a directory path in addition to a single file. When a directory was specified, all .json, .yaml, and .yml files in that directory were loaded and merged in lexicographical order. (#131658, @dims) [SIG Auth and Node]
LeaseLocks could now have custom labels that different holders would overwrite when they became the holder of the underlying lease. (#131632, @DerekFrank)
Memory limits could be decreased with a NotRequired resize restart policy. When decreasing memory limits,a best-effort check was performed to prevent limits from decreasing below usage and triggering an OOM-kill. (#133012, @tallclair) [SIG Apps, Node and Testing]
Migrated validation in CertificateSigningRequest to use declarative validation. When the DeclarativeValidation feature gate is enabled, mismatches with existing validation are reported via metrics. If DeclarativeValidationTakeover is enabled, declarative validation becomes the primary source of errors for migrated fields. (#132361, @yongruilin) [SIG API Machinery and Auth]
Moved Recover from volume expansion failure to GA. (#132662, @gnufied) [SIG Apps, Auth, Node, Storage and Testing]
Prevented any type of CPU/Memory alignment or hint generation with the Topology Manager from the CPU or Memory Manager when pod-level resources were used in the Pod spec. (#133279, @ffromani) [SIG Node and Testing]
Promoted Linux node pressure stall information (PSI) metrics to beta. (#132822, @roycaihw) [SIG Node]
Promoted Windows graceful shutdown feature from alpha to beta. (#133062, @zylxjtu)
Promoted the Ordered Namespace Deletion test to Conformance. (#132219, @BenTheElder) [SIG API Machinery, Architecture and Testing]
Promoted the KubeletPodResourcesDynamicResources and KubeletPodResourcesGet feature gates to beta, which were enabled by default if DRA went to GA. (#132940, @guptaNswati)
Promoted the feature OrderedNamespaceDeletion to GA. (#131514, @cici37) [SIG API Machinery and Testing]
Removed "endpoint-controller" and "workload-leader-election" FlowSchemas from the default APF configuration.
migrate the lock type used in the leader election in your workloads from configmapsleases/endpointsleases to leases. (#131215, @tosi3k) [SIG API Machinery, Apps, Network, Scalability and Scheduling]
Started recording metrics for in-place Pod resize. (#132903, @natasha41575)
The Kubernetes API server merged selectors built from matchLabelKeys into the labelSelector of topologySpreadConstraints, aligning Pod Topology Spread behavior with Inter-Pod Affinity. To prevent breaking existing Pods using matchLabelKeys, this scheduler behavior was preserved until v1.34. Upgrades from v1.32 to v1.34 should be done incrementally (v1.32 → v1.33 → v1.34), ensuring Pods created at v1.32 with matchLabelKeys are scheduled before reaching v1.34. Controllers relying on matchLabelKeys no longer need to handle them directly and can use labelSelector instead. The new feature gate MatchLabelKeysInPodTopologySpreadSelectorMerge, enabled by default, controls this behavior. (#129874, @mochizuki875) [SIG Apps, Node, Scheduling and Testing]
The PreferSameTrafficDistribution feature gate is now enabled by default,
enabling the PreferSameNode traffic distribution value for Services. (#132127, @danwinship) [SIG Apps and Network]
The new dra_resource_claims_in_use kubelet metrics reported active ResourceClaims, overall and by driver. (#131641, @pohly) [SIG Architecture, Instrumentation, Node and Testing]
The scheduler no longer cleared the nominatedNodeName field for Pods. External components, such as Cluster Autoscaler and Karpenter, were responsible for managing this field when needed. (#133276, @macsko) [SIG Scheduling and Testing]
The validation in the CertificateSigningRequest /status and /approval subresources was migrated to declarative validation.
If the DeclarativeValidation feature gate was enabled, mismatches with existing validation are reported via metrics.
If the DeclarativeValidationTakeover feature gate was enabled, declarative validation was the primary source of errors for migrated fields. (#133068, @yongruilin) [SIG API Machinery and Auth]
Updated kube-controller-manager events to support contextual logging. (#128351, @mengjiao-liu)
Updated pause version to registry.k8s.io/pause:3.10.1. (#130713, @ArkaSaha30) [SIG Cluster Lifecycle, Node, Scheduling and Testing]
Updated the Kubernetes build environment to use Go 1.24.5. (#132896, @cpanato) [SIG Release and Testing]
Updated the built in system:monitoring role with permission to access kubelet metrics endpoints. (#132178, @gavinkflam) [SIG Auth]
When RelaxedServiceNameValidation feature gate is enabled, the
names of new Services names are validation with NameIsDNSLabel(),
relaxing the pre-existing validation. (#132339, @adrianmoisey) [SIG Apps, Network and Testing]
When proxying to an aggregated API server, kube-apiserver used the
EndpointSlices of the service indicated by the APIServer, rather than
using Endpoints.
If you were using the aggregated API server feature, and you were writing out
the endpoints for it by hand (rather than letting kube-controller-manager
generate Endpoints and EndpointSlices for it automatically based on the
Service definition), then you should write out an EndpointSlice object rather
than (or in addition to) an Endpoints object. (#129837, @danwinship) [SIG API Machinery, Network and Testing]
Whenever a pod was successfully bound to a node, the kube-apiserver cleared the pod's nominatedNodeName field. This prevented stale information from affecting external scheduling components. (#132443, @utam0k) [SIG Apps, Node, Scheduling and Testing]
DRAPrioritizedList was turned on by default which made it possible to provide a prioritized list of subrequests in a ResourceClaim. (#132767, @mortent) [SIG Node, Scheduling and Testing]
PodLifecycleSleepAction was graduated to GA. (#132595, @AxeZhan) [SIG Apps, Node and Testing]
kube-controller-manager reported the following metrics for ResourceClaims with admin access:
resourceclaim_controller_creates_total count metric with labels admin_access (true or false), status (failure or success) to track the total number of ResourceClaims creation requestsresourceclaim_controller_resource_claims gauge metric with labels admin_access (true or false), allocated (true or false) to track the current number of ResourceClaims. (#132800, @ritazh) [SIG Apps, Auth, Instrumentation and Node]kubeadm: Started using a named port probe-port for all probes in the static pod manifests generated by kubeadm for the kube-apiserver, kube-controller-manager, kube-scheduler, and related components. If probe port values were previously patched using kubeadm patches, the corresponding named port under the container’s ports field must now also be patched. (#132776, @neolit123)
resource.k8s.io version used by the DRA driver. (#133076, @pohly) [SIG Node and Testing]podSpec validation for creating StatefulSet. (#131790, @chengjoey) [SIG Apps, Etcd and Testing]--ignore-not-found flag. Supported --ignore-not-found in watch operation. (#132542, @gemmahou)adminAccess were no longer allocated the same device multiple times. (#131299, @nojnhuh)SharedInformers if a transformer is provided and WatchList is activated. (#131799, @valerian-roche)StorageClassList queries to return a graceful error message, if the provided ResourceVersion is too large. (#132374, @PatrickLaabs) [SIG API Machinery and Etcd]DeploymentReplicaSetTerminatingReplicas feature gate was enabled. (#131822, @atiratree)== evaluates to false for identical objects when a field is present but the value is null. This bug does not impact the Kubernetes API. (#131559, @jpbetz) [SIG API Machinery]etcd instead of being served from cache. (#132244, @hakuna-matatah)JoinConfigurationKind in the error message when no ResetConfiguration is found during kubeadm reset with the --config flag. (#132258, @J3m3) [SIG Cluster Lifecycle]CustomResourceDefinition was terminating. (#132467, @sdowell)ModifyLoadBalancer API updates did not match the HNS state in version 15.4. Support for ModifyLoadBalancer policy began with Kubernetes 1.31+. (#131506, @princepereira)insufficientResources was logged as a pointer during pod preemption, making logs more readable. (#132183, @chrisy-x) [SIG Node]TokenRequestServiceAccountUIDValidation feature gate (Beta, enabled by default) ensures the TokenRequest UID matches the service account UID when set. (#132803, @aramase) [SIG API Machinery, Auth, Node and Testing]PodTopologyLabelAdmission from working due to checking for the incorrect label key when copying topology labels. This bug delayed the graduation of the feature to beta by an additional release to allow time for meaningful feedback. (#132462, @munnerz)x-int-or-string custom resource schemas with maximum lengths. (#132837, @JoelSpeed)allocatedResourceStatuses field name mismatch in PVC status validation. (#131213, @carlory)observedGeneration field in pod resize conditions to accurately reflect the associated pod generation when both InPlacePodVerticalScaling and PodObservedGenerationTracking feature gates are enabled. (#131157, @natasha41575)/metrics/resource endpoint. (#132065, @yuanwang04) [SIG Node and Testing]suspend=true, and completions=0 to set the Complete condition. (#132614, @mimowo) [SIG Apps and Testing]spec.jobTemplate.spec.podFailurePolicy.rules[*].onPodConditions[*].status fields for CronJob objects as documented, avoiding validation failures during write requests. (#131525, @carlory)NodeResizeError condition to appear in the PVC status when the CSI driver did not support node volume expansion and the PVC had the ReadWriteMany access mode. (#131495, @carlory)podresources API endpoint to consider only active pods. Since this changes long-standing behavior, the KubeletPodResourcesListUseActivePods feature gate (enabled by default) can be disabled to restore the previous behavior. Users encountering regressions are encouraged to file an issue if they rely on the old behavior. (#132028, @ffromani) [SIG Node and Testing]user-namespaces (hostUsers: false) and volumeDevices. Kubernetes returned an error in this case. (#132868, @rata)node.kubernetes.io/unreachable:NoExecute when a Node became unreachable. (#120816, @tnqn) [SIG Apps and Node]make vet target, please use make lint instead (#132509, @yongruilin) [SIG Testing]--wait-interval for the ip6tables-legacy-restore binary. (#132352, @PatrickLaabs).status.availableReplicas at the correct time without a delay. This results in faster reconciliation of Deployment conditions and faster, unblocked Deployment rollouts. (#132121, @atiratree) [SIG Apps]ValidateDaemonSet and ValidateDaemonSetUpdate. This redundancy has been removed to prevent repeated validation runs. (#132548, @gavinkflam)PodMaxBackoffDuration kube-scheduler option was set to zero and the SchedulerPopFromBackoffQ feature gate was enabled. (#131965, @macsko)baseline and restricted pod security admission levels blocked setting the host field on probe and lifecycle handlers. (#125271, @tssurya) [SIG Auth, Node and Testing]ownerReferences when deleting orphaned objects. (#132632, @sdowell) [SIG API Machinery and Apps]kube-proxy to align with Linux behavior by correctly honoring the port specified in EndpointSlice for internal traffic routing. (#132647, @princepereira) [SIG Network and Windows]kube-proxy with nftables to reject or drop traffic to services with no endpoints from filter chains at priority 0 (NF_IP_PRI_FILTER). (#132456, @aroradaman)kubectl get job to display the SuccessCriteriaMet status for listed jobs. (#132832, @Goend) [SIG Apps and CLI]FailedRescale event if a scale operation initially failed due to a conflict but succeeded after a retry; it now emitted a SuccessfulRescale event in this case. A FailedRescale event was still emitted if all retries were exhausted. (#132007, @AumPatel1) [SIG Apps and Autoscaling]Statefulset respected minReadySeconds. (#130909, @Edwinhr716)kubectl create|delete|get|replace --raw commands now honored the server root paths specified in the kubeconfig file. (#131165, @liggitt)kubectl attach, notifying / reminding users that commands and output are available via the log subresource of that Pod. (#127183, @mochizuki875) [SIG Auth, CLI, Node and Security]json.Marshaler, json.Unmarshaler, encoding.TextMarshaler, or encoding.TextUnmarshaler to and from CBOR by transcoding. (#132935, @benluddy)grpcnotrace tag enabled. Used the DBG flag to enable Golang tracing if needed. (#132210, @dims)webhook_fail_open_count (#131627, @dims) [SIG API Machinery]driverName instead of pluginName, aligning with the rest of the Kubernetes components. (#132096, @pohly) [SIG Node and Testing]apiserver_encryption_config_controller_automatic_reload_success_total and apiserver_encryption_config_controller_automatic_reload_failure_total metrics in favor of apiserver_encryption_config_controller_automatic_reloads_total. (#132238, @aramase) [SIG API Machinery, Auth and Testing]/proc and /sys. (#131018, @saschagrunert)pkg/kubelet/status to use contextual logging. (#130852, @Chulong-Li)pkg/kubelet/volumemanager to contextual logging. (#131306, @Chulong-Li)pkg/kubelet/winstats to contextual logging. (#131001, @Chulong-Li)SeparateTaintEvictionController feature gate to GA; it is now enabled unconditionally. (#122634, @carlory) [SIG API Machinery, Apps, Node and Testing]apiserver_authentication_config_controller_automatic_reloads_total and apiserver_authentication_config_controller_automatic_reload_last_timestamp_seconds metrics to BETA. (#131798, @aramase) [SIG API Machinery, Auth and Instrumentation]apiserver_authorization_config_controller_automatic_reloads_total and apiserver_authorization_config_controller_automatic_reload_last_timestamp_seconds metrics to BETA. (#131768, @aramase) [SIG API Machinery, Auth and Instrumentation]EndpointSlice tests to conformance to ensure that service proxy implementations rely on EndpointSlices instead of Endpoints. (#132019, @danwinship) [SIG Architecture, Network and Testing]V(4) to V(5). (#132840, @ppmechlinski) [SIG Autoscaling, Scheduling and Storage]k8s.io/externaljwt in favor of google.golang.org/protobuf. (#132772, @saschagrunert) [SIG Auth]k8s.io/kms/apis in favor of google.golang.org/protobuf. (#132833, @saschagrunert) [SIG API Machinery, Auth and Testing]k8s.io/kubelet/pkg/apis/deviceplugin in favor of google.golang.org/protobuf. (#133028, @saschagrunert) [SIG Node and Testing]k8s.io/kubelet/pkg/apis/podresources in favor of google.golang.org/protobuf. (#133027, @saschagrunert) [SIG Node and Testing]DevicePluginCDIDevices. (#132083, @carlory) [SIG Node and Testing]PodDisruptionConditions. (#129501, @carlory) [SIG Apps]List() method of the typed client. (#132257, @p0lyn0mial) [SIG API Machinery and Testing]List() method. (#132229, @p0lyn0mial) [SIG API Machinery, CLI and Testing]List() method. (#132149, @p0lyn0mial) [SIG API Machinery and Testing]kubernetes.io/initial-events-list-blueprint annotation from the synthetic "Bookmark" event in watch stream requests. (#132326, @p0lyn0mial)--register-schedulable command line argument from the kubelet. (#122384, @carlory) [SIG Cloud Provider, Node and Scalability]toPtr helper functions with the "k8s.io/utils/ptr" implementations. (#132806, @PatrickLaabs) [SIG Apps, Testing and Windows]k8s.io/utils/pointer with k8s.io/utils/ptr for ./test/e2e and ./test/utils. (#132763, @PatrickLaabs) [SIG Autoscaling and Testing]k8s.io/utils/pointer with k8s.io/utils/ptr for ./test/e2e. (#132764, @PatrickLaabs) [SIG Auth, Network, Node, Storage and Testing]k8s.io/utils/pointer with k8s.io/utils/ptr for ./test/e2e. (#132765, @PatrickLaabs) [SIG API Machinery, Apps, CLI and Testing]k8s.io/utils/pointer with k8s.io/utils/ptr for ./test/integration. (#132762, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for apiextensions apiservers validation tests. (#132726, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for apiextensions-apiserver pkg/controller. (#132724, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for apiextensions-apiserver pkg/registry. (#132725, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for pkg/apis (1/2). (#132778, @PatrickLaabs) [SIG Apps and Network]k8s.io/utils/pointer with k8s.io/utils/ptr for pkg/apis (2/2). (#132779, @PatrickLaabs) [SIG Apps, Auth and Storage]k8s.io/utils/pointer with k8s.io/utils/ptr for pkg/controller (1/2). (#132781, @PatrickLaabs) [SIG API Machinery, Apps and Network]k8s.io/utils/pointer with k8s.io/utils/ptr for pkg/controller (2/2). (#132784, @PatrickLaabs) [SIG API Machinery, Apps, Network, Node and Storage]k8s.io/utils/pointer with k8s.io/utils/ptr for pod-security-admission tests. (#132741, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for the apiextensions-apiservers integration tests. (#132721, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for the apiserver (2/2). (#132752, @PatrickLaabs) [SIG API Machinery and Auth]k8s.io/utils/pointer with k8s.io/utils/ptr for the cli-runtime. (#132750, @PatrickLaabs) [SIG CLI and Release]k8s.io/utils/pointer with k8s.io/utils/ptr for the cloud-provider. (#132720, @PatrickLaabs) [SIG Cloud Provider and Network]k8s.io/utils/pointer with k8s.io/utils/ptr for the components-helper of the apimachinery. (#132413, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for the controller-manager. (#132753, @PatrickLaabs) [SIG API Machinery and Cloud Provider]k8s.io/utils/pointer with k8s.io/utils/ptr for the csr. (#132699, @PatrickLaabs) [SIG API Machinery and Auth]k8s.io/utils/pointer with k8s.io/utils/ptr for the e2e_node. (#132755, @PatrickLaabs) [SIG Node and Testing]k8s.io/utils/pointer with k8s.io/utils/ptr for the kubeapiserver. (#132529, @PatrickLaabs) [SIG API Machinery and Architecture]k8s.io/utils/pointer with k8s.io/utils/ptr for the pkg/security and plugin/pkg. (#132777, @PatrickLaabs) [SIG Auth, Node and Release]k8s.io/utils/pointer with k8s.io/utils/ptr for the pod-security-admission admissiontests. (#132742, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for the pod-security-admission policy. (#132743, @PatrickLaabs)k8s.io/utils/pointer with k8s.io/utils/ptr for the reflector. (#132698, @PatrickLaabs)k8s.io/utils/ptr implementations. (#133030, @PatrickLaabs) [SIG API Machinery and Auth]LegacySidecarContainers feature gate was completely removed. (#131463, @gjkim42) [SIG Node and Testing]k8s.io/kubernetes/pkg/scheduler/framework to k8s.io/kube-scheduler/framework. (#132087, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]ClusterEvent, ActionType, EventResource, ClusterEventWithHint, QueueingHint and QueueingHintFn moved from pkg/scheduler/framework to k8s.io/kube-scheduler/framework. (#132190, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]NodeInfo, PodInfo, QueuedPodInfo, PodResource, AffinityTerm, WeightedAffinityTerm, Resource, ImageStateSummary, ProtocolPort and HostPortInfo were moved from pkg/scheduler/framework to staging repo.
Users should update import path for these types from k8s.io/kubernetes/pkg/scheduler/framework to k8s.io/kube-scheduler/framework and update use of fields (to use getter/setter functions instead) where needed. (#132457, @ania-borowiec) [SIG Node, Scheduling, Storage and Testing]conntrack reconciler to consider a Service’s target port during cleanup of stale flow entries. (#130542, @aroradaman)kubeadm to use the InitialCorruptCheck=true etcd feature gate instead of the deprecated --experimental-initial-corrupt-check flag. Also replaced the use of --experimental-watch-progress-notify-interval with its graduated counterpart --watch-progress-notify-interval. (#132838, @AwesomePatrol)kubectl kustomize as described at https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize%2Fv5.7.0. (#132593, @koba1t)HorizontalPodAutoscaler to ensure that API objects were created and functioned properly. (#132537, @lalitc375) [SIG Etcd and Testing]| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | f7bdadc269da91b2892d45a493bc673bd7a2f309e52d0af00e08c28ec15fd52fecfb0f53e1eb32098a910ca4cb5f4824f50ffa855fd1ca1f8ad4426223633227 |
| kubernetes-src.tar.gz | 6272b6ac799dae382779592c890e838ce1c0264a4b300a501ba3952329d177f9b07b9e1ddb2636327d8e95b572ee2da9d08824c6d88d7c3a8342323360b6d1df |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 453293b8fe62dfea905bb7d6859e684ae46ebd1c32d454e06d424a3adf78f3c05d8e5d3b82fcfac7707ccf55ce05e1936b3808e2190ae33fedf6f58b8300d1e6 |
| kubernetes-client-darwin-arm64.tar.gz | 4ac21ca50bf0ace0f876c43658e34715ea49671542db9fad15028b4e49ddd078ddb449f674bd76bfc39d5854bb12864e4811554148381b207582b510ed73ae11 |
| kubernetes-client-linux-386.tar.gz | 300a21a090e564290f200203ef276f1829f1cb8a59ea4cfdfc78f5bf08a092d5241d19926f6958c8d5677aba57a2871f20e1764c15d3d223249e741c04666b58 |
| kubernetes-client-linux-amd64.tar.gz | d283a216e442eed1664f32cdb5a2cad47011bc5ee49cbfd072a9cfd9f9970e578aed3f90cfebe5a45fc6194fd720ebb035ebb4cb5a151f638899133d88c2a41b |
| kubernetes-client-linux-arm.tar.gz | 08e500b65bac726f984fde0f2d3af74ad6d3f2e6c2b58c34b0732503960b715c011f81cfdc9a6ef9f77adbc585f0f5b2b94993dd705a2cde20e9baec3cb11e9f |
| kubernetes-client-linux-arm64.tar.gz | 111702bec96f578ef6aaa9f42ba77146d5246f50e5d307275261fcbf9bdb7a569a9963400165659436dfdbed5640ad22cebd8603dcef4de671eed5072919b96c |
| kubernetes-client-linux-ppc64le.tar.gz | 98a48f18d9038f4553d1e0cd0e23c19f5e5dfaaabe7d35fcff1cd79340e6c38f0967d9a94c18c3e177790170acc7663bd98a3f6e6b9eeb05ce4d302d7d9bcbee |
| kubernetes-client-linux-s390x.tar.gz | b2006580603819b01b9300eaa9bae34133ee3ca2ee86314ca890aba472a81b833bb0ef4e9eb07b46a8ae0074d5b0c9c826129d338720dae63752c0d92736002b |
| kubernetes-client-windows-386.tar.gz | ee20616424acf66d0499f1228016324a634da3e53ed2728d33269fb06cafb96b7d2c8585a253ba9b05d43a51ee72a034a73000d3672ba1239b7cf75be9d10089 |
| kubernetes-client-windows-amd64.tar.gz | 1f3a69ccac5cd00be47a4e89adfcd4bcbfe203895e98d8cc51282620a414a269891337cead1763ff7160b75b93fe48689d2cfd2467b8872f6e5fdc095fae0660 |
| kubernetes-client-windows-arm64.tar.gz | b619d292bc6427328a319c9ffc5e3e22039b89e8a875fa73c8cc2c6c767a066d6b1dd1984178a7035dd2eb38a468089f6259a6ba72506e32ab1249354a2590f0 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | ec025926ab67e9307763266fbf178b533af679c3e371297dafd204981d1ecc9fd6cff34986a6580b2106d2ddab7f78ad66b1e01b223b612f0847c530922a41b2 |
| kubernetes-server-linux-arm64.tar.gz | 0cf717718ed42283e8065d80afa18589dd2cb16f985811f25f8bf27302f4cbe5eb07bd264562a17798678047631584c10cd015c94982a91e7cd971cea8833b27 |
| kubernetes-server-linux-ppc64le.tar.gz | d2e91d34fb64832ee3142289adbe61a025de832f5b594e93046b6ec4e3d5c557fd564236e095d7673a243dbfe59cd6d56475d97bc741dfb899c7db9036e8af5a |
| kubernetes-server-linux-s390x.tar.gz | f36021108f5e5c9c8223dd1044579c6321fab4567ab6fdbb476ce81791ae5c09672f2121e9156f9166f8fd774a0d8ecddb4915093038ff617d2a0f3014f2a0cf |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | eda824ac2a18a02a655bdf23137c9196698a6688acb97f147f97ee430054a2d93da1ebdd5a75a5862435d311aeb3841e4e6592290831a8cb51da4f99a463777d |
| kubernetes-node-linux-arm64.tar.gz | e0bd74348eb3c6d973b9a71c2114e9141eec6dc8448b38669261c7233254ece002e77971dc5de41ddbb1f34f9e2597f9429b0939123de889ee39e9dfee465633 |
| kubernetes-node-linux-ppc64le.tar.gz | 737d536c7f3b458fc222e8ff600f3b4d71cb6f832cdea7900f0d0b4ceb473aa018cb6848b69b2c4609fe6a9d2681a666927678d98ce0fb959ad1a54c2bf046ac |
| kubernetes-node-linux-s390x.tar.gz | 1a5dee2a9816128069fb3bde1bfec5f07e521425c1daa4b5538a18369850c186cff0a3e2a5f6f29325b83f275de86b26e4b5eea6b70297fb406a5d98eb77c8db |
| kubernetes-node-windows-amd64.tar.gz | 51026e3f0ae4820fee2be15bef726deab5f8bc5e1ad33b5ca6f208e453a5bfd4ec161210d0ade1252ef899200b973f547e768d2d48a74b1af1514cdd9902d590 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Nothing has changed.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 0685ab08c9f1c9696b66d17c6bb480c5e880b217b4cdd239f5c3884f2bdbf0052544724d9e366e5ce51d86008176bfccf6406b088b0d97336f8e1d436894aea8 |
| kubernetes-src.tar.gz | 845873a513e35e3b54c68b578825a47252591558b53781948de660494355e8d3b658a337f2bb096634b47a7f72a6bec2ed02285b1fd08d772d562011f310a8c4 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | b24ab87ffd978869c4b2d20190695225a6cdc827c2db5ca9774dfbdc7d879b57e7474b1fcd006fe8169ed37a020e194a99134aaebd90188c86ce85ffde71b2ab |
| kubernetes-client-darwin-arm64.tar.gz | 0c8826535a3836d55405acce38c3a58e4fbd488c8933e9eced8e59deeba26ae583908062d809ff4b319c891a9ef7ac2bb736e3b7c665b7f9a47e65387f0ec964 |
| kubernetes-client-linux-386.tar.gz | 4c6d920d2ab1003fcb5fc4b815337fd3b571256d64471fa0613a1d1f394f3ca55b9ac4f80bdb3921fd57ffc2887181f004abb252c23f0ed42e26a1bdbe26e9ca |
| kubernetes-client-linux-amd64.tar.gz | e1a0e3c2552fef6a21acef1ce1fb0f9a15c6b86c6b7b1c34fa8e6b60d2b341fe8fd3208555474cf4a1f2f4cffd90d175f866e508900ddf3d47178a24f6f6ae64 |
| kubernetes-client-linux-arm.tar.gz | bc4d687d8a8aa906a1e91e36dca875283aec2ec42c9a45db8c23dd38e7b9fb30e48c6bbf118c582717d3c0dc28cb1b198b90b167790ebbdaa9e33c7a29500187 |
| kubernetes-client-linux-arm64.tar.gz | c1a460ec2698034181261d8678fb4ae4addbd21b80850539b7c38bed402f664dabaab76c0aff23a283516aeddc45658ab1b619d82d17590ca9f8e3d9a0268d8d |
| kubernetes-client-linux-ppc64le.tar.gz | 6ff03ab89e77ef519f5dd81ff547ca3267b71a6fe6b876409282b39e90f7af1531d20d50266487d7ab75a9154cb9260d546b8dcd5868180175c76c538baa93cb |
| kubernetes-client-linux-s390x.tar.gz | 4b25feee780e0b6cfb7b9b9f263cea678ee2436ae4d674babaa5729abe065d07f1e8faa44b8881272716d703cffa7ee3712d6f9405f5ee825828ad9ca7d9d675 |
| kubernetes-client-windows-386.tar.gz | 9a561196c73f4a2208347eb2bc8b98d462049798ea48961d3cc19ab9165d1985825f16014d6f4ba5ec19019e9c4dee7975415b7ef58d52d775b16838478b9708 |
| kubernetes-client-windows-amd64.tar.gz | 9a8540a961c27395748c1d69988d4e93135b620e99a76cdbad403e42af41ef174eff50f590c0226d7431084134cf8b8aa7afb267024660ce8116117e7dde96d5 |
| kubernetes-client-windows-arm64.tar.gz | 5f7388b575dbf909423bc7b08e9a2b580d74c2827fd7740120d28f14b7d7cf1266c213dcda73268ad5acc030b1ef0f0a6c1d6683173661a37ddf34822306564a |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | cb719756e1e15e8b2dd656aae888d3b70478d12b9384636b8d6f2cd685f76dc8e79e94b8ee3f428e9e2f4503dc3a103b6918c9a5825c099723a14a314668fb5f |
| kubernetes-server-linux-arm64.tar.gz | bf187239d1f2108e96d89503af0d8eed89608470470beb781dce0393263919d18c7ae3e6cb94c00d37413d295af135752c6d63de6abe11c717e96a4b2c1b549d |
| kubernetes-server-linux-ppc64le.tar.gz | c140f4784438140ac65c672185c579e7b6fc5839bbcfa03390110726655b07e02b6c0a0adfc96446b4d4a8659c1831da74bfd5d83fc8a6d8cd2d6fcbf8750ed8 |
| kubernetes-server-linux-s390x.tar.gz | cc1fe349b9b39b52bbe0e2172049a60ce97dc4e2d4d23007c07ccc8692d01c0ee22012c74e1712d19dd50d6a8c391a9894f7e0a02e3596389083f360c6744743 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | daffae5fe6930b631fbfb68a9a3f9b7128c98a0a5916afde8de513b8967a4334c4cdb74a87ba0ab75e193e6fdfcfcf74136eaca059b3095be5e06c2828f2ab11 |
| kubernetes-node-linux-arm64.tar.gz | 0c4bc0530eea7b136b9a6977fa0212f43123f5215ab9e6c53739688890e2a88d7c4aee75cd09d1f7f03d645fa756b48bbea30b46b255527ba2bcc5f954fffab4 |
| kubernetes-node-linux-ppc64le.tar.gz | 7c6da33a3f82e2e14274d7be6a329277ee4ee483e0d2e228d3500fc57201f6b6220e1fed3c4214c46ca2c660257c83cdd0157724f17cafd79b4ac47f98c2ce84 |
| kubernetes-node-linux-s390x.tar.gz | 8ee20942b91808026b9e54c8964422cb7a6dcf4c081b26bf41ea910721dfdccb449eab7b7ea2e11ef0260693f7c48411e65c4b18ab8d0045d243020b674f93d4 |
| kubernetes-node-windows-amd64.tar.gz | b9b112456539ef0dd4b08178cdf3c56e1723746fdbad2dddb3ca18075e1258591b4f9937cfc884fb64f5ef275b82c8f5a3d25e29307753bdb574f18bd56da358 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Nothing has changed.
Nothing has changed.
Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 3a40163a162b703ca49714789d751c741cc09a4921e1dd1a3e51cd1e45285c43aa84c153a9130b105220defe573ecc9bc2f9e69e7ead50f470110eba0f3eb2e7 |
| kubernetes-src.tar.gz | f1e769b6bd1c24e88a445ba58c30448b4f138c36b4acb1de04616630eb8d74b01986c94d7ed2022943425e0e9ea8043253fe3f32a696c510187ccae2deb81334 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | c5b135c912d5d942cdeff31b23f3d7865aa40252730e367f8170d70fbb2c695efbc04648787b8d36ec788ce761f71adde0c8bd92ab1bec714ded7e5b43f1e70e |
| kubernetes-client-darwin-arm64.tar.gz | d2dc774dbf6ec52a6e848be7ede8d3640ec3969d6b79462ab5b06c654d65046961fecf7b0dee7861af7895beb65c90867f7f0b370d0437322f92d2afbe7ff999 |
| kubernetes-client-linux-386.tar.gz | c5df62de030efad772ff72ce96776229a4cdf7c80c6e8625f46f32d7fe064b84021432eda05aa48d8dfd3b38f5d8bb1f0fec010fa39bdcc437d48f7dc02ce20c |
| kubernetes-client-linux-amd64.tar.gz | 789c6ffc56ed8772fdd7142865cd788d0975dbeb759533d00768c6ac964973d5553aaac8341c8d55604e70abdfdb3c5b1b91cf7f2a6fc08ccc4a5a0d93e76127 |
| kubernetes-client-linux-arm.tar.gz | f82bb1bc87d8288f54de7f5dbb54ff6e29dea210e0632348b3912cff326a78047da4dd05581dd29be2d9f7756eab1f2af1a9bf45818e378b22ccaf7c265803c1 |
| kubernetes-client-linux-arm64.tar.gz | 977cd13d6ad03c3e3b820d69d9136acb90e0efc13253a6233cf2c0d819c0b68734672ab623a7496080417c750ee04d3ce276e41d541cd07deb31ff90b6c19ee7 |
| kubernetes-client-linux-ppc64le.tar.gz | 6bb7a7935989c301727e355b3db6774d2ca057f317c166ceddb3aee1d4d5c553b62dc28f851b8acf0dda73f64d41aec77e41721e9cd5c1d9e8ffb7afc318ff6c |
| kubernetes-client-linux-s390x.tar.gz | e922a13265a591f989e6026321c792221663f09f062a5f7866fb4c1efa28a91216bc7f297b4c778eac8784f773d642ed873bcd6d97dfcff6897631a17c3d35d7 |
| kubernetes-client-windows-386.tar.gz | 963016b3be20076dd94f46aac858d2e4fe3a973d54a574b0289c8e5e20ec192680b3e4cf9f813f17658f892c96adabfd467cb8a7ad6332007e4aea07a828572c |
| kubernetes-client-windows-amd64.tar.gz | 01432a7dcdcd99c0c8e00bd9085dde13fb07a7091c19592bd7b7323932af56f47d2554b4806fc5ff867f7f04428a4572e0149bec32f7b9e1b3dc2dc0e63792d6 |
| kubernetes-client-windows-arm64.tar.gz | 38fefd2b9c6a5b37b461e1787ee824d8208bd76f375bb0f5740e4dc2ede98baa30532021629cfc9ccb04b854ce19c7ccde245e4edd3a7482336d70ea47dd09d4 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 4a63efa6876bc66683650361a071ddca8c201a653a3947e3939f68d32835b76357a5c63bebfdbd9e2420b485b9dfe42ea03ad6b230960207c21a98d96f24ddda |
| kubernetes-server-linux-arm64.tar.gz | 0965a31c7db0dcbbe8160c420df3ca12923fa1bfc720103b93f3ba238c529667933477df0f190737595402173f38b1785179f468047d504e4a1bfbe969951df9 |
| kubernetes-server-linux-ppc64le.tar.gz | b62515af8f866bcde5866b10def38c63bb0ef50d84dcac1b536dad85d04b10285e38bafd79e0d80fcab8820455597164e4202cc4848b1cc03137a967a1ca5597 |
| kubernetes-server-linux-s390x.tar.gz | 17eaa46f21730ad8e809b827c053030249e8cfff812fbd0a2252650ef1b90ae4c98c57d54972317d806fcad7c77444f69c97436d1f652b7ac0a6ba908acee09a |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 97bb8e23f59afae0f0a5d4a9b594dca25e76fc426d1e05d13582df44f207b913f82eb1b36e2669a267f0d8171978049e623556395a94f63ad30a873d41bb0a47 |
| kubernetes-node-linux-arm64.tar.gz | caa6625eec52dee92dec7f33936e7a5f3ba8166e1150b6c747048b74f1bb574dcc097fb7ce7a634f122d42a7fbdbf81e5b4a483a71adeed2c2937af8977114a8 |
| kubernetes-node-linux-ppc64le.tar.gz | cab3bd432093fb03bdc6497f94dd501e412fb90eca9b350319239fcca5687012561f7342114b52e09bad61e6eea3109158ef92add94809d4b56f9aa3470e9e93 |
| kubernetes-node-linux-s390x.tar.gz | 0c95a03a6539f99de244213359c6d4f42ebf6aea79c26c8cfb82d319b7c27dd5ca4050cc58ef27f999fba334fc67629a0b96bb7af66721309a203b1f0aec6467 |
| kubernetes-node-windows-amd64.tar.gz | 9f2e1f5e6227e41d0c681e07a2edc3eb4da4b6ba20125a4aad6b94c2023d29238257244b243e508c17c5693a8168da5bf66cf744a9610799d77adbed29363c45 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Add a new FileKeyRef field to containers, allowing them to load variables from files by setting this field.
Introduce the EnvFiles feature gate to govern activation of this functionality. (#132626, @HirazawaUi) [SIG API Machinery, Apps, Node and Testing]
Add driver-owned fields in ResourceSlice to mark whether the device is shareable among multiple resource claims (or requests) and to specify how each capacity can be shared between different requests.
Add new optional APIs in ResouceSlice.Basic and ResourceClaim.Status.AllocatedDeviceStatus. (#130160, @KobayashiD27) [SIG API Machinery, Apps, Architecture, Node, Release, Scheduling and Testing]
Added a mechanism for configurable container restarts: container level restart rules. This is an alpha feature behind the ContainerRestartRules feature gate. (#132642, @yuanwang04) [SIG API Machinery, Apps, Node and Testing]
Added detailed event for in-place pod vertical scaling completed, improving cluster management and debugging (#130387, @shiya0705) [SIG API Machinery, Apps, Autoscaling, Node, Scheduling and Testing]
Added validation to reject Pods using the PodLevelResources feature on Windows OS due to lack of support. The API server rejects Pods with Pod-level resources and a Pod.spec.os.name targeting Windows. Kubelet on nodes running Windows also rejects Pods with Pod-level resources at admission phase. (#133046, @toVersus) [SIG Apps and Node]
Adds warnings when creating headless service with set loadBalancerIP,externalIPs and/or SessionAffinity (#132214, @Peac36) [SIG Network]
Allow pvc.spec.VolumeAttributesClassName to go from non-nil to nil (#132106, @AndrewSirenko) [SIG Apps]
Allows setting the hostnameOverride field in PodSpec to specify any RFC 1123 DNS subdomain as the pod's hostname. The HostnameOverride feature gate has been introduced to control enablement of this functionality. (#132558, @HirazawaUi) [SIG API Machinery, Apps, Network, Node and Testing]
AppArmor profiles specified in the pod or container SecurityContext are no longer copied to deprecated AppArmor annotations (prefix container.apparmor.security.beta.kubernetes.io/). Anything that inspects the deprecated annotations must be migrated to use the SecurityContext fields instead. (#131989, @tallclair) [SIG Node]
Changes underlying logic to propagate Pod level hugepage cgroup to containers when they do not specify hugepage resources.
DRA: the scheduler plugin now prevents abnormal filter runtimes by timing out after 10 seconds. This is configurable via the plugin configuration's FilterTimeout. Setting it to zero disables the timeout and restores the behavior of Kubernetes <= 1.33. (#132033, @pohly) [SIG Node, Scheduling and Testing]
DRA: when the prioritized list feature is used in a request and the resulting number of allocated devices exceeds the number of allowed devices per claim, the scheduler aborts the attempt to allocate devices early. Previously it tried to many different combinations, which can take a long time. (#130593, @mortent) [SIG Apps, Node, Scheduling and Testing]
Dynamic Resource Allocation: graduated core functionality to general availability (GA). This newly stable feature uses the structured parameters flavor of DRA. (#132706, @pohly) [SIG API Machinery, Apps, Auth, Autoscaling, Etcd, Node, Scheduling and Testing]
Enable kube-apiserver support for PodCertificateRequest and PodCertificate projected volumes (behind the PodCertificateRequest feature gate). (#128010, @ahmedtd) [SIG API Machinery, Apps, Auth, Cloud Provider, Etcd, Node, Storage and Testing]
Extended resources backed by DRA feature allows cluster operator to specify extendedResourceName in DeviceClass, and application operator to continue using extended resources in pod's requests to request for DRA devices matching the DeviceClass.
NodeResourcesFit plugin scoring won't work for extended resources backed by DRA (#130653, @yliaog) [SIG API Machinery, Apps, Auth, Node, Scheduling and Testing]
Fix prerelease lifecycle for PodCertificateRequest (#133350, @carlory) [SIG Auth]
Fixes a 1.33 regression that can cause a nil panic in kube-scheduler when aggregating resource requests across container's spec and status. (#132895, @yue9944882) [SIG Node and Scheduling]
Introduced the admissionregistration.k8s.io/v1beta1/MutatingAdmissionPolicy API type.
To enable, enable the MutatingAdmissionPolicy feature gate (which is off by default) and set --runtime-config=admissionregistration.k8s.io/v1beta1=true on the kube-apiserver.
Note that the default stored version remains alpha in 1.34 and whoever enabled beta during 1.34 needs to run a storage migration yourself to ensure you don't depend on alpha data in etcd. (#132821, @cici37) [SIG API Machinery, Etcd and Testing]
No, changes underlying logic for Eviction Manager helper functions (#132277, @KevinTMtz) [SIG Node, Scheduling and Testing]
Promote MutableCSINodeAllocatableCount to Beta. (#132429, @torredil) [SIG Storage]
Promoted feature-gate VolumeAttributesClass to GA
Promoted the APIServerTracing feature gate to GA. The --tracing-config-file flag now accepts TracingConfiguration in version apiserver.config.k8s.io/v1 (with no changes from apiserver.config.k8s.io/v1beta1). (#132340, @dashpole) [SIG API Machinery and Testing]
Removed deprecated gogo protocol definitions from k8s.io/kubelet/pkg/apis/pluginregistration in favor of google.golang.org/protobuf. (#132773, @saschagrunert) [SIG Node]
The Kubelet can now monitor the health of devices allocated via Dynamic Resource Allocation (DRA) and report it in the pod.status.containerStatuses.allocatedResourcesStatus field. This requires the DRA plugin to implement the new v1alpha1 NodeHealth gRPC service. This feature is controlled by the ResourceHealthStatus feature gate. (#130606, @Jpsassine) [SIG Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Network, Node, Release, Scheduling, Storage and Testing]
The KubeletServiceAccountTokenForCredentialProviders feature is now beta and enabled by default. (#133017, @aramase) [SIG Auth and Node]
The conditionType is "oneof" approved/denied check of CertificateSigningRequest's .status.conditions field has been migrated to declarative validation.
If the DeclarativeValidation feature gate is enabled, mismatches with existing validation are reported via metrics.
If the DeclarativeValidationTakeover feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#133013, @aaron-prindle) [SIG API Machinery and Auth]
The fallback behavior of the Downward API's resourceFieldRef field has been updated to account for pod-level resources: if container-level limits are not set, pod-level limits are now used before falling back to node allocatable resources. (#132605, @toVersus) [SIG Node, Scheduling and Testing]
The kubelet's image pull credential tracking now supports service account-based verification. When an image is pulled using service account credentials via external credential providers, subsequent pods using the same service account (UID, name, and namespace) can access the cached image without re-authentication for the lifetime of that service account. (#132771, @aramase) [SIG Auth, Node and Testing]
API calls dispatched during pod scheduling are now executed asynchronously if the SchedulerAsyncAPICalls feature gate is enabled. Out-of-tree plugins can use APIDispatcher and APICacher from the framework to dispatch their own calls. (#132886, @macsko) [SIG Release, Scheduling and Testing]
Add started_user_namespaced_pods_total and started_user_namespaced_pods_errors_total for tracking the successes and failures in creating pods if a user namespace is requested. (#132902, @haircommander) [SIG Node and Testing]
Add apiserver_resource_size_estimate_bytes metric to apiserver (#132893, @serathius) [SIG API Machinery, Etcd and Instrumentation]
Add memory tracking to scheduler performance tests to help detect memory leaks and monitor memory usage patterns while running scheduler_perf (#132910, @utam0k) [SIG Scheduling and Testing]
Added 3 new metrics for monitoring async API calls in the scheduler when the SchedulerAsyncAPICalls feature gate is enabled:
Added machine readable output options (JSON & YAML) to kubectl api-resources (#132604, @dharmit) [SIG Apps, CLI and Network]
Added support for a new kubectl output format, kyaml. KYAML is a strict subset of YAML and should be accepted by any YAML processor. The formatting of KYAML is halfway between JSON and YAML. Because it is more explicit than the default YAML style, it should be less error-prone. (#132942, @thockin) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Contributor Experience, Instrumentation, Network, Node, Scheduling, Storage and Testing]
Adds HPA support to pod-level resource specifications. When the pod-level resource feature is enabled, HPAs configured with Resource type metrics will calculate the pod resources from pod.Spec.Resources field, if specified. (#132430, @laoj2) [SIG Apps, Autoscaling and Testing]
Adds a container_swap_limit_bytes metric to expose the swap limit assigned to containers under the LimitedSwap swap behavior. (#132348, @iholder101) [SIG Node and Testing]
Adds useful endpoints for kube-apiserver (#132581, @itssimrank) [SIG API Machinery, Architecture, Instrumentation, Network, Node, Scheduling and Testing]
Bump KubeletCgroupDriverFromCRI to GA and add metric to track out of support CRI implementations (#133157, @haircommander) [SIG Node and Testing]
CRI API has auth fields in image pulling marked as debug_redact. (#133135, @SergeyKanzhelev) [SIG Node]
Changed handling of CustomResourceDefinitions with unrecognized formats. Writing a schema with an unrecognized formats now triggers a warning (the write is still accepted). (#133136, @yongruilin) [SIG API Machinery]
DRAAdminAccess is enabled by default allowing users to create ResourceClaims and ResourceClaimTemplates in privileged mode to grant access to devices that are in use by other users for admin tasks like monitor health or status of the device. (#133085, @ritazh) [SIG Auth and Node]
DRAPrioritizedList is now turned on by default which makes it possible to provide a prioritized list of subrequests in a ResourceClaim. (#132767, @mortent) [SIG Node, Scheduling and Testing]
Demote KEP-5278 feature gates ClearingNominatedNodeNameAfterBinding and NominatedNodeNameForExpectation to Alpha from Beta (#133293, @utam0k) [SIG Scheduling and Testing]
Deprecate apiserver_storage_objects and replace it with apiserver_resource_objects metric using labels consistent with other metrics (#132965, @serathius) [SIG API Machinery, Etcd and Instrumentation]
Ensure memory resizing for Guaranteed QOS pods on static Memory policy configured is gated by InPlacePodVerticalScalingExclusiveMemory (defaults to false). (#132473, @pravk03) [SIG Node, Scheduling and Testing]
Fix recording the kubelet_container_resize_requests_total metric to include all resize-related updates. (#133060, @natasha41575) [SIG Node]
Graduate ListFromCacheSnapshot to Beta (#132901, @serathius) [SIG API Machinery and Etcd]
Graduate PodLevelResources feature to beta and have it on by default. This feature allows defining CPU and memory resources for an entire pod in pod.spec.resources. (#132999, @ndixita) [SIG Node]
Graduate PodObservedGenerationTracking feature to beta and have it on by default. This feature means that the top level status.observedGeneration and status.conditions[].observedGeneration fields in pods will now be populated to reflect the metadata.generation of the podspec at the time that the status or condition is being reported. (#132912, @natasha41575) [SIG Apps, Node and Testing]
Graduate the WinDSR feature in the kube-proxy to GA. The WinDSR feature gate is now enabled by default. (#132108, @rzlink) [SIG Network and Windows]
Graduate the WinOverlay feature in the kube-proxy to GA. The WinOverlay feature gate is now enabled by default. (#133042, @rzlink) [SIG Network and Windows]
Graduates the WatchList feature gate to Beta for kube-apiserver and enables WatchListClient for KCM. (#132704, @p0lyn0mial) [SIG API Machinery and Testing]
If PreBindPreFlight returns Skip, the scheduler doesn't run the plugin at PreBind. If any PreBindPreFlight returns Success, the scheduler puts NominatedNodeName to the pod so that other components (such as the cluster autoscaler) can notice the pod is going to be bound to the node. (#133021, @sanposhiho) [SIG Scheduling and Testing]
Increase APF max seats to 100 for LIST requests (#133034, @serathius) [SIG API Machinery]
Introduce a method 'GetPCIeRootAttributeByPCIBusID(pciBusID)' for third-party DRA drivers to provide common logic for the standardized device attribute 'resource.kubernetes.io/pcieRoot' (#132296, @everpeace) [SIG Node]
It will promote windows graceful shutdown feature from alpha to beta. (#133062, @zylxjtu) [SIG Windows]
Kube-apiserver now reports the last configuration hash as a label in
apiserver_authentication_config_controller_last_config_info metric after successfully loading the authentication configuration file.apiserver_authorization_config_controller_last_config_info metric after successfully loading the authorization configuration file.apiserver_encryption_config_controller_last_config_info metric after successfully loading the encryption configuration file. (#132299, @aramase) [SIG API Machinery, Auth and Testing]Kube-apiserver: previously persisted CustomResourceDefinition objects with an invalid whitespace-only caBundle can now serve requests that do not require conversion. (#132514, @tiffanny29631) [SIG API Machinery]
Kube-controller-manager now reports the following metrics for ResourceClaims with admin access:
resourceclaim_controller_creates_total count metric with labels admin_access (true or false), status (failure or success) to track the total number of ResourceClaims creation requestsresourceclaim_controller_resource_claims gauge metric with labels admin_access (true or false), allocated (true or false) to track the current number of ResourceClaims (#132800, @ritazh) [SIG Apps, Auth, Instrumentation and Node]Kubelet now detects terminal CSI volume mount failures due to exceeded attachment limits on the node and marks the stateful pod as Failed, allowing its controller to recreate it. This prevents pods from getting stuck indefinitely in the ContainerCreating state. (#132933, @torredil) [SIG Apps, Node, Storage and Testing]
Kubelet now reports a hash of the credential provider configuration via the kubelet_credential_provider_config_info metric. The hash is exposed in the hash label. (#133016, @aramase) [SIG API Machinery and Auth]
Memory limits can now be decreased with a NotRequired resize restart policy. When decreasing memory limits, perform a best-effort check to prevent limits from decreasing below usage and triggering an OOM-kill. (#133012, @tallclair) [SIG Apps, Node and Testing]
Move Recover from volume expansion failure GA (#132662, @gnufied) [SIG Apps, Auth, Node, Storage and Testing]
PodLifecycleSleepAction is graduated to GA (#132595, @AxeZhan) [SIG Apps, Node and Testing]
Prevents any type of CPU/Memory alignment or hint generation with the Topology manager from the CPU or Memory manager when Pod Level resources are used in the pod spec. (#133279, @ffromani) [SIG Node and Testing]
Promoted Linux node pressure stall information (PSI) metrics to beta. (#132822, @roycaihw) [SIG Node]
Start recording metrics for in-place pod resize. (#132903, @natasha41575) [SIG Node]
The scheduler no longer clears the nominatedNodeName field for Pods. External components, such as Cluster Autoscaler and Karpenter, are responsible for managing this field when needed. (#133276, @macsko) [SIG Scheduling and Testing]
The validation in the CertificateSigningRequest /status and /approval subresource has been migrated to declarative validation.
If the DeclarativeValidation feature gate is enabled, mismatches with existing validation are reported via metrics.
If the DeclarativeValidationTakeover feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#133068, @yongruilin) [SIG API Machinery and Auth]
This will promote the KubeletPodResourcesDynamicResources and KubeletPodResourcesGet feature gates to Beta which will be enabled by default if DRA goes to GA. (#132940, @guptaNswati)
Update pause version to registry.k8s.io/pause:3.10.1 (#130713, @ArkaSaha30) [SIG Cluster Lifecycle, Node, Scheduling and Testing]
Use DRA API version to "v1" in "deviceattribute" package in "k8s.io/dynamic-resource-allocation" module (#133164, @everpeace) [SIG Node]
When proxying to an aggregated API server, kube-apiserver now uses the
EndpointSlices of the service indicated by the APIServer, rather than
using Endpoints.
If you are using the aggregated API server feature, and you are writing out the endpoints for it by hand (rather than letting kube-controller-manager generate Endpoints and EndpointSlices for it automatically based on the Service definition), then you should write out an EndpointSlice object rather than (or in addition to) an Endpoints object. (#129837, @danwinship) [SIG API Machinery, Network and Testing]
Whenever a pod is successfully bound to a node, the kube-apiserver now clears the pod's nominatedNodeName field. This prevents stale information from affecting external scheduling components. (#132443, @utam0k) [SIG Apps, Node, Scheduling and Testing]
hostUsers: false) and volumeDevices. Kubernetes now returns an error in this case. (#132868, @rata) [SIG Apps].status.availableReplicas at the correct time without a delay. This results in faster reconciliation of Deployment conditions and faster, unblocked Deployment rollouts. (#132121, @atiratree) [SIG Apps]baseline and restricted pod security admission levels now block setting the host field on probe and lifecycle handlers (#125271, @tssurya) [SIG Auth, Node and Testing]k8s.io/kms/apis in favor of google.golang.org/protobuf. (#132833, @saschagrunert) [SIG API Machinery, Auth and Testing]k8s.io/kubelet/pkg/apis/deviceplugin in favor of google.golang.org/protobuf. (#133028, @saschagrunert) [SIG Node and Testing]k8s.io/kubelet/pkg/apis/podresources in favor of google.golang.org/protobuf. (#133027, @saschagrunert) [SIG Node and Testing]LegacySidecarContainers feature gate is completely removed. (#131463, @gjkim42) [SIG Node and Testing]kubectl kustomize as described at https://github.com/kubernetes-sigs/kustomize/releases/tag/kustomize%2Fv5.7.0 (#132593, @koba1t) [SIG CLI]Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | e1a1cf79f95354bae349afa992f72cf8cb23aa9a016f67599de1f0c31572a00cd84f541163d0da3205ecfe421901a88dc2c9012cec91d45fa2f094d524059f92 |
| kubernetes-src.tar.gz | 7e2c9837dd9be43df835d999024d516d52d211ee7e65f995da8e6c45442c8a8b6e5bc3e13a9279fc401c58b3ad1ba2b0b37abba3719e0605dfb5cb5c752d7df7 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 1a3944812f26c37de6418f84d14e97366a1d2e268d8d61619f98f92778f3f3a9e30e4fd092ea0963ee19524284815803511e3d143c9f1b7df77f06728eddcefd |
| kubernetes-client-darwin-arm64.tar.gz | 01bcf3e380e9b18e7db316c0a7968b9293ff0cee6bd6395f8b3a8fcfbd9bc660b3016cfa636498c28d35a0e8a221f56303bd34b136d044df2356f3085aa4e613 |
| kubernetes-client-linux-386.tar.gz | 847526c7c2d2559f16ad1f6172d07590b4f35051a7bcf741c98067ace09fc92c52241f74a8c1d7ad1f4b713b26d8abc7059b47d97f4a8d9afc87d465b837dfd4 |
| kubernetes-client-linux-amd64.tar.gz | 260d78b743af5e7a6563cf26df7a4a4e75987f1bce96de3cec020d47f1a2586a39f3058cc1668a0b77266bb131490c74c55eaf669766918c8379e3c9818abebe |
| kubernetes-client-linux-arm.tar.gz | f4dcc3597f2e005b51c4f3fc8323e119582fd00626ddaea6f2602810fd64fb65d1c1a795519d458b2c74ef5bd52467e6cd77b01972e858bb97d12f4ef2c81839 |
| kubernetes-client-linux-arm64.tar.gz | 4cc18be405d27f797ccd93b2f3ae0fe985450a0cf6f35e023c91e4a116b8443e32ba99e07bbc93c8dc4d9739c5adbb888cbc16ba457e362975e907057d0f38c1 |
| kubernetes-client-linux-ppc64le.tar.gz | 06eca6eb5dc82304566fc7194f1ae6f002a70dd031357608bbf65e9449840dcb55b37b1c61ff13e40f0eb95a0456bb6e5d692b14f806cd7e694ef71cb720bfb1 |
| kubernetes-client-linux-s390x.tar.gz | ed6db8acb534c557e3619628b78c1de5abcb31bda04e418296acc4fde54e23bba1ee42b4db9daefdf5622b09e3c9d4916461b85da10058d822251ac3da2eebca |
| kubernetes-client-windows-386.tar.gz | 0302f1dea8c321f254b9aeb87882c82b28a4be74b4718f73840769e06c21a4a240d285ec89d94657522e49bd7550eda44a8e7312d83198c4b4f60990609beaae |
| kubernetes-client-windows-amd64.tar.gz | 28dcf914521f31ed11d258fe1ff516eac9f7e1ed317bc55a816a2bca2ef41ce18140c296ea0c22e1a3808f82979ce8970e91951a982c33dd18e3fedb840ca4ad |
| kubernetes-client-windows-arm64.tar.gz | ed50434e96f2fd80abaf3b9fa6befa96f829c086ac6b87d0d9f6ce9d6d3e10a22eb17928902b42b95ad4709a936e791d189b338af46fbe91d5391fde7c1f2904 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 2862b8ed25f52542558fe48a6a584b02644a731decec878cfa0cee00173476f354d70a04efb84d084b87fe303291092d06e795e42e13a40c339699982a90044a |
| kubernetes-server-linux-arm64.tar.gz | 1c00a6559f4f6c6190fe2265fb88cad4ac448eb3223dbd809976e3c85139d04b9cc02b4a9b80e9b42a2e4ee4a7a03a7a303ced49bc9673bff7be7cde7bb5f7a5 |
| kubernetes-server-linux-ppc64le.tar.gz | 7a998922d3fff36914ee690a5937d7b592f1916f68f7a31311065b25e7035cd38572df062e90680d56299b93be278c2fa24a370547270c07add274cf4a420d2f |
| kubernetes-server-linux-s390x.tar.gz | 555b5690e99d0470ea7ca1bc4aebfda68a1126859962876db897b3024d5d7e352a3beeae4f2f3cba28a0d1b3c6edcf7094395492ff36fbc7d2d7a1e87ebb5fca |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 4b029d2f1022c4fd84ad1afaeeff9ae4fd80593c90f3f30a633df04bde68fac182c72bd906575b779eff01cc2e7d18884d9b5b0a3259a02e3131976a4339d1e1 |
| kubernetes-node-linux-arm64.tar.gz | c65b44be119997d321d13d6f9d08e42b1576fb9515cbf646c730f72e4e80a47afa1e59ea55cf8a8de1aa93a9db586ecb7101b2f59633460f4a4381ded987051b |
| kubernetes-node-linux-ppc64le.tar.gz | 837442a3311c2382b417e2d8cbf9638f9abc22f8584519becd44e9a161ef2cecee686a76977391f2c20b0477d5417d657ec29b9f0ab81e059a64f9566065f37b |
| kubernetes-node-linux-s390x.tar.gz | 3c8232cd07d8869258cc4a7793fee524ec26847d32c4c6efe966946b81df6e36450acbfcbe199296b2ad79201875d00e7a8af8ceacc2c9681fdae9b4a11c2c0e |
| kubernetes-node-windows-amd64.tar.gz | 768c4cd582f4b708451d5f3fdacf048de7550251e468a9e255f1c5180602d7abca5f86f22a16089309e35c0f5eee18c9133cebe24830461e3471bc180efc3769 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
tokenAttributes.cacheType field to v1 credential provider config. This field is required to be set to either ServiceAccount or Token when configuring a provider that uses service account to fetch registry credentials. (#132617, @aramase) [SIG Auth, Node and Testing]AuthenticationConfiguration.jwt array can now optionally specify either the controlplane or cluster egress selector by setting the issuer.egressSelectorType field. When unset, the prior behavior of using no egress selector is retained. The StructuredAuthenticationConfigurationEgressSelector beta feature (default on) must be enabled to use this functionality. (#132768, @enj) [SIG API Machinery, Auth and Testing]KubeletTracing feature gate to GA. (#132341, @dashpole) [SIG Instrumentation and Node]AuthorizeWithSelectors and AuthorizeNodeWithSelectors feature gates are promoted to stable and locked on. (#132656, @liggitt) [SIG API Machinery, Auth and Testing]apiserver_storage_consistency_checks_total metric and results in cache snapshots being purged. (#132884, @serathius) [SIG API Machinery, Instrumentation and Testing]ConsistentListFromCache to GA (#132645, @serathius) [SIG API Machinery]kubectl get job now displays the SuccessCriteriaMet status for the listed jobs. (#132832, @Goend) [SIG Apps and CLI]TokenRequestServiceAccountUIDValidation feature gate (Beta, enabled by default) validates the TokenRequest UID when set matches the service account UID. (#132803, @aramase) [SIG API Machinery, Auth, Node and Testing]observedGeneration field exposed in the pod resize conditions to more accurately reflect which pod generation is associated with the condition. (#131157, @natasha41575) [SIG Node]/proc and /sys. (#131018, @saschagrunert) [SIG Node]| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | ec76c311b4aa0bcc97d4a83e6586a14081129343721bf844f0907ec2e14cad1ba4d0db04b667de963043c0fd4b410f7fe90788c10f070fa3b8ad0aa340e2dc5f |
| kubernetes-src.tar.gz | b99cf04b86438285c24872e6ec2fdc03998a95b88e502e457ea03fba01beb870ef34e57055f7a14a016ae102906a1ed32ea20ddada31c9c1fa467c47b203d1f9 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 5f2b298b4f1c27e06e79258b2ac840a36f70d46bd95b776d01bee89c1821b8a1138556224d4c23b8e582ca1676e0125bda8ebc93e8db0a92ede240efa169b01f |
| kubernetes-client-darwin-arm64.tar.gz | 719d4d81d85cf7f73e6f461e17c1559768f4e084753d0b210603e920b2ee6d687350e7ba5ae0bfa160630c02159e2900936ebde03104050f2eb6906b24573694 |
| kubernetes-client-linux-386.tar.gz | 07ec8bd3d5308431bb4cf17dc8937ad13b95a2aab35fa0389479776228cc0f47756d1791d2371a66fa8f045d1894ac6d0dec4e42a3f96e443ea961cd2e7477ee |
| kubernetes-client-linux-amd64.tar.gz | 5c4613fa4b8de852147a24e7c80894f1588e93023cff4bfe58725e2b141f5417662bcf837272c41eeaf8a91382eca3e6015b27cca099e516ba2e08214521279a |
| kubernetes-client-linux-arm.tar.gz | 1204c3f108b5e83a081b31af13d9e3185f0ff3c9547213ecbd854293b89661f5060c2b10a2c73d8bb6d5099438287dedbcdf88f33de6bc95a060e2d634d80652 |
| kubernetes-client-linux-arm64.tar.gz | 763d07a3a3f69b42047686e81e6cc137f9ef4b7ab2f50cc7bfbb26b8a15e011549501893e5cb9b77de0008cc77631fd8f37d113c0f0ee6a17e6435da06c269a2 |
| kubernetes-client-linux-ppc64le.tar.gz | ad4f45f8402014da35a3ff1daa5cfaafedd2d7e579bff1a0a87f49647e2d8488eb2b791776de3e4d5ac25631f13ec9c0bc64e7e0edd9f9049619659b9ebf9305 |
| kubernetes-client-linux-s390x.tar.gz | aba923f458d8f8d4c27b0144f40cac186663884447a5a67c20d2fb59d0c9ebd83e8d7480555365562e97c88992d28ffdd20378ce18412465a0356b2c20fa5dff |
| kubernetes-client-windows-386.tar.gz | b5b1a854e0298f2f401627ecec5bd61fad8ccb7f77a42b5c34e6c0dc8f4f5e7485d13525f2775b160b15277d591d46c1633acddea60dd2b20949794f0f80a4e5 |
| kubernetes-client-windows-amd64.tar.gz | 75b60210f1e6994abc4da9fceb23290438be81c094e27b2025c96addde4cbc034348dde0d50098db22aeceed3e3d6dd855d8d740d36e0f16932ca4ae537542d0 |
| kubernetes-client-windows-arm64.tar.gz | f997fa3ba6081273b46e6a71a98fcee06c0df36e045fd43eb38454b28dcf3863e8e5f053cc14057f9cfd53267ae611477f5410a2305d56b7a60a88f4c0cb36bd |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 3313f4746bdfaf7bd86bd72d035c552ae800426f5546eb23b83bdb3178e378d3aa5c4a59bc2b5ce5d97755432879812a293f582ca1dec3733e95adc5a5c07524 |
| kubernetes-server-linux-arm64.tar.gz | add5d69f2d48656649d1712c476a9de99ef2fcf4473d982b78b834e5ad544cf947a9fc35324552cd38e3824ea96194a81d76bc99111bfc725b9aa9212da8e88d |
| kubernetes-server-linux-ppc64le.tar.gz | f2038f7382e660e8c97c4efa05adcb3d785ccd550597a50aa9d98e04e9bf1f29b5ac0c5d3d686f01870d64949dc43cf83e176c718fddc20f84ed38bd44f8ba54 |
| kubernetes-server-linux-s390x.tar.gz | 077708405b4b22ebeaee8feeddbe1134374008129cc0cc40830434fa762f549f5950c1c2f76b72ddfab2ccc972e3325cb360a13acdbe54729a1eae0324b60b08 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 9c0a3e76311789bfbaa3d8e27c289e5b5ab142ab0269dd5922016d2e3e8be6ddffd60ba1a57d6deb2571e4826bec1aab81c98a973d633b263ac316275ee01251 |
| kubernetes-node-linux-arm64.tar.gz | 1289b5e39164eaac2acce143dbb389341966e06b8b0261eb0eb4eb774848dd34f35b78d22b56d1613d5a6801868881415af62aa15ff8b1cbedbec9cad0567591 |
| kubernetes-node-linux-ppc64le.tar.gz | 235d060ddd4c3da0b58fdb64a6a25b03690b7eb9c2888201b86d269f29d2a4e70000cea9711dff472626e78b56e228b9ffd16ab89442c54991de44bc8c3d9344 |
| kubernetes-node-linux-s390x.tar.gz | 8e9ca919e77e0ff226e92c036ac35ab284aa07fdd2e01b01bb4352d04acd567f40edc4caf934092cb3c1b04ac4ea281ef6681b6589d9e43ea25ae038381e95ad |
| kubernetes-node-windows-amd64.tar.gz | 421cf6c68c5e0603f67dd44ac0d4d02c6feb3e60e9608268cdc4b498718c99b2cef4842fb7df60feaa99dc18d650164a0fcc31fbf896653ea4b6d126e0683d14 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
k8s.io/cri-api in favor of google.golang.org/protobuf. (#128653, @saschagrunert) [SIG API Machinery, Auth, Instrumentation, Node and Testing]StreamingCollectionEncodingToJSON and StreamingCollectionEncodingToProtobuf to GA (#132648, @serathius) [SIG API Machinery]dra_resource_claims_in_use kubelet metrics informs about active ResourceClaims, overall and by driver. (#131641, @pohly) [SIG Architecture, Instrumentation, Node and Testing]RelaxedServiceNameValidation feature gate is enabled, the
names of new Services names are validation with NameIsDNSLabel(),
relaxing the pre-existing validation. (#132339, @adrianmoisey) [SIG Apps, Network and Testing]watch operation. (#132542, @gemmahou) [SIG CLI]WatchList is activated (#131799, @valerian-roche) [SIG API Machinery]/metrics/resource endpoint. (#132065, @yuanwang04) [SIG Node and Testing]make vet target, please use make lint instead (#132509, @yongruilin) [SIG Testing]k8s.io/externaljwt in favor of google.golang.org/protobuf. (#132772, @saschagrunert) [SIG Auth]Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 566db0b881557117fd7038bb5f25c46c727d2cc6a7cf3de0afc720eeeecfce947ae0e1b5162173a3ebfb915cfcc2c05fe8ab61db4551ac882a2756ad333d6337 |
| kubernetes-src.tar.gz | 3ccccf95776d0639455cead6d74a04e1af8f244915c583213b70f688ffd0cb291752da48589134eac5392ff1f6fb5046803d1e35f70475bcf74ded85c587df49 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 058f6b47787adabfbb191ef80888633cddf5e2e36be6bb113da7db2c239c2691ad5467d381b09ca78bf9c54397a7eb0d54f2025ba7314c504eee4537787982b1 |
| kubernetes-client-darwin-arm64.tar.gz | 1e22f2b5c699e991daa282aaa1475d37e1614e4d90022dadc205b64c988c5050005a2347d0e93c9b0804c0db1fd0eb1f8eb4f86a0811638ccd9324cda95265fa |
| kubernetes-client-linux-386.tar.gz | dacff605a6be45b4844b5120e420aedeea422297de1c9d5b5bc5926cc730efdc13f9881c75cb346159cb8a4e0a4364070299ffcc41494dbdd8ece6f698238658 |
| kubernetes-client-linux-amd64.tar.gz | 38f5c80ad4cf1c8e422d5ac54cf6e5ea93425bd4fe4dd8d9ac011734e2b187769f74da749240bea1cc3a850ea6530dcbc27979af8fc9d86b3ec3299362c54e03 |
| kubernetes-client-linux-arm.tar.gz | e8e116b2603e961d6090da8755d61c895a5ec7e9b6bf0bfc52a6a2b45c2111c73f7c30496dfdc624778c9ce74aa116206c0b3adcc41b046d06d8301a55218679 |
| kubernetes-client-linux-arm64.tar.gz | ece12bddbae26f6d63e39482985a43429b768d82bc6c1b523724c134d98f52ae41c64f66d267d53400566bf0428021228c9cf9b0b663399ab27c08304bbe193f |
| kubernetes-client-linux-ppc64le.tar.gz | 4346923ea8eae6e51c07fa53a6a6f72d75ca6a50db5ae255c9902f4bd7af0a1cde359f9d6c2a84253c74e4d32f32ee81abe8b1dfaabb0206f871c57ba1eacb73 |
| kubernetes-client-linux-s390x.tar.gz | e7f93440b0497bab07db1f5bf70be61148abe555a8aa83712201128056a0e53c0273a7269ba92c65af0095bb9e69d3bfe85359720969bca1399d21e0b04b1264 |
| kubernetes-client-windows-386.tar.gz | 5a43893f34cac36608a7817c1116c43b71411ef75d71188886672941db7d8080efcb94e183b0beadc852b36b12986eb356bdde4c4a7729e284e214ba8cf43fea |
| kubernetes-client-windows-amd64.tar.gz | 52f3514824ab0a152eaf588722f56e6d12366ecf8479e1cd11f0e878ed7c9b0b5ec528cdb7dd0f03273eef704adeaa3cce3918e89bd7a4c15480130aa5c6b5f3 |
| kubernetes-client-windows-arm64.tar.gz | 5f31dfc54626f31feff6373a7282cf624779a79b2178f0d7ff4e977652c5f8bc2b2c64de1b6db22eda9c563a4980b3b72b134ff2a1743a5b196ab3eeb6f5e452 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | b13750ef0157384cf353ef6a4471fd17706c3bf3bd7bed2c84efc57f8863f3c7306a09813d8788fcd97d0e7e0929f4c136e2ac047c30fef2c45d4fb3d0bbe8ff |
| kubernetes-server-linux-arm64.tar.gz | 84d004c4df9c46a280abfca2af02d5601d07fa8e1355b4ebfc2dcc069829804650a1097f97254c4f4ad0423b7f4828c76dfd2a56348aa1339f5518bbb9257c8e |
| kubernetes-server-linux-ppc64le.tar.gz | f1cb4b333fc9bc696a3a75b4b0a846fe9f207c79fcfac438f2d3e3a709d23039c3f1507ea6e03dff2b5a4ef737052c613d354efe3b034384544ebf99551be7ea |
| kubernetes-server-linux-s390x.tar.gz | ded6953d4d2b04f589a24f5e6e21aa3630d9a12f5562d8c8e6301660b1fa04782523500d74bb5399a8cb0d6102546bd1000591c3dd8464d98a3d3399576a20e7 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | e4e4e2ac9acb4d36aded75ee4e841947b8eec2e66b08d11b01b662c5372be51cd746b9a87248a03be45c49de9aa53a31904b38a3e1253f0aaecc5e5b774cb4d7 |
| kubernetes-node-linux-arm64.tar.gz | 40318c61e6b060c18d2cd80143d83bab9178275f099e65b82161334eb9970ec9151b581654151799532564c92c4a3730abeb00a9e88ddcfddd66ed69d09c9921 |
| kubernetes-node-linux-ppc64le.tar.gz | 778ca04559776b3e03537e13ff9f2136ae7fdb71c2a130e9734761cb2ad278f1af9e7285a132f2f77f49566f0c302ef8ca7f3694f84e48c93f5585236718cd8e |
| kubernetes-node-linux-s390x.tar.gz | b6b0865359b6c767b233374918263d05cfd8fb52130b67ca7db2dcc01df119efbff89041a6310dbed77c96aa8faeb5a50bd1c184ccd9e5441eb09c1cb6df8e03 |
| kubernetes-node-windows-amd64.tar.gz | 9374a3ec4ea2d417a63fef4809e982b9cc62f98ef67cd0bcabb7b673f1efaa82c66724bf605e658d0905cf9ee61f61f1ab00a077a330ee1e4197c06c582d9a37 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
runtime.ApplyConfiguration interface that is implemented by all generated applyconfigs (#132194, @alvaroaleman) [SIG API Machinery and Instrumentation]k8s-short-name and k8s-long-name. (#132504, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage]JobPodReplacementPolicy feature gate is now locked to true, and will be removed in a future release of Kubernetes. (#132173, @dejanzele) [SIG Apps and Testing]nodeStatusReportFrequency, helps spread the traffic and load (due to node status updates) more evenly over time. The initial status update can be up to 50% earlier or 50% later than the regular schedule. (#130919, @mengqiy) [SIG Node]--etcd-servers-overrides now surface health checks named etcd-override-<index> and etcd-override-readiness-<index>. These checks are still excluded by ?exclude=etcd and ?exclude=etcd-readiness directives. (#129438, @pacoxu) [SIG API Machinery and Testing]--register-schedulable command line argument from the kubelet. (#122384, @carlory) [SIG Cloud Provider, Node and Scalability]kubernetes.io/initial-events-list-blueprint annotation from the synthetic "Bookmark" event for the watch stream requests. (#132326, @p0lyn0mial) [SIG API Machinery]Nothing has changed.
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 4125206915e9f0cd7bffd77021f210901bade4747d84855c8210922c82e2085628a05b81cef137e347b16a05828f99ac2a27a8f8f19a14397011031454736ea0 |
| kubernetes-src.tar.gz | c1dfe0a1df556adcad5881a7960da5348feacc23894188b94eb75be0b156912ab8680b94e2579a96d9d71bff74b1c813b8592de6926fba8e5a030a88d8b4b208 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 22c4d1031297ea1833b3cd3e6805008c34b66f932ead3818db3eb2663a71510a8cdb53a05852991d54e354800ee97a2aad4afc31726d956f38c674929ce10778 |
| kubernetes-client-darwin-arm64.tar.gz | 6be320d2075d8a7835751c019556059ff2fca704d0bbeeff181248492d8ed6fcc2d6d6b68c509e4453431100b06a20268e61b9e434b638a78ebfad68e7c41276 |
| kubernetes-client-linux-386.tar.gz | e63ac6b7127591068626a3d7caf0e1bae6390106f6c93efae34b18e38af257f1521635eb2adf76c40ad0f0d9a5397947bbb0215087d4d2e87ce6f253b6aec1a4 |
| kubernetes-client-linux-amd64.tar.gz | 12dc8dc4997b71038c377bfd9869610110cebb20afcb051e85c86832f75bc8e7eabbb08b5caa00423c5f8df68210ad5ca140a61d4a8e9ad8640f648250205752 |
| kubernetes-client-linux-arm.tar.gz | 0a7f8df6abfe9971f778add6771135d7079c245b18dd941eacf1230f75f461e7d8302142584aa4d60062c8cfd4e021f21ae5aa428d82b5fbe3697bda0e5854ff |
| kubernetes-client-linux-arm64.tar.gz | b1442640ac1e45268e9916d0c51e711b7640fd2594ecad05a0d990c19db2e0dcde53cc90fb13588a2b926e25c831f62bf5461fa9c8e6a03a83573cc1c3791903 |
| kubernetes-client-linux-ppc64le.tar.gz | e5a028da7fcb24aee85d010741c864fa4e5a3d6c87223b5c397686107a53dd2801a8c75cf9e1046ab28c97b06a5457aa6b3e4f809cd46cbe4858f78b2cb6a4df |
| kubernetes-client-linux-s390x.tar.gz | 4d3fce13d8f29e801c4d7355f83ded4d2e4abcc0b788f09d616ef7f89bd04e9d92d0b32e6e365118e618b32020d8b43e4cbd59a82262cc787b98f42e7df4ddbc |
| kubernetes-client-windows-386.tar.gz | 3bbe15f8856cab69c727b02766024e1bb430add8ad18216929a96d7731d255c5d5bb6b678a4d4e7a021f2e976633b69c0516c2260dcc0bee7d2447f64bd52fe8 |
| kubernetes-client-windows-amd64.tar.gz | 1833d8b09d5524df91120115667f897df47ad66edb57d2570e022234794c4d0d09212fca9b0b64e21ccc8ce6dcd41080bf9198c81583949cb8001c749f25e8a0 |
| kubernetes-client-windows-arm64.tar.gz | c0819674e11923b38d2df7cb9955929247a5b0752c93fc5215300da3514c592348cbe649a5c6fd6ac63500c6d68cf61a2733c099788164547e3f7738afe78ecf |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | acd0b0b6723789780fd536894a965001056e94e92e2070edacdb53d2d879f56a90cc2c1ad0ff6d634ed74ef4debcefa01eee9f675cc4c70063da6cc52cc140d3 |
| kubernetes-server-linux-arm64.tar.gz | 31321659424b4847ec456ae507486efe57c8e903c2bc450df65ffc3bc90011ba050e8351ab32133943dfebd9d6e8ad47f2546a7cdc47e424cdaf0dc7247e08c3 |
| kubernetes-server-linux-ppc64le.tar.gz | fe81aa313be46ed5cc91507e58bc165e98722921d33473c29d382dceb948b1ffc0437d74825277a7da487f9390dec64f6a70617b05e0441c106fa87af737b90c |
| kubernetes-server-linux-s390x.tar.gz | 69a54f40e7a8684a6a1606f0463266d83af615f70a55d750031d82601c8070f4f9161048018c78e0859faa631ec9984fc20af3bc17240c8fc9394c6cbffacaf9 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 797a5df349e571330e8090bd78f024d659d0d46e8a7352210b80ac594ef50dc2f3866240b75f7c0d2e08fa526388d0dfdcb91b4686f01b547c860a2d0a9846a7 |
| kubernetes-node-linux-arm64.tar.gz | 552a114facbd42c655574953186ba15a91c061b3db9ad25e665892c355347bf841e1bf716f8e28a16f1f1b37492911103212ec452bf5e663f8fcf26fae3ccc6a |
| kubernetes-node-linux-ppc64le.tar.gz | 7f08bad1921127fdceba7deb58d305e0b599de7ab588da936ff753ab4c6410b5db0634d71094e97ee1baeaccc491370c88268f6a540eedb556c90fb1ce350eda |
| kubernetes-node-linux-s390x.tar.gz | 4d1ac168b4591bf5ed7773d87eb47e64eb322adb6fd22b89f4f79c9849aee70188f0fa04a18775feff6f9baf95277499c56cd471a56240a87f9810c82434ba35 |
| kubernetes-node-windows-amd64.tar.gz | 896e508aa1c0bb3249c01554aea0ea25d65c4d9740772f8c053ded411b89a34a1c1e954e62fad10a1366cb0a9534af9b3d4e0a46acd956b47eb801e900dfcbe6 |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
apiserver_cache_list_fetched_objects_total, apiserver_cache_list_returned_objects_total, apiserver_cache_list_total replace resource_prefix label with API group and resource labels.
For metrics etcd_request_duration_seconds, etcd_requests_total and etcd_request_errors_total replace type label with API resource and group label.
For metric apiserver_selfrequest_total add a API group label.
For metrics apiserver_watch_events_sizes and apiserver_watch_events_total replace API kind label with resource label.
For metrics apiserver_request_body_size_bytes, apiserver_storage_events_received_total, apiserver_storage_list_evaluated_objects_total, apiserver_storage_list_fetched_objects_total, apiserver_storage_list_returned_objects_total, apiserver_storage_list_total, apiserver_watch_cache_events_dispatched_total, apiserver_watch_cache_events_received_total, apiserver_watch_cache_initializations_total, apiserver_watch_cache_resource_version, watch_cache_capacity, apiserver_init_events_total, apiserver_terminated_watchers_total, watch_cache_capacity_increase_total, watch_cache_capacity_decrease_total, apiserver_watch_cache_read_wait_seconds, apiserver_watch_cache_consistent_read_total, apiserver_storage_consistency_checks_total, etcd_bookmark_counts, storage_decode_errors_total extract the API group from resource label and put it in new group label. (#131845, @serathius) [SIG API Machinery, Etcd, Instrumentation and Testing]--cloud-config from the command line. (#130161, @carlory) [SIG Cloud Provider, Node and Scalability]DRA API: resource.k8s.io/v1alpha3 now only contains DeviceTaintRule. All other types got removed because they became obsolete when introducing the v1beta1 API in 1.32. before updating a cluster where resourceclaims, resourceclaimtemplates, deviceclasses, or resourceslices might have been stored using Kubernetes < 1.32, delete all of those resources before updating and recreate them as needed while running Kubernetes >= 1.32. (#132000, @pohly) [SIG Etcd, Node, Scheduling and Testing]
Extends the nodeports scheduling plugin to consider hostPorts used by restartable init containers. (#132040, @avrittrohwer) [SIG Scheduling and Testing]
Kube-apiserver: Caching of authorization webhook decisions for authorized and unauthorized requests can now be disabled in the --authorization-config file by setting the new fields cacheAuthorizedRequests or cacheUnauthorizedRequests to false explicitly. See https://kubernetes.io/docs/reference/access-authn-authz/authorization/#using-configuration-file-for-authorization for more details. (#129237, @rfranzke) [SIG API Machinery and Auth]
Kube-apiserver: Promoted the StructuredAuthenticationConfiguration feature gate to GA. (#131916, @aramase) [SIG API Machinery, Auth and Testing]
Kube-apiserver: the AuthenticationConfiguration type accepted in --authentication-config files has been promoted to apiserver.config.k8s.io/v1. (#131752, @aramase) [SIG API Machinery, Auth and Testing]
Kube-log-runner: rotating log output into a new file when reaching a certain file size can be requested via the new -log-file-size parameter. -log-file-age enables automatical removal of old output files. Periodic flushing can be requested through -flush-interval. (#127667, @zylxjtu) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows]
Kubectl: graduated kuberc support to beta. A kuberc configuration file provides a mechanism for customizing kubectl behavior (separate from kubeconfig, which configured cluster access across different clients). (#131818, @soltysh) [SIG CLI and Testing]
Promote the RelaxedEnvironmentVariableValidation feature gate to GA and lock it in the default enabled state. (#132054, @HirazawaUi) [SIG Apps, Architecture, Node and Testing]
Remove inaccurate statement about requiring ports from pod spec hostNetwork field (#130994, @BenTheElder) [SIG Network and Node]
TBD (#131318, @aojea) [SIG API Machinery, Apps, Architecture, Auth, Etcd, Network and Testing]
The validation of replicas field in the ReplicationController /scale subresource has been migrated to declarative validation.
If the DeclarativeValidation feature gate is enabled, mismatches with existing validation are reported via metrics.
If the DeclarativeValidationTakeover feature gate is enabled, declarative validation is the primary source of errors for migrated fields. (#131664, @jpbetz) [SIG API Machinery and Apps]
The validation-gen code generator generates validation code that supports validation ratcheting. (#132236, @yongruilin) [SIG API Machinery, Apps, Auth and Node]
Update etcd version to v3.6.0 (#131501, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing]
When the IsDNS1123SubdomainWithUnderscore function returns an error, it will return the correct regex information dns1123SubdomainFmtWithUnderscore. (#132034, @ChosenFoam) [SIG Network]
Zero-value metadata.creationTimestamp values are now omitted and no longer serialize an explicit null in JSON, YAML, and CBOR output (#130989, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Scheduling, Storage and Testing]
Add a flag to kubectl version that detects whether a client/server version mismatch is outside the officially supported range. (#127365, @omerap12) [SIG CLI]
Add support for CEL expressions with escaped names in structured authentication config. Using [ for accessing claims or user data is preferred when names contain characters that would need to be escaped. CEL optionals via ? can be used in places where has cannot be used, i.e. claims[?"kubernetes.io"] or user.extra[?"domain.io/foo"]. (#131574, @enj) [SIG API Machinery and Auth]
Added Traffic Distribution field to kubectl describe service output (#131491, @tchap) [SIG CLI]
Added a --show-swap option to kubectl top subcommands (#129458, @iholder101) [SIG CLI]
Added alpha metrics for compatibility versioning (#131842, @michaelasp) [SIG API Machinery, Architecture, Instrumentation and Scheduling]
Enabling completion for aliases defined in kuberc (#131586, @ardaguclu) [SIG CLI]
Graduate ResilientWatchCacheInitialization to GA (#131979, @serathius) [SIG API Machinery]
Graduate configurable endpoints for anonymous authentication using the authentication configuration file to stable. (#131654, @vinayakankugoyal) [SIG API Machinery and Testing]
Graduated relaxed DNS search string validation to GA. For the Pod API, .spec.dnsConfig.searches
now allows an underscore (_) where a dash (-) would be allowed, and it allows search strings be a single dot .. (#132036, @adrianmoisey) [SIG Network and Testing]
Graduated scheduler QueueingHint support to GA (general availability) (#131973, @sanposhiho) [SIG Scheduling and Testing]
Kube-apiserver: Promoted ExternalServiceAccountTokenSigner feature to beta, which enables external signing of service account tokens and fetching of public verifying keys, by enabling the beta ExternalServiceAccountTokenSigner feature gate and specifying --service-account-signing-endpoint. The flag value can either be the location of a Unix domain socket on a filesystem, or be prefixed with an @ symbol and name a Unix domain socket in the abstract socket namespace. (#131300, @HarshalNeelkamal) [SIG API Machinery, Auth and Testing]
Kube-controller-manager events to support contextual logging. (#128351, @mengjiao-liu) [SIG API Machinery]
Kube-proxy: Check if IPv6 is available on Linux before using it (#131265, @rikatz) [SIG Network]
Kubeadm: add support for ECDSA-P384 as an encryption algorithm type in v1beta4. (#131677, @lalitc375) [SIG Cluster Lifecycle]
Kubeadm: fixed issue where etcd member promotion fails with an error saying the member was already promoted (#130782, @BernardMC) [SIG Cluster Lifecycle]
Kubeadm: graduated the NodeLocalCRISocket feature gate to beta and enabed it by default. When its enabled, kubeadm will:
/var/lib/kubelet/instance-config.yaml file to customize the containerRuntimeEndpoint field in per-node kubelet configurations.kubeadm.alpha.kubernetes.io/cri-socket annotation from nodes during upgrade operations.--container-runtime-endpoint flag from the /var/lib/kubelet/kubeadm-flags.env file during upgrades. (#131981, @HirazawaUi) [SIG Cluster Lifecycle]Kubeadm: switched the validation check for Linux kernel version to throw warnings instead of errors. (#131919, @neolit123) [SIG Cluster Lifecycle and Node]
Kubelet: the --image-credential-provider-config flag previously only accepted an individual file, but can now specify a directory path as well; when a directory is specified, all .json/.yaml/.yml files in the directory are loaded and merged in lexicographical order. (#131658, @dims) [SIG Auth and Node]
Kubernetes api-server now merges selectors built from matchLabelKeys into the labelSelector of topologySpreadConstraints, aligning Pod Topology Spread with the approach used by Inter-Pod Affinity.
To avoid breaking existing pods that use matchLabelKeys, the current scheduler behavior will be preserved until it is removed in v1.34. Therefore, do not upgrade your scheduler directly from v1.32 to v1.34. Instead, upgrade step-by-step (from v1.32 to v1.33, then to v1.34), ensuring that any pods created at v1.32 with matchLabelKeys are either removed or already scheduled by the time you reach v1.34.
If you maintain controllers that previously relied on matchLabelKeys (for instance, to simulate scheduling), you likely no longer need to handle matchLabelKeys directly. Instead, you can just rely on the labelSelector field going forward.
Additionally, a new feature gate MatchLabelKeysInPodTopologySpreadSelectorMerge, which is enabled by default, has been
added to control this behavior. (#129874, @mochizuki875) [SIG Apps, Node, Scheduling and Testing]
Kubernetes is now built using Go 1.24.3 (#131934, @cpanato) [SIG Release and Testing]
Kubernetes is now built using Go 1.24.4 (#132222, @cpanato) [SIG Release and Testing]
LeaseLocks can now have custom Labels that different holders will overwrite when they become the holder of the underlying lease. (#131632, @DerekFrank) [SIG API Machinery]
Non-scheduling related errors (e.g., network errors) don't lengthen the Pod scheduling backoff time. (#128748, @sanposhiho) [SIG Scheduling and Testing]
Promote feature OrderedNamespaceDeletion to GA. (#131514, @cici37) [SIG API Machinery and Testing]
Removed "endpoint-controller" and "workload-leader-election" FlowSchemas from the default APF configuration.
migrate the lock type used in the leader election in your workloads from configmapsleases/endpointsleases to leases. (#131215, @tosi3k) [SIG API Machinery, Apps, Network, Scalability and Scheduling]
The PreferSameTrafficDistribution feature gate is now enabled by default,
enabling the PreferSameNode traffic distribution value for Services. (#132127, @danwinship) [SIG Apps and Network]
Updated the built in system:monitoring role with permission to access kubelet metrics endpoints. (#132178, @gavinkflam) [SIG Auth]
adminAccess will no longer be allocated the same device multiple times. (#131299, @nojnhuh) [SIG Node]== evaluates to false for identical objects when a field is present but the value is null. This bug does not impact the Kubernetes API. (#131559, @jpbetz) [SIG API Machinery]JoinConfigurationKind in the error message when no ResetConfiguration is found during kubeadm reset with the --config flag. (#132258, @J3m3) [SIG Cluster Lifecycle]insufficientResources was logged as a pointer during pod preemption, making logs more readable. (#132183, @chrisy-x) [SIG Node]spec.jobTemplate.spec.podFailurePolicy.rules[*].onPodConditions[*].status fields as documented, avoiding validation failures during write requests. (#131525, @carlory) [SIG Apps]node.kubernetes.io/unreachable:NoExecute when a Node becomes unreachable (#120816, @tnqn) [SIG Apps and Node]kubectl create|delete|get|replace --raw commands now honor server root paths specified in the kubeconfig file. (#131165, @liggitt) [SIG API Machinery]kubectl attach, notifying / reminding users that commands and output are available via the log subresource of that Pod. (#127183, @mochizuki875) [SIG Auth, CLI, Node and Security]webhook_fail_open_count (#131627, @dims) [SIG API Machinery]driverName like the rest of the Kubernetes components, instead of pluginName. (#132096, @pohly) [SIG Node and Testing]apiserver_encryption_config_controller_automatic_reload_success_total and apiserver_encryption_config_controller_automatic_reload_failure_total metrics in favor of apiserver_encryption_config_controller_automatic_reloads_total. (#132238, @aramase) [SIG API Machinery, Auth and Testing]apiserver_authentication_config_controller_automatic_reloads_total and apiserver_authentication_config_controller_automatic_reload_last_timestamp_seconds metrics to BETA. (#131798, @aramase) [SIG API Machinery, Auth and Instrumentation]apiserver_authorization_config_controller_automatic_reloads_total and apiserver_authorization_config_controller_automatic_reload_last_timestamp_seconds metrics to BETA. (#131768, @aramase) [SIG API Machinery, Auth and Instrumentation]SeparateTaintEvictionController feature gate to GA; it is now enabled unconditionally. (#122634, @carlory) [SIG API Machinery, Apps, Node and Testing]PodDisruptionConditions. (#129501, @carlory) [SIG Apps]List() method of the dynamic client. (#132229, @p0lyn0mial) [SIG API Machinery, CLI and Testing]List() method of the metadata client. (#132149, @p0lyn0mial) [SIG API Machinery and Testing]List() method of the typed client. (#132257, @p0lyn0mial) [SIG API Machinery and Testing]