Skip to content

Latest commit

 

History

History
3134 lines (2323 loc) · 342 KB

CHANGELOG-1.10.md

File metadata and controls

3134 lines (2323 loc) · 342 KB

v1.10.13

Documentation

Downloads for v1.10.13

filename sha512 hash
kubernetes.tar.gz 8add1e0bb21e5d3be1a91301d522782c3b867d55a48ce865331db23d35cca0ad4289279332dbf74a4c45ccc4ea9dc160cef98e44b7b6bcd072196f099059b913
kubernetes-src.tar.gz 65b37053be2b323e21ddec4d2d7abb1614f20fd467d1d420fb880b6e61734eadbe8aaf55f30e5ae5b02e03de746924a64a85459352190848be102f62a768cb21

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz 05be88ada7db616a3ccdc50d47136ab1a9213879b65c81db81bbd06c7c97db6dbeb3d05ed1b6fc06d7e399f26428718792b133706b7b274ac7f6981193403647
kubernetes-client-darwin-amd64.tar.gz 351769fa9caf9d285d47fb21bd25f8876b00d0d079d14e407b342467e824c61e936049a6adb6f42a7323129f37e8218448a790daa9835db540f0016d71e81139
kubernetes-client-linux-386.tar.gz c7668ec89f32ad524dcaa6f87e9c6646a0d97165daa436a8915e72b2b7f3f6f55231041e44c91e22adbb62e9b7bd9e60360611c5ccd801c3b74fe4e98238995b
kubernetes-client-linux-amd64.tar.gz 2355ab1e140ea9a117fd5ea04bbf3795e14880bafc8c177c9797d40244c523d5b8ef6f2c72be252e7e0439eb659258ef9ace3bab9a72213e494ee0bef9c2e0c0
kubernetes-client-linux-arm.tar.gz 3aa45783210b465af7a8217ff167ef5a6d2e0318231b451a3eafe9f09799c8f10531dcbc352cef04fdaa7a024205f635ccf3a61b2eb7c1d2d303f002b61250ae
kubernetes-client-linux-arm64.tar.gz e02b43419b8b6d19c18bc03c751df1a29489d8cd0e247c6ac430f83a5f1227671cbf56407cf266fb113dddb3e9353f18f8ce9bcfe83f52a45af3b667898d6ef5
kubernetes-client-linux-ppc64le.tar.gz 339fccf4a82898d087d5c48e0c13a4652e8f37b6a5423e7aad4262bbda137d5e5ebd7de96b30bd2c9ef4d0f84d610359a48b4b67591576e298355185d63d0d46
kubernetes-client-linux-s390x.tar.gz b7dd449defcd1b47db78472c8740f99ad96bb921d64db37b57cb9392a055afba4380a012186b28a52518377f96048d47799370497a829f1b474aea0cbac9971f
kubernetes-client-windows-386.tar.gz 64657c29c4b90029c9a0739e67566c1a0e781e7ad3a133833f2a7cd4d88a7f16db4c0ed28a5473aecd96dfa4cf8d2cd2fe6f7d72633a2538739497196d704521
kubernetes-client-windows-amd64.tar.gz 71bfcea7ff941320b225b5b896c8e2dd6fe1165b05b95d512cefa31950e972b5db95788c2bb031097d5d17408e537af60c0b5b3edca707c472fad80f04fc35d4

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 6ece286535569786579233809fee92307a103c30947e1350fa009fab29b9f45e82c065f6d3576025ea1499c9a58ee97d2386f540aee3e789aa0b2aaf2b388aca
kubernetes-server-linux-arm.tar.gz 35aaaffdf478b6044146d620bd867b1d09e290537ec4200ab29b06fddb3425a339ebadaa5463cd10f0797df00d696a2bfab1a48db9b4a682b1b5d7ba2b7f3fb1
kubernetes-server-linux-arm64.tar.gz dfd7edc27cef7b2750790f3d6b71c4a2beb8b3e4716a3f8a2033708cfed93bb351f60b1af424520e5ce89b159f797a56094a327ce62c08dd2a72fbac69a06b9e
kubernetes-server-linux-ppc64le.tar.gz 7f877383ea353510b6e27d6485bac09b71aacae028dc2e9ddf1bbdaca129283aac2cbdb9c0c3bd3542513d268c37eb5efdec2a0711e613337631df3ed4e21992
kubernetes-server-linux-s390x.tar.gz c2e5eb5bf18a127c25ac6a9f182bc8bc36b5d3962f996ce24ebb85dd25704a7da34f1c7eeed1710757b1cbb788a5b20c2e72caefba3d76b9580ac05a39469843

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 28bed15d3e9b3bfb1d70c6dcd5c0c0f7b6f1c096c796d778f548856f4a446437377d5a4b5b939dc577ebfe8c3e6dbf2d594da77c9fdb8b514fc75c9e0a7b7471
kubernetes-node-linux-arm.tar.gz 48b04f7bbe3604429270ad2a1516b3898748153d184213cbb1e7f05571f3cfb4d4588ec2f5fb6f03ac5a666022d7df27e6c60236852fb38bd3240565a96e76c0
kubernetes-node-linux-arm64.tar.gz 506299ddf40d53ecf3fe377db6ef9ab8459f47210490108c1af2d5135c53279b8de3dcc0a16bb6014bdd1aae8aaf52cefc123b317b97eaba23d2c5fcaf0c7bd2
kubernetes-node-linux-ppc64le.tar.gz 1887d3f85448c35cc1debe4dadde3ccbca6b5c384726c047dff948e17b3df854e78626b4b8c2c2fb4174899e39cbc2b8cd799459d92e4c29f7962150060e9ed5
kubernetes-node-linux-s390x.tar.gz 6c2323040b763dbd4b42fd1f1f6154f061f26909fb26b0c663668d9df4673dcaf35be28a35738b97fc00dfa195eefe28982a8bab4aae1bb95d5a21df7a59e33e
kubernetes-node-windows-amd64.tar.gz 002a3d1aab5b928943c6a4378f0af5a3c0844c6fa65a21c1bc0e66ef198bc47a04659fedc00c32d973747d15e92f7dd90c8fca042b0a0ed591baffc51727a703

Changelog since v1.10.12

Other notable changes

v1.10.12

Documentation

Downloads for v1.10.12

filename sha512 hash
kubernetes.tar.gz be4d23a65d8aacd28355941f82a3b3668b4763ea37dc5caca9b556c5e8922133e91c13b48e14b4c337af61ae7d7d20c662b7a8439efff2626328beb569d1ad94
kubernetes-src.tar.gz 048ae3196924cb4fc78c9fbf9b816df6e65ded80f651a7fcb3cbabb531dd55adab30db579a0ed5f9b161066611658da68bf7963d7f0e78fbff9525e504911abe

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz 7b9d52fdd81efad548c0860f273a9a4b05dee7e8d8a7508f859e72af299bd5e8d29d7f449689c97f9673a86ecb3968fccede6e24672b45d645ed7355f80a9127
kubernetes-client-darwin-amd64.tar.gz e1cc1bd0f9c00899cd1ded8b87e3ca49ac698459c7c4c55d370f31ad675a8d9d44380d004111ccd39c164ac954c9fb63b476a2d476dec3425fe3b3f64273684b
kubernetes-client-linux-386.tar.gz 8ddf167501e2bbd9fa6923abb4027d866d7ea9a5b743c4f42c520c86ba5f9f3e9bf84c5ebf7e694aa1cfcd6a23c65fa39c00f4c53ffd268f1ab0f353a23d6cc5
kubernetes-client-linux-amd64.tar.gz 1772c0d5328113884916e5564ed010612599d8e22eea9bea01175ddf17e1e292220cd3915b0dba746b42eaa1bd2a051c235dc2de12579b35270a2868cfe25a4c
kubernetes-client-linux-arm.tar.gz 3710487740cf8bef6aa26e8dcee9e1b0346e32ca5d389de8edc0a1925764dbacadf186779752b7b511a5290b59aaa4da70f9289aa6a7756160d7878ddd3a80aa
kubernetes-client-linux-arm64.tar.gz b12fc191da4753873ce08f4e3182b03d8af418434da9eea9346382ce2c3907f5d0cf1c2f3c7bba279713142acbb6bbaffbf38451ea86be1e1eda35e08cc21ef5
kubernetes-client-linux-ppc64le.tar.gz 22c1e26c4f2acb749ea2e6735767b494e8d5deb1d39afcf3c3f52550a524c23464ae7d54b8ecececfa808e97201f4fcec8051165cb87490be2f379535b20c3f1
kubernetes-client-linux-s390x.tar.gz d4039f0d3df66c57b840c82c17cfe221a0d9db39ebdc3194f58b92542dd483b0861538b977c389f7cb07faa4a910ceb48775793633a90d53f91677159361a023
kubernetes-client-windows-386.tar.gz 950b45edc202acd61ec21642abeb5f17f95e54708cdb3564dcc7dc19a40184373c3e9b8d032b285b860d5748ec3e151ab766bfee3bab7e406187eab88471d159
kubernetes-client-windows-amd64.tar.gz 20fa2a817fa17ffd0f79fe5549f5ad0baf60536ed9c00cdb16ae0afb7950b21f6152aead5bd92fc89bceeeeee54954f9e0d12dec516408703f957488c7c0a5c9

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz b802cd244d6c727938dca27c24f6b83e7edce23cfeb5ec8cd91c0d5a28ef23d6fc7222617d574fe3ea1429b2618c0ffce8b42bc3fe4867e8f54a4f6a395e5887
kubernetes-server-linux-arm.tar.gz a39bc970133cd519f9dc99377fc83ef3472246ba334ea3e6060c001748c6fffd6fb27bff94b9bc18b6e1ea7d0da1c3160eb4b1f8fb58a3eed9bcce4aa464092b
kubernetes-server-linux-arm64.tar.gz e9ecb2eac0c887b6659cbf35c0753b8783ca9316ad7c4517f55f2bdc2dde1a5d49d54e34312c025c4492cda2ef40f229be37772477e82098fc7dedbe0c53dcd2
kubernetes-server-linux-ppc64le.tar.gz 6a06b7ceb02e6ce1cf0f8f5bb326fb88441b022f2e87a44125e971365b8cd0dcfa4b1fd5dcfcbeb659950c32f460e26d4600e693cdee54da640beee11e05ed27
kubernetes-server-linux-s390x.tar.gz 46902169b2fa7be5db76384b851dcd15f20581e7cdc7a69102a8d654269626e19953cb2728014c3c03bdfc4a0ae78afca182dfb4b280177d135ed1fac34b8c1c

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 066a9268fc2539176232dbf643d2fce09ff8d9d7968c28181d7215455f5019e9abdfc7e2668ab0bb582e249016bfb59add635c2645746f603b6cd0204d6e427f
kubernetes-node-linux-arm.tar.gz 26cede0b12af44a1b43eb0d529ba9e2ae483fb3729a6c70b6bf34110be33260169871005616f736ecb2b87faeb1d10e7e472d7f8baef2a6f36b773d0c005357a
kubernetes-node-linux-arm64.tar.gz b98d6fe3bce97f59271eda3ff1dd2674c345f0db3cd5a196922edf67ffcbe4f4428ceb951c69309c20c0641267d2ace39ee697d5cd2fe6891f6ad18e51423179
kubernetes-node-linux-ppc64le.tar.gz 9e7113cf792fa8cfe0bd07ae0c9ec25bb51f9b92bf2ed2724910c0cf935200dd6c5cce03243a2e1788588d550851bf71af796746f38c13176b7311c5b7b9abae
kubernetes-node-linux-s390x.tar.gz f083646dc9cc8518b3ccdf0dc5a6dce1cc583236ab31cf9e79a803c7b3c0028ea1daaf4175a95ba0012c407f6d39ea9eab478c9e71a12308021fbfaf2eab933a
kubernetes-node-windows-amd64.tar.gz 0b01cb827874b641dc51a91c033d6c53d13dac8926e5065d783689c313b2af50176cdb82cc1e65c3660a54f07e104390d02f6b47ecbe49d7e6f1b20ae90bb4d8

Changelog since v1.10.11

Other notable changes

  • Updates defaultbackend to 1.5 (#69381, @bowei)
  • Immediately close the other side of the connection when proxying. (#67288, @MHBauer)
  • Disable proxy to loopback and linklocal (#71980, @micahhausler)
  • Do not detach volume if mount in progress (#71145, @gnufied)
  • Only use the first IP address got from instance metadata. This is because Azure CNI would set up a list of IP addresses in instance metadata, while only the first one is the Node's IP. (#71736, @feiskyer)
  • fix detach azure disk issue due to dirty cache (#71495, @andyzhangx)
  • Fixes issue where an apiserver on 1.9 and controller-manager on 1.10 can cause volume provisioning and binding to fail. (#71286, @msau42)
  • On GCI, NPD starts to monitor kubelet, docker, containerd crashlooping, read-only filesystem and corrupt docker overlay2 issues. (#71522, @wangzhen127)
  • Allows changing nodeName in endpoint update. (#68575, @prameshj)
  • Upgrade Stackdriver Logging Agent addon image to 0.6-1.6.0-1 to use Fluentd v1.2. This provides nanoseconds timestamp granularity for logs. (#70954, @qingling128)
  • apiserver: fixes handling and logging of panics in REST handlers to prevent crashes (#71076, @liggitt)
  • Fixes ability for admin/edit/view users to see controller revisions, needed for kubectl rollout commands (#70699, @liggitt)
  • fix azure disk attach/detach failed forever issue (#71377, @andyzhangx)
  • Fixes an issue with stuck connections handling error responses (#71419, @liggitt)
  • Add tolerations for Stackdriver Logging and Metadata Agents. (#69737, @qingling128)

v1.10.11

Documentation

Downloads for v1.10.11

filename sha512 hash
kubernetes.tar.gz 92ba95aea1e28ad0edd4504e6bd3ccd22201e55c4496076d4d864ab15340850041d8c5ee1ff14525b3239fd05a295c6ac3752fa73a7f091e01eea241b5eec8b4
kubernetes-src.tar.gz 4b929d645c04977b5b5cc6d292203aafca562fde585c71bc71fe09d4b0fe42192d9bbeb943130770bbf841c1079d3d952269f576950dd71c6d0e87f6451cb445

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz 513f6b2c858b926b45cd78d83ec03d179094ea9723165a84456a732c3085a52c2066b2f2750b098227b510b9a7036e19e23c73b751d30d0172a32fae09ea162e
kubernetes-client-darwin-amd64.tar.gz c49ad1cc56060d776405bca866183fc67ac1018b89cdc779168b9c41af6d30a999d89e144306685a2f9f1a4daf728af85bc2218bd1e5fbe497daded32c0b3f6b
kubernetes-client-linux-386.tar.gz b9f5a240fe84e2c418e97d0548b7e72c3f6ad8320e717f85fcd12caed8c1d545e87f049255ddaa566c25368dc8b4ac80728e7c0e904a70e7dd8e71d728cc3d73
kubernetes-client-linux-amd64.tar.gz 75eb71c9d1bd3b697ac1fbdf247df52fcc8b5e03e8f6182a674623f5020122bf1883b0ed59d85a2434dfdb93e42439d640e456683c0d37948dcd011b84889303
kubernetes-client-linux-arm.tar.gz 5063acdac8d495a62ad64fa519045be346697510642e14f746b8da00b8b44ec1fd06b96fe97c095e754e6f652823bc44687d17cb80c5fd9cacdf243ad8640551
kubernetes-client-linux-arm64.tar.gz e2a3457ef39d7d820f17f95559d1ffbd36d5f041bb9da65892c5727dd67ff274bb5275a482dae069189662e01413d569442a0be7c76f65b7d2537747927566d8
kubernetes-client-linux-ppc64le.tar.gz df8b0f9610f50be81770b1a66142390a2d3630e24cc2bd9bb5bf88b4a4eeee636f2dec12655c47b1ec40c3670b2628ae11811bdf94a22605a90b2d4fb1b0d3d3
kubernetes-client-linux-s390x.tar.gz d70cde5b029ef2af48d114ca8af3345c3f31ee57f243b598a5d2461c990c466e254b84e52754052ae129a453c6ecb1dbf5bf118bf37f4179a2627b3132e1bcbe
kubernetes-client-windows-386.tar.gz 4a599bfb3079df2ac50f96d95f0f57275599b34310f96b229d418d51abe963c886c6662e2c9c43886ce2dc47889ff80fcb28e4bddaacf75e25c15c4a8f35f71e
kubernetes-client-windows-amd64.tar.gz 1feb680268aa249f1a2bd24ba2a5c837125dbec99e4fbe6b3a31169a032c6670b253f45a49f65490fe751c5fe8d0189444273afcaa753812ed722fd088c234c4

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 8b6fd92708fc3e296a50b0b11afed5005b285902f9c9cc2a48264d9ee4acd34d358e3885698d46f0c486da626091692b3e4eedbec360f8a432a0baf90f6069fd
kubernetes-server-linux-arm.tar.gz f78b0cc50b7a7df4cde89f5136b2588f7ae8852c538cf177f3efba2f8b229ee497cc65ff103d7386fcc86fcb7b873446311bc858c3b7a1d1e2e7895e4027044c
kubernetes-server-linux-arm64.tar.gz f4d318574a256132a067af0f087215aadd602f3833ea0f66e27e7bcb4e71a125a479b033b67eb7d708faa211240c85f700ec84ecd9e994d818dae97bf197bc82
kubernetes-server-linux-ppc64le.tar.gz 3207519994c9112eea02c0876a7a93afd723cc5979c195f05d1a87ed45f465195b729221055c9eef3237f3cce2569361437743ea2910a9f0edb34dcae3ebef2b
kubernetes-server-linux-s390x.tar.gz ce1b2061a07147025dd244d38c65375b8707c9f58ce9ef4c205f9c56bab77afce04fd525163c61c7eb144cf8348f3e334ebc13652b0494c54bfe984b96faec17

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 1609818d925e88c28ec01938c81785301ee79cc93a771cc22ecccbfbf45c5b7c7d47bc3c660f0343978e5269839a08cb3d56284916d5b4c5bf5d816aebf0f19b
kubernetes-node-linux-arm.tar.gz 1829fe50dd8cd02dff5fad304a01cff6abb48aa376a0c6c2ce61264fa48ccac334491a79492ef1786b9f0cd61573c5983f4ab7706b5f7c5ae87b6d4509616100
kubernetes-node-linux-arm64.tar.gz d7edc4b2a89cf0483780f35085b49b6ebabb30c38bbb2845e55b13b42decca7cc3ea79fe95f32b15931f3d38574c865f5d26f4edcfc0ec28c88b4f28953ee651
kubernetes-node-linux-ppc64le.tar.gz 92ac92c5a841e8c788df91c09ee6ed00d580283b8d287cd2d5ca238971506ef1fff22d2e43820f4fa7ff19475d4337000b7348827795386a23cf876b71d4efe5
kubernetes-node-linux-s390x.tar.gz 56c5fd8a3a721f81813c145f70e5580dd1757af3e0afcf6a9bb793a7442ab71996e640d3d00e81b54dd5a3b1b70456b2e3747b70070f5c5a4afd0b0ba1b51e1d
kubernetes-node-windows-amd64.tar.gz 9c7dc2aaab8258a86bc93ae7ec142131de77cf032e0dd548e3846897d9dd2905bbb45f5a279a4ccbdc406a2f2f53427ce1877ee65dc9eb72bc133488a7eec5d2

Changelog since v1.10.10

Other notable changes

  • CVE-2018-1002105: Fix critical security issue in kube-apiserver upgrade request proxy handler (#71411, @liggitt)

v1.10.10

Documentation

Downloads for v1.10.10

filename sha512 hash
kubernetes.tar.gz 605609b9b20b1c17f2accc251bb4e5dfb878fce351c7efadd8b6684323bdb8f87f31fbb27cf8a92c5d52c719f92f754ffe0fd065bbec43cb03ec91a6680ee327
kubernetes-src.tar.gz 0f01069a5198016b616c3e71fd280c5396fdc4c679d2f37fc2db3463f21a9d947a18f5ce69314e71c2d1ad63725807ab1639dad89362b6100ddfdf9cd57d06c5

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz ec93db4049f700d3f912ff3b3f463abb809938ac78510a48da58d13644c14a881c5d676d014cdf216d0d30ac8a107f0de6f0fdb48f337d35cf2bf5ab32d686e5
kubernetes-client-darwin-amd64.tar.gz 1a13d3c60a7c8f1556e8690cb90a418fa20cd2dda35dafaddc9f17330d2142f25b0c22fc629e92f828af4cf761d190647a49f5df474719c828d381243dbf00be
kubernetes-client-linux-386.tar.gz d291f6472f35e3dbd869865a35f16036f80e79ae5c21ba4c4e5dabc028279ea068924a916a95807fe2659b972c3618094d307e5a98246d83f304aa552aaaefb0
kubernetes-client-linux-amd64.tar.gz 101acba3a200fc33026c78adaffc7ca0f6e8dc8be860f06724a01129e6cc29286c6bd735c7166a938f10cb19aa1185f5bbbdcc8c97f6b5750c7417cbf4b36484
kubernetes-client-linux-arm.tar.gz 12cd6c4ada86dd9febf15e018e1215c6fc3900e51873f7efef4cf10e5770e1ea3bb2657d89a3a14c334149f3726e98ec7d6b56bef7558c8d53ab0a747b21847a
kubernetes-client-linux-arm64.tar.gz aefa008d4a71f78ea1d9152de754c61d3103b7aaceb7fe6cf47caa1e3cf2c1f0dc203f7253df8f167f37fd3209cf885903d11a2f34fbfd5118c2db7d3edf93bc
kubernetes-client-linux-ppc64le.tar.gz bedbed22c4265aae574240a01ec350cf9961a74977648df4102aa5fc3c827903114be97b057dac0b7a19e92d4cadba4322d8a918083deac63816250c520a9651
kubernetes-client-linux-s390x.tar.gz a7f9c70fb3be422f37dbe87ddc1b3237788121463d8bd1fec668f280488ee034009cdbd3011386a9a894a9a1313f34ce851afb495b62f425698e8e2423078216
kubernetes-client-windows-386.tar.gz 872ea8da0478fd80231066afcb7a79a1b1007b727cefa67561210f1d279798dec16c3e32e7a9cc515621faf56294741ecbcdd0044e570d9d28f1af377c10e20d
kubernetes-client-windows-amd64.tar.gz ab296181bb60294a08d5b849ea1bc73d800bdc32a14c5a9e31d152224bc51240cb82d1765387997d991cccab30137a798360d8ab787fde171aace69bc8db7f31

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz d27e0eecb362f0ff02ae96093749b8b2e44695cb8ed36fe00dc75095812396588a575a994314d78f79d26601ddbef69734944e202991e4b0a44e3ea768c515e3
kubernetes-server-linux-arm.tar.gz b0d91a4d6e0700d098ca7c93c8c99c23e23cec61b3d5229d62b42d0f0769be73948832e49c073616da2edc72054017e8081315ea562eaca0da1db32475594b3d
kubernetes-server-linux-arm64.tar.gz 7cbdfb5e19a499848b9df23a8e68fe827fe913a8b8596d88fb565303dee3a49b9850ab9bc07137f2453a6336e374aaee0cdda4fdd43cb8877308165f295ec976
kubernetes-server-linux-ppc64le.tar.gz 4e71ab08406ae4e27ddb105901d4f8544e6e61652734539a939ef112672a10a3f89a86cb7eecb0421d1db70123f5d994be2545f8714305ce74c073f83ef8d3fa
kubernetes-server-linux-s390x.tar.gz fb45be7bd8d2bba7d8105ea904377007cc697770fe0d1b81f0780ce56d442f20a26df87871594bc3692b59ca6f0f15bae58a473b1d31ebe3e9fbaadeb651408b

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 4f97b6f2282af262bf53995e39c2e8eeeda8492cdad34e3616c1aaa9b8bc8c04a6e0ac9ef79ba6290aa53d2ee3bfb65d6cd69b1c3fd1c31dd851bce4420bcfc0
kubernetes-node-linux-arm.tar.gz 27ba1d0c5b53a26d066ac80b59f997e748b022666f7374a471c4822a551aa6e5396634f0c77666004a0c8aa90d7e4bbb3f4badd4847545e32da49c535d32736d
kubernetes-node-linux-arm64.tar.gz b2f361621f24d3c6872f277f790e19be51a4466ca576725554f61ff60539740984d720c75d9266311fd0d2cf18c2eab8aa8454c41ba66deb8685844c263ce53e
kubernetes-node-linux-ppc64le.tar.gz 19e13f95b8372221d08eb26c694fa533f24889e052c1a3635df6630c2ca3f768bf34b59e6948b05c058c901794905448d648129070c14ec48a64262af1a059f2
kubernetes-node-linux-s390x.tar.gz 1631f0e2f2c9a7674ec73f2c27cd808f94ef48a782042bfaa7c007caac5fa4d5016863b8fca7c3c2dd92c606b0d079e6cb0038d874e9c1c521cdc73a723a346d
kubernetes-node-windows-amd64.tar.gz 7d0d709cf8cbfd076c921ea9cb19b185db1ac04e9915c92bd02be4fc79b3971997b1dcd2c75efeb985e0ff42e85e96c1ac09d9e4a82d03f95460e057d26c6a0f

Changelog since v1.10.9

Other notable changes

  • Do not remove shutdown nodes from api-server for vSphere. (#70291, @gnufied)
    • Fixes volume detach from shutdown nodes.
  • remove retry operation on attach/detach azure disk (#70568, @andyzhangx)
  • fix azure disk attachment error on Linux (#70002, @andyzhangx)
  • Ensure orphan public IPs on Azure deleted when service recreated with the same name. (#70463, @feiskyer)
  • Improve Azure instance metadata handling by adding caches. (#70353, @feiskyer)
  • Fix cloud-controller-manager crash when using OpenStack provider and PersistentVolume initializing controller (#70459, @mvladev)
  • GCE/GKE load balancer health check default interval changes from 2 seconds to 8 seconds, unhealthyThreshold to 3. (#70099, @grayluck)
    • Health check parameters are configurable to be bigger than default values.
  • Scheduling conformance tests related to daemonsets should set the annotation that relaxes node selection restrictions, if any are set. This ensures conformance tests can run on a wider array of clusters. (#68793, @aveshagarwal)
  • Fix cluster autoscaler addon permissions so it can access batch/job. (#69858, @losipiuk)
  • change default azure file mount permission to 0777 (#69854, @andyzhangx)
  • Verify invalid secret/configmap/projected volumes before calling setup (#68691, @gnufied)

v1.10.9

Documentation

Downloads for v1.10.9

filename sha512 hash
kubernetes.tar.gz 5ffc5ddac07c65d306057996aec741120340124a6a94a1fa254fb41899efa8d35148e9a9e630dc114f9dc6296b9bb3cb6933cb7fa41b1e68acd161340a274c8b
kubernetes-src.tar.gz e5ba1360050e3af958e241a3853abcb333b9616aad227324e53b76964a0aca0bed30104a9fbc839eae6ab2dcddf4329718fdbb79dbfb0fc80937f5c18a427de9

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz 691771cc4123f3dc054cd1c00188b4eff5089c549da56e13eab1565b3cc4f442bc12b994dea5b0f97680fc21c6a12119a8978930c375ac0b4b38a49831b73e59
kubernetes-client-darwin-amd64.tar.gz 6815525005208138e7cf5f26e14b0089a557ba6cf5d00f8deb3e64e60fc652d28dc0b0bb846ef235a9c5dc0581e68109e5f40976c2ab261e8f890b1c94bb02ee
kubernetes-client-linux-386.tar.gz b959b0ce3b66c1f971accb4cfd4af655f8e0981332fa3116c4852e0427bf489b15c27bc9824a440544651810f2d8561948f1b69df0aaa19768b8cd4681cb762b
kubernetes-client-linux-amd64.tar.gz 4f04319698f0fccd0432a7078b7fcbc4b9fc33fe781a735217782b27b9b6ae6023ab70e26a6e9e24a55f07fb9dc6e59ad0f8dcc636b81593911bbdf2c94d6919
kubernetes-client-linux-arm.tar.gz 1378ff1c25446f2be3f6a47b326d9e2ea0e6f4e1d689665f8c6f16f31352ea4c5fcfb166d26db78fc001f50393ed2447867f0991574cc70086c830a9f5a9fa88
kubernetes-client-linux-arm64.tar.gz c619478527466416da5a8f8a9eb683a1ac7c996c1acc2d1ba96803d81e818e0b905d5830f80e63aed297154b152dd6d8d9586a2122c00e59b2946a872b831c85
kubernetes-client-linux-ppc64le.tar.gz 1218c2f99fd446b5e16b20116e0138e12c0e411b8dba759ed28164a5f91bf3357d2b5ed1be0c557695cc961d29a192c5bb465ff4a9d0c128e83597f0b32e9f7b
kubernetes-client-linux-s390x.tar.gz a7ddad405a349df82987446bbb9d96376efa9d053b1d995375ddf4f3ad19955da8b6a8286bddcd2ef7327bb36547e850348431fce86d6597f3c8fae5ac8b9624
kubernetes-client-windows-386.tar.gz dfad6079e52d7d5c4ef24b8ac09a6f31e060bc3c7945ebf1ed97d72cb218dacf97528404b5000f45e5cecd133a18ef8ef210920140cf4c70f0f846d5cee10411
kubernetes-client-windows-amd64.tar.gz 1133465d9f161a42dc603b03ce2654be5c27698f8fec0bec9039ac8494c45bbb0770b198b6e15f4ffacb719078fe25cf9ca294f923191ba35a909e657b7399be

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz d224296a114cdc5dc3ab96332518096dc4c9d451a9a119824cfeafebd299d0bfc57d1cd3b20a1dd9eaf7df601a07d90994be1b06a1cf5e793380e29e4c39f734
kubernetes-server-linux-arm.tar.gz d9c4aa37884ef24bc61bdbba99c9efdb08a9364e8de720e090f8de665c074a0aed9c888193157f72bb6a1c64ecb290053419fa40c5f3ae2bbec47b764a59f3c7
kubernetes-server-linux-arm64.tar.gz da43429bf30d95487bb8524f6dd056e97e94d32d41441c36503a856f8a89ae1f7324b4deebf3adb307e4554b51c3a7053223a8d0e6c7dc49bd0dac2c38223583
kubernetes-server-linux-ppc64le.tar.gz dfa80db2a41bee53504549846a05fe5dc862ed8d6903671a34e5299f6f0fa33742fbdd9d7388c37c2ecbd6ff8490682f7e1fed420733a279ae2d91e48f2cac62
kubernetes-server-linux-s390x.tar.gz bc5eaf56617daebe8d6dfddf88966f6226a28ef965e38d256b9e004558cbffbc578f0dc9c18d0069bd1b6343cafb65eb48e065fd47818b3fa32d8d0c797e4d5f

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 4c558fb5157e198b466b4550f1e415036c09c6b4a6fe85072ba21822e5ebc1ff4fcda4aebf809caa8eec4b3effd011307d5e487dd68d521ac0798cebc8b71c33
kubernetes-node-linux-arm.tar.gz 4fcd869ce150a59951aaa99e2ad6ce57c2e5b862265abf0af55862594f82e4ec8953b33ca52cef0b2ba9b467010069c2907b3fe0bb0332ef5d250d8ea3e20cf0
kubernetes-node-linux-arm64.tar.gz 48a17a0146b3564fda719ebf51521cb814dcf5eb493648dfae25785eabfce0ac55af4b6ad38dbbc2a7ba08d026257b863f25b08f1ab6c1cfc405586f17102936
kubernetes-node-linux-ppc64le.tar.gz 1ffd4d6d727fa62fede97e8cebfad5ee48977aca296384c11b86fd4165ae0a1447ee640c80c555a1b5650fa14e35cc9907e427d9f820f73c766a1fcf4cccd413
kubernetes-node-linux-s390x.tar.gz 99085f64462072d26c8e1c739a5dfbb4950cc15f9c18a0f3350e5a0776d9d7ac1fb58e4571df3b44fadb779038f96c90dd04b526b94f6cb2117420706ac9e47a
kubernetes-node-windows-amd64.tar.gz d8271e62770cffef6acdca0bf224970919a00e631f2b39b9423fd701380a06f3384702ec3819b0821563a478897bd0ff1533bcc5639456d06fccb621fac3c352

Changelog since v1.10.8

Other notable changes

  • Fix gpu issue after node instance recreation in 1.10. (#69595, @jiayingz)
  • Reduced excessive logging from fluentd-gcp-scaler. (#68837, @x13n)
  • locking fix in vSphere cleanup function (#68388, @wgliang)
    • The vSphere cloud provider has a cleanup function with a loop,
    • inside of which a write lock was intended to prevent races against
    • VM creation, but the usage of the sync.RWMutex type is incorrect,
    • plus is placed in a defer call so the locking is effectively
    • nonexistent. This patch adds an anonymous function call inside
    • the loop to correctly handle acquiring the write lock with deferred
    • unlock to run at that function's completion, following the normal
    • golang lock/deferred-unlock pattern.
  • Avoid creating new controller revisions for statefulsets when cache is stale (#67039, @mortent)
  • Add fallbacks to ARM API when getting empty node IP from Azure IMDS (#69077, @feiskyer)
  • fix UnmountDevice failure on Windows (#68608, @andyzhangx)
  • Get public IP for Azure vmss nodes. (#68498, @feiskyer)
  • adjusted http/2 buffer sizes for apiservers to prevent starvation issues between concurrent streams (#67902, @liggitt)
  • Fix load balancer issues when running zero nodes in Azure vmss. (#68775, @feiskyer)
  • Fix potential panic when getting azure load balancer status (#68609, @feiskyer)

v1.10.8

Documentation & Examples

Downloads for v1.10.8

filename sha256 hash
kubernetes.tar.gz 8af88c2aa340fd4801e39374572e4e4b876b0c723327fe32286bb4a0b3f5c1fd
kubernetes-src.tar.gz 23e5e78b3d96c7acf955bedb38d0d2f03e5d70f9a263d3e571689b12fc90fd5b

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz c93ce57df402dfcdb5887a3d32ba8604c63df9ab17c8ec7bf29d9c0bd783949c
kubernetes-client-darwin-amd64.tar.gz d04ef3fb961421f49015f4b9236d2ab43a2f2f1504640bb363482bebed7b63bf
kubernetes-client-linux-386.tar.gz aa4710010d16287335f90e58e417748238cd6a24c7e3ec46acb04b49582e8089
kubernetes-client-linux-amd64.tar.gz 925594f5e3b062323701e3d751b2a4fbd5aa7f48f5e6271b6b9aa8280dee7e7b
kubernetes-client-linux-arm.tar.gz a399dc143942ddad294eeeda3fdcd7ed2c8a1b3616d046aea310b68e01b46a6b
kubernetes-client-linux-arm64.tar.gz 6e68974fec812f7f4470c4d42145719e81d703fe7c8c2b757b26fee660bbc42d
kubernetes-client-linux-ppc64le.tar.gz 8d99975699753d95439643f835f125c098bbe5617f221e1dff9ee4c89cf2f488
kubernetes-client-linux-s390x.tar.gz 76990333dc565ba0c75e0e1bc6544c3c60439339ec3e450d98c43e706b4f1dbe
kubernetes-client-windows-386.tar.gz 13d6c632602f933fa742d6feb2b503e30b42cf5adcd50b63fdb89fea08cc5a0a
kubernetes-client-windows-amd64.tar.gz 883b4b04a5afde5b624499d25d768160105257697212b3fe58229f5f84db6350

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz e09463d6336099a20509387b29dd6e2cd510636cdc1d5a925a0543152bbab531
kubernetes-server-linux-arm.tar.gz 2b2da5e3e436ca7bb9c30cc018ed094478bafb441370c09689ca0269a3b36fcc
kubernetes-server-linux-arm64.tar.gz 1d21cb8aac0431bba97d7705c4938311021b1aa686e017b0e797d0045ce4957b
kubernetes-server-linux-ppc64le.tar.gz 234d27c6ae5434ce9238bd5b117a49eae044171ae303b258e54839d9e678dc93
kubernetes-server-linux-s390x.tar.gz 6765a12700e4c14ddda36659fb78480d189ef2283806349d9ea15fe2b19181fe

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 6894cf0d0b1d9dbd156c15168a1e1f1232497b891cbb8d23c701f59e42f551fe
kubernetes-node-linux-arm.tar.gz ee4d65b6f717604f4b14ed04e1ff8c0850b53e36ff2999db19d5754067f8871a
kubernetes-node-linux-arm64.tar.gz 65c9d79ed0b460191df5956f7bac64212839a0296b40b32331e0f8d0a7a32d84
kubernetes-node-linux-ppc64le.tar.gz ea887de37de4681472878b9fb3d5cf7294d92660195b20c3282de54389a7becb
kubernetes-node-linux-s390x.tar.gz b387e375370e4ec2a7b48b8126b39503906c5a094e769b5fd2847910a6fbdc61
kubernetes-node-windows-amd64.tar.gz c79849df2946e12ab4e51161d2fdffceaae49d3d26268c2afff69aa028ac2411

Changelog since v1.10.7

Other notable changes

  • [fluentd-gcp-scaler addon] Bump fluentd-gcp-scaler to 0.4 to pick up security fixes. (#67691, @loburm)
    • [prometheus-to-sd addon] Bump prometheus-to-sd to 0.3.1 to pick up security fixes, bug fixes and new features.
    • [event-exporter addon] Bump event-exporter to 0.2.3 to pick up security fixes.
  • Fix validation for HealthzBindAddress in kube-proxy when --healthz-port is set to 0 (#66138, @wsong)
  • Role, ClusterRole and their bindings for cloud-provider is put under system namespace. Their addonmanager mode switches to EnsureExists. (#67224, @grayluck)
  • Bump ip-masq-agent to v2.1.1 (#67916, @MrHohn)
      • Update debian-iptables image for CVEs.
      • Change chain name to IP-MASQ to be compatible with the
    • pre-injected masquerade rules.
  • Fix VMWare VM freezing bug by reverting #51066 (#67825, @nikopen)
  • support cross resource group for azure file (#68117, @andyzhangx)
  • Return apiserver panics as 500 errors instead terminating the apiserver process. (#68001, @sttts)
  • Cluster Autoscaler 1.2.3 (release notes: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.2.3) (#68348, @losipiuk)
  • Fix scheduler informers to receive events for all the pods in the cluster. (#63003, @bsalamat)
  • attachdetach controller attaches volumes immediately when Pod's PVCs are bound (#66863, @cofyc)
  • PVC may not be synced to controller local cache in time if PV is bound by external PV binder (e.g. kube-scheduler), double check if PVC is not found to prevent reclaiming PV wrongly. (#67062, @cofyc)
  • kube-apiserver now includes all registered API groups in discovery, including registered extension API group/versions for unavailable extension API servers. (#66932, @nilebox)

v1.10.7

Documentation & Examples

Downloads for v1.10.7

filename sha256 hash
kubernetes.tar.gz 49037bfff1a398afb3d22c4caa71b9c3915b443653a730d5faee83d8845ea93c
kubernetes-src.tar.gz 44470b90a7de1136be6d5bd8d98597ac88631002c798f7e190c0bbad654e581c

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 068fd5ec8db814c888c2314c84865399d7692f2a5c9523dac432038786dd5226
kubernetes-client-darwin-amd64.tar.gz 8255ff56aa9a6bc9ea7bfba7a08fa1451b36a652607b65b45a0dabd49b2663f3
kubernetes-client-linux-386.tar.gz f1a7a9fa5a74f71aebe12b2ad6217b8b1d5d6720992272a305cf63a218fc9d27
kubernetes-client-linux-amd64.tar.gz 169b57c6707ed8d8be9643b0088631e5c0c6a37a5e99205f03c1199cd32bc61e
kubernetes-client-linux-arm.tar.gz 3693441ea33c4a7ece2c105684690a8678f3a79d4f619611eb1f588345a46af7
kubernetes-client-linux-arm64.tar.gz 3fa337a331fe7a657c946cb02d361caa02f2d65b02e21d597d5edb3866eb959b
kubernetes-client-linux-ppc64le.tar.gz 98ee2353b41737028e807a22c1933409e5d5ecc504a4cf3b955ae60079c56b50
kubernetes-client-linux-s390x.tar.gz 96537d9b25fd4a8cb6e6092f19d6f25241af0e4be02e4419083775336588463f
kubernetes-client-windows-386.tar.gz 741043cc6174ee6be82ef52403e47c9db8118f5ce78c254678478445a2d05880
kubernetes-client-windows-amd64.tar.gz 6bdd1372e0be44378a03468a0143c3d2982bf2f20c27bd547e20d953c5a85ecb

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 347e1842ffa915d1ea8048381886087a90911ac52fa2339089a4a89d46bc64c2
kubernetes-server-linux-arm.tar.gz c04538c5bb6d9f376fb2280896f582a314de51715f8d14b2cb79e937b0c90b4d
kubernetes-server-linux-arm64.tar.gz bd5d44575505b844f65d6ec06f36ba5ae6c42dcc586e4251cad8aa0b8a37407e
kubernetes-server-linux-ppc64le.tar.gz fdb39f6e29db93464c97b81d3eaa7b8f2d2d2c2d37d5b5bf8fb0fdbed6a2973a
kubernetes-server-linux-s390x.tar.gz 172399f4742be55ddf08d355fddec2898d8e14c5706949512b06f9acb29bc379

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz a4c4cf87971726cf9d929d66a9fa2b36cdf3b0d9f2d66ad7595d8b7e532f9657
kubernetes-node-linux-arm.tar.gz 1f848d49cc3d404a4157f8fdd38b8dd2c613b27ccc3244a2d79643f6b8765c99
kubernetes-node-linux-arm64.tar.gz 4e621c64f8074deb717669cf082b46228746b7d02193ee3a3be9bcec08bae635
kubernetes-node-linux-ppc64le.tar.gz 56d6930a77bfed0db0bb09cd38db8d54648f645b997d6a9386f2bb6fd83bf843
kubernetes-node-linux-s390x.tar.gz 8ecd7f94584864930980233efdf1d5ccea6c57a08da3fcc5ac56c1fd0f901651
kubernetes-node-windows-amd64.tar.gz 4183e55ba5649b48a38fe9c96ae6a31ba89b4ab90b27124144466b58d49c4e52

Changelog since v1.10.6

Action Required

  • action required: the API server and client-go libraries have been fixed to support additional non-alpha-numeric characters in UserInfo "extra" data keys. Both should be updated in order to properly support extra data containing "/" characters or other characters disallowed in HTTP headers. (#65799, @dekkagaijin)

Other notable changes

  • Fix creation of custom resources when the CRD contains non-conventional pluralization and subresources (#66249, @deads2k)
  • Bump up version number of debian-base, debian-hyperkube-base and debian-iptables. (#67026, @satyasm)
    • Also updates dependencies of users of debian-base.
    • debian-base version 0.3.1 is already available.
  • Fix an issue that pods using hostNetwork keep increasing. (#67456, @Huang-Wei)
  • Allows extension API server to dynamically discover the requestheader CA certificate when the core API server doesn't use certificate based authentication for it's clients (#66394, @rtripat)
  • Fix an issue where filesystems are not unmounted when a backend is not reachable and returns EIO. (#67097, @chakri-nelluri)
  • Add NoSchedule/NoExecute tolerations to ip-masq-agent, ensuring it to be scheduled in all nodes except master. (#66260, @tanshanshan)
  • Metadata Agent Improvements (#66485, @bmoyles0117)
    • Bump metadata agent version to 0.2-0.0.21-1.
    • Expand the metadata agent's access to all API groups.
    • Remove metadata agent config maps in favor of command line flags.
    • Update the metadata agent's liveness probe to a new /healthz handler.
    • Logging Agent Improvements
    • Bump logging agent version to 0.2-1.5.33-1-k8s-1.
    • Appropriately set log severity for k8s_container.
    • Fix detect exceptions plugin to analyze message field instead of log field.
    • Fix detect exceptions plugin to analyze streams based on local resource id.
    • Disable the metadata agent for monitored resource construction in logging.
    • Disable timestamp adjustment in logs to optimize performance.
    • Reduce logging agent buffer chunk limit to 512k to optimize performance.
  • Kubelet will set extended resource capacity to zero after it restarts. If the extended resource is exported by a device plugin, its capacity will change to a valid value after the device plugin re-connects with the Kubelet. If the extended resource is exported by an external component through direct node status capacity patching, the component should repatch the field after kubelet becomes ready again. During the time gap, pods previously assigned with such resources may fail kubelet admission but their controller should create new pods in response to such failures. (#64784, @jiayingz)
  • This fix prevents a GCE PD volume from being mounted if the udev device link is stale and tries to correct the link. (#66832, @msau42)
  • Report node DNS info with --node-ip flag (#63170, @micahhausler)
  • Fixed an issue which prevented gcloud from working on GCE when metadata concealment was enabled. (#66630, @dekkagaijin)
  • fix issue that pull image failed from a cross-subscription Azure Container Registry (#66429, @andyzhangx)
  • Preserve vmUUID when renewing nodeinfo in vSphere cloud provider (#66007, @w-leads)

v1.10.6

Documentation & Examples

Downloads for v1.10.6

filename sha256 hash
kubernetes.tar.gz dbb1e757ea8fe5e82796db8604d3fc61f8b79ba189af8e3b618d86fcae93dfd0
kubernetes-src.tar.gz 1e8f6769043ab3159135ee001f883e5f650c450ebade96a257922f34cd451093

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 1caccad500426b921491aab17d0af78c6ac3722b98881d0f7b3a4ed3a0ab010e
kubernetes-client-darwin-amd64.tar.gz f693f29e1f86c34e89ec5c388d40f6844223cb53ff4261a7d22ac7c89818435d
kubernetes-client-linux-386.tar.gz bd23843aa152a2ec4e93a81e0786ecc66eb4844b01d2379a7b1651ab31853850
kubernetes-client-linux-amd64.tar.gz e45040a60cf548abbd5f554f2a72fdda73b446a257e08e4bdd6f02fd110a7fce
kubernetes-client-linux-arm.tar.gz 3952b2acfd7c6b43ebfc7fe0ca6b82306273aa9254a3015420576e8bcdb03aa7
kubernetes-client-linux-arm64.tar.gz bc4efc774eae3f67533b7d115b3d3a8ecd2c4511788291f21d3a3956a8e5eebf
kubernetes-client-linux-ppc64le.tar.gz 443b148699e6e987e854a30fe370e38cfb55bd55caceebe9b8afa2c67206e5d4
kubernetes-client-linux-s390x.tar.gz e39953c6df427f5929eaabbf339d5b09b6dd9a34f8c244f5af4a656568463689
kubernetes-client-windows-386.tar.gz b6571e740ec708acc60e44ed7de25b248eb4da420c4392dddc35db9a31ad269f
kubernetes-client-windows-amd64.tar.gz 54e45e2de247a13be30d4e954c1d1e97f3524c940028de166e685568689fb9d4

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 2a7912c5ecd54d29e1c7509dd21f85118eeea88d3a32e839ba2e019fb3644ff9
kubernetes-server-linux-arm.tar.gz 1558e1a2adce69cdddbeb6967979c153731be0c2426e9918cf24504daac3d1c5
kubernetes-server-linux-arm64.tar.gz 1a27098db5a2b9923dea307da40acc5ac50f33980e39e9645a9eeee9d43070d8
kubernetes-server-linux-ppc64le.tar.gz 091e941396ead7bf370fd340cf2d0894f3fdc11c922025f1040226780727f1c1
kubernetes-server-linux-s390x.tar.gz f269061020a87ca2e30786a8a43d70432f1ff7f41b5caa8f75cb058f47a5b8cf

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz e3b0a4ea518b2c94268897a24c3ed2e6cc0377d87fcab0782d4353d3610ea09b
kubernetes-node-linux-arm.tar.gz 0e3aa7f648d3f716d495bf6e20efdad1459fe285b546c5c944b61c37e02fd613
kubernetes-node-linux-arm64.tar.gz 8956e961868304d00f83b793cef8e97c7ea00bf2b96960af535e318b15a66879
kubernetes-node-linux-ppc64le.tar.gz 725b4c9ff5a490446fed8753ab00eb094db3b4a83facde99bab07245e002ee28
kubernetes-node-linux-s390x.tar.gz 3b014b15010d877e8f81c98c7f3856f6398d88cd3eb92b075092ad2a24f92911
kubernetes-node-windows-amd64.tar.gz ce0ece3941f544ac01b3d3adbe55e43fd81d819835a200d0863307b1fd6bc798

Changelog since v1.10.5

Action Required

  • ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/Drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ``` (#65499, @krunaljain)

Other notable changes

  • Extend TLS timeouts to work around slow arm64 math/big (#66264, @joejulian)
  • GCE: Fixes loadbalancer creation and deletion issues appearing in 1.10.5. (#66400, @nicksardo)
  • fixes spurious "meaningful conflict" error encountered by nodes attempting to update status, which could cause them to be considered unready (#66169, @liggitt)
  • fix mount unmount failure for a Windows pod (#63272, @andyzhangx)
  • Fix for resourcepool-path configuration in the vsphere.conf file. (#66261, @divyenpatel)
  • Fixed cleanup of CSI metadata files. (#65323, @jsafrane)
  • Fix an issue with dropped audit logs, when truncating and batch backends enabled at the same time. (#65823, @loburm)
  • fixes a validation error that could prevent updates to StatefulSet objects containing non-normalized resource requests (#66165, @liggitt)
  • Fixed issue 63608, which is that under rare circumstances the ResourceQuota admission controller could lose track of an request in progress and time out after waiting 10 seconds for a decision to be made. (#64598, @MikeSpreitzer)
  • Make kubelet ReadLogs backward compatible. (#63268, @Random-Liu)
  • set EnableHTTPSTrafficOnly in azure storage account creation (#64957, @andyzhangx)
  • Rework Kubelet set /etc/hosts behavior to fix conformance testability (#61613, @dims)
  • Fix RunAsGroup which doesn't work since 1.10. (#65926, @Random-Liu)
  • Fix a bug that preempting a pod may block forever. (#65987, @Random-Liu)
  • fix data loss issue if using existing azure disk with partitions in disk mount (#63270, @andyzhangx)
  • The garbage collector now supports CustomResourceDefinitions and APIServices. (#65916, @xmudrii)
  • fix smb mount issue (#65751, @andyzhangx)
  • Fix a scalability issue where high rates of event writes degraded etcd performance. (#64539, @ccding)
  • Fixed API server panic during concurrent GET or LIST requests with non-empty resourceVersion. (#65092, @sttts)
  • Properly manage security groups for loadbalancer services on OpenStack. (#65373, @multi-io)
  • Reload systemd config files before starting kubelet. (#65702, @mborsz)
  • Fixes an issue where Portworx PVCs remain in pending state when created using a StorageClass with empty parameters (#64895, @harsh-px)
  • add external resource group support for azure disk (#64427, @andyzhangx)
  • skip nodes that have a primary NIC in a 'Failed' provisioningState (#65412, @yastij)
  • On COS, NPD creates a node condition for frequent occurrences of unregister_netdevice (#65342, @dashpole)
  • Fix concurrent map access panic (#65328, @dashpole)
    • Don't watch .mount cgroups to reduce number of inotify watches
    • Fix NVML initialization race condition
    • Fix brtfs disk metrics when using a subdirectory of a subvolume
  • Pass cluster_location argument to Heapster (#65176, @kawych)
  • fixes a memory leak in the kube-controller-manager observed when large numbers of pods with tolerations are created/deleted (#65339, @liggitt)
  • Disable session affinity for internal kubernetes service - Backport of #56690 to 1.10 release branch (#65177, @afritzler)

v1.10.5

Documentation & Examples

Downloads for v1.10.5

filename sha256 hash
kubernetes.tar.gz 3be564d25f68c6539a29c103825b7824d6a451ac8e4fc1ac0ee164c9513761f0
kubernetes-src.tar.gz a1a166dca72a4fd8284ff59ebd687ca0f6e3bb6d51266fbd3fdde442678d1568

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz b1748341e76eb72ddf4f64f9222f742238d1dcd34d3542aae55f35e0b961225f
kubernetes-client-darwin-amd64.tar.gz fef9cbf920349f860ebd3e31c899d4734be77a44895d9ce8bb50163790938210
kubernetes-client-linux-386.tar.gz 8324d554414f2238ee1aab9ff24de1defe19cfce17adc09eda5da536291054b5
kubernetes-client-linux-amd64.tar.gz da9d557989a0b9671a610f21642052febb8f70c3cf144c98a8a4f7ecab6bafe2
kubernetes-client-linux-arm.tar.gz 7d299f6928afce106d2ab66e8d79c4184a891edb84cd1f813f6608253a2494dd
kubernetes-client-linux-arm64.tar.gz c36c52707f771995d82bd7c23925fcab301fce2f0143527960b58b48e41afde9
kubernetes-client-linux-ppc64le.tar.gz 8f0596ed15a511ec8de5bcaeb02e8395509f604f7531c922eaabd89881852b56
kubernetes-client-linux-s390x.tar.gz 7f5fba2162db17a6050d9738dfc50400065272e2dce82b8498fd55f5768cfb88
kubernetes-client-windows-386.tar.gz e5c335127b733b83853bf4a8a3f31eeab61c5b55ec1762c40bfe67b88b451b46
kubernetes-client-windows-amd64.tar.gz 045725afdeca4261a4ea110a271908aaf3fc23b7a00f70d2375e927820b4d6b4

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 27838c15e6ba3805d35d5321b0b58c4c481548406559c7b7407686c2492b5a51
kubernetes-server-linux-arm.tar.gz 4c7e451a5cb592060012c90fa9367e17c22ecb7d6fb0a946369ea749c5bc064d
kubernetes-server-linux-arm64.tar.gz af9b54b8dfb9eeac86a3169fbe294e24109c7cfaef8ef70bb709922f10e51713
kubernetes-server-linux-ppc64le.tar.gz 3063e8d2107d51a2a3992caf5a629e36f984d3158fb1dd57775d38d3d4118499
kubernetes-server-linux-s390x.tar.gz ffd1315f7618daba89dae9828eefb8a8da3c155172ed079879276b323de83fc0

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 6237e4cec81f56189126010b8c7a410322b9fdb660c58d88d0bc8c6f90e8ff8c
kubernetes-node-linux-arm.tar.gz 315cbb50daabb10ccc15a2a8cb3a677789efdf3523c00e50cd03985d620c2efa
kubernetes-node-linux-arm64.tar.gz d900e63dc0e26be0cc63c67a024a923ab2814330d81cde3b507a69de41d563ed
kubernetes-node-linux-ppc64le.tar.gz f191c537eea56953cbfe42ac9077015ba98e143828c865deeadcdf33697e4388
kubernetes-node-linux-s390x.tar.gz 89b5f416e35f4ce81073182ec6c67d70d5baa6485f4e633766d46ebe12f1dde4
kubernetes-node-windows-amd64.tar.gz 2f253d29fab26dc6f27e8cbf7653a2fd66171a26292fc4df6b091099b878d0ab

Changelog since v1.10.4

Action Required

  • A cluster-autoscaler ClusterRole is added to cover only the functionality required by Cluster Autoscaler and avoid abusing system:cluster-admin role. (#64503, @kgolab)
    • action required: Cloud providers other than GCE might want to update their deployments or sample yaml files to reuse the role created via add-on.

Other notable changes

  • Kubernetes json deserializer is now case-sensitive to restore compatibility with pre-1.8 servers. (#65157, @caesarxuchao)
    • If your config files contains fields with wrong case, the config files will be now invalid.
  • GCE: Fixes operation polling to adhere to the specified interval. Furthermore, operation errors are now returned instead of ignored. (#64630, @nicksardo)
  • Fix setup of configmap/secret/projected/downwardapi volumes (#64855, @gnufied)
  • Added default ClusterRoles for external CSI components csi-external-provisioner and csi-external-attacher (#65073, @davidz627)
  • fixes a panic applying json patches containing out of bounds operations (#64355, @liggitt)
  • Fixed NoTaintMaster to remove master taint and keep all other applied taints. (#64986, @ashleyschuett)
  • Include kms-plugin-container.manifest to master manifests tarball. (#65035, @immutableT)
  • kubeadm - Increase the manifest upgrade timeout to make upgrades more reliable. (#65029, @detiber)
  • Webhooks for the mutating admission controller now support "remove" operation. (#64971, @sttts)
  • increase grpc client default response size (#63977, @runcom)
  • Increase the gRPC max message size to 16MB in the remote container runtime. (#64672, @mcluseau)
  • Fix kube-controller-manager panic while provisioning Azure security group rules (#64739, @feiskyer)
  • Fix regression in v1.JobSpec.backoffLimit that caused failed Jobs to be restarted indefinitely. (#63650, @soltysh)
  • GCE: Update cloud provider to use TPU v1 API (#64727, @yguo0905)
  • fix formatAndMount func issue on Windows (#63248, @andyzhangx)

v1.10.4

Documentation & Examples

Downloads for v1.10.4

filename sha256 hash
kubernetes.tar.gz b6e04c7c95ec9cfe6463ccc0863cd7c5dc874409ce2c3dd130809ea3e22ec39d
kubernetes-src.tar.gz fd93b9cf0f7735e85a90674f90a7b943539774406ac21ea351789bd5d5f32649

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 1beadf6a6031bb461b34b9286e652e5ff79f4373dfa8ee8489f02b42b741d69d
kubernetes-client-darwin-amd64.tar.gz dbbb0f6d29002f8cfee39ffe61bcec74341916927ee7f2d2e41f18689364936f
kubernetes-client-linux-386.tar.gz 00363c5438dc049b26257dcf97f012bc0dc5844aa7804633d2dc077c9814d9b7
kubernetes-client-linux-amd64.tar.gz 2831fe621bf1542a1eac38b8f50aa40a96b26153e850b3ff7155e5ce4f4f400e
kubernetes-client-linux-arm.tar.gz ca98be6e14e697e7dc3aa2f0f83422ed6bc466efaaf19139c84c6cb74f79477a
kubernetes-client-linux-arm64.tar.gz 444cddd2c0b2c7ab37f8c4786723c1c940fdcf52c24edefd992ad707e9628360
kubernetes-client-linux-ppc64le.tar.gz f7ac9c508634c77a54e8a0b71684bbe454e3ddb325ff6c4450e8d013e90a7e7f
kubernetes-client-linux-s390x.tar.gz ed5440b893e0e39eb2d09a4b32e072e6e51ec8aef6e674d6620e3e1c23b1715d
kubernetes-client-windows-386.tar.gz 80207e67c741a6fb30073fd5890edfd3e21ff9dc5560b802d8601e82d062b029
kubernetes-client-windows-amd64.tar.gz 7ada21ad4c0e10939f0bbb16ec3dc5c6d9329eff75e943eecca2461d0f874eb1

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz e2381459ba91674b5e5cc10c8e8d6dc910e71874d01165ca07a94188edc8505e
kubernetes-server-linux-arm.tar.gz c48cc7a90c57f3fa73de1362ef5f64542e11eb31290569b190e716c03f09ca39
kubernetes-server-linux-arm64.tar.gz 1ab1d282935be7e775ee07aab720c9bc8da6157386fc3d91565214cbc16debf1
kubernetes-server-linux-ppc64le.tar.gz a64bb8c60e094cb03e29413bc83b6177caa07f786f43e52a8d748147138321c3
kubernetes-server-linux-s390x.tar.gz 5e96c974df9e41ca12a6ba0796227af48df6d6d6c5256abb7e39c0002504714e

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 40b8bc76cb4a2676d02169e26f43d39198f6e41297f22ef07e1984feac3879b3
kubernetes-node-linux-arm.tar.gz 7d818b1fcf82a74de401936db1cd4704e52b594658c9be6c760b3c5ca2e49c01
kubernetes-node-linux-arm64.tar.gz 41e4fb14acaec64b7b79fd0c938a2c2c5b914de8b007afe3ffb0eb1c3e2d7f0e
kubernetes-node-linux-ppc64le.tar.gz a22095e62acbcea4ea4d95e500eaa10d30db529b8b0465b67b44bd53a3df628f
kubernetes-node-linux-s390x.tar.gz bfe8e8890d2ed5511cf4cbc9908b603a1b0610d7847c7c272011028b382f71de
kubernetes-node-windows-amd64.tar.gz f9d9b614febf3c787c02e661bfc7a54cbff9a0ef0d260d43fe03190f13bdf065

Changelog since v1.10.3

Other notable changes

  • Fixes issue for readOnly subpath mounts for SELinux systems and when the volume mountPath already existed in the container image. (#64351, @msau42)
  • Fixed CSI gRPC connection leak during volume operations. (#64519, @vladimirvivien)
  • In case StorageObjectInUse feature is disabled and Persistent Volume (PV) or Persistent Volume Claim (PVC) contains a finalizer and the PV or PVC is deleted it is not automatically removed from the system. Now, it is automatically removed. (#62938, @pospispa)
  • Fixed SELinux relabeling of CSI volumes. (#64026, @jsafrane)
  • Fixed error reporting of CSI volumes attachment. (#63303, @jsafrane)
  • fix azure file size grow issue (#64383, @andyzhangx)
  • Fixed detach of already detached CSI volumes. (#63295, @jsafrane)
  • Update event-exporter to version v0.2.0 that supports old (gke_container/gce_instance) and new (k8s_container/k8s_node/k8s_pod) stackdriver resources. (#63918, @cezarygerard)
  • Fix issue of colliding nodePorts when the cluster has services with externalTrafficPolicy=Local (#64349, @nicksardo)
  • Update nvidia-gpu-device-plugin DaemonSet config to use RollingUpdate updateStrategy instead of OnDelete. (#64296, @mindprince)
  • kubeadm will no longer generate an unused etcd CA and certificates when configured to use an external etcd cluster. (#63806, @detiber)
  • Fix incorrectly propagated ResourceVersion in ListRequests returning 0 items. (#64150, @wojtek-t)
  • Fix SessionAffinity not updated issue for Azure load balancer (#64180, @feiskyer)
  • Fixes a hang on kubelet startup when using systemd cgroup driver of libcontainer. (#61926, @filbranden)
  • Prevent 1.10 e2es testing deprecated CAdvisorPort in v1.11 (#64184, @dixudx)
  • GCE: Fix to make the built-in kubernetes service properly point to the master's load balancer address in clusters that use multiple master VMs. (#63696, @grosskur)
  • etcd client add dial timeout. (#61459, @hzxuzhonghu)
  • nil admission options are now consistent with other nil options. (#63993, @tamalsaha)
  • Add a way to pass extra arguments to etcd. (#63961, @mborsz)
  • kubeadm: surface external etcd preflight validation errors (#60585, @alexbrand)

v1.10.3

Documentation & Examples

Downloads for v1.10.3

filename sha256 hash
kubernetes.tar.gz c39d9c5a1cd3507c9464a1df12436ec005975a13980b47c451434c4e6de43a76
kubernetes-src.tar.gz 9106ebb70d016b2417cf239b62bdd6a85e927f2d010627aa64cfcf912fb0059b

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 0a98adaedf4734dd6a757fee062a10da389e5a7dd456ab335ad5189f9fbf5cf5
kubernetes-client-darwin-amd64.tar.gz ef3a831e8778be0633e992a0acc876eea694a2149d7142e0e619c33d897ec0aa
kubernetes-client-linux-386.tar.gz fd270522896cbbd61538deb64d21031983f9965084376cc3dd53c3e2aa72afec
kubernetes-client-linux-amd64.tar.gz 687a75e695dd9f5f38d727f27df9ecdbb04594a4082acdde2c852b289ccaaefa
kubernetes-client-linux-arm.tar.gz 449ea23eacb31f90cb8ad98ba18a0bc3cd3403281c0c06764cd7bab85aa6c09d
kubernetes-client-linux-arm64.tar.gz 74a4fe81159243393e47af19955aadefed3269476a18d90b1f1a394f69cc7f62
kubernetes-client-linux-ppc64le.tar.gz 239e685f8793a0f87612d19edadb9465aefe3814da13ebf6d1853b707c5626b8
kubernetes-client-linux-s390x.tar.gz ca3b5f3a8c9c8e861baf309e5a68eda1946124b7ce75cddd78de45713729ee32
kubernetes-client-windows-386.tar.gz 5a3ea415339d57b669457601c957bc80cb3119c10d7d750355cdae8f1fe05763
kubernetes-client-windows-amd64.tar.gz 11b8d65c4ee813ce99f2d4df702d23fb90ab6a0d823ae70de5cc7d8468a06285

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz c87f0b80a60e8d451cb0cc33819efe9e12fe971be8de200d8ca577f05d9bac82
kubernetes-server-linux-arm.tar.gz 1368ccd9ef57260ed60f7b91f6783af0efe0827910d409aa699a461fde89ce10
kubernetes-server-linux-arm64.tar.gz 1eb81d4d486add74281733fd3eae5f5a835aa2049f55d481a5f076863523229a
kubernetes-server-linux-ppc64le.tar.gz 7aa07397df4d786bda38cf1ae11f5c240477d784ba76524dd106c2d267ee6fe3
kubernetes-server-linux-s390x.tar.gz c3725f1dc33a994beb0d99f01fd3d1d0b5120d3ff23c6db42ac36e76dfe3812d

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz e0ab6d4759e72cba8f3676cb4789108ab4aaeb978939f1b80a1c0c5be9c4f6bf
kubernetes-node-linux-arm.tar.gz a7f09a209e8689309dd3126349006206f3e851a1515fbbf811bc9809c7aefcd2
kubernetes-node-linux-arm64.tar.gz c56e9e71284c94b4d2d272781937426330aff18dde8339573feb12ab1e106ebb
kubernetes-node-linux-ppc64le.tar.gz 42711c69cafa6fc15fb7b0c19429248a04ae043f9045999d868cc35b30148e41
kubernetes-node-linux-s390x.tar.gz 5ab986d2de922744b9fa87fdd5e557888615eb9ec24dec1f820d05e0ab51e249
kubernetes-node-windows-amd64.tar.gz d69524ad0dc671a32b221e76b73968c316b58e16a2f0e762925350ddd9de393a

Changelog since v1.10.2

Other notable changes

  • Use inline func to ensure unlock is executed (#61644, @resouer)
  • Introduce truncating audit backend that can be enabled by passing --audit-log-truncate-enabled or --audit-webhook-truncate-enabled flag to the apiserver to limit the size of individual audit events and batches of events. (#64024, @loburm)
  • Fix memory cgroup notifications, and reduce associated log spam. (#63220, @dashpole)
  • Cluster Autoscaler 1.2.2 (release notes: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.2.2) (#63974, @aleksandra-malinowska)
  • kubeadm - fix upgrades with external etcd (#63925, @detiber)
  • Restores the pre-1.10 behavior of the openstack cloud provider which uses the instance name as the Kubernetes Node name. This requires instances be named with RFC-1123 compatible names. (#63903, @liggitt)
  • Re-enable nodeipam controller for external clouds. (#63049, @andrewsykim)
  • kubelet: fix hangs in updating Node status after network interruptions/changes between the kubelet and API server (#63492, @liggitt)
  • [fluentd-gcp addon] Use the logging agent's node name as the metadata agent URL. (#63353, @bmoyles0117)
  • Fixes bugs that make apiserver panic when aggregating valid but not well formed OpenAPI spec (#63627, @roycaihw)
  • fix local volume absolute path issue on Windows (#62018, @andyzhangx)
  • Fixes issue where subpath readOnly mounts failed (#63045, @msau42)
  • Add MAX_PODS_PER_NODE env so that GCE/GKE user can use it to specify the default max pods per node for the cluster. IP_ALIAS_SIZE will be changed accordingly. Must have ip alias enabled. (#63621, @grayluck)
  • corrects a race condition in bootstrapping aggregated cluster roles in new HA clusters (#63761, @liggitt)
  • Fix stackdriver metrics for node memory using wrong metric type (#63535, @serathius)
  • Fix dockershim CreateContainer error handling (#61965, @Random-Liu)
  • When updating /status subresource of a custom resource, only the value at the .status subpath for the update is considered. (#63385, @CaoShuFeng)
  • Kubernetes version command line parameter in kubeadm has been updated to drop an unnecessary redirection from ci/latest.txt to ci-cross/latest.txt. Users should know exactly where the builds are stored on Google Cloud storage buckets from now on. For example for 1.9 and 1.10, users can specify ci/latest-1.9 and ci/latest-1.10 as the CI build jobs what build images correctly updates those. The CI jobs for master update the ci-cross/latest location, so if you are looking for latest master builds, then the correct parameter to use would be ci-cross/latest. (#63504, @dims)
  • Azure VMSS: support VM names to contain the _ character (#63526, @djsly)
  • Default mount propagation has changed from "HostToContainer" ("rslave" in Linux terminology) to "None" ("private") to match the behavior in 1.9 and earlier releases. "HostToContainer" as a default caused regressions in some pods. (#62462, @jsafrane)
  • Make volume usage metrics available for Cinder (#62668, @zetaab)
  • Fix issue where on re-registration of device plugin, allocatable was not getting updated. This issue makes devices invisible to the Kubelet if device plugin restarts. Only work-around, if this fix is not there, is to restart the kubelet and then start device plugin. (#63118, @vikaschoudhary16)

v1.10.2

Documentation & Examples

Downloads for v1.10.2

filename sha256 hash
kubernetes.tar.gz 1ff377ad005a5548f872f7534328dcc332c683e527f432708eddcc549a6ab880
kubernetes-src.tar.gz 175a33ad6dec11e86e022b57e5e3f11280c70a04a309b1b915f030697e789d89

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 95722e24ce02e4844563686f91773b053cf01ed66a46284a85f127a73528ae4c
kubernetes-client-darwin-amd64.tar.gz 3b5829a446b9eadae573c4d4e51dc69c1fe0af9453a88d0371095dd6560622bf
kubernetes-client-linux-386.tar.gz 8a5d3d031e09b511be77efd8701841a46265204c99549ef99f7849f162022e32
kubernetes-client-linux-amd64.tar.gz 84ca93bf6c427ad0cbef4f053c25deb3b267fea05aaa996b14f6b34db670e764
kubernetes-client-linux-arm.tar.gz aa3775972d7f8e5ee833ad8f19c09fd42c908e51b5f80ea843983ce5741b4e3b
kubernetes-client-linux-arm64.tar.gz e7b272d498c5b914fa6918be6851979c79f7adc14c5778120e42f4cba1e9fbde
kubernetes-client-linux-ppc64le.tar.gz 7913ba72de496e8a1cc38a2e7efa156f9b5fe8c3cad37a2056a406d852f4b0e2
kubernetes-client-linux-s390x.tar.gz 87a4c565d1d782351f320b38a9a76c4a9141efd4fa4559f7abe98769ba9ccbba
kubernetes-client-windows-386.tar.gz 1dfe9684bfaed00a185bdb791e292d078a6be23c7acc2941492fc11ad9a4f68d
kubernetes-client-windows-amd64.tar.gz 3d6396737ca6f9e272348cd31f150a636d5cd90fae341712cdb9d809c2eab3e7

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 350e48201e97c79639764e2380f3943aac944d602ad472f506be3f48923679d2
kubernetes-server-linux-arm.tar.gz 75425973f22d846896f293a2d416ea697d44511d35aa6c7dd777c8f6227e6655
kubernetes-server-linux-arm64.tar.gz 85cdbfbeb12ad35d814e3e29c962daeb6d4995d694df4ff5fbc7aeddd96366d5
kubernetes-server-linux-ppc64le.tar.gz c75f906ec1397c7fc2d5a0a0edde25b789c122088dfb39d1a28adeec40e1ca49
kubernetes-server-linux-s390x.tar.gz af23a78f51906b84836e44300336348d7df99807e3b25cf46e8c406001433299

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 9a8e88688de9ee5e32aab445d00e119d6d918bb28b238e75670055a37efac777
kubernetes-node-linux-arm.tar.gz 9ab0bec58796e9b48aded1deb8bdb64e9a030b0e5b38a22421d5f9d54326bcf5
kubernetes-node-linux-arm64.tar.gz aaf5e103e1cdcc2e8c4cb3485091dac6eaf2381bafaf8cb0c23fc77e4611adce
kubernetes-node-linux-ppc64le.tar.gz 868d754868686db1d3900e48f12e3a79f94d7fed73d2827be8a1105f75787c6d
kubernetes-node-linux-s390x.tar.gz e4d0e3a647edf1c145171716f038f4eff652565f4fa12e57fca106d244579cd6
kubernetes-node-windows-amd64.tar.gz a25add831d97f2f4edc9e3ee02334e1831fe2ca165d901b9319546452bf01eca

Changelog since v1.10.1

Other notable changes

  • kubeadm upgrade no longer races leading to unexpected upgrade behavior on pod restarts (#62655, @stealthybox)
    • kubeadm upgrade now successfully upgrades etcd and the controlplane to use TLS
    • kubeadm upgrade now supports external etcd setups
    • kubeadm upgrade can now rollback and restore etcd after an upgrade failure
  • Update version of Istio addon from 0.5.1 to 0.6.0. (#61911, @ostromart)
  • removed unsafe double RLock in cpumanager (#62464, @choury)
  • Fix in vSphere Cloud Provider to handle upgrades from kubernetes version less than v1.9.4 to v1.9.4 and above. (#62919, @abrarshivani)
  • Remove METADATA_AGENT_VERSION configuration option. (#63000, @kawych)
  • Fix in vSphere Cloud Provider to report disk is detach when VM is not found. (#62220, @abrarshivani)
  • Restores ability to enable/disable resource within an API GroupVersion individually. (#62116, @deads2k)
  • Fixes the kubernetes.default.svc loopback service resolution to use a loopback configuration. (#62649, @liggitt)
  • Fix the liveness probe to use /bin/bash -c instead of /bin/bash c. (#63033, @bmoyles0117)
  • Fix error where config map for Metadata Agent was not created by addon manager. (#62909, @kawych)
  • GCE: Fix for internal load balancer management resulting in backend services with outdated instance group links. (#62887, @nicksardo)
  • respect fstype in Windows for azure disk (#61267, @andyzhangx)
  • Update kube-dns to Version 1.14.10. Major changes: (#62676, @MrHohn)
      • Fix a bug in DNS resolution for externalName services
    • and PTR records that need to query from upstream nameserver.
  • Fix machineID getting for vmss nodes when using instance metadata (#62611, @feiskyer)
  • GCE: Bump GLBC version to 1.1.1 - fixing an issue of handling multiple certs with identical certificates (#62751, @nicksardo)
  • fix nsenter GetFileType issue in containerized kubelet (#62467, @andyzhangx)
  • fix WaitForAttach failure issue for azure disk (#62612, @andyzhangx)
  • Pod affinity nodeSelectorTerm.matchExpressions may now be empty, and works as previously documented: nil or empty matchExpressions matches no objects in scheduler. (#62448, @k82cn)
  • Fix user visible files creation for windows (#62375, @feiskyer)
  • Resolves forbidden error when the daemon-set-controller cluster role access controllerrevisions resources. (#62146, @frodenas)
  • fixes configuration error when upgrading kubeadm from 1.9 to 1.10+ (#62568, @liztio)
    • enforces kubeadm upgrading kubernetes from the same major and minor versions as the kubeadm binary.
  • Bugfix allowing use of IP-aliases with custom-mode network in GCE setup scripts. (#62172, @shyamjvs)
  • Ensure expected load balancer is selected for Azure (#62450, @feiskyer)
  • fix the issue that default azure disk fsypte(ext4) does not work on Windows (#62250, @andyzhangx)
  • gitRepo volumes in pods no longer require git 1.8.5 or newer, older git versions are supported too now. (#62394, @jsafrane)
  • Fixes issue where PersistentVolume.NodeAffinity.NodeSelectorTerms were ANDed instead of ORed. (#62556, @msau42)
  • Cluster Autoscaler 1.2.1 (release notes: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.2.1) (#62457, @mwielgus)
  • Return error if get NodeStageSecret and NodePublishSecret failed in CSI volume plugin (#61096, @mlmhl)
  • fix incompatible file type checking on Windows (#62154, @dixudx)

v1.10.1

Documentation & Examples

Downloads for v1.10.1

filename sha256 hash
kubernetes.tar.gz 877f83d7475eade8104388799a842d1002f5ef8f284154bed229a25862ed2bde
kubernetes-src.tar.gz 7c0f5b80e89e1a7bd5cd859d505bfafbcf873ad99be9ac22b422d9ef732a5d4c

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz e7eca1569c705752ab8aef07623d2a9a3b8d798c71b702b4d5c18892d455349d
kubernetes-client-darwin-amd64.tar.gz 68c5080b85c2ab5340268e21585e309eacef64fcd175b869194b4d6b0bec2467
kubernetes-client-linux-386.tar.gz bd08ce097e25e970eea3f13d02e322770a036eed8a63ac6fb1364f6ad1283e5c
kubernetes-client-linux-amd64.tar.gz f638cf6121e25762e2f6f36bca9818206778942465f0ea6e3ba59cfcc9c2738a
kubernetes-client-linux-arm.tar.gz 7d395f3c0f27a14c9980f930a2b8c4b56528a09c477a5121b71ff54c17b61f73
kubernetes-client-linux-arm64.tar.gz 75fd5b1eeb082df201abc91e7a98b280817692c52f723ed2ff8234097eaff841
kubernetes-client-linux-ppc64le.tar.gz 56b4102881c3945765bbc94efa035628a522911a4ddb2a80e63255bbe989db2d
kubernetes-client-linux-s390x.tar.gz f4e6f10f265a2cf9b71fad9ce2ddb28d577cc79643321e31318261f140d612e1
kubernetes-client-windows-386.tar.gz 86c591895cfee141b147d58d13af2c75cfb03a0ae615a70300a63a3a45132243
kubernetes-client-windows-amd64.tar.gz b2caa7e6a192c1333614b3aae412cdbbc764431c1e59ace53ca6792aa7ec6496

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz c66ad48fb37c6bd31e86f7633742eab7ccb136cd7268f1f642ca52fdb814f1a5
kubernetes-server-linux-arm.tar.gz 8ef4a278639f3335c033d385e57a286043b7172dc7613403f841f05486dc731a
kubernetes-server-linux-arm64.tar.gz 5987762c352155a5d378760e91af55c6180bdb25be1bf3799e9317d9435ab05a
kubernetes-server-linux-ppc64le.tar.gz 014409580ccc492caaee30e1136e88b4580608b1eedf2c9da96488a05b586110
kubernetes-server-linux-s390x.tar.gz dc2fb6e1f53e11fc161b617ceef09f4117e54e18ade24401813c934283e8ee6f

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 6398c87906dbd37ccd881ca4169713c512a7bd04e336f4c81d2497c460be855f
kubernetes-node-linux-arm.tar.gz 54e24107ac1f98fa75ce3c603c4f8c3edcf7277046deaff2cef55521147ac956
kubernetes-node-linux-arm64.tar.gz 7d9c8aa2ee5f2d6207a6bac9e32639ea14fe830e6bb57f2ab4fc4ad47b6772c4
kubernetes-node-linux-ppc64le.tar.gz 339ce8cb3e703fd2252e6978bfbdd2c26d46516ed8ef4f548e2e1fd2b7d4b49e
kubernetes-node-linux-s390x.tar.gz 896396437d74a8a1c8c310de1666cc95d4d5bbee67c201c400c383e9fb6818f2
kubernetes-node-windows-amd64.tar.gz 9932e75059ffb8c9a7400ffd5620fb114fcd53961651f97b943298bb8a7dd24a

Changelog since v1.10.0

Other notable changes

  • Fix panic create/update CRD when mutating/validating webhook configured. (#61404, @hzxuzhonghu)
  • Add support to ingest log entries to Stackdriver against new "k8s_container" and "k8s_node" resources. (#62076, @qingling128)
  • new dhcp-domain parameter to be used for figuring out the hostname of a node (#61890, @dims)
  • Extend the Stackdriver Metadata Agent by adding a new Deployment for ingesting unscheduled pods, and services. (#62043, @supriyagarg)
  • Fixed a panic in kubectl run --attach ... when the api server failed to create the runtime object (due to name conflict, PSP restriction, etc.) (#61713, @mountkin)
  • Fix a bug that fluentd doesn't inject container logs for CRI container runtimes (containerd, cri-o etc.) into elasticsearch on GCE. (#61818, @Random-Liu)
  • fix local volume issue on Windows (#62012, @andyzhangx)
  • Fixed bug in rbd-nbd utility when nbd is used. (#62168, @piontec)
  • GCE: Updates GLBC version to 1.0.1 which includes a fix which prevents multi-cluster ingress objects from creating full load balancers. (#62075, @nicksardo)
  • Fix GCE etcd scripts to pass in all required parameters for the etcd migration utility to correctly perform HA upgrades and downgrades (#61960, @jpbetz)
  • Update kube-dns to Version 1.14.9. Major changes: (#61908, @MrHohn)
      • Fix for kube-dns returns NXDOMAIN when not yet synced with apiserver.
      • Don't generate empty record for externalName service.
      • Add validation for upstreamNameserver port.
      • Update go version to 1.9.3.
  • kubectl: improves compatibility with older servers when creating/updating API objects (#61949, @liggitt)
  • Bound cloud allocator to 10 retries with 100 ms delay between retries. (#61375, @satyasm)
  • Fixed #61123 by triggering syncer.Update on all cases including when a syncer is created (#61124, @satyasm)
    • on a new add event.
  • Add ipset and udevadm to the hyperkube base image. (#61357, @rphillips)
  • kubectl: restore the ability to show resource kinds when displaying multiple objects (#61985, @liggitt)
  • Remove 'system' prefix from Metadata Agent rbac configuration (#61394, @kawych)
  • Ensure cloudprovider.InstanceNotFound is reported when the VM is not found on Azure (#61531, @feiskyer)
  • kubectl: fixes issue with -o yaml and -o json omitting kind and apiVersion when used with --dry-run (#61808, @liggitt)
  • Bump Heapster to v1.5.2 (#61396, @kawych)
  • Support new NODE_OS_DISTRIBUTION 'custom' on GCE (#61235, @yguo0905)
  • Fix mounting of UNIX sockets(and other special files) in subpaths (#61480, @gnufied)
  • [fluentd-gcp addon] Update event-exporter image to have the latest base image. (#61727, @crassirostris)

v1.10.0

Documentation & Examples

Downloads for v1.10.0

filename sha256 hash
kubernetes.tar.gz a48d4f6eb4bf329a87915d2264250f2045aab1e8c6cc3e574a887ec42b5c6edc
kubernetes-src.tar.gz 3b51bf50370fc022f5e4578b071db6b63963cd64b35c41954d4a2a8f6738c0a7

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 8f35d820d21bfdb3186074eb2ed5212b983e119215356a7a76a9f773f2a1e6a3
kubernetes-client-darwin-amd64.tar.gz ae06d0cd8f6fa8d145a9dbdb77e6cba99ad9cfce98b01c766df1394c17443e42
kubernetes-client-linux-386.tar.gz 8147723a68763b9791def5b41d75745e835ddd82f23465a2ba7797b84ad73554
kubernetes-client-linux-amd64.tar.gz 845668fe2f854b05aa6f0b133314df83bb41a486a6ba613dbb1374bf3fbe8720
kubernetes-client-linux-arm.tar.gz 5d2552a6781ef0ecaf308fe6a02637faef217c98841196d4bd7c52a0f1a4bfa0
kubernetes-client-linux-arm64.tar.gz 9d5e4ba43ad7250429015f33f728c366daa81e894e8bfe8063d73ce990e82944
kubernetes-client-linux-ppc64le.tar.gz acabf3a26870303641ce60a59b5bb9702c8a7445b16f4293abc7868e91d252c8
kubernetes-client-linux-s390x.tar.gz 8d836df10b50d11434b5ee797aecc21714723f02fc47fe3dd600426eb83b9e38
kubernetes-client-windows-386.tar.gz ca183b66f910ff11fa468e47251c68d256ef145fcfc2d23d4347d066e7787971
kubernetes-client-windows-amd64.tar.gz 817aea754a059c635f4d690aa0232a8e77eb74e76357cafd8f10556972022e9e

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz f2e0505bee7d9217332b96be11d1b88c06f51049f7a44666b0ede80bfb92fdf6
kubernetes-server-linux-arm.tar.gz a7be68c32a299c98353633f3161f910c4b970c8364ccee5f98e1991364b3ce69
kubernetes-server-linux-arm64.tar.gz 4df4add2891d02101818653ac68b57e6ce4760fd298f47467ce767ac029f4508
kubernetes-server-linux-ppc64le.tar.gz 199b52461930c0218f984884069770fb7e6ceaf66342d5855b209ff1889025b8
kubernetes-server-linux-s390x.tar.gz 578f93fc22d2a5bec7dc36633946eb5b7359d96233a2ce74f8b3c5a231494584

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 8c03412881eaab5f3ea828bbb81e8ebcfc092d311b2685585817531fa7c2a289
kubernetes-node-linux-arm.tar.gz d6a413fcadb1b933a761ac9b0c864f596498a8ac3cc4922c1569306cd0047b1d
kubernetes-node-linux-arm64.tar.gz 46d6b74759fbc3b2aad42357f019dae0e882cd4639e499e31b5b029340dabd42
kubernetes-node-linux-ppc64le.tar.gz bdecc12feab2464ad917623ade0cbf58675e0566db38284b79445841d246fc08
kubernetes-node-linux-s390x.tar.gz afe35c2854f35939be75ccfb0ec81399acf4043ae7cf19dd6fbe6386288972c2
kubernetes-node-windows-amd64.tar.gz eac14e3420ca9769e067cbf929b5383cd77d56e460880a30c0df1bbfbb5a43db

Major Themes

Node

Many of the changes within SIG-Node revolve around control. With the beta release of the kubelet.config.k8s.io API group, a significant subset of Kubelet configuration can now be configured via a versioned config file. Kubernetes v1.10 adds alpha support for the ability to configure whether containers in a pod should share a single process namespace, and the CRI has been upgraded to v1alpha2, which adds support for Windows Container Configuration. Kubernetes v1.10 also ships with the beta release of the CRI validation test suite.

The Resource Management Working Group graduated three features to beta in the 1.10 release. First, CPU Manager, which allows users to request exclusive CPU cores. This helps performance in a variety of use-cases, including network latency sensitive applications, as well as applications that benefit from CPU cache residency. Next, Huge Pages, which allows pods to consume either 2Mi or 1Gi Huge Pages. This benefits applications that consume large amounts of memory. Use of Huge Pages is a common tuning recommendation for databases and JVMs. Finally, the Device Plugin feature, which provides a framework for vendors to advertise their resources to the Kubelet without changing Kubernetes core code. Targeted devices include GPUs, High-performance NICs, FPGAs, InfiniBand, and other similar computing resources that may require vendor specific initialization and setup.

Storage

This release brings additional power to both local storage and Persistent Volumes. Mount namespace propagation allows a container to mount a volume as rslave so that host mounts can be seen inside the container, or as rshared so that mounts made inside a container can be seen by the host. (Note that this is not supported on Windows.) Local Ephemeral Storage Capacity Isolation makes it possible to set requests and limits on ephemeral local storage resources. In addition, you can now create Local Persistent Storage, which enables PersistentVolumes to be created with locally attached disks, and not just network volumes.

On the Persistent Volumes side, this release Prevents deletion of Persistent Volume Claims that are used by a pod and Persistent Volumes that are bound to a Persistent Volume Claim, making it impossible to delete storage that is in use by a pod.

This release also includes Topology Aware Volume Scheduling for local persistent volumes, the stable release of Detailed storage metrics of internal state, and beta support for Out-of-tree CSI Volume Plugins.

Windows

This release continues to enable more existing features on Windows, including container CPU resources, image filesystem stats, and flexvolumes. It also adds Windows service control manager support and experimental support for Hyper-V isolation of single-container pods.

OpenStack

SIG-OpenStack updated the OpenStack provider to use newer APIs, consolidated community code into one repository, engaged with the Cloud Provider Working Group to have a consistent plan for moving provider code into individual repositories, improved testing of provider code, and strengthened ties with the OpenStack developer community.

API-machinery

API Aggregation has been upgraded to "stable" in Kubernetes 1.10, so you can use it in production. Webhooks have seen numerous improvements, including alpha Support for self-hosting authorizer webhooks.

Auth

This release lays the groundwork for new authentication methods, including the alpha release of External client-go credential providers and the TokenRequest API. In addition, Pod Security Policy now lets administrators decide what contexts pods can run in, and gives administrators the ability to limit node access to the API.

Azure

Kubernetes 1.10 includes alpha Azure support for cluster-autoscaler, as well as support for Azure Virtual Machine Scale Sets.

CLI

This release includes a change to kubectl get and describe to work better with extensions, as the server, rather than the client, returns this information for a smoother user experience.

Network

In terms of networking, Kubernetes 1.10 is about control. Users now have beta support for the ability to configure a pod's resolv.conf, rather than relying on the cluster DNS, as well as configuring the NodePort IP address. You can also switch the default DNS plugin to CoreDNS (beta).

Before Upgrading

  • If you need to downgrade from 1.10 to 1.9.x, downgrade to v1.9.6 to ensure PV and PVC objects can be deleted properly.

  • In-place node upgrades to this release from versions 1.7.14, 1.8.9, and 1.9.4 are not supported if using subpath volumes with PVCs. Such pods should be drained from the node first.

  • The minimum supported version of Docker is now 1.11; if you are using Docker 1.10 or below, be sure to upgrade Docker before upgrading Kubernetes. (#57845, @yujuhong)

  • The Container Runtime Interface (CRI) version has increased from v1alpha1 to v1alpha2. Runtimes implementing the CRI will need to update to the new version, which configures container namespaces using an enumeration rather than booleans. This change to the alpha API is not backwards compatible; implementations of the CRI such as containerd, will need to update to the new API version. (#58973, @verb)

  • The default Flexvolume plugin directory for COS images on GCE has changed to /home/kubernetes/flexvolume, rather than /etc/srv/kubernetes/kubelet-plugins/volume/exec. Existing Flexvolume installations in clusters using COS images must be moved to the new directory, and installation processes must be updated with the new path. (#58171, @verult)

  • Default values differ between the Kubelet's componentconfig (config file) API and the Kubelet's command line. Be sure to review the default values when migrating to using a config file. For example, the authz mode is set to "AlwaysAllow" if you rely on the command line, but defaults to the more secure "Webhook" mode if you load config from a file. (#59666, @mtaufen)

  • [GCP kube-up.sh] Variables that were part of kube-env that were only used for kubelet flags are no longer being set, and are being replaced by the more portable mechanism of the kubelet configuration file. The individual variables in the kube-env metadata entry were never meant to be a stable interface and this release note only applies if you are depending on them. (#60020, @roberthbailey)

  • kube-proxy: feature gates are now specified as a map when provided via a JSON or YAML KubeProxyConfiguration, rather than as a string of key-value pairs. For example:

KubeProxyConfiguration Before:

apiVersion: kubeproxy.config.k8s.io/v1alpha1
kind: KubeProxyConfiguration
**featureGates: "SupportIPVSProxyMode=true"**

KubeProxyConfiguration After:

apiVersion: kubeproxy.config.k8s.io/v1alpha1
kind: KubeProxyConfiguration
**featureGates:**
**  SupportIPVSProxyMode: true**

If your cluster was installed by kubeadm, you should edit the featureGates field in the kubeadm-config ConfigMap. You can do this using kubectl -n kube-system edit cm kubeadm-config before upgrading. For example:

kubeadm-config Before:

apiVersion: v1
kind: ConfigMap
metadata:
  name: kubeadm-config
data:
  MasterConfiguration: |
    kubeProxy:
      config:
        featureGates: "SupportIPVSProxyMode=true"

kubeadm-config After:

apiVersion: v1
kind: ConfigMap
metadata:
  name: kubeadm-config
data:
  MasterConfiguration: |
    kubeProxy:
      config:
        featureGates:
          SupportIPVSProxyMode: true

If no featureGates was specified in kubeadm-config, just change featureGates: "" to featureGates: {}.

(#57962, @xiangpengzhao)

  • The kubeletconfig API group has graduated from alpha to beta, and the name has changed to kubelet.config.k8s.io. Please use kubelet.config.k8s.io/v1beta1, as kubeletconfig/v1alpha1 is no longer available. (#53833, @mtaufen)

  • kube-apiserver: the experimental in-tree Keystone password authenticator has been removed in favor of extensions that enable use of Keystone tokens. (#59492, @dims)

  • The udpTimeoutMilliseconds field in the kube-proxy configuration file has been renamed to udpIdleTimeout. Administrators must update their files accordingly. (#57754, @ncdc)

  • The kubelet's --cloud-provider=auto-detect feature has been removed; make certain to specify the cloud provider. (#56287, @stewart-yu)

  • kube-apiserver: the OpenID Connect authenticator no longer accepts tokens from the Google v3 token APIs; users must switch to the "https://www.googleapis.com/oauth2/v4/token" endpoint.

  • kube-apiserver: the root /proxy paths have been removed (deprecated since v1.2). Use the /proxy subresources on objects that support HTTP proxying. (#59884, @mikedanese)

  • Eviction thresholds set to 0% or 100% will turn off eviction. (#59681, @mtaufen)

  • CustomResourceDefinitions: OpenAPI v3 validation schemas containing $refreferences are no longer permitted. Before upgrading, ensure CRD definitions do not include those $ref fields. (#58438, @carlory)

  • Webhooks now do not skip cluster-scoped resources. Before upgrading your Kubernetes clusters, double check whether you have configured webhooks for cluster-scoped objects (e.g., nodes, persistentVolume), as these webhooks will start to take effect. Delete/modify the configs if that's not desirable. (#58185, @caesarxuchao)

  • Using kubectl gcp auth plugin with a Google Service Account to authenticate to a cluster now additionally requests a token with the "userinfo.email" scope. This way, users can write ClusterRoleBindings/RoleBindings with the email address of the service account directly. (This is a breaking change if the numeric uniqueIDs of the Google service accounts were being used in RBAC role bindings. The behavior can be overridden by explicitly specifying the scope values as comma-separated string in the "users[*].config.scopes" field in the KUBECONFIG file.) This way, users can now set a Google Service Account JSON key in the GOOGLE_APPLICATION_CREDENTIALS environment variable, craft a kubeconfig file with GKE master IP+CA cert, and authenticate to GKE in headless mode without requiring gcloud CLI. (#58141, @ahmetb)

  • kubectl port-forward no longer supports the deprecated -p flag; the flag itself is unnecessary and should be replaced by just the <pod-name>. (#59705, @phsiao)

  • Removed deprecated --require-kubeconfig flag, removed default --kubeconfig value ((#58367, @zhangxiaoyu-zidif)

  • The public-address-override, address, and port flags have been removed and replaced by bind-address, insecure-bind-address, and insecure-port, respectively. They are marked as deprecated in #36604, which is more than a year ago. (#59018, @hzxuzhonghu)

  • The alpha --init-config-dir flag has been removed. Instead, use the --config flag to reference a kubelet configuration file directly. (#57624, @mtaufen)

  • Removed deprecated and unmaintained salt support. kubernetes-salt.tar.gz will no longer be published in the release tarball. (#58248, @mikedanese)

  • The deprecated –mode switch for GCE has been removed.(#61203)

  • The word “manifest” has been expunged from the Kubelet API. (#60314)

  • kubernetes#49213 sig-cluster-lifecycle has decided to phase out the cluster/ directory over the next couple of releases in favor of deployment automations maintained outside of the core repo and outside of kubernetes orgs. (@kubernetes/sig-cluster-lifecycle-misc)

  • The DaemonSet controller, its integration tests, and its e2e tests, have been updated to use the apps/v1 API. Users should, but are not yet required to, update their scripts accordingly. (#59883, @kow3ns)

  • MountPropagation feature is now beta. As a consequence, all volume mounts in containers are now rslave on Linux by default. To make this default work in all Linux environments the entire mount tree should be marked as shareable, e.g. via mount --make-rshared /. All Linux distributions that use systemd already have the root directory mounted as rshared and hence they need not do anything. In Linux environments without systemd we recommend running mount --make-rshared / during boot before docker is started, (@jsafrane)

Known Issues

  • If you need to downgrade from 1.10 to 1.9.x, downgrade to v1.9.6 to ensure PV and PVC objects can be deleted properly.

  • Use of subPath module with hostPath volumes can cause issues during reconstruction (#61446) and with containerized kubelets (#61456). The workaround for this issue is to specify the complete path in the hostPath volume. Use of subPathmounts nested within atomic writer volumes (configmap, secret, downwardAPI, projected) does not work (#61545), and socket files cannot be loaded from a subPath (#62377). Work on these issues is ongoing.

  • Kubeadm is currently omitting etcd certificates in a self-hosted deployment; this will be fixed in a point relelase. (#61322)

  • Some users, especially those with very large clusters, may see higher memory usage by the kube-controller-manager in 1.10. (#61041)

  • Due to an issue in ingress-gce controller in 1.10.0, creating multi-cluster ingresses with kubemci CLI fails. This will be fixed in 1.10.1 release. (GoogleCloudPlatform/k8s-multicluster-ingress#175)

Deprecations

  • etcd2 as a backend is deprecated and support will be removed in Kubernetes 1.13.

  • VolumeScheduling and LocalPersistentVolume features are beta and enabled by default. The PersistentVolume NodeAffinity alpha annotation is deprecated and will be removed in a future release. (#59391, @msau42)

  • The alpha Accelerators feature gate is deprecated and will be removed in v1.11. Please use device plugins (kubernetes/enhancements#368) instead. They can be enabled using the DevicePlugins feature gate. (#57384, @mindprince)

  • The ability to use kubectl scale jobs is deprecated. All other scale operations remain in place, but the ability to scale jobs will be removed in a future release. (#60139, @soltysh)

  • Flags that can be set via the Kubelet's --config file are now deprecated in favor of the file. (#60148, @mtaufen)

  • --show-all (which only affected pods and only for human readable/non-API printers) is now defaulted to true and deprecated. The flag determines whether pods in a terminal state are displayed. It will be inert in 1.11 and removed in a future release. (#60210, @deads2k)

  • The ability to use the insecure HTTP port of kube-controller-manager and cloud-controller-manager has been deprecated, and will be removed in a future release. Use --secure-port and --bind-address instead. (#59582, @sttts)

  • The ability to use the insecure flags --insecure-bind-address, --insecure-port in the apiserver has been deprecated and will be removed in a future release. Use --secure-port and --bind-address instead. (#59018, @hzxuzhonghu)

  • The recycling reclaim policy has been deprecated. Users should use dynamic provisioning instead. (#59063, @ayushpateria)

  • kube-apiserver flag --tls-ca-file has had no effect for some time. It is now deprecated and slated for removal in 1.11. If you are specifying this flag, you must remove it from your launch config before upgrading to 1.11. (#58968, @deads2k)

  • The PodSecurityPolicy API has been moved to the policy/v1beta1 API group. The PodSecurityPolicy API in the extensions/v1beta1 API group is deprecated and will be removed in a future release. Authorizations for using pod security policy resources should change to reference the policy API group after upgrading to 1.11. (#54933, @php-coder)

  • Add --enable-admission-plugins --disable-admission-plugins flags and deprecate --admission-control. When using the separate flag, the order in which they're specified doesn't matter. (#58123, @hzxuzhonghu)

  • The kubelet --docker-disable-shared-pid flag, which runs docker containers with a process namespace that is shared between all containers in a pod, is now deprecated and will be removed in a future release. It is replaced by v1.Pod.Spec.ShareProcessNamespace, which configures this behavior. This field is alpha and can be enabled with --feature-gates=PodShareProcessNamespace=true. (#58093, @verb)

  • The kubelet's cadvisor port has been deprecated. The default will change to 0 (disabled) in 1.12, and the cadvisor port will be removed entirely in 1.13. (#59827, @dashpole)

  • rktnetes has been deprecated in favor of rktlet. Please see https://github.com/kubernetes-incubator/rktlet for more information. (#58418, @yujuhong)

  • The Kubelet now explicitly registers all of its command-line flags with an internal flagset, which prevents flags from third party libraries from unintentionally leaking into the Kubelet's command-line API. Many unintentionally leaked flags are now marked deprecated, so that users have a chance to migrate away from them before they are removed. In addition, one previously leaked flag, --cloud-provider-gce-lb-src-cidrs, has been entirely removed from the Kubelet's command-line API, because it is irrelevant to Kubelet operation. The deprecated flags are:

    • --application_metrics_count_limit
    • --boot_id_file
    • --container_hints
    • --containerd
    • --docker
    • --docker_env_metadata_whitelist
    • --docker_only
    • --docker-tls
    • --docker-tls-ca
    • --docker-tls-cert
    • --docker-tls-key
    • --enable_load_reader
    • --event_storage_age_limit
    • --event_storage_event_limit
    • --global_housekeeping_interval
    • --google-json-key
    • --log_cadvisor_usage
    • --machine_id_file
    • --storage_driver_user
    • --storage_driver_password
    • --storage_driver_host
    • --storage_driver_db
    • --storage_driver_table
    • --storage_driver_secure
    • --storage_driver_buffer_duration

(#57613, @mtaufen)

  • The boostrapped RBAC role and rolebinding for the cloud-provider service account is now deprecated. If you're currently using this service account, you must create and apply your own RBAC policy for new clusters. (#59949, @nicksardo)

  • Format-separated endpoints for the OpenAPI spec, such as /swagger.json, /swagger-2.0.0.0.json, and so on, have been deprecated. The old endpoints will remain in 1.10, 1.11, 1.12 and 1.13, and get removed in 1.14. Please use single /openapi/v2 endpoint with the appropriate Accept: header instead. For example:

previous now
GET /swagger.json GET /openapi/v2 Accept: application/json
GET /swagger-2.0.0.pb-v1 GET /openapi/v2 Accept: application/[email protected]+protobuf
GET /swagger-2.0.0.pb-v1.gz GET /openapi/v2 Accept: application/[email protected]+protobuf Accept-Encoding: gzip

(#59293, @roycaihw)

Other Notable Changes

Apps

  • Updated defaultbackend image to 1.4 and deployment apiVersion to apps/v1. Users should concentrate on updating scripts to the new version. (#57866, @zouyee)

  • Fix StatefulSet to work correctly with set-based selectors. (#59365, @ayushpateria)

  • Fixes a case when Deployment with recreate strategy could get stuck on old failed Pod. (#60301, @tnozicka)

  • ConfigMap objects now support binary data via a new binaryData field. When using kubectl create configmap --from-file, files containing non-UTF8 data will be placed in this new field in order to preserve the non-UTF8 data. Note that kubectl's --append-hash feature doesn't take binaryData into account. Use of this feature requires 1.10+ apiserver and kubelets. (#57938, @dims)

AWS

  • Add AWS cloud provider option to use an assumed IAM role. For example, this allows running Controller Manager in a account separate from the worker nodes, but still allows all resources created to interact with the workers. ELBs created would be in the same account as the worker nodes for instance.(#59668, @brycecarman)

  • AWS EBS volume plugin now includes block and volumeMode support. (#58625, @screeley44)

  • On AWS kubelet returns an error when started under conditions that do not allow it to work (AWS has not yet tagged the instance), rather than failing silently. (#60125, @vainu-arto)

  • AWS Security Groups created for ELBs will now be tagged with the same additional tags as the ELB; that is, the tags specified by the "service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags" annotation. This is useful for identifying orphaned resources. (#58767, @2rs2ts)

  • AWS Network Load Balancers will now be deleted properly, including security group rules. Fixes #57568 (#57569, @micahhausler)

  • Time for attach/detach retry operations has been decreased from 10-12s to 2-6s (#56974, @gnufied)

Auth

  • Contexts must be named in kubeconfigs. (#56769, @dixudx)

  • vSphere operations will no longer fail due to authentication errors. (#57978, @prashima)

  • This removes the cloud-provider role and role binding from the rbac boostrapper and replaces it with a policy applied via addon mgr. This also creates a new clusterrole allowing the service account to create events for any namespace.

  • client-go: alpha support for out-of-tree exec-based credential providers. For example, a cloud provider could create their own authentication system rather than using the standard authentication provided with Kubernetes. (#59495, @ericchiang)

  • The node authorizer now allows nodes to request service account tokens for the service accounts of pods running on them. This allows agents using the node identity to take actions on behalf of local pods. (#55019, @mikedanese)

  • kube-apiserver: the OpenID Connect authenticator can now verify ID Tokens signed with JOSE algorithms other than RS256 through the --oidc-signing-algs flag. (#58544, @ericchiang)

  • Requests with invalid credentials no longer match audit policy rules where users or groups are set, correcting a problem where authorized requests were getting through. (#59398, @CaoShuFeng)

  • The Stackdriver Metadata Agent addon now includes RBAC manifests, enabling it to watch nodes and pods. (#57455, @kawych)

  • Fix RBAC role for certificate controller to allow cleaning up of Certificate Signing Requests that are Approved and issued or Denied. (#59375, @mikedanese)

  • kube-apiserver: Use of the --admission-control-config-file with a file containing an AdmissionConfiguration apiserver.k8s.io/v1alpha1 config object no longer leads to an error when launching kube-apiserver. (#58439 @liggitt)

  • Default enabled admission plugins are now NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota. Please note that if you previously had not set the --admission-control flag, your cluster behavior may change (to be more standard). (#58684, @hzxuzhonghu)

  • Encryption key and encryption provider rotation now works properly. (#58375, @liggitt)

  • RBAC: The system:kubelet-api-admin cluster role can be used to grant full access to the kubelet API so integrators can grant this role to the --kubelet-client-certificate credential given to the apiserver. (#57128, @liggitt)

  • DenyEscalatingExec admission controller now checks psp HostNetwork as well as hostIPC and hostPID. hostNetwork is also checked to deny exec /attach. (#56839, @hzxuzhonghu)

  • When using Role-Based Access Control, the "admin", "edit", and "view" roles now have the expected permissions on NetworkPolicy resources, rather than reserving those permissions to only cluster-admin. (#56650, @danwinship)

  • Added docker-logins config to kubernetes-worker charm. (#56217, @Cynerva)

  • Add ability to control primary GID of containers through Pod Spec at Pod level and Per Container SecurityContext level. (#52077, @krmayankk)

CLI

  • Use structured generator for kubectl autoscale. (#55913, @wackxu)

  • Allow kubectl to set image|env on a cronjob (#57742, @soltysh)

  • Fixed crash in kubectl cp when path has multiple leading slashes. (#58144, @tomerf)

  • kubectl port-forward now allows using resource name (e.g., deployment/www) to select a matching pod, as well as the use of --pod-running-timeout to wait until at least one pod is running. (#59705, @phsiao)

  • 'cj' has been added as a shortname for CronJobs, as in kubectl get cj (#59499, @soltysh)

  • crds has been added as a shortname for CustomResourceDefinition, as in kubectl get crds (#59061, @nikhita)

  • Fix kubectl explain for resources not existing in default version of API group, such as batch/v1, Kind=CronJob. (#58753, @soltysh)

  • Added the ability to select pods in a chosen node to be drained based on given pod label-selector. (#56864, @juanvallejo)

  • Kubectl explain now prints out the Kind and API version of the resource being explained. (#55689, @luksa)

Cluster Lifecycle

  • The default Kubernetes version for kubeadm is now 1.10. (#61127, @timothysc)

  • The minimum Kubernetes version in kubeadm is now v1.9.0. (#57233, @xiangpengzhao)

  • Fixes a bug in Heapster deployment for google sink. (#57902, @kawych)

  • On cluster provision or upgrade, kubeadm now generates certs and secures all connections to the etcd static-pod with mTLS. This includes the etcd serving cert, the etcd peer cert, and the apiserver etcd client cert. Flags and hostMounts are added to the etcd and apiserver static-pods to load these certs. For connections to etcd, https is now used in favor of http. (#57415, @stealthybox) These certs are also generated on upgrade. (#60385, @stealthybox)

  • Demoted controlplane passthrough flags apiserver-extra-args, controller-manager-extra-args, scheduler-extra-args to alpha flags (#59882, @kris-nova)

  • The new flag --apiserver-advertise-dns-address is used in the node's kubelet.confg to point to the API server, allowing users to define a DNS entry instead of an IP address. (#59288, @stevesloka)

  • MasterConfiguration manifiest The criSocket flag is now usable within the MasterConfiguration and NodeConfiguration manifest files that exist for configuring kubeadm. Before it only existed as a command line flag and was not able to be configured when using the --config flag and the manifest files. (#59057)(#59292, @JordanFaust)

  • kubeadm init can now omit the tainting of the master node if configured to do so in kubeadm.yaml using noTaintMaster: true. For example, uses can create a file with the content:

apiVersion: [kubeadm.k8s.io/v1alpha1](http://kubeadm.k8s.io/v1alpha1)
kind: MasterConfiguration
kubernetesVersion: v1.9.1
noTaintMaster: true

And point to the file using the --config flag, as in

kubeadm init --config /etc/kubeadm/kubeadm.yaml

(#55479, @ijc)

  • kubeadm: New "imagePullPolicy" option in the init configuration file, that gets forwarded to kubelet static pods to control pull policy for etcd and control plane images. This option allows for precise image pull policy specification for master nodes and thus for more tight control over images. It is useful in CI environments and in environments, where the user has total control over master VM templates (thus, the master VM templates can be preloaded with the required Docker images for the control plane services). (#58960, @rosti)

  • Fixed issue with charm upgrades resulting in an error state. (#59064, @hyperbolic2346)

  • kube-apiserver --advertise-address is now set using downward API for self-hosted Kubernetes with kubeadm. (#56084, @andrewsykim)

  • When using client or server certificate rotation, the Kubelet will no longer wait until the initial rotation succeeds or fails before starting static pods. This makes running self-hosted masters with rotation more predictable. (#58930, @smarterclayton)

  • Kubeadm no longer throws an error for the --cloud-provider=external flag. (#58259, @dims)

  • Added support for network spaces in the kubeapi-load-balancer charm. (#58708, @hyperbolic2346)

  • Added support for network spaces in the kubernetes-master charm. (#58704, @hyperbolic2346)

  • Added support for network spaces in the kubernetes-worker charm. (#58523, @hyperbolic2346)

  • Added support for changing nginx and default backend images to kubernetes-worker config. (#58542, @hyperbolic2346)

  • kubeadm now accepts --apiserver-extra-args, --controller-manager-extra-args and --scheduler-extra-args, making it possible to override / specify additional flags for control plane components. One good example is to deploy Kubernetes with a different admission-control flag on API server. (#58080, @simonferquel)

  • Alpha Initializers have been removed from kubeadm admission control. Kubeadm users who still want to use Initializers can use apiServerExtraArgs through the kubeadm config file to enable it when booting up the cluster. (#58428, @dixudx)

  • ValidatingAdmissionWebhook and MutatingAdmissionWebhook are beta, and are enabled in kubeadm by default. (#58255, @dixudx)

  • Add proxy_read_timeout flag to kubeapi_load_balancer charm. (#57926, @wwwtyro)

  • Check for known manifests during preflight instead of only checking for non-empty manifests directory. This makes the preflight checks less heavy-handed by specifically checking for well-known files (kube-apiserver.yaml, kube-controller-manager.yaml, kube-scheduler.yaml, etcd.yaml) in /etc/kubernetes/manifests instead of simply checking for a non-empty directory. (#57287, @mattkelly)

  • PVC Protection alpha feature was renamed to Storage Protection. The Storage Protection feature is beta. (#59052, @pospispa)

  • iSCSI sessions managed by kubernetes will now explicitly set startup.mode to 'manual' to prevent automatic login after node failure recovery. This is the default open-iscsi mode, so this change will only impact users who have changed their startup.mode to be 'automatic' in /etc/iscsi/iscsid.conf. (#57475, @stmcginnis)

  • The IPVS feature gateway is now enabled by default in kubeadm, which makes the --feature-gates=SupportIPVSProxyMode=true obsolete, and it is no longer supported. (#60540, @m1093782566)

GCP

Instrumentation

  • For advanced auditing, audit policy supports subresources wildcard matching, such as "resource/", "/subresource","*". (#55306, @hzxuzhonghu)

  • Auditing is now enabled behind a featureGate in kubeadm. A user can supply their own audit policy with configuration option as well as a place for the audit logs to live. If no policy is supplied a default policy will be provided. The default policy will log all Metadata level policy logs. It is the example provided in the documentation. (#59067, @chuckha)

  • Reduce Metrics Server memory requirement from 140Mi + 4Mi per node to 40Mi + 4Mi per node. (#58391, @kawych)

  • Annotations is added to advanced audit api. (#58806, @CaoShuFeng)

  • Reorganized iptables rules to fix a performance regression on clusters with thousands of services. (#56164, @danwinship)

  • Container runtime daemon (e.g. dockerd) logs in GCE cluster will be uploaded to stackdriver and elasticsearch with tag container-runtime. (#59103, @Random-Liu)

  • Enable prometheus apiserver metrics for custom resources. (#57682, @nikhita)

  • Add apiserver metric for number of requests dropped because of inflight limit, making it easier to figure out on which dimension the master is overloaded. (#58340, @gmarek)

  • The Metrics Server now exposes metrics via the /metric endpoint. These metrics are in the prometheus format. (#57456, @kawych)

  • Reduced the CPU and memory requests for the Metrics Server Nanny sidecar container to free up unused resources. (#57252, @kawych)

  • Enabled log rotation for load balancer's api logs to prevent running out of disk space. (#56979, @hyperbolic2346)

  • Fixed etcd-version-monitor to backward compatibly support etcd 3.1 go-grpc-prometheus metrics format. (#56871, @jpbetz)

Node

  • Summary of Container Runtime changes:

    • [beta] cri-tools: CLI and validation tools for CRI is now v1.0.0-beta.0. This release mainly focused on UX improvements. [@feiskyer]
    • [stable] containerd: containerd v1.1 natively supports CRI v1alpha2 now, so users can use Kubernetes v1.10 with containerd v1.1 directly, without having to use the intermediate cri-containerd daemon. All Kubernetes 1.10 tests passed. [@Random-Liu]
    • [stable] cri-o: cri-o v1.10 updated CRI version to v1alpha2 and made several bug and stability fixes. [@mrunalp]
    • [stable] frakti: frakti v1.10 implemented GCE Persistent Disk as a high performance volume, fixed several bugs, added ARM64 support, and passed all CRI validation conformance tests and node e2e conformance tests. [@resouer]
    • [alpha] CRI now supports specifying the GID of the container at both LinuxSandboxSecurityContext and LinuxContainerSecurityContext in addition to specifying the UID. Support is implemented for dockershim. [@krmayankk]
  • Fixed race conditions around devicemanager Allocate() and endpoint deletion. (#60856, @jiayingz)

  • kubelet initial flag parse now normalizes flags instead of exiting. (#61053, @andrewsykim)

  • Fixed regression where kubelet --cpu-cfs-quota flag did not work when --cgroups-per-qos was enabled (#61294, @derekwaynecarr)

  • Kubelet now supports container log rotation for container runtimes implementing CRI (container runtime interface). The feature can be enabled with feature gate CRIContainerLogRotation. The flags --container-log-max-size and --container-log-max-files can be used to configure the rotation behavior. (#59898, @Random-Liu)

  • Fixed a bug where if an error was returned that was not an autorest.DetailedError we would return "not found", nil which caused nodes to go to NotReady state. (#57484, @brendandburns)

  • HugePages feature is beta, and thus enabled by default. (#56939, @derekwaynecarr)

  • Avoid panic when failing to allocate a Cloud CIDR (aka GCE Alias IP Range). (#58186, @negz)

  • 'none' can now be specified in KubeletConfiguration.EnforceNodeAllocatable (--enforce-node-allocatable) to explicitly disable enforcement. (#59515, @mtaufen)

  • The alpha KubeletConfiguration.ConfigTrialDuration field is no longer available. It can still be set using the dynamic configuration alpha feature. (#59628, @mtaufen)

  • Summary API will include pod CPU and Memory stats for CRI container runtime. (#60328, @Random-Liu)

  • Some field names in the Kubelet's now v1beta1 config API differ from the v1alpha1 API: for example, PodManifestPath is renamed to StaticPodPath, ManifestURL is renamed to StaticPodURL, and ManifestURLHeader is renamed to StaticPodURLHeader. Users should focus on switching to the v1beta1 API. (#60314, @mtaufen)

  • The DevicePlugins feature has graduated to beta, and is now enabled by default; users should focus on moving to the v1beta API if possible. (#60170, @jiayingz)

  • Per-cpu metrics have been disabled by default for to improve scalability. (#60106, @dashpole)

  • When the PodShareProcessNamespace alpha feature is enabled, setting pod.Spec.ShareProcessNamespace to true will cause a single process namespace to be shared between all containers in a pod. (#58716, @verb)

  • Resource quotas on extended resources such as GPUs are now supported. (#57302, @lichuqiang)

  • If the TaintNodesByCondition is enabled, a node will be tainted when it is under PID pressure. (#60008, @k82cn)

  • The Kubelet Summary API will now include total usage of pods through the "pods" SystemContainer. (#57802, @dashpole)

  • vSphere Cloud Provider supports VMs provisioned on vSphere v6.5. (#59519, @abrarshivani)

  • Created k8s.gcr.io image repo alias to pull images from the closest regional repo. Replaces gcr.io/google_containers. (#57824, @thockin)

  • Fix the bug where kubelet in the standalone mode would wait for the update from the apiserver source, even if there wasn't one. (#59276, @roboll)

  • Changes secret, configMap, downwardAPI and projected volumes to mount read-only, instead of allowing applications to write data and then reverting it automatically. Until version 1.11, setting the feature gate ReadOnlyAPIDataVolumes=false will preserve the old behavior. (#58720, @joelsmith)

  • Fixes a bug where kubelet crashes trying to free memory under memory pressure. (#58574, @yastij)

  • New alpha feature limits the number of processes running in a pod. Cluster administrators will be able to place limits by using the new kubelet command line parameter --pod-max-pids. Note that since this is a alpha feature they will need to enable the "SupportPodPidsLimit" feature. By default, we do not set any maximum limit, If an administrator wants to enable this, they should enable SupportPodPidsLimit=true in the --feature-gates= parameter to kubelet and specify the limit using the --pod-max-pids parameter. The limit set is the total count of all processes running in all containers in the pod. (#57973,@dims)

  • Fixes bug finding master replicas in GCE when running multiple Kubernetes clusters. (#58561, @jesseshieh)

  • --tls-min-version on kubelet and kube-apiserver allow for configuring minimum TLS versions (#58528, @deads2k)

  • Fix a bug affecting nested data volumes such as secret, configmap, etc. (#57422, @joelsmith)

  • kubelet will no longer attempt to remove images being used by running containers when garbage collecting. (#57020, @dixudx)

  • Allow kubernetes components to react to SIGTERM signal and shutdown gracefully. (#57756, @mborsz)

  • Fixed garbage collection and resource quota issue when the controller-manager uses --leader-elect=false (#57340, @jmcmeek)

  • Fixed issue creating docker secrets with kubectl 1.9 for accessing docker private registries. (#57463, @dims)

  • The CPU Manager feature is now beta, and is enabled by default, but the default policy is no-op so no action is required. (#55977, @ConnorDoyle)

OpenStack

  • Fixed a bug in the OpenStack cloud provider where dual stack deployments (IPv4 and IPv6) did not work well when using kubenet as the network plugin. (#59749, @zioproto)

  • Fixed a bug that tries to use the octavia client to query flip. (#59075, @jrperritt)

  • Kubernetes now registers metadata.hostname as node name for OpenStack nodes, eliminating a problem with invalid node names. (#58502, @dixudx)

  • Authentication information for OpenStack cloud provider can now be specified as environment variables. When we convert the OpenStack cloud provider to run in an external process, we can now use the kubernetes Secrets capability to inject the OS_* variables. This way we can specify the cloud configuration as a configmap, and specify secrets for the userid/password information. The configmap is mounted as a file, and the secrets are made available as environment variables. The external controller itself runs as a pod/daemonset. For backward compatibility, we preload all the OS_* variables, and if anything is in the config file, then that overrides the environment variables. (#58300, @dims)

  • Fixed issue when using OpenStack config drive for node metadata. Since we need to run commands such as blkid, we need to ensure that api server and kube controller are running in the privileged mode. (#57561, @dims)

  • Orphaned routes are properly removed from terminated instances. (#56258, @databus23)

  • OpenStack Cinder will now detach properly when Nova is shut down. (#56846, @zetaab)

Scalability

  • Added the ability to limit the increase in apiserver memory usage when audit logging with buffering is enabled. (#61118, @shyamjvs)

  • Upgrade to etcd client 3.2.13 and grpc 1.7.5 to improve HA etcd cluster stability. (#57480, @jpbetz)

Storage

  • Fixes CVE-2017-1002101 - See https://issue.k8s.io/60813 for details on this major security fix. (#61044, @liggitt)

  • Fixed missing error checking that could cause kubelet to crash in a race condition. (#60962, @technicianted)

  • Fixed a regression that prevented using subPath volume mounts with secret, configMap, projected, and downwardAPI volumes. (#61080, @liggitt)

  • K8s supports cephfs fuse mount. (#55866, @zhangxiaoyu-zidif)

  • Use GiB unit for creating and resizing volumes for Glusterfs. (#56581, @gnufied)

  • Adding support for Block Volume type to rbd plugin. (#56651, @sbezverk)

  • Add FSType for CSI volume source to specify filesystems (alpha defaults to ext4) (#58209, @NickrenREN)

  • Enabled File system resize of mounted volumes. (#58794, @gnufied)

  • The Local Volume Plugin has been updated to support Block volumeMode PVs. With this change, it is now possible to create local volume PVs for raw block devices. (#59303, @dhirajh)

  • Fixed an issue where Portworx volume driver wasn't passing namespace and annotations to the Portworx Create API. (#59607, @harsh-px)

  • Addressed breaking changes introduced by new 0.2.0 release of CSI spec. Specifically, csi.Version was removed from all API calls and CcontrollerProbe and NodeProbe were consolidated into a single Probe API call. (#59209, @sbezverk)

  • GCE PD volume plugin now supports block volumes. (#58710, @screeley44)

  • Implements MountDevice and UnmountDevice for the CSI Plugin, the functions will call through to NodeStageVolume/NodeUnstageVolume for CSI plugins. (#60115, @davidz627)

  • The LocalStorageCapacityIsolation feature is beta and enabled by default. The LocalStorageCapacityIsolation feature added a new resource type ResourceEphemeralStorage "ephemeral-storage" so that this resource can be allocated, limited, and consumed as the same way as CPU/memory. All the features related to resource management (resource request/limit, quota, limitrange) are available for local ephemeral storage. This local ephemeral storage represents the storage for root file system, which will be consumed by containers' writable layer and logs. Some volumes such as emptyDir might also consume this storage. (#60159, @jingxu97)

  • VolumeScheduling and LocalPersistentVolume features are beta and enabled by default. The PersistentVolume NodeAffinity alpha annotation is deprecated and will be removed in a future release. (#59391, @msau42)

  • K8s now supports rbd-nbd for Ceph rbd volume mounts. (#58916, @ianchakeres)

  • CSI now allows credentials to be specified on CreateVolume/DeleteVolume, ControllerPublishVolume/ControllerUnpublishVolume, and NodePublishVolume/NodeUnpublishVolume operations. Before this change all API calls had to fetch key/value stored in secret and use it to authenticate/authorize these operations. With this change API calls receive key/value as a input parameter so they not need to know where and how credentials were stored and fetched. Main goal was to make these API calls CO (Container Orchestrator) agnostic. (#60118, @sbezverk)

  • StorageOS volume plugin has been updated to support mount options and environments where the kubelet runs in a container and the device location should be specified. (#58816, @croomes)

  • Get parent dir via canonical absolute path when trying to judge mount-point, fixing a problem that caused an NFS volume with improper permissions to get stuck in TERMINATING status. (#58433, @yue9944882)

  • Clusters with GCE feature 'DiskAlphaAPI' enabled can now dynamically provision GCE PD volumes. (#59447, @verult)

  • Added keyring parameter for Ceph RBD provisioner. (#58287, @madddi)

  • Added xfsprogs to hyperkube container image. (#56937, @redbaron)

  • Improved messages user gets during and after volume resizing is done, providing a clear message to the user explaining what to do when resizing is finished. (#58415, @gnufied)

  • MountPropagation feature is now beta. As consequence, all volume mounts in containers are now "rslave" on Linux by default. To make this default work in all Linux environments you should have entire mount tree marked as shareable via "mount --make-rshared /". All Linux distributions that use systemd already have root directory mounted as rshared and hence they need not do anything. In Linux environments without systemd we recommend running "mount --make-rshared /" during boot, before docker is started. (#59252, @jsafrane)

  • Volume metrics support for vSphere Cloud Provider has been added. You can now monitor available space, capacity, and used space on volumes created using vSphere. (#59328, @divyenpatel)

  • Emit number of bound and unbound persistent volumes as Metrics. This PR adds four kinds of Volume Metrics for kube-controller-manager: bound PVC numbers, unbound PVC numbers, bound PV numbers and unbound PV numbers. The PVC metrics use namespace as dimension and the PV metrics use StorageClassName as its dimension. With these metrics we can better monitor the use of volumes in the cluster. (#57872, @mlmhl)

  • Add windows config to Kubelet CRI so that WindowsContainerResources can be managed. (#57076, @feiskyer)

  • PersistentVolumes that are bound to a PersistentVolumeClaim will not be deleted. (#58743, @NickrenREN)

  • The VolumeAttachment API is now available as V1beta1, and is enabled by default. The Alpha API is deprecated and will be removed in a future release. (#58462, @NickrenREN)

  • Add storage-backend configuration option to kubernetes-master charm. (#58830, @wwwtyro)

  • Fixed dynamic provisioning of GCE PDs to round to the next GB (base 1000) instead of GiB (base 1024). (#56600, @edisonxiang)

  • PersistentVolume flexVolume sources can now reference secrets in a namespace other than the PersistentVolumeClaim's namespace. (#56460, @liggitt)

Windows

  • kubelet and kube-proxy can now be run as native Windows services. (#60144, @alinbalutoiu)

  • WindowsContainerResources is set now for windows containers. (#59333, @feiskyer)

  • Disable mount propagation for windows containers (because it is not supported by the OS). (#60275, @feiskyer)

  • Fix image file system stats for windows nodes. (#59743, @feiskyer)

  • Kubernetes will now return an error if New-SmbGlobalMapping failed when mounting an azure file on Windows. (#59540, @andyzhangx)

  • Kubernetes now uses the more reliable GlobalMemoryStatusEx to get total physical memory on windows nodes. (#57124, @JiangtianLi)

  • Windows containers now support experimental Hyper-V isolation by setting annotation experimental.windows.kubernetes.io/isolation-type=hyperv and feature gates HyperVContainer. At the moment this function only supports one container per pod. (#58751, @feiskyer)

  • Get windows kernel version directly from registry rather than windows.getVersion(). (#58498, @feiskyer)

  • Fixed controller manager crash when using mixed case names in a vSphere cloud provider environment. (#57286, @rohitjogvmw)

  • Flexvolume is now enabled on Windows nodes. (#56921, @andyzhangx)

Autoscaling

  • The getSubnetIDForLB() returns subnet id rather than net id. (#58208, @FengyunPan)

  • kubectl scale can now scale any resource (kube, CRD, aggregate) conforming to the standard scale endpoint (#58298, @p0lyn0mial)

  • Cluster Autoscaler has been updated to Version 1.2.0, which includes fixes around GPUs and base image change. See https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.2.0for details. (#60842, @mwielgus)

  • Allows HorizontalPodAutoscaler to use global metrics not associated with any Kubernetes object (for example metrics from a hosting service running outside of the Kubernetes cluster). (#60096, @MaciekPytel)

  • fluentd-gcp resources can be modified via a ScalingPolicy. (#59657, @x13n)

  • Added anti-affinity to kube-dns pods. Otherwise the "no single point of failure" setting doesn't actually work (a single node failure can still take down the entire cluster). (#57683, @vainu-arto)

API-Machinery

  • Fixed webhooks to use the scheme provided in clientConfig, instead of defaulting to http. (#60943, @jennybuckley)

  • The webhook admission controller in a custom apiserver now works off-the-shelf. (#60995, @caesarxuchao)

  • Upgrade the default etcd server version to 3.1.12 to pick up critical etcd "mvcc "unsynced" watcher restore operation" fix. (#60998, @jpbetz)

  • Fixed bug allowing garbage collector to enter a broken state that could only be fixed by restarting the controller-manager. (#61201, @jennybuckley)

  • kube-apiserver: The external hostname no longer longer use the cloud provider API to select a default. It can be set explicitly using --external-hostname, if needed. If there is no default, AdvertiseAddress or os.Hostname() will be used, in that order. (#56812, @dims)

  • Custom resources can be listed with a set of grouped resources (category) by specifying the categories in the CustomResourceDefinition spec. Example: They can be used with kubectl get important, where important is a category. (#59561, @nikhita)

  • Fixed an issue making it possible to create a situation in which two webhooks make it impossible to delete each other. ValidatingWebhooks and MutatingWebhooks will not be called on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects in the admissionregistration.k8s.io group (#59840, @jennybuckley)

  • Fixed potential deadlock when deleting CustomResourceDefinition for custom resources with finalizers. (#60542, @liggitt)

  • A buffered audit backend can be used with other audit backends. (#60076, @crassirostris)

  • Introduced --http2-max-streams-per-connection command line flag on api-servers and set default to 1000 for aggregated API servers. (#60054, @MikeSpreitzer)

  • APIserver backed by etcdv3 exports metric shows number of resources per kind. (#59757, @gmarek)

  • Add kubectl create job --from-cronjob command. (#60084, @soltysh)

  • /status and /scale subresources have been added for custom resources. See kubernetes#55168 for more details. (#55168, @nikhita)

  • Restores the ability of older clients to delete and scale jobs with initContainers. (#59880, @liggitt)

  • Fixed a race condition causing apiserver crashes during etcd healthchecking. (#60069, @wojtek-t)

  • Fixed a race condition in k8s.io/client-go/tools/cache.SharedInformer that could violate the sequential delivery guarantee and cause panics on shutdown in Kubernetes 1.8.* and 1.9.*. (#59828, @krousey)

  • Add automatic etcd 3.2->3.1 and 3.1->3.0 minor version rollback support to gcr.io/google_container/etcd images. For HA clusters, all members must be stopped before performing a rollback. (#59298, @jpbetz)

  • The meta.k8s.io/v1alpha1 objects for retrieving tabular responses from the server (Table) or fetching just the ObjectMeta for an object (as PartialObjectMetadata) are now beta as part of meta.k8s.io/v1beta1 and configurations must be changed to use the new API. Clients may request alternate representations of normal Kubernetes objects by passing an Accept header like application/json;as=Table;g=meta.k8s.io;v=v1beta1 or application/json;as=PartialObjectMetadata;g=meta.k8s.io;v1=v1beta1. Older servers will ignore this representation or return an error if it is not available. Clients may request fallback to the normal object by adding a non-qualified mime-type to their Accept header like application/json - the server will then respond with either the alternate representation if it is supported or the fallback mime-type which is the normal object response. (#59059, @smarterclayton)

  • kube-apiserver now uses SSH tunnels for webhooks if the webhook is not directly routable from apiserver's network environment. (#58644, @yguo0905)

  • Access to externally managed IP addresses via the kube-apiserver service proxy subresource is no longer allowed by default. This can be re-enabled via the ServiceProxyAllowExternalIPs feature gate, but will be disallowed completely in 1.11 (#57265, @brendandburns)

  • The apiregistration.k8s.io (aggregation) is now generally available. Users should transition from the v1beta1 API to the v1 API. (#58393, @deads2k)

  • Fixes an issue where the resourceVersion of an object in a DELETE watch event was not the resourceVersion of the delete itself, but of the last update to the object. This could disrupt the ability of clients clients to re-establish watches properly. (#58547, @liggitt)

  • kube-apiserver: requests to endpoints handled by unavailable extension API servers (as indicated by an Available condition of false in the registered APIService) now return 503 errors instead of 404 errors. (#58070, @weekface)

  • Custom resources can now be submitted to and received from the API server in application/yaml format, consistent with other API resources. (#58260, @liggitt)

Network

  • Fixed kube-proxy to work correctly with iptables 1.6.2 and later. (#60978, @danwinship)

  • Makes the kube-dns addon optional so that users can deploy their own DNS solution. (#57113, @wwwtyro)

  • kubectl port-forward now supports specifying a service to port forward to, as in kubectl port-forward svc/myservice 8443:443. Additional support has also been added for looking up targetPort for a service, as well as enabling using svc/name to select a pod. (#59809, @phsiao)

  • Make NodePort IP addresses configurable. (#58052, @m1093782566)

  • Fixed the issue in kube-proxy iptables/ipvs mode to properly handle incorrect IP version. (#56880, @MrHohn)

  • Kubeadm: CoreDNS supports migration of the kube-dns configuration to CoreDNS configuration when upgrading the service discovery from kube-dns to CoreDNS as part of Beta. (#58828, @rajansandeep)

  • Adds BETA support for DNSConfig field in PodSpec and DNSPolicy=None, so configurable pod resolve.conf is now enabled by default. (#59771, @MrHohn)

  • Removed some redundant rules created by the iptables proxier to improve performance on systems with very many services. (#57461, @danwinship)

  • Fix an issue where port forwarding doesn't forward local TCP6 ports to the pod (#57457, @vfreex)

  • Correctly handle transient connection reset errors on GET requests from client library. (#58520, @porridge)

  • GCE: Allows existing internal load balancers to continue using a subnetwork that may have been wrongfully chosen due to a bug choosing subnetworks on automatic networks. (#57861, @nicksardo)

Azure

  • Set node external IP for azure node when disabling UseInstanceMetadata. (#60959, @feiskyer)

  • Changed default azure file/dir mode to 0755. (#56551, @andyzhangx)

  • Fixed azure file plugin failure issue on Windows after node restart. (#60625, @andyzhangx)(#60623, @feiskyer)

  • Fixed race condition issue when detaching azure disk, preventing Multi-Attach errors when scheduling one pod from one node to another. (#60183, @andyzhangx)

  • Add AzureDisk support for vmss nodes. (#59716, @feiskyer)

  • Map correct vmset name for Azure internal load balancers. (#59747, @feiskyer)

  • Node's providerID will now follow the Azure resource ID format (azure:///subscriptions/<id>/resourceGroups/<rg>/providers/Microsoft.Compute/virtualMachines/<node-name> rather than azure://d84a1c30-0c9f-11e8-8a34-000d3a919531) when useInstanceMetadata is enabled (#59539, @feiskyer)

  • Azure public IP is now correctly removed after a service is deleted. (#59340, @feiskyer)

  • Added PV size grow feature for azure filesystems. (#57017, @andyzhangx)

  • Ensured IP is set for Azure internal load balancer. (#59083, @feiskyer)

  • Set fsGroup by securityContext.fsGroup in azure file. However,f user both sets gid=xxx in mountOptions in azure storage class and securityContext.fsGroup, gid=xxx setting in mountOptions takes precedence. (#58316, @andyzhangx)

  • If an Azure disk is not found, K8s will immediately detach it. (#58345, @rootfs)

  • Instrumented the Azure cloud provider for Prometheus monitoring. (#58204, @cosmincojocar)

  • Fixed device name change issues for azure disk. (#57953, @andyzhangx) (#57549, @andyzhangx)

  • Support multiple scale sets in Azure cloud provider. (#57543, @feiskyer)

  • Support LoadBalancer for Azure Virtual Machine Scale Sets (#57131, @feiskyer)

  • Fixed incorrect error info when creating an azure file PVC failed. (#56550, @andyzhangx)

  • Added mount options support for azure disk. For example:

kind: StorageClass
apiVersion: storage.k8s.io/v1
metadata:
  name: hdd
provisioner: kubernetes.io/azure-disk
mountOptions:
  - barrier=1
  - acl
parameters:
  skuname: Standard_LRS
  kind: Managed
  fstype: ext3

(#56147, @andyzhangx)

Scheduling

  • Fixed a bug the in scheduler cache by using Pod UID as the cache key instead of namespace/name (#61069, @anfernee)

  • When TaintNodesByCondition is enabled, added node.kubernetes.io/unschedulable:NoSchedule (#61161, @k82cn)

  • kube-scheduler: Support extender managed extended resources in kube-scheduler (#60332, @yguo0905)

  • Updated priority of mirror pod according to PriorityClassName. (#58485, @k82cn)

  • kube-scheduler: restores default leader election behavior. Setting the --leader-elect command line parameter to true (#60524, @dims)

  • All pods with priorityClassName system-node-critical and system-cluster-critical will be critical pods while preserving backwards compatibility. (#58835, @ravisantoshgudimetla)

  • Priority admission controller picks a global default with the lowest priority value if more than one such default PriorityClass exists. (#59991, @bsalamat)

  • Disallow PriorityClass names with 'system-' prefix for user defined priority classes. (#59382, @bsalamat)

  • kube-scheduler: Use default predicates/prioritizers if they are unspecified in the policy config. (#59363, @yguo0905)

  • Scheduler should be able to read from config file if configmap is not present. (#59386, @ravisantoshgudimetla)

  • Add apiserver metric for current inflight-request usage. (#58342, @gmarek)

  • Stability: Make Pod delete event handling of scheduler more robust. (#58712, @bsalamat)* Allow scheduler set AlwaysCheckAllPredicates, short circuit all predicates if one predicate fails can greatly improve the scheduling performance. (#56926, @wgliang)

  • GCE: support passing kube-scheduler policy config via SCHEDULER_POLICY_CONFIG. This allows us to specify a customized scheduler policy configuration. (#57425, @yguo0905)

  • Returns an error for non overcommitable resources if they don't have limit field set in container spec to prevent users from creating invalid configurations. (#57170, @jiayingz)

  • GCE: Fixed ILB creation on automatic networks with manually created subnetworks. (#57351, @nicksardo)

  • Multiple Performance Improvements to the MatchInterPodAffinity predicate (#57476, @misterikkit)(#57477, @misterikkit)

  • The calico-node addon tolerates all NoExecute and NoSchedule taints by default. So Calico components can even be scheduled on tainted nodes. (#57122, @caseydavenport)

  • The scheduler skips pods that use a PVC that either does not exist or is being deleted. (#55957, @jsafrane)

Other changes

  • Updated dashboard version to v1.8.3, which keeps auto-generated certs in memory. (#57326, @floreks)

  • fluentd-gcp addon: Fixed bug with reporting metrics in event-exporter. (#60126, @serathius)

  • Avoid hook errors when effecting label changes on kubernetes-worker charm. (#59803, @wwwtyro)

  • Fixed charm issue where docker login would run prior to daemon options being set. (#59396, @kwmonroe)

  • Implementers of the cloud provider interface will note the addition of a context to this interface. Trivial code modification will be necessary for a cloud provider to continue to compile. (#59287, @cheftako)

  • Added configurable etcd quota backend bytes in GCE. (#59259, @wojtek-t)

  • GCP: allow a master to not include a metadata concealment firewall rule (if it's not running the metadata proxy). (#58104, @ihmccreery)

  • Fixed issue with kubernetes-worker option allow-privileged not properly handling the value True with a capital T. (#59116, @hyperbolic2346)

  • Controller-manager --service-sync-period flag has been removed. (It was never used in the code and should have no user impact.) (#59359, @khenidak)

  • [fluentd-gcp addon] Switch to the image provided by Stackdriver. The Stackdriver Logging Agent container image uses fluentd v0.14.25. (#59128, @bmoyles0117)

Non-user-facing Changes

  • CRI now uses moutpoint as image filesystem identifier instead of UUID. (#59475, @Random-Liu)

  • GCE: support Cloud TPU API in cloud provider (#58029, @yguo0905)

  • kubelet now notifies systemd that it has finished starting, if systemd is available and running. (#60654, @dcbw)

  • Do not count failed pods as unready in HPA controller (#60648, @bskiba)

  • fixed foreground deletion of podtemplates (#60683, @nilebox)

  • Conformance tests are added for the DaemonSet kinds in the apps/v1 group version. Deprecated versions of DaemonSet will not be tested for conformance, and conformance is only applicable to release 1.10 and later. (#60456, @kow3ns)

  • Log audit backend can now be configured to perform batching before writing events to disk. (#60237, @crassirostris)

  • New conformance tests added for the Garbage Collector (#60116, @jennybuckley)

  • Fixes a bug where character devices are not recognized by the kubelet (#60440, @andrewsykim)

  • StatefulSet in apps/v1 is now included in Conformance Tests. (#60336, @enisoc)

  • dockertools: disable memory swap on Linux. (#59404, @ohmystack)

  • Increase timeout of integration tests (#60458, @jennybuckley)

  • force node name lowercase on static pod name generating (#59849, @yue9944882

  • fix device name change issue for azure disk (#60346, @andyzhangx)

  • Additional changes to iptables kube-proxy backend to improve performance on clusters with very large numbers of services. (#60306, @danwinship)

  • add spelling checking script (#59463, @dixudx)

  • Use consts as predicate name in handlers (#59952, @resouer)

  • Fix instanceID for vmss nodes. (#59857, @feiskyer)

  • Increase allowed lag for ssh key sync loop in tunneler to allow for one failure (#60068, @wojtek-t)

  • Set an upper bound (5 minutes) on how long the Kubelet will wait before exiting when the client cert from disk is missing or invalid. This prevents the Kubelet from waiting forever without attempting to bootstrap a new client credentials. (#59316, @smarterclayton)

  • Add ipset binary for IPVS to hyperkube docker image (#57648, @Fsero)

  • Making sure CSI E2E test runs on a local cluster (#60017, @sbezverk)

  • Fix kubelet PVC stale metrics (#59170, @cofyc)

  • Separate current ARM rate limiter into read/write (#59830, @khenidak)

  • Improve control over how ARM rate limiter is used within Azure cloud provider, add generic cache for Azure VM/LB/NSG/RouteTable (#59520, @feiskyer)

  • fix typo (#59619, @jianliao82)

  • DaemonSet, Deployment, ReplicaSet, and StatefulSet objects are now persisted in etcd in apps/v1 format (#58854, @liggitt)

  • YAMLDecoder Read now tracks rest of buffer on io.ErrShortBuffer (#58817, @karlhungus)

  • Prevent kubelet from getting wedged if initialization of modules returns an error. (#59020, @brendandburns)

  • Fixed a race condition inside kubernetes-worker that would result in a temporary error situation. (#59005, @hyperbolic2346)

  • Fix regression in the CRI: do not add a default hostname on short image names (#58955, @runcom)

  • use containing API group when resolving shortname from discovery (#58741, @dixudx)

  • remove spaces from kubectl describe hpa (#56331, @shiywang)

  • fluentd-es addon: multiline stacktraces are now grouped into one entry automatically (#58063, @monotek)

  • Default scheduler code is moved out of the plugin directory. (#57852, @misterikkit)

  • CDK nginx ingress is now handled via a daemon set. (#57530, @hyperbolic2346)

  • Move local PV negative scheduling tests to integration (#57570, @sbezverk)

  • Only create Privileged PSP binding during e2e tests if RBAC is enabled. (#56382, @mikkeloscar)

  • ignore nonexistent ns net file error when deleting container network in case a retry (#57697, @dixudx)

  • Use old dns-ip mechanism with older cdk-addons. (#57403, @wwwtyro)

  • Retry 'connection refused' errors when setting up clusters on GCE. (#57394, @mborsz)

  • YAMLDecoder Read now returns the number of bytes read (#57000, @sel)

  • Drop hacks used for Mesos integration that was already removed from main kubernetes repository (#56754, @dims)

  • Compare correct file names for volume detach operation (#57053, @prashima)

  • Fixed documentation typo in IPVS README. (#56578, @shift)

  • The ConfigOK node condition has been renamed to KubeletConfigOk. (#59905, @mtaufen)

  • Adding pkg/kubelet/apis/deviceplugin/v1beta1 API. (#59588, @jiayingz)

  • Fixes volume predicate handler for equiv class (#59335, @resouer)

  • Bugfix: vSphere Cloud Provider (VCP) does not need any special service account anymore. (#59440, @rohitjogvmw)

  • fix the error prone account creation method of blob disk (#59739, @andyzhangx)

  • Updated kubernetes-worker to request new security tokens when the aws cloud provider changes the registered node name. (#59730, @hyperbolic2346)

  • Pod priority can be specified ins PodSpec even when the feature is disabled, but it will be effective only when the feature is enabled. (#59291, @bsalamat)* Add generic cache for Azure VMSS (#59652, @feiskyer)

  • fix the create azure file pvc failure if there is no storage account in current resource group (#56557, @andyzhangx)

  • Implement envelope service with gRPC, so that KMS providers can be pulled out from API server. (#55684, @wu-qiang)

  • Enable golint for pkg/scheduler and fix the golint errors in it. (#58437, @tossmilestone)

  • Ensure euqiv hash calculation is per schedule (#59245, @resouer)

  • Upped the timeout for apiserver communication in the juju kubernetes-worker charm. (#59219, @hyperbolic2346)

  • kubeadm init: skip checking cri socket in preflight checks (#58802, @dixudx)

  • Configurable etcd compaction frequency in GCE (#59106, @wojtek-t)

  • Fixed a bug which caused the apiserver reboot failure in the presence of malfunctioning webhooks. (#59073, @caesarxuchao)

  • GCE: Apiserver uses InternalIP as the most preferred kubelet address type by default. (#59019, @MrHohn)

  • CRI: Add a call to reopen log file for a container. (#58899, @yujuhong)

  • The alpha KubeletConfigFile feature gate has been removed, because it was redundant with the Kubelet's --config flag. It is no longer necessary to set this gate to use the flag. The --config flag is still considered alpha. (#58978, @mtaufen)

  • Fixing extra_sans option on master and load balancer. (#58843, @hyperbolic2346)

  • Ensure config has been created before attempting to launch ingress. (#58756, @wwwtyro)

  • Support metrics API in kubectl top commands. (#56206, @brancz)

  • Bump GCE metadata proxy to v0.1.9 to pick up security fixes. (#58221, @ihmccreery)

  • "ExternalTrafficLocalOnly" has been removed from feature gate. It has been a GA feature since v1.7. (#56948, @MrHohn)

  • feat(fakeclient): push event on watched channel on add/update/delete (#57504, @yue9944882)

  • Fixes a possible deadlock preventing quota from being recalculated (#58107, @ironcladlou)

  • Bump metadata proxy version to v0.1.7 to pick up security fix. (#57762, @ihmccreery)

  • The kubelet uses a new release 3.1 of the pause container with the Docker runtime. This version will clean up orphaned zombie processes that it inherits. (#57517, @verb)

  • Add cache for VM get operation in azure cloud provider (#57432, @karataliu)

  • Configurable liveness probe initial delays for etcd and kube-apiserver in GCE (#57749, @wojtek-t)

  • Fixed garbage collection hang (#57503, @liggitt

  • Improve scheduler performance of MatchInterPodAffinity predicate. (#57478, @misterikkit)

  • Add the path '/version/' to the system:discovery cluster role. (#57368, @brendandburns)

  • adding predicates ordering for the kubernetes scheduler. (#57168, @yastij)

  • Fix ipvs proxier nodeport ethassumption (#56685, @m1093782566)

  • Fix Heapster configuration and Metrics Server configuration to enable overriding default resource requirements. (#56965, @kawych)

  • Improved event generation in volume mount, attach, and extend operations (#56872, @davidz627)

  • Remove ScrubDNS interface from cloudprovider. (#56955, @feiskyer)

  • Fixed a garbage collection race condition where objects with ownerRefs pointing to cluster-scoped objects could be deleted incorrectly. (#57211, @liggitt)

  • api-server provides specific events when unable to repair a service cluster ip or node port (#54304, @frodenas)

  • delete useless params containerized (#56146, @jiulongzaitian)

  • dockershim now makes an Image's Labels available in the Info field of ImageStatusResponse (#58036, @shlevy)

  • Support GetLabelsForVolume in OpenStack Provider (#58871, @edisonxiang)

  • Add "nominatedNodeName" field to PodStatus. This field is set when a pod preempts other pods on the node. (#58990, @bsalamat)* Fix the PersistentVolumeLabel controller from initializing the PV labels when it's not the next pending initializer. (#56831, @jhorwit2)

  • Rename StorageProtection to StorageObjectInUseProtection (#59901, @NickrenREN)

  • Add support for cloud-controller-manager in local-up-cluster.sh (#57757, @dims)

  • GCE: A role and clusterrole will now be provided with GCE/GKE for allowing the cloud-provider to post warning events on all services and watching configmaps in the kube-system namespace. No user action is required. (#59686, @nicksardo)

  • Wait for kubedns to be ready when collecting the cluster IP. (#57337, @wwwtyro)

External Dependencies

  • The supported etcd server version is 3.1.12, as compared to 3.1.10 in v1.9 (#60998)
  • The validated docker versions are the same as for v1.9: 1.11.2 to 1.13.1 and 17.03.x (ref)
  • The Go version is go1.9.3, as compared to go1.9.2 in v1.9. (#59012)
  • The minimum supported go is the same as for v1.9: go1.9.1. (#55301)
  • CNI is the same as v1.9: v0.6.0 (#51250)
  • CSI is updated to 0.2.0 as compared to 0.1.0 in v1.9. (#60736)
  • The dashboard add-on has been updated to v1.8.3, as compared to 1.8.0 in v1.9. (#57326)
  • Heapster has is the same as v1.9: v1.5.0. It will be upgraded in v1.11. (ref)
  • Cluster Autoscaler has been updated to v1.2.0. (#60842, @mwielgus)
  • Updates kube-dns to v1.14.8 (#57918, @rramkumar1)
  • Influxdb is unchanged from v1.9: v1.3.3 (#53319)
  • Grafana is unchanged from v1.9: v4.4.3 (#53319)
  • CAdvisor is v0.29.1 (#60867)
  • fluentd-gcp-scaler is v0.3.0 (#61269)
  • Updated fluentd in fluentd-es-image to fluentd v1.1.0 (#58525, @monotek)
  • fluentd-elasticsearch is v2.0.4 (#58525)
  • Updated fluentd-gcp to v3.0.0. (#60722)
  • Ingress glbc is v1.0.0 (#61302)
  • OIDC authentication is coreos/go-oidc v2 (#58544)
  • Updated fluentd-gcp updated to v2.0.11. (#56927, @x13n)
  • Calico has been updated to v2.6.7 (#59130, @caseydavenport)

v1.10.0-rc.1

Documentation & Examples

Downloads for v1.10.0-rc.1

filename sha256 hash
kubernetes.tar.gz d7409a0bf36558b8328eefc01959920641f1fb2630fe3ac19b266fcea05a1646
kubernetes-src.tar.gz 4384bfe4151850e5d169b125c0cba51b7c2f00aa9972a6b4c22c44af74e8e3f8

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 1eb98b5d527ee9ed375f06df96c1158b9879880eb12d68a81e823d7a92e3866d
kubernetes-client-darwin-amd64.tar.gz be7e35e9698b84ace37e0ed54640c3958c0d9eea8bd413eb8b604ec02922321a
kubernetes-client-linux-386.tar.gz 825a80abdb1171e72c1660fb7854ed6e8290cb7cb54ebb88c3570b3f95e77a02
kubernetes-client-linux-amd64.tar.gz 97e22907c3f0780818b7124c50451ae78e930cd99ec8f96f188cdd080547e21b
kubernetes-client-linux-arm64.tar.gz d27674c7daec425f0fa72ca14695e7f13c81cfd08517ceb1f5ce1bb052b5b9b2
kubernetes-client-linux-arm.tar.gz e54f1fc7cf95981f54d68108ad0113396357ff0c7baaf6a76a635f0de21fb944
kubernetes-client-linux-ppc64le.tar.gz 7535a6668e6ca6888b22615439fae8c68d37d62f572b284755db87600050a6c6
kubernetes-client-linux-s390x.tar.gz 6a9f90e2ea5cb50b2691c45d327cca444ae9bfc41cba43ca22016679da940a71
kubernetes-client-windows-386.tar.gz cc5fef5e054588ad41870a379662d8429bd0f09500bcf4a67648bf6593d18aaf
kubernetes-client-windows-amd64.tar.gz a06033004c5cecc43494d95dd5d5e75f698cf8e4d358c229c5fef222c131b077

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz e844897e9a39ca14a449e077cb4e4f2dc6c7d5326b95a1e47bef3b6f9c6057f7
kubernetes-server-linux-arm64.tar.gz c15476626cd750a8f59c30c3389ada482995aea66b510c43732035d33e87e774
kubernetes-server-linux-arm.tar.gz 74a1ff7478d7ca5c4ccb2fb772ef13745a20cfb512e3e66f238abb98122cc4eb
kubernetes-server-linux-ppc64le.tar.gz 3b004717fe811352c15fe71f3122d2eaac7e0d1c4ff07d8810894c877b409c0f
kubernetes-server-linux-s390x.tar.gz b6ff40f13355b47e2c02c6c016ac334a3f5008769ed7b4377c617c2fc9e30b7a

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz a3a3e27c2b77fa46b7c9ff3b8bfdc672c2657e47fc4b1ca3d76cdc102ca27630
kubernetes-node-linux-arm64.tar.gz af172c9d71ba2d15e14354159ac34ca7fe112b7d2d2ba38325c467950aa04755
kubernetes-node-linux-arm.tar.gz fb904aa009c3309e92505ceff15863f83d9317af15cbf729bcbd198f5be3379f
kubernetes-node-linux-ppc64le.tar.gz 659f0091578e42b111417d45f708be2ac60447512e485dab7d2f4abaeee36f49
kubernetes-node-linux-s390x.tar.gz ce40dcc55ca299401ddf146b2622dd7f19532e95620bae63aea58a45a8020875
kubernetes-node-windows-amd64.tar.gz 0f8b5c551f58cdf298d41258483311cef66fe1b41093152a43120514a493b23d

Changelog since v1.10.0-beta.4

Other notable changes

  • Updates kubeadm default to use 1.10 (#61127, @timothysc)
  • Bump ingress-gce image in glbc.manifest to 1.0.0 (#61302, @rramkumar1)
  • Fix regression where kubelet --cpu-cfs-quota flag did not work when --cgroups-per-qos was enabled (#61294, @derekwaynecarr)
  • Fix bug allowing garbage collector to enter a broken state that could only be fixed by restarting the controller-manager. (#61201, @jennybuckley)
  • When TaintNodesByCondition enabled, added node.kubernetes.io/unschedulable:NoSchedule (#61161, @k82cn)
    • taint to the node if spec.Unschedulable is true.
    • When ScheduleDaemonSetPods enabled, node.kubernetes.io/unschedulable:NoSchedule
    • toleration is added automatically to DaemonSet Pods; so the unschedulable field of
    • a node is not respected by the DaemonSet controller.
  • Fixed kube-proxy to work correctly with iptables 1.6.2 and later. (#60978, @danwinship)
  • Audit logging with buffering enabled can increase apiserver memory usage (e.g. up to 200MB in 100-node cluster). The increase is bounded by the buffer size (configurable). Ref: issue #60500 (#61118, @shyamjvs)
  • Fix a bug in scheduler cache by using Pod UID as the cache key instead of namespace/name (#61069, @anfernee)

v1.10.0-beta.4

Documentation & Examples

Downloads for v1.10.0-beta.4

filename sha256 hash
kubernetes.tar.gz 69132f3edcf549c686055903e8ef007f0c92ec05a8ec1e3fea4d5b4dc4685580
kubernetes-src.tar.gz 60ba32e493c0a1449cdbd615d709e9d46780c91c88255e8e9f468c5e4e124576

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 80ef567c51aa705511ca20fbfcad2e85f1dc4fb750c0f58e0d82f4166359273f
kubernetes-client-darwin-amd64.tar.gz 925830f3c6c135adec206012ae94807b58b9438008ae87881e7a9d648ab993ec
kubernetes-client-linux-386.tar.gz 9e4f40325a27b79f16eb3254c6283d67e2fecd313535b300f9931800e4c495a4
kubernetes-client-linux-amd64.tar.gz 85ee9bfa519e49283ab711c73f52809f8fc43616cc2076dc060987e6f262ff95
kubernetes-client-linux-arm.tar.gz f0123581243a278052413e862208a797e78e7689c6dba0da08ab3200feedd66c
kubernetes-client-linux-arm64.tar.gz dd19b034e1798f5bb0b1c6230ef294ca8f3ef7944837c5d49dce4659bb284b8e
kubernetes-client-linux-ppc64le.tar.gz 84a46003fe0140f8ecec03befceed7a4d955f9f88abdced99ecee24bc675b113
kubernetes-client-linux-s390x.tar.gz c4ee2bf9f7ea66ab41b350220920644bee3eeceb13cfd19873843a9ab43b372d
kubernetes-client-windows-386.tar.gz 917e768179e82a33232281b9b6e555cee75cf6315bd3c60a1fce4717fbd0e538
kubernetes-client-windows-amd64.tar.gz 915f3cc888332b360701a4b20d1af384ec5388636f2c3e3868e36124ce8a96a8

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 01b50da6bae8abe4e2c813381c3848ff615fc1d8164d11b163ac0819554ad7b4
kubernetes-server-linux-arm.tar.gz 0a1ebd399759a68972e6248b09ce46a76deef931e51c807e032fefc4210e3dde
kubernetes-server-linux-arm64.tar.gz b8298a06aed6cd1c624855fb4e2d7258e8f9201fbc5bfebc8190c24273e95d9b
kubernetes-server-linux-ppc64le.tar.gz b3b03dc71476f70c8a62cf5ac72fe0bfa433005778d39bfbc43fe225675f9986
kubernetes-server-linux-s390x.tar.gz 940bc9b4f73f32896f3c55d1b5824f931517689ec62b70600c8699e84bc725ee

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz bcc29195864e4e486a7e8194be06f3cf575203e012790ea6d70003349b108701
kubernetes-node-linux-arm.tar.gz 35ab99a6cd30c2ea6a1f2347d244fb8583bfd7ef1d54f89fbf9a3a3be14fb9e7
kubernetes-node-linux-arm64.tar.gz fcb611d964c7e1c546fbbb38c8b30b3e3bb54226540caa0b80930f53e321dd2e
kubernetes-node-linux-ppc64le.tar.gz 4de7b25cf712df27b6eec5232dc2891e07dbeb8c3699a145f777cc0629f1fe9c
kubernetes-node-linux-s390x.tar.gz 2f0b6a01c7c86209f031f47e1901bf3da82efef4db5b73b4e7d83be04b03c814
kubernetes-node-windows-amd64.tar.gz 619013157435d8da7f58bb339aa21d5a080c341aebe226934d1139d29cff72be

Changelog since v1.10.0-beta.3

Other notable changes

  • Fix a regression that prevented using subPath volume mounts with secret, configMap, projected, and downwardAPI volumes (#61080, @liggitt)
  • Upgrade the default etcd server version to 3.1.12 to pick up critical etcd "mvcc "unsynced" watcher restore operation" fix. (#60998, @jpbetz)
  • Fixed missing error checking that could cause kubelet to crash in a race condition. (#60962, @technicianted)

v1.10.0-beta.3

Documentation & Examples

Downloads for v1.10.0-beta.3

filename sha256 hash
kubernetes.tar.gz 65880d0bb77eeb83554bb0a6c78b6d3a25cd38ef7d714bbe2c73b203386618d6
kubernetes-src.tar.gz e9fbf8198fd80c92dd7e2ecf0cf6cefda06f9b89e7986ae141412f8732dae47c

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 50b1a41e70804f74b3e76d7603752d45dfd47011fd986d055462e1330330aa45
kubernetes-client-darwin-amd64.tar.gz 3658e70ae9761464df50c6cae8d57349648c80d16658892e42ea898ddab362bc
kubernetes-client-linux-386.tar.gz 00b8c048b201931ab1fb059df030e0bfc866f3c3ff464213aa6071ff261a3d33
kubernetes-client-linux-amd64.tar.gz 364d6439185399e72f96bea1bf2863deb2080f4bf6df721932ef14ec45b2d5fc
kubernetes-client-linux-arm.tar.gz 98670b2e965e118fb02901aa949cd1eb12d34ffd0bba7ff22014e9ad587556bc
kubernetes-client-linux-arm64.tar.gz 5f4febc543aa2f10c0c8aee9c9a8cb169b19b04486bda4cf1f72c80fa7a3a483
kubernetes-client-linux-ppc64le.tar.gz ff3d020e97e2ff4c1824db910f13945d70320fc3988cc24385708cab58d4065f
kubernetes-client-linux-s390x.tar.gz 508695afe6d3466488bc20cad31c184723cb238d1c311d2d1c4f9f1c9e981bd6
kubernetes-client-windows-386.tar.gz 9f6372cfb973d04a150e1388d96cb60e7fe6ccb9ba63a146ff2dee491c2e3f4e
kubernetes-client-windows-amd64.tar.gz 2c85f2f13dc535d3c777f186b7e6d9403d64ac18ae01d1e460a8979e62845e04

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 4797ada6fd43e223d67840e815c1edb244a3b40a3a1b6ecfde7789119f2add3d
kubernetes-server-linux-arm.tar.gz fb2fdb4b2feb41adbbd33fe4b7abbe9780d91a288a64ff7acf85d5ef942d3960
kubernetes-server-linux-arm64.tar.gz bc1f35e1999beaac91b65050f70c8e539918b927937e88bfcfa34a0c26b96701
kubernetes-server-linux-ppc64le.tar.gz cce312f5af7dd182c8cc4ef35a768fef788a849a93a6f2f36e9d2991e721b362
kubernetes-server-linux-s390x.tar.gz 42edec36fa34a4cc4959af20a587fb05924ccc87c94b0f845953ba1ceec56bb7

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz e517986261e3789cada07d9063ae96ed9b17ffd80c1b220b6ae9c41238c07c08
kubernetes-node-linux-arm.tar.gz 9eb213248982816a855a7ff18c9421d5e987d5f1c472880a16bc6c477ce8da2a
kubernetes-node-linux-arm64.tar.gz e938dce3ec05cedcd6ab8e2b63224170db00e2c47e67685eb3cb4bad247ac8c0
kubernetes-node-linux-ppc64le.tar.gz bc9bf3d55f85d3b30f0a28fd79b7610ecdf019b8bc8d7f978da62ee0006c72eb
kubernetes-node-linux-s390x.tar.gz c5a1b18b8030ec86748e23d45f1de63783c2e95d67b0d6c2fcbcd545d205db8d
kubernetes-node-windows-amd64.tar.gz df4f4e8df8665ed08a9a3d9816e61c6c9f0ce50e4185b6c7a7f34135ad1f91d0

Changelog since v1.10.0-beta.2

Other notable changes

v1.10.0-beta.2

Documentation & Examples

Downloads for v1.10.0-beta.2

filename sha256 hash
kubernetes.tar.gz d07d77f16664cdb5ce86c87de36727577f48113efdb00f83283714ac1373d521
kubernetes-src.tar.gz c27b06e748e4c10f42472f51ddfef7e9546e4ec9d2ce9f7a9a3c5768de8d97bf

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz d63168f9155f04e4b47fe96381f9aa06c3d498b6e6b71d1fb8c3ffeb0f3c6e4c
kubernetes-client-darwin-amd64.tar.gz f473cbe830c1bfb738b0a66f07b3cd858ba185232eba26fe776f90d8a27bd7c1
kubernetes-client-linux-386.tar.gz 2a0f74d30cdaf19ed7c3fde3528e98a8cd98fdb9dc6e6a501525e69895674d56
kubernetes-client-linux-amd64.tar.gz 69c18569717a97cb5e6bc22bebcf2f64969ba68b11685faaf2949c4ffbcd0b73
kubernetes-client-linux-arm.tar.gz 10e1d76a1ee6c0df9f9cce40d18c350a1e3e3665e6fe64d22e4433b6283d3fe2
kubernetes-client-linux-arm64.tar.gz 12f081b99770548c8ddd688ae6b417c196f8308bd5901abbed6f203e133411ae
kubernetes-client-linux-ppc64le.tar.gz 6e1a035b4857539c90324e00b150ae65aaf4f4524250c9ca7d77ad5936f0628e
kubernetes-client-linux-s390x.tar.gz 5a8e2b0d14e18a39f821b09a7d73fa5c085cf6c197aeb540a3fe289e04fcc0d9
kubernetes-client-windows-386.tar.gz 03fac6befb94b85fb90e0bb47596868b4da507d803806fad2a5fb4b85c98d87d
kubernetes-client-windows-amd64.tar.gz 3bf8dd42eb70735ebdbda4ec4ec54e9507410e2f97ab2f364b88c2f24fdf471c

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 1278703060865281aa48b1366e3c4b0720d4eca623ba08cf852a4719a6680ec3
kubernetes-server-linux-arm.tar.gz b1e2b399bec8c25b7b6037203485d2d09b091afc51ffebf861d5bddb8bb076ac
kubernetes-server-linux-arm64.tar.gz 4c3d0ed44d6a19ae178034117891678ec373894b02f8d33627b37a36c2ea815b
kubernetes-server-linux-ppc64le.tar.gz 88a7b52030104a4c6fb1f8c5f79444ed853f381e1463fec7e4939a9998d92dff
kubernetes-server-linux-s390x.tar.gz 35981580c00bff0e3d92238f961e37dd505c08bcd4cafb11e274daa1eb8ced5f

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz ceedb0a322167bae33042407da5369e0b7889fbaa3568281500c921afcdbe310
kubernetes-node-linux-arm.tar.gz b84ab4c486bc8f00841fccce2aafe4dcef25606c8f3184bce2551ab6486c8f71
kubernetes-node-linux-arm64.tar.gz b79a41145c28358a64d7a689cd282cf8361fe87c410fbae1cdc8db76cfcf6e5b
kubernetes-node-linux-ppc64le.tar.gz afc00f67b9f6d4fc149d4426fc8bbf6083077e11a1d2330d70be7e765b6cb923
kubernetes-node-linux-s390x.tar.gz f6128bbccddfe8ce39762bacb5c13c6c68d76a4bf8d35e773560332eb05a2c86
kubernetes-node-windows-amd64.tar.gz b1dde1ed2582cd511236fec69ebd6ca30281b30cc37e0841c493f06924a466cf

Changelog since v1.10.0-beta.1

Action Required

  • ACTION REQUIRED: LocalStorageCapacityIsolation feature is beta and enabled by default. (#60159, @jingxu97)

Other notable changes

  • Upgrade the default etcd server version to 3.2.16 (#59836, @jpbetz)
  • Cluster Autoscaler 1.1.2 (#60842, @mwielgus)
  • ValidatingWebhooks and MutatingWebhooks will not be called on admission requests for ValidatingWebhookConfiguration and MutatingWebhookConfiguration objects in the admissionregistration.k8s.io group (#59840, @jennybuckley)
  • Kubeadm: CoreDNS supports migration of the kube-dns configuration to CoreDNS configuration when upgrading the service discovery from kube-dns to CoreDNS as part of Beta. (#58828, @rajansandeep)
  • Fix broken useManagedIdentityExtension for azure cloud provider (#60775, @feiskyer)
  • kubelet now notifies systemd that it has finished starting, if systemd is available and running. (#60654, @dcbw)
  • Do not count failed pods as unready in HPA controller (#60648, @bskiba)
  • fixed foreground deletion of podtemplates (#60683, @nilebox)
  • Conformance tests are added for the DaemonSet kinds in the apps/v1 group version. Deprecated versions of DaemonSet will not be tested for conformance, and conformance is only applicable to release 1.10 and later. (#60456, @kow3ns)
  • Log audit backend can now be configured to perform batching before writing events to disk. (#60237, @crassirostris)
  • Fixes potential deadlock when deleting CustomResourceDefinition for custom resources with finalizers (#60542, @liggitt)
  • fix azure file plugin failure issue on Windows after node restart (#60625, @andyzhangx)
  • Set Azure vmType to standard if it is not set in azure cloud config. (#60623, @feiskyer)
  • On cluster provision or upgrade, kubeadm generates an etcd specific CA for all etcd related certificates. (#60385, @stealthybox)
  • kube-scheduler: restores default leader election behavior. leader-elect command line parameter should "true" (#60524, @dims)
  • client-go: alpha support for exec-based credential providers (#59495, @ericchiang)

v1.10.0-beta.1

Documentation & Examples

Downloads for v1.10.0-beta.1

filename sha256 hash
kubernetes.tar.gz 428139d9877f5f94acc806cc4053b0a5f8eac2acc219f06efd0817807473dbc5
kubernetes-src.tar.gz 5bfdecdbb43d946ea965f22ec6b8a0fc7195197a523aefebc2b7b926d4252edf

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 8cc086e901fe699df5e0711438195e675e099848a72ba272b290d22abc107a93
kubernetes-client-darwin-amd64.tar.gz b2782b8f6dbfe3fa962b08606cbf3366b071b78c47794d2ef67f9d484b4af4e4
kubernetes-client-linux-386.tar.gz a4001ad2387ccb4557b15c560b0ea8ea4d7c7ed494375346e3f83c10eb9426ac
kubernetes-client-linux-amd64.tar.gz b95d354e80d9f00a883e5eeb8c2e0ceaacc0f3cc8c904cb2eca1e1b6d91462b2
kubernetes-client-linux-arm64.tar.gz 647d234c59bc1d6f8eea88624d85b09bbe1272d9e27e1f7963e03cc025530ed0
kubernetes-client-linux-arm.tar.gz 187da9ad060ac7d426811772f6c3d891a354945af6a7d8832ac7097e19d4b46d
kubernetes-client-linux-ppc64le.tar.gz 6112396b8f0e7b1401b374aa2ae6195849da7718572036b6f060a722a89dc319
kubernetes-client-linux-s390x.tar.gz 09789cf33d8eed610ad2eef7d3ae25a4b4a63ee5525e452f9094097a172a1ce9
kubernetes-client-windows-386.tar.gz 1e71bc9979c8915587cdea980dad36b0cafd502f972c051c2aa63c3bbfeceb14
kubernetes-client-windows-amd64.tar.gz 3c2978479c6f65f1cb5043ba182a0571480090298b7d62090d9bf11b043dd27d

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz d887411450bbc06e2f4a24ce3c478fe6844856a8707b3236c045d44ab93b27d2
kubernetes-server-linux-arm64.tar.gz 907f037eea90bf893520d3adeccdf29eda69eea32c564b08cecbedfd06471acd
kubernetes-server-linux-arm.tar.gz f2ac4ad4f831a970cb35c1d7194788850dff722e859a08a879c918db1233aaa7
kubernetes-server-linux-ppc64le.tar.gz 0bebb59217b491c5aa4b4b9dc740c0c8c5518872f6f86853cbe30493ea8539a5
kubernetes-server-linux-s390x.tar.gz 5f343764e04e3a8639dffe225cc6f8bc6f17e1584b2c68923708546f48d38f89

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz c4475c315d4ae27c30f80bc01d6ea8b0b8549ec6a60a5dc745cf11a0c4398c23
kubernetes-node-linux-arm64.tar.gz 4512a4c3e62cd26fb0d3f78bfc8de9a860e7d88e7c913c5df4c239536f89da42
kubernetes-node-linux-arm.tar.gz 1da407ad152b185f520f04215775a8fe176550a31a2bb79e3e82968734bdfb5c
kubernetes-node-linux-ppc64le.tar.gz f23f6f819e6d894f8ca7457f80ee4ede729fd35ac59e9c65ab031b56aa06d4a1
kubernetes-node-linux-s390x.tar.gz 205c789f52a4c666a63ac7944ffa8ee325cb97e788b748c262eae59b838a94ba
kubernetes-node-windows-amd64.tar.gz aa7675fd22d9ca671585f429f6981aa79798f1894025c3abe3a7154f3c94aae6

Changelog since v1.10.0-alpha.3

Action Required

  • [action required] Default Flexvolume plugin directory for COS images on GCE is changed to /home/kubernetes/flexvolume. (#58171, @verult)
  • action required: [GCP kube-up.sh] Some variables that were part of kube-env are no longer being set (ones only used for kubelet flags) and are being replaced by a more portable mechanism (kubelet configuration file). The individual variables in the kube-env metadata entry were never meant to be a stable interface and this release note only applies if you are depending on them. (#60020, @roberthbailey)
  • action required: Deprecate format-separated endpoints for OpenAPI spec. Please use single /openapi/v2 endpoint instead. (#59293, @roycaihw)
  • action required: kube-proxy: feature gates are now specified as a map when provided via a JSON or YAML KubeProxyConfiguration, rather than as a string of key-value pairs. (#57962, @xiangpengzhao)
  • Action Required: The boostrapped RBAC role and rolebinding for the cloud-provider service account is now deprecated. If you're currently using this service account, you must create and apply your own RBAC policy for new clusters. (#59949, @nicksardo)
  • ACTION REQUIRED: VolumeScheduling and LocalPersistentVolume features are beta and enabled by default. The PersistentVolume NodeAffinity alpha annotation is deprecated and will be removed in a future release. (#59391, @msau42)
  • action required: Deprecate the kubelet's cadvisor port. The default will change to 0 (disabled) in 1.12, and the cadvisor port will be removed entirely in 1.13. (#59827, @dashpole)
  • action required: The kubeletconfig API group has graduated from alpha to beta, and the name has changed to kubelet.config.k8s.io. Please use kubelet.config.k8s.io/v1beta1, as kubeletconfig/v1alpha1 is no longer available. (#53833, @mtaufen)
  • Action required: Default values differ between the Kubelet's componentconfig (config file) API and the Kubelet's command line. Be sure to review the default values when migrating to using a config file. (#59666, @mtaufen)
  • kube-apiserver: the experimental in-tree Keystone password authenticator has been removed in favor of extensions that enable use of Keystone tokens. (#59492, @dims)
  • The udpTimeoutMilliseconds field in the kube-proxy configuration file has been renamed to udpIdleTimeout. Action required: administrators need to update their files accordingly. (#57754, @ncdc)

Other notable changes

  • Enable IPVS feature gateway by default (#60540, @m1093782566)
  • dockershim now makes an Image's Labels available in the Info field of ImageStatusResponse (#58036, @shlevy)
  • kube-scheduler: Support extender managed extended resources in kube-scheduler (#60332, @yguo0905)
  • Fix the issue in kube-proxy iptables/ipvs mode to properly handle incorrect IP version. (#56880, @MrHohn)
  • WindowsContainerResources is set now for windows containers (#59333, @feiskyer)
  • GCE: support Cloud TPU API in cloud provider (#58029, @yguo0905)
  • The node authorizer now allows nodes to request service account tokens for the service accounts of pods running on them. (#55019, @mikedanese)
  • Fix StatefulSet to work with set-based selectors. (#59365, @ayushpateria)
  • New conformance tests added for the Garbage Collector (#60116, @jennybuckley)
  • Make NodePort IP addresses configurable (#58052, @m1093782566)
  • Implements MountDevice and UnmountDevice for the CSI Plugin, the functions will call through to NodeStageVolume/NodeUnstageVolume for CSI plugins. (#60115, @davidz627)
  • Fixes a bug where character devices are not recognized by the kubelet (#60440, @andrewsykim)
  • [fluentd-gcp addon] Switch to the image, provided by Stackdriver. (#59128, @bmoyles0117)
  • StatefulSet in apps/v1 is now included in Conformance Tests. (#60336, @enisoc)
  • K8s supports rbd-nbd for Ceph rbd volume mounts. (#58916, @ianchakeres)
  • AWS EBS volume plugin got block volume support (#58625, @screeley44)
  • Summary API will include pod CPU and Memory stats for CRI container runtime. (#60328, @Random-Liu)
  • dockertools: disable memory swap on Linux. (#59404, @ohmystack)
  • On AWS kubelet returns an error when started under conditions that do not allow it to work (AWS has not yet tagged the instance). (#60125, @vainu-arto)
  • Increase timeout of integration tests (#60458, @jennybuckley)
  • Fixes a case when Deployment with recreate strategy could get stuck on old failed Pod. (#60301, @tnozicka)
  • Buffered audit backend is introduced, to be used with other audit backends. (#60076, @crassirostris)
  • Update dashboard version to v1.8.3 (#57326, @floreks)
  • GCE PD volume plugin got block volume support (#58710, @screeley44)
  • force node name lowercase on static pod name generating (#59849, @yue9944882)
  • AWS Security Groups created for ELBs will now be tagged with the same additional tags as the ELB (i.e. the tags specified by the "service.beta.kubernetes.io/aws-load-balancer-additional-resource-tags" annotation.) (#58767, @2rs2ts)
  • Fixes an error when deleting an NLB in AWS - Fixes #57568 (#57569, @micahhausler)
  • fix device name change issue for azure disk (#60346, @andyzhangx)
  • On cluster provision or upgrade, kubeadm now generates certs and secures all connections to the etcd static-pod with mTLS. (#57415, @stealthybox)
  • Some field names in the Kubelet's now v1beta1 config API differ from the v1alpha1 API: PodManifestPath is renamed to StaticPodPath, ManifestURL is renamed to StaticPodURL, ManifestURLHeader is renamed to StaticPodURLHeader. (#60314, @mtaufen)
  • Adds BETA support for DNSConfig field in PodSpec and DNSPolicy=None. (#59771, @MrHohn)
  • kubeadm: Demote controlplane passthrough flags to alpha flags (#59882, @kris-nova)
  • DevicePlugins feature graduates to beta. (#60170, @jiayingz)
  • Additional changes to iptables kube-proxy backend to improve performance on clusters with very large numbers of services. (#60306, @danwinship)
  • CSI now allows credentials to be specified on CreateVolume/DeleteVolume, ControllerPublishVolume/ControllerUnpublishVolume, and NodePublishVolume/NodeUnpublishVolume operations (#60118, @sbezverk)
  • Disable mount propagation for windows containers. (#60275, @feiskyer)
  • Introduced --http2-max-streams-per-connection command line flag on api-servers and set default to 1000 for aggregated API servers. (#60054, @MikeSpreitzer)
  • APIserver backed by etcdv3 exports metric showing number of resources per kind (#59757, @gmarek)
  • The DaemonSet controller, its integration tests, and its e2e tests, have been updated to use the apps/v1 API. (#59883, @kow3ns)
  • Fix image file system stats for windows nodes (#59743, @feiskyer)
  • Custom resources can be listed with a set of grouped resources (category) by specifying the categories in the CustomResourceDefinition spec. Example: They can be used with kubectl get all, where all is a category. (#59561, @nikhita)
  • [fluentd-gcp addon] Fixed bug with reporting metrics in event-exporter (#60126, @serathius)
  • Critical pods to use priorityClasses. (#58835, @ravisantoshgudimetla)
  • --show-all (which only affected pods and only for human readable/non-API printers) is now defaulted to true and deprecated. It will be inert in 1.11 and removed in a future release. (#60210, @deads2k)
  • Removed some redundant rules created by the iptables proxier, to improve performance on systems with very many services. (#57461, @danwinship)
  • Disable per-cpu metrics by default for scalability. (#60106, @dashpole)
    • Fix inaccurate disk usage monitoring of overlayFs.
    • Retry docker connection on startup timeout to avoid permanent loss of metrics.
  • When the PodShareProcessNamespace alpha feature is enabled, setting pod.Spec.ShareProcessNamespace to true will cause a single process namespace to be shared between all containers in a pod. (#60181, @verb)
  • add spelling checking script (#59463, @dixudx)
  • Allows HorizontalPodAutoscaler to use global metrics not associated with any Kubernetes object (for example metrics from a hoster service running outside of Kubernetes cluster). (#60096, @MaciekPytel)
  • fix race condition issue when detaching azure disk (#60183, @andyzhangx)
  • Add kubectl create job command (#60084, @soltysh)
  • [Alpha] Kubelet now supports container log rotation for container runtime which implements CRI(container runtime interface). (#59898, @Random-Liu)
    • The feature can be enabled with feature gate CRIContainerLogRotation.
    • The flags --container-log-max-size and --container-log-max-files can be used to configure the rotation behavior.
  • Reorganized iptables rules to fix a performance regression on clusters with thousands of services. (#56164, @danwinship)
  • StorageOS volume plugin updated to support mount options and environments where the kubelet runs in a container and the device location should be specified. (#58816, @croomes)
  • Use consts as predicate name in handlers (#59952, @resouer)
  • /status and /scale subresources are added for custom resources. (#55168, @nikhita)
  • Allow kubectl env to specify which keys to import from a config map (#60040, @PhilipGough)
  • Set default enabled admission plugins NamespaceLifecycle,LimitRanger,ServiceAccount,PersistentVolumeLabel,DefaultStorageClass,DefaultTolerationSeconds,MutatingAdmissionWebhook,ValidatingAdmissionWebhook,ResourceQuota (#58684, @hzxuzhonghu)
  • Fix instanceID for vmss nodes. (#59857, @feiskyer)
  • Deprecate kubectl scale jobs (only jobs). (#60139, @soltysh)
  • Adds new flag --apiserver-advertise-dns-address which is used in node kubelet.confg to point to API server (#59288, @stevesloka)
  • Fix kube-proxy flags validation for --healthz-bind-address and --metrics-bind-address to allow specifying ip:port. (#54191, @MrHohn)
  • Increase allowed lag for ssh key sync loop in tunneler to allow for one failure (#60068, @wojtek-t)
  • Flags that can be set via the Kubelet's --config file are now deprecated in favor of the file. (#60148, @mtaufen)
  • PVC Protection alpha feature was renamed to Storage Protection. Storage Protection feature is beta. (#59052, @pospispa)
  • kube-apiserver: the root /proxy paths have been removed (deprecated since v1.2). Use the /proxy subresources on objects that support HTTP proxying. (#59884, @mikedanese)
  • Set an upper bound (5 minutes) on how long the Kubelet will wait before exiting when the client cert from disk is missing or invalid. This prevents the Kubelet from waiting forever without attempting to bootstrap a new client credentials. (#59316, @smarterclayton)
  • v1.Pod now has a field to configure whether a single process namespace should be shared between all containers in a pod. This feature is in alpha preview. (#58716, @verb)
  • Priority admission controller picks a global default with the lowest priority value if more than one such default PriorityClass exists. (#59991, @bsalamat)
  • Add ipset binary for IPVS to hyperkube docker image (#57648, @Fsero)
  • kube-apiserver: the OpenID Connect authenticator can now verify ID Tokens signed with JOSE algorithms other than RS256 through the --oidc-signing-algs flag. (#58544, @ericchiang)
  • Rename StorageProtection to StorageObjectInUseProtection (#59901, @NickrenREN)
  • kubeadm: add criSocket field to MasterConfiguration manifiest (#59057, @JordanFaust)
  • kubeadm: add criSocket field to NodeConfiguration manifiest (#59292, @JordanFaust)
  • The PodSecurityPolicy API has been moved to the policy/v1beta1 API group. The PodSecurityPolicy API in the extensions/v1beta1 API group is deprecated and will be removed in a future release. Authorizations for using pod security policy resources should change to reference the policy API group after upgrading to 1.11. (#54933, @php-coder)
  • Restores the ability of older clients to delete and scale jobs with initContainers (#59880, @liggitt)
  • Support for resource quota on extended resources (#57302, @lichuqiang)
  • Fix race causing apiserver crashes during etcd healthchecking (#60069, @wojtek-t)
  • If TaintNodesByCondition enabled, taint node when it under PID pressure (#60008, @k82cn)
  • Expose total usage of pods through the "pods" SystemContainer in the Kubelet Summary API (#57802, @dashpole)
  • Unauthorized requests will not match audit policy rules where users or groups are set. (#59398, @CaoShuFeng)
  • Making sure CSI E2E test runs on a local cluster (#60017, @sbezverk)
  • Addressing breaking changes introduced by new 0.2.0 release of CSI spec (#59209, @sbezverk)
  • GCE: A role and clusterrole will now be provided with GCE/GKE for allowing the cloud-provider to post warning events on all services and watching configmaps in the kube-system namespace. (#59686, @nicksardo)
  • Updated PID pressure node condition (#57136, @k82cn)
  • Add AWS cloud provider option to use an assumed IAM role (#59668, @brycecarman)
  • kubectl port-forward now supports specifying a service to port forward to: kubectl port-forward svc/myservice 8443:443 (#59809, @phsiao)
  • Fix kubelet PVC stale metrics (#59170, @cofyc)
  • Separate current ARM rate limiter into read/write (#59830, @khenidak)
    • Improve control over how ARM rate limiter is used within Azure cloud provider
  • The ConfigOK node condition has been renamed to KubeletConfigOk. (#59905, @mtaufen)
  • fluentd-gcp resources can be modified via a ScalingPolicy (#59657, @x13n)
  • Adding pkg/kubelet/apis/deviceplugin/v1beta1 API. (#59588, @jiayingz)
  • Fixes volume predicate handler for equiv class (#59335, @resouer)
  • Bugfix: vSphere Cloud Provider (VCP) does not need any special service account anymore. (#59440, @rohitjogvmw)
  • Fixing a bug in OpenStack cloud provider, where dual stack deployments (IPv4 and IPv6) did not work well when using kubenet as the network plugin. (#59749, @zioproto)
  • Get parent dir via canonical absolute path when trying to judge mount-point (#58433, @yue9944882)
  • Container runtime daemon (e.g. dockerd) logs in GCE cluster will be uploaded to stackdriver and elasticsearch with tag container-runtime (#59103, @Random-Liu)
  • Add AzureDisk support for vmss nodes (#59716, @feiskyer)
  • Fixed a race condition in k8s.io/client-go/tools/cache.SharedInformer that could violate the sequential delivery guarantee and cause panics on shutdown. (#59828, @krousey)
  • Avoid hook errors when effecting label changes on kubernetes-worker charm. (#59803, @wwwtyro)
  • kubectl port-forward now allows using resource name (e.g., deployment/www) to select a matching pod, as well as allows the use of --pod-running-timeout to wait till at least one pod is running. (#59705, @phsiao)
    • kubectl port-forward no longer support deprecated -p flag
  • Deprecate insecure HTTP port of kube-controller-manager and cloud-controller-manager. Use --secure-port and --bind-address instead. (#59582, @sttts)
  • Eviction thresholds set to 0% or 100% are now ignored. (#59681, @mtaufen)
  • [advanced audit] support subresources wildcard matching. (#55306, @hzxuzhonghu)
  • CronJobs can be accessed through cj alias (#59499, @soltysh)
  • fix typo in resource_allocation.go (#58275, @carmark)
  • fix the error prone account creation method of blob disk (#59739, @andyzhangx)
  • Add automatic etcd 3.2->3.1 and 3.1->3.0 minor version rollback support to gcr.io/google_container/etcd images. For HA clusters, all members must be stopped before performing a rollback. (#59298, @jpbetz)
  • kubeadm init can now omit the tainting of the master node if configured to do so in kubeadm.yaml. (#55479, @ijc)
  • Updated kubernetes-worker to request new security tokens when the aws cloud provider changes the registered node name. (#59730, @hyperbolic2346)
  • Controller-manager --service-sync-period flag is removed (was never used in the code). (#59359, @khenidak)
  • Pod priority can be specified ins PodSpec even when the feature is disabled, but it will be effective only when the feature is enabled. (#59291, @bsalamat)
  • kubeadm: Enable auditing behind a feature gate. (#59067, @chuckha)
  • Map correct vmset name for Azure internal load balancers (#59747, @feiskyer)
  • Add generic cache for Azure VMSS (#59652, @feiskyer)
  • kubeadm: New "imagePullPolicy" option in the init configuration file, that gets forwarded to kubelet static pods to control pull policy for etcd and control plane images. (#58960, @rosti)
  • fix the create azure file pvc failure if there is no storage account in current resource group (#56557, @andyzhangx)
  • Add generic cache for Azure VM/LB/NSG/RouteTable (#59520, @feiskyer)
  • The alpha KubeletConfiguration.ConfigTrialDuration field is no longer available. (#59628, @mtaufen)
  • Updates Calico version to v2.6.7 (Fixed a bug where Felix would crash when parsing a NetworkPolicy with a named port. See https://github.com/projectcalico/calico/releases/tag/v2.6.7) (#59130, @caseydavenport)
  • return error if New-SmbGlobalMapping failed when mounting azure file on Windows (#59540, @andyzhangx)
  • Disallow PriorityClass names with 'system-' prefix for user defined priority classes. (#59382, @bsalamat)
  • Fixed an issue where Portworx volume driver wasn't passing namespace and annotations to the Portworx Create API. (#59607, @harsh-px)
  • Enable apiserver metrics for custom resources. (#57682, @nikhita)
  • fix typo (#59619, @jianliao82)
    • incase -> in case
    • selction -> selection
  • Implement envelope service with gRPC, so that KMS providers can be pulled out from API server. (#55684, @wu-qiang)
  • Enable golint for pkg/scheduler and fix the golint errors in it. (#58437, @tossmilestone)
  • AWS: Make attach/detach operations faster. from 10-12s to 2-6s (#56974, @gnufied)
  • CRI starts using moutpoint as image filesystem identifier instead of UUID. (#59475, @Random-Liu)
  • DaemonSet, Deployment, ReplicaSet, and StatefulSet objects are now persisted in etcd in apps/v1 format (#58854, @liggitt)
  • 'none' can now be specified in KubeletConfiguration.EnforceNodeAllocatable (--enforce-node-allocatable) to explicitly disable enforcement. (#59515, @mtaufen)
  • vSphere Cloud Provider supports VMs provisioned on vSphere v1.6.5 (#59519, @abrarshivani)
  • Annotations is added to advanced audit api (#58806, @CaoShuFeng)
  • 2nd try at using a vanity GCR name (#57824, @thockin)
  • Node's providerID is following Azure resource ID format now when useInstanceMetadata is enabled (#59539, @feiskyer)
  • Block Volume Support: Local Volume Plugin update (#59303, @dhirajh)
  • [action-required] The Container Runtime Interface (CRI) version has increased from v1alpha1 to v1alpha2. Runtimes implementing the CRI will need to update to the new version, which configures container namespaces using an enumeration rather than booleans. (#58973, @verb)
  • Fix the bug where kubelet in the standalone mode would wait for the update from the apiserver source. (#59276, @roboll)
  • Add "keyring" parameter for Ceph RBD provisioner (#58287, @madddi)
  • Ensure euqiv hash calculation is per schedule (#59245, @resouer)
  • kube-scheduler: Use default predicates/prioritizers if they are unspecified in the policy config (#59363, @yguo0905)
  • Fixed charm issue where docker login would run prior to daemon options being set. (#59396, @kwmonroe)
  • Implementers of the cloud provider interface will note the addition of a context to this interface. Trivial code modification will be necessary for a cloud provider to continue to compile. (#59287, @cheftako)
  • /release-note-none (#58264, @WanLinghao)
  • Use a more reliable way to get total physical memory on windows nodes (#57124, @JiangtianLi)
  • Add xfsprogs to hyperkube container image. (#56937, @redbaron)
  • Ensure Azure public IP removed after service deleted (#59340, @feiskyer)
  • Improve messages user gets during and after volume resizing is done. (#58415, @gnufied)
  • Fix RBAC permissions for Stackdriver Metadata Agent. (#57455, @kawych)
  • Scheduler should be able to read from config file if configmap is not present. (#59386, @ravisantoshgudimetla)
  • MountPropagation feature is now beta. As consequence, all volume mounts in containers are now "rslave" on Linux by default. (#59252, @jsafrane)
  • Fix RBAC role for certificate controller to allow cleaning. (#59375, @mikedanese)
  • Volume metrics support for vSphere Cloud Provider (#59328, @divyenpatel)
  • Announcing the deprecation of the recycling reclaim policy. (#59063, @ayushpateria)
  • Intended for post-1.9 (#57872, @mlmhl)
  • The meta.k8s.io/v1alpha1 objects for retrieving tabular responses from the server (Table) or fetching just the ObjectMeta for an object (as PartialObjectMetadata) are now beta as part of meta.k8s.io/v1beta1. Clients may request alternate representations of normal Kubernetes objects by passing an Accept header like application/json;as=Table;g=meta.k8s.io;v=v1beta1 or application/json;as=PartialObjectMetadata;g=meta.k8s.io;v1=v1beta1. Older servers will ignore this representation or return an error if it is not available. Clients may request fallback to the normal object by adding a non-qualified mime-type to their Accept header like application/json - the server will then respond with either the alternate representation if it is supported or the fallback mime-type which is the normal object response. (#59059, @smarterclayton)
  • add PV size grow feature for azure file (#57017, @andyzhangx)
  • Upgrade default etcd server version to 3.2.14 (#58645, @jpbetz)
  • Add windows config to Kubelet CRI (#57076, @feiskyer)
  • Configurable etcd quota backend bytes in GCE (#59259, @wojtek-t)
  • Remove unmaintained kube-registry-proxy support from gce kube-up. (#58564, @mikedanese)
  • Allow expanding mounted volumes (#58794, @gnufied)
  • Upped the timeout for apiserver communication in the juju kubernetes-worker charm. (#59219, @hyperbolic2346)
  • kubeadm init: skip checking cri socket in preflight checks (#58802, @dixudx)
  • Add "nominatedNodeName" field to PodStatus. This field is set when a pod preempts other pods on the node. (#58990, @bsalamat)
  • Changes secret, configMap, downwardAPI and projected volumes to mount read-only, instead of allowing applications to write data and then reverting it automatically. Until version 1.11, setting the feature gate ReadOnlyAPIDataVolumes=false will preserve the old behavior. (#58720, @joelsmith)
  • Fixed issue with charm upgrades resulting in an error state. (#59064, @hyperbolic2346)
  • Ensure IP is set for Azure internal load balancer. (#59083, @feiskyer)
  • Postpone PV deletion when it is being bound to a PVC (#58743, @NickrenREN)
  • Add V1beta1 VolumeAttachment API, co-existing with Alpha API object (#58462, @NickrenREN)
  • When using client or server certificate rotation, the Kubelet will no longer wait until the initial rotation succeeds or fails before starting static pods. This makes running self-hosted masters with rotation more predictable. (#58930, @smarterclayton)

v1.10.0-alpha.3

Documentation & Examples

Downloads for v1.10.0-alpha.3

filename sha256 hash
kubernetes.tar.gz 246f0373ccb25a243a387527b32354b69fc2211c422e71479d22bfb3a829c8fb
kubernetes-src.tar.gz f9c60bb37fb7b363c9f66d8efd8aa5a36ea2093c61317c950719b3ddc86c5e10

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz ca8dfd7fbd34478e7ba9bba3779fcca08f7efd4f218b0c8a7f52bbeea0f42cd7
kubernetes-client-darwin-amd64.tar.gz 713c35d99f44bd19d225d2c9f2d7c4f3976b5dd76e9a817b2aaf68ee0cb5a939
kubernetes-client-linux-386.tar.gz 7601e55e3bb0f0fc11611c68c4bc000c3cbbb7a09652c386e482a1671be7e2d6
kubernetes-client-linux-amd64.tar.gz 8a6c498531c1832176e22d622008a98bac6043f05dec96747649651531ed3fd7
kubernetes-client-linux-arm64.tar.gz 81561820fb5a000152e9d8d94882e0ed6228025ea7973ee98173b5fc89d62a42
kubernetes-client-linux-arm.tar.gz 6ce8c3ed253a10d78e62e000419653a29c411cd64910325b21ff3370cb0a89eb
kubernetes-client-linux-ppc64le.tar.gz a46b42c94040767f6bbf2ce10aef36d8dbe94c0069f866a848d69b2274f8f0bc
kubernetes-client-linux-s390x.tar.gz fa3e656b612277fc4c303aef95c60b58ed887e36431db23d26b536f226a23cf6
kubernetes-client-windows-386.tar.gz 832e12266495ac55cb54a999bc5ae41d42d160387b487d8b4ead577d96686b62
kubernetes-client-windows-amd64.tar.gz 7056a3eb5a8f9e8fa0326aa6e0bf97fc5b260447315f8ec7340be5747a16f5fd

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz dc8e2be2fcb6477249621fb5c813c853371a3bf8732c5cb3a6d6cab667cfa324
kubernetes-server-linux-arm64.tar.gz 399071ad9042a72bccd6e1aa322405c02b4a807c0b4f987d608c4c9c369979d6
kubernetes-server-linux-arm.tar.gz 7457ad16665e331fa9224a3d61690206723721197ad9760c3b488de9602293f5
kubernetes-server-linux-ppc64le.tar.gz ffcb728d879c0347bd751c9bccac3520bb057d203ba1acd55f8c727295282049
kubernetes-server-linux-s390x.tar.gz f942f6e15886a1fb0d91d04adf47677068c56070dff060f38c371c3ee3e99648

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 81b22beb30be9d270016c7b35b86ea585f29c0c5f09128da9341f9f67c8865f9
kubernetes-node-linux-arm64.tar.gz d9020b99c145f44c519b1a95b55ed24e69d9c679a02352c7e05e86042daca9d1
kubernetes-node-linux-arm.tar.gz 1d10bee4ed62d70b318f5703b2cd8295a08e199f810d6b361f367907e3f01fb6
kubernetes-node-linux-ppc64le.tar.gz 67cd4dde212abda37e6f9e6dee1bb59db96e0727100ef0aa561c15562df0f3e1
kubernetes-node-linux-s390x.tar.gz 362b030e011ea6222b1f2dec62311d3971bcce4dba94997963e2a091efbf967b
kubernetes-node-windows-amd64.tar.gz e609a2b0410acbb64d3ee6d7f134d98723d82d05bdbead1eaafd3584d3e45c39

Changelog since v1.10.0-alpha.2

Other notable changes

  • Fixed issue with kubernetes-worker option allow-privileged not properly handling the value True with a capital T. (#59116, @hyperbolic2346)
  • Added anti-affinity to kube-dns pods (#57683, @vainu-arto)
  • cloudprovider/openstack: fix bug the tries to use octavia client to query flip (#59075, @jrperritt)
  • Windows containers now support experimental Hyper-V isolation by setting annotation experimental.windows.kubernetes.io/isolation-type=hyperv and feature gates HyperVContainer. Only one container per pod is supported yet. (#58751, @feiskyer)
  • crds is added as a shortname for CustomResourceDefinition i.e. kubectl get crds can now be used. (#59061, @nikhita)
  • Fix an issue where port forwarding doesn't forward local TCP6 ports to the pod (#57457, @vfreex)
  • YAMLDecoder Read now tracks rest of buffer on io.ErrShortBuffer (#58817, @karlhungus)
  • Prevent kubelet from getting wedged if initialization of modules returns an error. (#59020, @brendandburns)
  • Fixed a race condition inside kubernetes-worker that would result in a temporary error situation. (#59005, @hyperbolic2346)
  • [GCE] Apiserver uses InternalIP as the most preferred kubelet address type by default. (#59019, @MrHohn)
  • Deprecate insecure flags --insecure-bind-address, --insecure-port and remove --public-address-override. (#59018, @hzxuzhonghu)
  • Support GetLabelsForVolume in OpenStack Provider (#58871, @edisonxiang)
  • Build using go1.9.3. (#59012, @ixdy)
  • CRI: Add a call to reopen log file for a container. (#58899, @yujuhong)
  • The alpha KubeletConfigFile feature gate has been removed, because it was redundant with the Kubelet's --config flag. It is no longer necessary to set this gate to use the flag. The --config flag is still considered alpha. (#58978, @mtaufen)
  • kubectl scale can now scale any resource (kube, CRD, aggregate) conforming to the standard scale endpoint (#58298, @p0lyn0mial)
  • kube-apiserver flag --tls-ca-file has had no effect for some time. It is now deprecated and slated for removal in 1.11. If you are specifying this flag, you must remove it from your launch config before upgrading to 1.11. (#58968, @deads2k)
  • Fix regression in the CRI: do not add a default hostname on short image names (#58955, @runcom)
  • Get windows kernel version directly from registry (#58498, @feiskyer)
  • Remove deprecated --require-kubeconfig flag, remove default --kubeconfig value (#58367, @zhangxiaoyu-zidif)
  • Google Cloud Service Account email addresses can now be used in RBAC (#58141, @ahmetb)
    • Role bindings since the default scopes now include the "userinfo.email"
    • scope. This is a breaking change if the numeric uniqueIDs of the Google
    • service accounts were being used in RBAC role bindings. The behavior
    • can be overridden by explicitly specifying the scope values as
    • comma-separated string in the "users[*].config.scopes" field in the
    • KUBECONFIG file.
  • kube-apiserver is changed to use SSH tunnels for webhook iff the webhook is not directly routable from apiserver's network environment. (#58644, @yguo0905)
  • Updated priority of mirror pod according to PriorityClassName. (#58485, @k82cn)
  • Fixes a bug where kubelet crashes trying to free memory under memory pressure (#58574, @yastij)

v1.10.0-alpha.2

Documentation & Examples

Downloads for v1.10.0-alpha.2

filename sha256 hash
kubernetes.tar.gz 89efeb8b16c40e5074f092f51399995f0fe4a0312367a8f54bd227c3c6fcb629
kubernetes-src.tar.gz eefbbf435f1b7a0e416f4e6b2c936c49ce5d692994da8d235c5e25bc408eec57

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 878366200ddfb9128a133d7d377057c6f878b24357062cf5243c0f0aac26b292
kubernetes-client-darwin-amd64.tar.gz dc065b9ecfa513607eac6e7dd125b2c25c9a9e7c13d0b2b6e56586e17bbd6ae5
kubernetes-client-linux-386.tar.gz 93c2462051935d8f6bca6c72d09948963d47cd64426660f63e0cea7d37e24812
kubernetes-client-linux-amd64.tar.gz 0eef61285fad1f9ff8392c59986d3a41887abc642bcb5cb451c5a5300927e2c4
kubernetes-client-linux-arm64.tar.gz 6cf7913730a57b503beaf37f5c4d0f97789358983ed03654036f8b986b60cc62
kubernetes-client-linux-arm.tar.gz f03c3ecbf4c08d263f2daa8cbe838e20452d6650b80e9a74762c155c26a579b7
kubernetes-client-linux-ppc64le.tar.gz 25a2f93ebb721901d262adae4c0bdaa4cf1293793e9dff4507e031b85f46aff8
kubernetes-client-linux-s390x.tar.gz 3e0b9ef771f36edb61bd61ccb67996ed41793c01f8686509bf93e585ee882c94
kubernetes-client-windows-386.tar.gz 387e5e6b0535f4f5996c0732f1b591d80691acaec86e35482c7b90e00a1856f7
kubernetes-client-windows-amd64.tar.gz c10a72d40252707b732d33d03beec3c6380802d0a6e3214cbbf4af258fddf28c

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 42c1e016e8b0c5cc36c7bf574abca18c63e16d719d35e19ddbcbcd5aaeabc46c
kubernetes-server-linux-arm64.tar.gz b7774c54344c75bf5c703d4ca271f0af6c230e86cbe40eafd9cbf98a4f4be6e9
kubernetes-server-linux-arm.tar.gz c11c8554506b64d6fd1a6e79bfc4e1e19f4f826b9ba98de81bc757901e8cdc43
kubernetes-server-linux-ppc64le.tar.gz 196bd957804b2a9049189d225e49bf78e52e9adef12c072128e4e85d35da438e
kubernetes-server-linux-s390x.tar.gz be12fbea28a6cb089734782fe11e6f90a30785b9ad1ec02bc08a59afeb95c173

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz a1feb239dfc473b49adf95d7d94e4a9c6c7d07416d4e935e3fc10175ffaa7163
kubernetes-node-linux-arm64.tar.gz 26583c0bd08313bdc0bdfba6745f3ccd0f117431d3a5e2623bb5015675d506b8
kubernetes-node-linux-arm.tar.gz 79c6299a5482467e3e85ee881f21edf5d491bc28c94e547d9297d1e1ad1b7458
kubernetes-node-linux-ppc64le.tar.gz 2732fd288f1eac44c599423ce28cbdb85b54a646970a3714be5ff86d1b14b5e2
kubernetes-node-linux-s390x.tar.gz 8d49432f0ff3baf55e71c29fb6ffc1673b2a45b9eae2e1906138b1409da53940
kubernetes-node-windows-amd64.tar.gz 15ff74edfa98cd1afadcc4e53dd592b1e2935fbab76ad731309d355ae23bdd09

Changelog since v1.10.0-alpha.1

Action Required

  • Bug fix: webhooks now do not skip cluster-scoped resources (#58185, @caesarxuchao)
    • Action required: Before upgrading your Kubernetes clusters, double check if you had configured webhooks for cluster-scoped objects (e.g., nodes, persistentVolume), these webhooks will start to take effect. Delete/modify the configs if that's not desirable.

Other notable changes

  • Fixing extra_sans option on master and load balancer. (#58843, @hyperbolic2346)
  • ConfigMap objects now support binary data via a new binaryData field. When using kubectl create configmap --from-file, files containing non-UTF8 data will be placed in this new field in order to preserve the non-UTF8 data. Use of this feature requires 1.10+ apiserver and kubelets. (#57938, @dims)
  • New alpha feature to limit the number of processes running in a pod. Cluster administrators will be able to place limits by using the new kubelet command line parameter --pod-max-pids. Note that since this is a alpha feature they will need to enable the "SupportPodPidsLimit" feature. (#57973, @dims)
  • Add storage-backend configuration option to kubernetes-master charm. (#58830, @wwwtyro)
  • use containing API group when resolving shortname from discovery (#58741, @dixudx)
  • Fix kubectl explain for resources not existing in default version of API group (#58753, @soltysh)
  • Ensure config has been created before attempting to launch ingress. (#58756, @wwwtyro)
  • Access to externally managed IP addresses via the kube-apiserver service proxy subresource is no longer allowed by default. This can be re-enabled via the ServiceProxyAllowExternalIPs feature gate, but will be disallowed completely in 1.11 (#57265, @brendandburns)
  • Added support for external cloud providers in kubeadm (#58259, @dims)
  • rktnetes has been deprecated in favor of rktlet. Please see https://github.com/kubernetes-incubator/rktlet for more information. (#58418, @yujuhong)
  • Fixes bug finding master replicas in GCE when running multiple Kubernetes clusters (#58561, @jesseshieh)
  • Update Calico version to v2.6.6 (#58482, @tmjd)
  • Promoting the apiregistration.k8s.io (aggregation) to GA (#58393, @deads2k)
  • Stability: Make Pod delete event handling of scheduler more robust. (#58712, @bsalamat)
  • Added support for network spaces in the kubeapi-load-balancer charm (#58708, @hyperbolic2346)
  • Added support for network spaces in the kubernetes-master charm (#58704, @hyperbolic2346)
  • update etcd unified version to 3.1.10 (#54242, @zouyee)
  • updates fluentd in fluentd-es-image to fluentd 1.1.0 (#58525, @monotek)
  • Support metrics API in kubectl top commands. (#56206, @brancz)
  • Added support for network spaces in the kubernetes-worker charm (#58523, @hyperbolic2346)
  • CustomResourceDefinitions: OpenAPI v3 validation schemas containing $refreferences are no longer permitted (valid references could not be constructed previously because property ids were not permitted either). Before upgrading, ensure CRD definitions do not include those $ref fields. (#58438, @carlory)
  • Openstack: register metadata.hostname as node name (#58502, @dixudx)
  • Added nginx and default backend images to kubernetes-worker config. (#58542, @hyperbolic2346)
  • --tls-min-version on kubelet and kube-apiserver allow for configuring minimum TLS versions (#58528, @deads2k)
  • Fixes an issue where the resourceVersion of an object in a DELETE watch event was not the resourceVersion of the delete itself, but of the last update to the object. This could disrupt the ability of clients clients to re-establish watches properly. (#58547, @liggitt)
  • Fixed crash in kubectl cp when path has multiple leading slashes (#58144, @tomerf)
  • kube-apiserver: requests to endpoints handled by unavailable extension API servers (as indicated by an Available condition of false in the registered APIService) now return 503 errors instead of 404 errors. (#58070, @weekface)
  • Correctly handle transient connection reset errors on GET requests from client library. (#58520, @porridge)
  • Authentication information for OpenStack cloud provider can now be specified as environment variables (#58300, @dims)
  • Bump GCE metadata proxy to v0.1.9 to pick up security fixes. (#58221, @ihmccreery)
  • kubeadm now supports CIDR notations in NO_PROXY environment variable (#53895, @kad)
  • kubeadm now accept --apiserver-extra-args, --controller-manager-extra-args and --scheduler-extra-args to override / specify additional flags for control plane components (#58080, @simonferquel)
  • Add --enable-admission-plugins --disable-admission-plugins flags and deprecate --admission-control. (#58123, @hzxuzhonghu)
    • Afterwards, don't care about the orders specified in the flags.
  • "ExternalTrafficLocalOnly" has been removed from feature gate. It has been a GA feature since v1.7. (#56948, @MrHohn)
  • GCP: allow a master to not include a metadata concealment firewall rule (if it's not running the metadata proxy). (#58104, @ihmccreery)
  • kube-apiserver: fixes loading of --admission-control-config-file containing AdmissionConfiguration apiserver.k8s.io/v1alpha1 config object (#58439, @liggitt)
  • Fix issue when using OpenStack config drive for node metadata (#57561, @dims)
  • Add FSType for CSI volume source to specify filesystems (#58209, @NickrenREN)
  • OpenStack cloudprovider: Ensure orphaned routes are removed. (#56258, @databus23)
  • Reduce Metrics Server memory requirement (#58391, @kawych)
  • Fix a bug affecting nested data volumes such as secret, configmap, etc. (#57422, @joelsmith)
  • kubectl now enforces required flags at a more fundamental level (#53631, @dixudx)
  • Remove alpha Initializers from kubeadm admission control (#58428, @dixudx)
  • Enable ValidatingAdmissionWebhook and MutatingAdmissionWebhook in kubeadm from v1.9 (#58255, @dixudx)
  • Fixed encryption key and encryption provider rotation (#58375, @liggitt)
  • set fsGroup by securityContext.fsGroup in azure file (#58316, @andyzhangx)
  • Remove deprecated and unmaintained salt support. kubernetes-salt.tar.gz will no longer be published in the release tarball. (#58248, @mikedanese)
  • Detach and clear bad disk URI (#58345, @rootfs)
  • Allow version arg in kubeadm upgrade apply to be optional if config file already have version info (#53220, @medinatiger)
  • feat(fakeclient): push event on watched channel on add/update/delete (#57504, @yue9944882)
  • Custom resources can now be submitted to and received from the API server in application/yaml format, consistent with other API resources. (#58260, @liggitt)
  • remove spaces from kubectl describe hpa (#56331, @shiywang)
  • fluentd-gcp updated to version 2.0.14. (#58224, @zombiezen)
  • Instrument the Azure cloud provider for Prometheus monitoring. (#58204, @cosmincojocar)
  • -Add scheduler optimization options, short circuit all predicates if … (#56926, @wgliang)
  • Remove deprecated ContainerVM support from GCE kube-up. (#58247, @mikedanese)
  • Remove deprecated kube-push.sh functionality. (#58246, @mikedanese)
  • The getSubnetIDForLB() should return subnet id rather than net id. (#58208, @FengyunPan)
  • Avoid panic when failing to allocate a Cloud CIDR (aka GCE Alias IP Range). (#58186, @negz)
  • Handle Unhealthy devices (#57266, @vikaschoudhary16)
  • Expose Metrics Server metrics via /metric endpoint. (#57456, @kawych)
  • Remove deprecated container-linux support in gce kube-up.sh. (#58098, @mikedanese)
  • openstack cinder detach problem is fixed if nova is shutdowned (#56846, @zetaab)
  • Fixes a possible deadlock preventing quota from being recalculated (#58107, @ironcladlou)
  • fluentd-es addon: multiline stacktraces are now grouped into one entry automatically (#58063, @monotek)
  • GCE: Allows existing internal load balancers to continue using an outdated subnetwork (#57861, @nicksardo)
  • ignore images in used by running containers when GC (#57020, @dixudx)
  • Remove deprecated and unmaintained photon-controller kube-up.sh. (#58096, @mikedanese)
  • The kubelet flag to run docker containers with a process namespace that is shared between all containers in a pod is now deprecated and will be replaced by a new field in v1.Pod that configures this behavior. (#58093, @verb)
  • fix device name change issue for azure disk: add remount logic (#57953, @andyzhangx)
  • The Kubelet now explicitly registers all of its command-line flags with an internal flagset, which prevents flags from third party libraries from unintentionally leaking into the Kubelet's command-line API. Many unintentionally leaked flags are now marked deprecated, so that users have a chance to migrate away from them before they are removed. One previously leaked flag, --cloud-provider-gce-lb-src-cidrs, was entirely removed from the Kubelet's command-line API, because it is irrelevant to Kubelet operation. (#57613, @mtaufen)
  • Remove deprecated and unmaintained libvirt-coreos kube-up.sh. (#58023, @mikedanese)
  • Remove deprecated and unmaintained windows installer. (#58020, @mikedanese)
  • Remove deprecated and unmaintained openstack-heat kube-up.sh. (#58021, @mikedanese)
  • Fixes authentication problem faced during various vSphere operations. (#57978, @prashima)
  • fluentd-gcp updated to version 2.0.13. (#57789, @x13n)
  • Add support for cloud-controller-manager in local-up-cluster.sh (#57757, @dims)
  • Update CSI spec dependency to point to v0.1.0 tag (#57989, @NickrenREN)
  • Update kube-dns to Version 1.14.8 that includes only small changes to how Prometheus metrics are collected. (#57918, @rramkumar1)
  • Add proxy_read_timeout flag to kubeapi_load_balancer charm. (#57926, @wwwtyro)
  • Adding support for Block Volume type to rbd plugin. (#56651, @sbezverk)
  • Fixes a bug in Heapster deployment for google sink. (#57902, @kawych)
  • Forbid unnamed contexts in kubeconfigs. (#56769, @dixudx)
  • Upgrade to etcd client 3.2.13 and grpc 1.7.5 to improve HA etcd cluster stability. (#57480, @jpbetz)
  • Default scheduler code is moved out of the plugin directory. (#57852, @misterikkit)
    • plugin/pkg/scheduler -> pkg/scheduler
    • plugin/cmd/kube-scheduler -> cmd/kube-scheduler
  • Bump metadata proxy version to v0.1.7 to pick up security fix. (#57762, @ihmccreery)
  • HugePages feature is beta (#56939, @derekwaynecarr)
  • GCE: support passing kube-scheduler policy config via SCHEDULER_POLICY_CONFIG (#57425, @yguo0905)
  • Returns an error for non overcommitable resources if they don't have limit field set in container spec. (#57170, @jiayingz)
  • Update defaultbackend image to 1.4 and deployment apiVersion to apps/v1 (#57866, @zouyee)
  • kubeadm: set kube-apiserver advertise address using downward API (#56084, @andrewsykim)
  • CDK nginx ingress is now handled via a daemon set. (#57530, @hyperbolic2346)
  • The kubelet uses a new release 3.1 of the pause container with the Docker runtime. This version will clean up orphaned zombie processes that it inherits. (#57517, @verb)
  • Allow kubectl set image|env on a cronjob (#57742, @soltysh)
  • Move local PV negative scheduling tests to integration (#57570, @sbezverk)
  • fix azure disk not available issue when device name changed (#57549, @andyzhangx)
  • Only create Privileged PSP binding during e2e tests if RBAC is enabled. (#56382, @mikkeloscar)
  • RBAC: The system:kubelet-api-admin cluster role can be used to grant full access to the kubelet API (#57128, @liggitt)
  • Allow kubernetes components to react to SIGTERM signal and shutdown gracefully. (#57756, @mborsz)
  • ignore nonexistent ns net file error when deleting container network in case a retry (#57697, @dixudx)
  • check psp HostNetwork in DenyEscalatingExec admission controller. (#56839, @hzxuzhonghu)
  • The alpha --init-config-dir flag has been removed. Instead, use the --config flag to reference a kubelet configuration file directly. (#57624, @mtaufen)
  • Add cache for VM get operation in azure cloud provider (#57432, @karataliu)
  • Fix garbage collection when the controller-manager uses --leader-elect=false (#57340, @jmcmeek)
  • iSCSI sessions managed by kubernetes will now explicitly set startup.mode to 'manual' to (#57475, @stmcginnis)
    • prevent automatic login after node failure recovery. This is the default open-iscsi mode, so
    • this change will only impact users who have changed their startup.mode to be 'automatic'
    • in /etc/iscsi/iscsid.conf.
  • Configurable liveness probe initial delays for etcd and kube-apiserver in GCE (#57749, @wojtek-t)
  • Fixed garbage collection hang (#57503, @liggitt)
  • Fixes controller manager crash in certain vSphere cloud provider environment. (#57286, @rohitjogvmw)
  • Remove useInstanceMetadata parameter from Azure cloud provider. (#57647, @feiskyer)
  • Support multiple scale sets in Azure cloud provider. (#57543, @feiskyer)
  • GCE: Fixes ILB creation on automatic networks with manually created subnetworks. (#57351, @nicksardo)
  • Improve scheduler performance of MatchInterPodAffinity predicate. (#57476, @misterikkit)
  • Improve scheduler performance of MatchInterPodAffinity predicate. (#57477, @misterikkit)
  • Improve scheduler performance of MatchInterPodAffinity predicate. (#57478, @misterikkit)
  • Allow use resource ID to specify public IP address in azure_loadbalancer (#53557, @yolo3301)
  • Fixes a bug where if an error was returned that was not an autorest.DetailedError we would return "not found", nil which caused nodes to go to NotReady state. (#57484, @brendandburns)
  • Add the path '/version/' to the system:discovery cluster role. (#57368, @brendandburns)
  • Fixes issue creating docker secrets with kubectl 1.9 for accessing docker private registries. (#57463, @dims)
  • adding predicates ordering for the kubernetes scheduler. (#57168, @yastij)
  • Free up CPU and memory requested but unused by Metrics Server Pod Nanny. (#57252, @kawych)
  • The alpha Accelerators feature gate is deprecated and will be removed in v1.11. Please use device plugins instead. They can be enabled using the DevicePlugins feature gate. (#57384, @mindprince)
  • Fixed dynamic provisioning of GCE PDs to round to the next GB instead of GiB (#56600, @edisonxiang)
  • Separate loop and plugin control (#52371, @cheftako)
  • Use old dns-ip mechanism with older cdk-addons. (#57403, @wwwtyro)
  • Retry 'connection refused' errors when setting up clusters on GCE. (#57394, @mborsz)
  • Upgrade to etcd client 3.2.11 and grpc 1.7.5 to improve HA etcd cluster stability. (#57160, @jpbetz)
  • Added the ability to select pods in a chosen node to be drained, based on given pod label-selector (#56864, @juanvallejo)
  • Wait for kubedns to be ready when collecting the cluster IP. (#57337, @wwwtyro)
  • Use "k8s.gcr.io" for container images rather than "gcr.io/google_containers". This is just a redirect, for now, so should not impact anyone materially. (#54174, @thockin)
    • Documentation and tools should all convert to the new name. Users should take note of this in case they see this new name in the system.
  • Fix ipvs proxier nodeport eth* assumption (#56685, @m1093782566)

v1.10.0-alpha.1

Documentation & Examples

Downloads for v1.10.0-alpha.1

filename sha256 hash
kubernetes.tar.gz 403b90bfa32f7669b326045a629bd15941c533addcaf0c49d3c3c561da0542f2
kubernetes-src.tar.gz 266da065e9eddf19d36df5ad325f2f854101a0e712766148e87d998e789b80cf

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 5aaa8e294ae4060d34828239e37f37b45fa5a69508374be668965102848626be
kubernetes-client-darwin-amd64.tar.gz 40a8e3bab11b88a2bb8e748f0b29da806d89b55775508039abe9c38c5f4ab97d
kubernetes-client-linux-386.tar.gz e08dde0b561529f0b2bb39c141f4d7b1c943749ef7c1f9779facf5fb5b385d6a
kubernetes-client-linux-amd64.tar.gz 76a05d31acaab932ef45c67e1d6c9273933b8bc06dd5ce9bad3c7345d5267702
kubernetes-client-linux-arm64.tar.gz 4b833c9e80f3e4ac4958ea0ffb5ae564b31d2a524f6a14e58802937b2b936d73
kubernetes-client-linux-arm.tar.gz f1484ab75010a2258ed7717b1284d0c139d17e194ac9e391b8f1c0999eec3c2d
kubernetes-client-linux-ppc64le.tar.gz da884f09ec753925b2c1f27ea0a1f6c3da2056855fc88f47929bb3d6c2a09312
kubernetes-client-linux-s390x.tar.gz c486f760c6707fc92d1659d3cbe33d68c03190760b73ac215957ee52f9c19195
kubernetes-client-windows-386.tar.gz 514c550b7ff85ac33e6ed333bcc06461651fe4004d8b7c12ca67f5dc1d2198bf
kubernetes-client-windows-amd64.tar.gz ddad59222f6a8cb4e88c4330c2a967c4126cb22ac5e0d7126f9f65cca0fb9f45

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 514efd798ce1d7fe4233127f3334a3238faad6c26372a2d457eff02cbe72d756
kubernetes-server-linux-arm64.tar.gz f71f75fb96221f65891fc3e04fd52ae4e5628da8b7b4fbedece3fab4cb650afa
kubernetes-server-linux-arm.tar.gz a9d8c2386813fd690e60623a6ee1968fe8f0a1a8e13bc5cc12b2caf8e8a862e1
kubernetes-server-linux-ppc64le.tar.gz 21336a5e40aead4e2ec7e744a99d72bf8cb552341f3141abf8f235beb250cd93
kubernetes-server-linux-s390x.tar.gz 257e44d38fef83f08990b6b9b5e985118e867c0c33f0e869f0900397b9d30498

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 97bf1210f0595ebf496ca7b000c4367f8a459d97ef72459efc6d0e07a072398f
kubernetes-node-linux-arm64.tar.gz eebcd3c14fb4faeb82ab047a2152db528adc2d9f7b20eef6f5dc58202ebe3124
kubernetes-node-linux-arm.tar.gz 3d4428416c775a0a6463f623286bd2ecdf9240ce901e1fbae180dfb564c53ea1
kubernetes-node-linux-ppc64le.tar.gz 5cc96b24fad0ac1779a66f9b136d90e975b07bf619fea905e6c26ac5a4c41168
kubernetes-node-linux-s390x.tar.gz 134c13338edf4efcd511f4161742fbaa6dc232965d3d926c3de435e8a080fcbb
kubernetes-node-windows-amd64.tar.gz ae54bf2bbcb99cdcde959140460d0f83c0ecb187d060b594ae9c5349960ab055

Changelog since v1.9.0

Action Required

  • [action required] Remove the kubelet's --cloud-provider=auto-detect feature (#56287, @stewart-yu)

Other notable changes

  • Fix Heapster configuration and Metrics Server configuration to enable overriding default resource requirements. (#56965, @kawych)
  • YAMLDecoder Read now returns the number of bytes read (#57000, @sel)
  • Retry 'connection refused' errors when setting up clusters on GCE. (#57324, @mborsz)
  • Update kubeadm's minimum supported Kubernetes version in v1.10.x to v1.9.0 (#57233, @xiangpengzhao)
  • Graduate CPU Manager feature from alpha to beta. (#55977, @ConnorDoyle)
  • Drop hacks used for Mesos integration that was already removed from main kubernetes repository (#56754, @dims)
  • Compare correct file names for volume detach operation (#57053, @prashima)
  • Improved event generation in volume mount, attach, and extend operations (#56872, @davidz627)
  • GCE: bump COS image version to cos-stable-63-10032-71-0 (#57204, @yujuhong)
  • fluentd-gcp updated to version 2.0.11. (#56927, @x13n)
  • calico-node addon tolerates all NoExecute and NoSchedule taints by default. (#57122, @caseydavenport)
  • Support LoadBalancer for Azure Virtual Machine Scale Sets (#57131, @feiskyer)
  • Makes the kube-dns addon optional so that users can deploy their own DNS solution. (#57113, @wwwtyro)
  • Enabled log rotation for load balancer's api logs to prevent running out of disk space. (#56979, @hyperbolic2346)
  • Remove ScrubDNS interface from cloudprovider. (#56955, @feiskyer)
  • Fix etcd-version-monitor to backward compatibly support etcd 3.1 go-grpc-prometheus metrics format. (#56871, @jpbetz)
  • enable flexvolume on Windows node (#56921, @andyzhangx)
  • When using Role-Based Access Control, the "admin", "edit", and "view" roles now have the expected permissions on NetworkPolicy resources. (#56650, @danwinship)
  • Fix the PersistentVolumeLabel controller from initializing the PV labels when it's not the next pending initializer. (#56831, @jhorwit2)
  • kube-apiserver: The external hostname no longer use the cloud provider API to select a default. It can be set explicitly using --external-hostname, if needed. (#56812, @dims)
  • Use GiB unit for creating and resizing volumes for Glusterfs (#56581, @gnufied)
  • PersistentVolume flexVolume sources can now reference secrets in a namespace other than the PersistentVolumeClaim's namespace. (#56460, @liggitt)
  • Scheduler skips pods that use a PVC that either does not exist or is being deleted. (#55957, @jsafrane)
  • Fixed a garbage collection race condition where objects with ownerRefs pointing to cluster-scoped objects could be deleted incorrectly. (#57211, @liggitt)
  • Kubectl explain now prints out the Kind and API version of the resource being explained (#55689, @luksa)
  • api-server provides specific events when unable to repair a service cluster ip or node port (#54304, @frodenas)
  • Added docker-logins config to kubernetes-worker charm (#56217, @Cynerva)
  • delete useless params containerized (#56146, @jiulongzaitian)
  • add mount options support for azure disk (#56147, @andyzhangx)
  • Use structured generator for kubectl autoscale (#55913, @wackxu)
  • K8s supports cephfs fuse mount. (#55866, @zhangxiaoyu-zidif)
  • COS: Keep the docker network checkpoint (#54805, @yujuhong)
  • Fixed documentation typo in IPVS README. (#56578, @shift)