- v1.16.2
- v1.16.1
- v1.16.0
- Kubernetes v1.16.0 Release Notes
- v1.16.0-rc.2
- v1.16.0-rc.1
- v1.16.0-beta.2
- v1.16.0-beta.1
- v1.16.0-alpha.3
- v1.16.0-alpha.2
- v1.16.0-alpha.1
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 9e21ab6317fe209dabac72444273b493f5f7639f73c489cc233da3a0205a93f8779964fe2cf2237bb6ca7535560c7c8ac48e25e75a1fbe97dc5b51f248ed7eeb |
kubernetes-src.tar.gz | 2e52029a8669f51020f689b0da481f56ab922ecd2c4495e37cb8456e9b10fee50f97bf9faa6a3bc947e4142aa4e5374d7f905a22e5f18830610eacfdf47adbc6 |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | 6424b3047c5d7557b6c5536f29139bb6f71e4357b5e181d62bfd5fbf7d5575c9d5eeeab531b0afcc72ac17dd6609162bebc1045932ee58cbeb3093a4107cbf3a |
kubernetes-client-darwin-amd64.tar.gz | 791d2a4f965130ea1d7033f807b29015520afa317f97643f27480a6530213fd3fa06817ba9ce04e81f843b8420f05baa25e597e5880f99cc2ffbfc8b8ebf18cf |
kubernetes-client-linux-386.tar.gz | fd727fe3200975f71d1f5b21991e5b8d2471e92dc3185df29b8ef21a9aa87d270baa1bd2f9f2dbe61abe9e9541ee806709d6ed08aa13254a5953ddc1f1ddb5a6 |
kubernetes-client-linux-amd64.tar.gz | 69bb92c9b16c0286d7401d87cc73b85c88d6f9a17d2cf1748060e44525194b5be860daf7554c4c6319a546c9ff10f2b4df42a27e32d8f95a4052993b17ef57c0 |
kubernetes-client-linux-arm.tar.gz | f846f6018eb3d82741e6d2e8fd2f9f7ca8768ead56c3e2c330ba7e7dbba3209dd66f793b37d330134d3e8f38a03d6492e0054e55fcf32f74743b7b26f3159210 |
kubernetes-client-linux-arm64.tar.gz | 49cb3495fa8bbe64cefdb9aab83d4cfbe6a0f3a0e58b1685a49244df02e5ee8bbfaf0be133f5cf5231b1470bb62bd699cd6aba8072cb6ea3542f3ccfd42d3813 |
kubernetes-client-linux-ppc64le.tar.gz | 35a8b25309150cf5e1dab2af1d5118a24d296e21cdaf4bdec615badbc27a109ffb8b0e1cd93439fb728ec4905178eae2eb9d2ec2760053211b495c103d76fe3b |
kubernetes-client-linux-s390x.tar.gz | ffd5ab012d38b7a7b9e0acd8339c30545a60bcabba5642f5020464846391ae41930e84c0103231f850f0f0c86e064c18f47bff95ccf11b410c0216a4d887b2fb |
kubernetes-client-windows-386.tar.gz | c04d33b31734c7b25c54daa361986fcb745178320daa54d76b7627c475346a87c65443f7b139e1c86436b27eb9d10ed4a61ba5a64e0420bb6ce2f68fbad0a1b0 |
kubernetes-client-windows-amd64.tar.gz | e81fcf83523dd1dc79de7b498df6115465eb83d31a400853cdf143870a281322f24be5609d0c541810f90047a3c4e75530b9a6e872e51ed00d268530f2ed7ca9 |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 4aa3da6d146db878f4605ea6334925e925268808856f482ea7f9d131dce76ee30d4ba077a6b35de34a68d8d9ca005cccd2e7e4866b775c1f7eaba1320a1b8ec5 |
kubernetes-server-linux-arm.tar.gz | 0a9cea07a1172038d300277f1d305d99b147ae5949df3dd63856944cc0e4724105a0d79bf9ea39dface923d794b71e9f40d4104218167e56096a9e82a422864a |
kubernetes-server-linux-arm64.tar.gz | b1aadb87ff310aec7292df5386613c4c0036c0e3c20e0a4ab7bd3d5eea8fff0116c8b8b47289e894950b249be4207daac58449ec9a587353873890b47217ecd8 |
kubernetes-server-linux-ppc64le.tar.gz | 2aecda7fb53efd23c34cfe90ae37d55efec513996573c9124d9bf94809ea5a86bcd786e84d646039fbaff2e42d7e8f9c5db179beec3fac1f0a420920c93dce35 |
kubernetes-server-linux-s390x.tar.gz | 74fd3d5dbedac211570ef011f14e98d37848587b670038c69354c0162668aa2c6789835a5dbfc82f43fb9662444756f974de75917f75f59ab51e6ae9183e5c20 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | d1e139006e1ce6b66a1c0b9dd90509db712e5e024e1c5a4c0a1bb185211dd138cbcf201e6a9cdf7df9b78b6817523da23097c8396c0afb98481052447d329cc9 |
kubernetes-node-linux-arm.tar.gz | 5779c23d4f77edf5d5c3b8bb55fd190bf180f13c782e44a50a96572477af30008685c4e670c07ceb56c8e64390be7e7cbf14a9b25c894c66f90131a993bda4fc |
kubernetes-node-linux-arm64.tar.gz | f09bc220a05b8f5fca6d4575198ac2b7625fcbceb09ffd6da587c8b13a5b93365b601b94a25fb8cc360c7521ccc30d11d86d88490f5a48369f6078c4395593c2 |
kubernetes-node-linux-ppc64le.tar.gz | 96b3f8578e4f5e5261489ba392e7167bfdbe5ec6fb60a369455edffbc027b3086bd99055f7e3cabbf56426b7b181764d5cd5979bacd3ad8c26b541cd94ce62d8 |
kubernetes-node-linux-s390x.tar.gz | 4c9c7e541164781231378091cae0ab693c29b517b7737be191436c5e85ea4702cdd640890ae7c1295273270cb7944e2a250e2791a9a07bb415dac67d3129d1c1 |
kubernetes-node-windows-amd64.tar.gz | a88e7a1c6f72ea6073dbb4ddfe2e7c8bd37c9a56d94a33823f531e303a9915e7a844ac5880097724e44dfa7f4a9659d14b79cc46e2067f6b13e6df3f3f1b0f64 |
- Fixed panic when accessing CustomResources of a CRD with x-kubernetes-int-or-string. (#83789, @sttts)
- Fixed a bug in the single-numa-node policy of the TopologyManager. Previously, pods that only requested CPU resources and did not request any third-party devices would fail to launch with a TopologyAffinity error. Now they will launch successfully. (#83697, @klueska)
- Fixes kube-proxy bug accessing self nodeip:port on windows (#83027, @liggitt)
- Fix error where metrics related to dynamic kubelet config isn't registered (#83184, @odinuge)
- Use online nodes instead of possible nodes when discovering available NUMA nodes (#83196, @zouyee)
- Update Azure load balancer to prevent orphaned public IP addresses (#82890, @chewong)
- Fixes a goroutine leak in kube-apiserver when a request times out. (#83333, @lavalamp)
- Fix aggressive VM calls for Azure VMSS (#83102, @feiskyer)
- Fixes a flaw (CVE-2019-11253) in json/yaml decoding where large or malformed documents could consume excessive server resources. Request bodies for normal API requests (create/delete/update/patch operations of regular resources) are now limited to 3MB. (#83261, @liggitt)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 3dc4f0f2a208d3f235b4dc579418c503ba64fec261294c3683268259117e5c82f56db3f0c4ad63199f0f35f0de21df0b13ca00a74efe7b3142b275f0733e9219 |
kubernetes-src.tar.gz | 2d79b1e4e43c57c0e24da07f1312d0e49f8c43ebba0231dd5d628a52c25e929fed34c3d34b2ab739c0348c2f42c88feea8f1a4c2d821ace170f451bf74903ae3 |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | f7139df5f06f3fc9d1944058e7ba40a482621d6a169bc2f09a50dfa8f903866706051cded14fbd39d8d03c576f9e5219b0887f029ee1cac45919dc5ff232cdcd |
kubernetes-client-darwin-amd64.tar.gz | c4d458a0c3ef2dc9e4527daecf6b34da065d1ae7fd245f8b8aceca43467f03073f538e65e504f9800d3db0c64d88fc41f687b493be4d9a8283f39dd001a86a7d |
kubernetes-client-linux-386.tar.gz | 82d79bc833ae5317c4a1d0d397ccaa9aef616e0c2e5ff2166da8c66a4f55851f4bfa3b57708f75dc12eabefdee35b08d8f7bee74cfaf38a0339ee927f90e1655 |
kubernetes-client-linux-amd64.tar.gz | e355a74a17d96785b0b217673e67fa0f02daa1939f10d410602ac0a0d061a4db71d727b67f75aa886007dab95dd5c7f8cc38253d291dc4d2504ce673df69fb32 |
kubernetes-client-linux-arm.tar.gz | b9fba5995a7a02d001bead0305ae2a0c8ee7d2a98069aad6e57612988e298972cb6f69267afb79df292195958871c56a2cc5ec7a8e180a8d56c428f82bbbece8 |
kubernetes-client-linux-arm64.tar.gz | 64917bd6c4b277f4cb676b2e3d69cb12148bc90e2b04011d11985e492d525646fd13021b74f93914d37849fba87c07c513fafc1bd07edc7d3e4415fe8bd9ea37 |
kubernetes-client-linux-ppc64le.tar.gz | 258cc1b13f3ef90c52d401190f4d59c8c0d10367a6d960c6273522a15b879de2df4d141461d80338144e83995422da802a417a55911d7a4d8aeeec5aecd2adec |
kubernetes-client-linux-s390x.tar.gz | adaa34bde363a030f099a96417e257688e6280d86bdd3e04f7c06b6bccce639f599d494b5181a78e91c7f50207c53fa1a04b3b2fbd65be91512e51441e66a2e8 |
kubernetes-client-windows-386.tar.gz | 3ed99240a99a2d9f4193264f14168896a2418f296e5a2372e4e6aac44b65cd6a531ceec71d24333a7c825ba02acec63fdb51b97aa9fb4665048e929b7e4b774d |
kubernetes-client-windows-amd64.tar.gz | cbf8363147e44bfadee4da9ced9ab7bfc3c88ba7dcfa3f64803376efa5adc6dbb38519f73253aa9ea8b12bb42a92f5ea78e8b63fb082e4ace04d3ee3e285f549 |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | c43795fc2bfaee240f1e32e0b523cbbc8a888a40efa85371e682433d6f60dd1f3225ca34484fc9db54e68e250acbb5c2c388071bcd033fed0d8a47d044708b0b |
kubernetes-server-linux-arm.tar.gz | 3a6c38db6d6c0950f6d3cd4c158ba9c816dcbf1b1959a74d55ead53b1df2cf9131f56d5b0f5720f9c2000085ada1fd4d48439ea20f4ba35764e1a54f94848697 |
kubernetes-server-linux-arm64.tar.gz | 3cbde62bb5ef0af033d643cea800e891c199f9d6e9f0a3e1131bebe6759fd72b2c8d1f86d92ab5d1c352297b57320b47c70a6422768656b2c44c4ef4b7e3c721 |
kubernetes-server-linux-ppc64le.tar.gz | a60a25a346de61e705d416b50f8eac582a36faa622c6c45d4e3af92c46f48409b4c2a9bcbfd9297cc77d747cf1a96721146a24a48500a55b806c6fc0d9008e21 |
kubernetes-server-linux-s390x.tar.gz | 1ee9bbb36245825604d7cf4c9bdb2e43d0d755958413809ae7d3c9448ada567c0ab510f68318055dd71ec73d2ccce5b8d23faa698fd42772e3bd3c9592006d80 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 4ef686de6aa5a2bdcb8034b3def008995fc4474f34f939620c657ae115c61403c8d5698c9af68d3fe7015beaa8d578edc9f1a62b08dea92d99a3c73c9fe9e7a6 |
kubernetes-node-linux-arm.tar.gz | 58607b1cf68e8420bacc8dc3f95b19b7f90fe4fda1255814c76e66f67638b8db150eb464f85e1b625e13a74b0d86a973e54da87e2fb41985eff14b25a7761b1d |
kubernetes-node-linux-arm64.tar.gz | f02417299b5b6f3ee4b325d4a23b0ca19ee3c10dbe871a716470e68a3e89f4b84232eac1048dc9dc88a00ed069a8fd3b4f7817664e296e8842322379702e67e4 |
kubernetes-node-linux-ppc64le.tar.gz | fa3b44b668d0a341847601a18c463698810457e113459d6f8ddbce6f9305b613c4f61f9831e16d8bab128efdd69524c86981785f9703e248eff11f95e9330e74 |
kubernetes-node-linux-s390x.tar.gz | afe166d9245bd35fbc21763b9ef24bf174396c0611f75ddf93f1e4f3fb3e1cf1d4e7998d963e26fe3761bf4984ea33a5d6656035092c9b0d35e94f97882a5595 |
kubernetes-node-windows-amd64.tar.gz | 93ebe21c147dcb38cb1ee222975f35f7c8c8175255cfce09381c8852734d054def58bc630cf868d99baa7f90bd2c201ccaa42dbae3ef360c3135c825ec2c74b1 |
- Limit the body length of exec readiness/liveness probes. remote CRIs and Docker shim read a max of 16MB output of which the exec probe itself inspects 10kb. (#82514, @dims)
- Fix possible fd leak and closing of dirs when using openstack (#82873, @odinuge)
- Update to go 1.12.10 (#83139, @cblecker)
- Use ipv4 in wincat port forward. (#83036, @liyanhui1228)
- Fixes a panic in kube-controller-manager cleaning up bootstrap tokens (#82887, @tedyu)
- Resolves bottleneck in internal API server communication that can cause increased goroutines and degrade API Server performance (#80465, @answer1991)
- Resolves regression generating informers for packages whose names contain
.
characters (#82410, @nikhita) - Fixed a scheduler panic when using PodAffinity. (#82841, @Huang-Wei)
- Update Cluster Autoscaler version to 1.16.1 (release notes: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.16.1) (#83052, @losipiuk)
- Resolves issue with /readyz and /livez not including etcd and kms health checks (#82713, @logicalhan)
- fix: azure disk detach failure if node not exists (#82640, @andyzhangx)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 99aa74225dd999d112ebc3e7b7d586a2312ec9c99de7a7fef8bbbfb198a5b4cf740baa57ea262995303e2a5060d26397775d928a086acd926042a41ef00f200b |
kubernetes-src.tar.gz | 0be7d1d6564385cc20ff4d26bab55b71cc8657cf795429d04caa5db133a6725108d6a116553bf55081ccd854a4078e84d26366022634cdbfffd1a34a10b566cf |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | a5fb80d26c2a75741ad0efccdacd5d5869fbc303ae4bb1920a6883ebd93a6b41969f898d177f2602faf23a7462867e1235edeb0ba0675041d0c8d5ab266ec62d |
kubernetes-client-darwin-amd64.tar.gz | 47a9a78fada4b840d9ae4dac2b469a36d0812ac83d22fd798c4cb0f1673fb65c6558383c19a7268ed7101ac9fa32d53d79498407bdf94923f4f8f019ea39e912 |
kubernetes-client-linux-386.tar.gz | 916e4dd98f5ed8ee111eeb6c2cf5c5f313e1d98f3531b40a5a777240ddb96b9cc53df101daa077ffff52cf01167fdcc39d38a8655631bac846641308634e127a |
kubernetes-client-linux-amd64.tar.gz | fccf152588edbaaa21ca94c67408b8754f8bc55e49470380e10cf987be27495a8411d019d807df2b2c1c7620f8535e8f237848c3c1ac3791b91da8df59dea5aa |
kubernetes-client-linux-arm.tar.gz | 066c55fabbe3434604c46574c51c324336a02a5bfaed2e4d83b67012d26bf98354928c9c12758b53ece16b8567e2b5ce6cb88d5cf3008c7baf3c5df02611a610 |
kubernetes-client-linux-arm64.tar.gz | e41be74cc36240a64ecc962a066988b5ef7c3f3112977efd4e307b35dd78688f41d6c5b376a6d1152d843182bbbe75d179de75675548bb846f8c1e28827e0e0c |
kubernetes-client-linux-ppc64le.tar.gz | 08783eb3bb2e35b48dab3481e17d6e345d43bab8b8dee25bb5ff184ba46cb632750d4c38e9982366050aecce6e121c67bb6812dbfd607216acd3a2d19e05f5a1 |
kubernetes-client-linux-s390x.tar.gz | bcb6eb9cd3d8c92dfaf4f102ff2dc7517f632b1e955be6a02e7f223b15fc09c4ca2d6d9cd5b23871168cf6b455e2368daf17025c9cd61bf43d2ea72676db913a |
kubernetes-client-windows-386.tar.gz | efbc764d8e2889ce13c9eaaa61f685a8714563ddc20464523140d6f5bef0dfd51b745c3bd3fe2093258db242bf9b3207f8e9f451b0484de64f18cdb7162ec30e |
kubernetes-client-windows-amd64.tar.gz | b34bce694c6a0e4c8c5ddabcecb6adcb4d35f8c126b4b5ced7e44ef39cd45982dd9f6483a38e04430846f4da592dc74b475c37da7fe08444ef4eb5efde85e0b2 |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | a6bdac1eba1b87dc98b2bf5bf3690758960ecb50ed067736459b757fca0c3b01dd01fd215b4c06a653964048c6a81ea80b61ee8c7e4c98241409c091faf0cee1 |
kubernetes-server-linux-arm.tar.gz | 0560e1e893fe175d74465065d43081ee7f40ba7e7d7cafa53e5d7491f89c61957cf0d3abfa4620cd0f33b6e44911b43184199761005d20b72e3cd2ddc1224f9f |
kubernetes-server-linux-arm64.tar.gz | 4d5dd001fa3ac2b28bfee64e85dbedab0706302ffd634c34330617674e7a90e0108710f4248a2145676bd72f0bbc3598ed61e1e739c64147ea00d3b6a4ba4604 |
kubernetes-server-linux-ppc64le.tar.gz | cc642fca57e22bf6edd371e61e254b369b760c67fa00cac50e34464470f7eea624953deff800fa1e4f7791fe06791c48dbba3ed47e789297ead889c2aa7b2bbf |
kubernetes-server-linux-s390x.tar.gz | 1f480ba6f593a3aa20203e82e9e34ac206e35839fd9135f495c5d154480c57d1118673dcb5a6b112c18025fb4a847f65dc7aac470f01d2f06ad3da6aa63d98a3 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | e987f141bc0a248e99a371ce220403b78678c739a39dad1c1612e63a0bee4525fbca5ee8c2b5e5332a553cc5f63bce9ec95645589298f41fe83e1fd41faa538e |
kubernetes-node-linux-arm.tar.gz | 8b084c1063beda2dd4000e8004634d82e580f05cc300c2ee13ad84bb884987b2c7fd1f033fb2ed46941dfc311249acef06efe5044fb72dc4b6089c66388e1f61 |
kubernetes-node-linux-arm64.tar.gz | 365bdf9759e24d22cf507a0a5a507895ed44723496985e6d8f0bd10b03ffe7c78198732ee39873912147f2dd840d2e284118fc6fc1e3876d8f4c2c3a441def0b |
kubernetes-node-linux-ppc64le.tar.gz | ff54d83dd0fd3c447cdd76cdffd253598f6800045d2b6b91b513849d15b0b602590002e7fe2a55dc25ed5a05787f4973c480126491d24be7c5fce6ce98d0b6b6 |
kubernetes-node-linux-s390x.tar.gz | 527cd9bf4bf392c3f097f232264c0f0e096ac410b5211b0f308c9d964f86900f5875012353b0b787efc9104f51ad90880f118efb1da54eba5c7675c1840eae5f |
kubernetes-node-windows-amd64.tar.gz | 4f76a94c70481dd1d57941f156f395df008835b5d1cc17708945e8f560234dbd426f3cff7586f10fd4c24e14e3dfdce28e90c8ec213c23d6ed726aec94e9b0ff |
A complete changelog for the release notes is now hosted in a customizable format at relnotes.k8s.io. Check it out and please give us your feedback!
We’re pleased to announce the delivery of Kubernetes 1.16, our third release of 2019! Kubernetes 1.16 consists of 31 enhancements: 8 enhancements moving to stable, 8 enhancements in beta, and 15 enhancements in alpha.
The main themes of this release are:
- Custom resources: CRDs are in widespread use as a way to extend Kubernetes to persist and serve new resource types, and have been available in beta since the 1.7 release. The 1.16 release marks the graduation of CRDs to general availability (GA).
- Admission webhooks: Admission webhooks are in widespread use as a Kubernetes extensibility mechanism and have been available in beta since the 1.9 release. The 1.16 release marks the graduation of admission webhooks to general availability (GA).
- Overhauled metrics: Kubernetes has previously made extensive use of a global metrics registry to register metrics to be exposed. By implementing a metrics registry, metrics are registered in more transparent means. Previously, Kubernetes metrics have been excluded from any kind of stability requirements.
- Volume Extension: There are quite a few enhancements in this release that pertain to volumes and volume modifications. Volume resizing support in CSI specs is moving to beta which allows for any CSI spec volume plugin to be resizable.
- Topology Manager, a new Kubelet component, aims to co-ordinate resource assignment decisions to provide optimized resource allocations.
- IPv4/IPv6 dual-stack enables the allocation of both IPv4 and IPv6 addresses to Pods and Services.
- API Server Network Proxy going alpha in 1.16.
- Extensions for Cloud Controller Manager Migration.
- Continued deprecation of extensions/v1beta1, apps/v1beta1, and apps/v1beta2 APIs; these extensions will be retired in 1.16!
- The etcd and KMS plugin health checks are not exposed in the new
livez
andreadyz
endpoints. This will be fixed in 1.16.1. - Systems running
iptables
1.8.0 or newer should start it in legacy mode. Please note that this affects all versions of Kubernetes and not only v1.16.0. For more detailed information about the issue and how to apply a workaround, please refer to the official documentation - Generating informers for packages in directories containing dots in their name is broken. This will be fixed in v1.16.1. (#82860)
- kube-scheduler won't be able to report scheduling Events if
events.k8s.io/v1beta1
API is disabled. We are targeting the fix for v1.16.2 (#83203) - The etcd client library vendored in v1.16 (github.com/coreos/etcd/clientv3) has a bug where IPv6 IP addresses get incorrectly trimmed to the first occurance of the
:
character. This affects all users of the client library including the kube-apiserver and kubeadm. We are targeting the fix for this bug in v1.16.3. (#83550)
- Container images tar files for
amd64
will now contain the architecture in the RepoTags manifest.json section. If you are using docker manifests there are not visible changes. (#80266, @javier-b-perez) - kubeadm now deletes the bootstrap-kubelet.conf file after TLS bootstrap User relying on bootstrap-kubelet.conf should switch to kubelet.conf that contains node credentials (#80676, @fabriziopandini)
- Node labels
beta.kubernetes.io/metadata-proxy-ready
,beta.kubernetes.io/metadata-proxy-ready
andbeta.kubernetes.io/kube-proxy-ds-ready
are no longer added on new nodes.- ip-mask-agent addon starts to use the label
node.kubernetes.io/masq-agent-ds-ready
instead ofbeta.kubernetes.io/masq-agent-ds-ready
as its node selector. - kube-proxy addon starts to use the label
node.kubernetes.io/kube-proxy-ds-ready
instead ofbeta.kubernetes.io/kube-proxy-ds-ready
as its node selector. - metadata-proxy addon starts to use the label
cloud.google.com/metadata-proxy-ready
instead ofbeta.kubernetes.io/metadata-proxy-ready
as its node selector.
- ip-mask-agent addon starts to use the label
- When PodInfoOnMount is enabled for a CSI driver, the new csi.storage.k8s.io/ephemeral parameter in the volume context allows a driver's NodePublishVolume implementation to determine on a case-by-case basis whether the volume is ephemeral or a normal persistent volume (#79983, @pohly)
- Add CSI Migration Shim for VerifyVolumesAreAttached and BulkVolumeVerify (#80443, @davidz627)
- Promotes VolumePVCDataSource (Cloning) feature to beta for 1.16 release (#81792, @j-griffith)
- Integrated volume limits for in-tree and CSI volumes into one scheduler predicate. (#77595, @bertinatto)
-
API
-
The following APIs are no longer served by default:
- All resources under
apps/v1beta1
andapps/v1beta2
- useapps/v1
instead daemonsets
,deployments
,replicasets
resources underextensions/v1beta1
- useapps/v1
insteadnetworkpolicies
resources underextensions/v1beta1
- usenetworking.k8s.io/v1
insteadpodsecuritypolicies
resources underextensions/v1beta1
- usepolicy/v1beta1
instead
Serving these resources can be temporarily re-enabled using the
--runtime-config
apiserver flag.apps/v1beta1=true
apps/v1beta2=true
extensions/v1beta1/daemonsets=true,extensions/v1beta1/deployments=true,extensions/v1beta1/replicasets=true,extensions/v1beta1/networkpolicies=true,extensions/v1beta1/podsecuritypolicies=true
The ability to serve these resources will be completely removed in v1.18. (#70672, @liggitt)
- All resources under
-
Ingress resources will no longer be served from
extensions/v1beta1
in v1.20. Migrate use to thenetworking.k8s.io/v1beta1
API, available since v1.14. Existing persisted data can be retrieved via thenetworking.k8s.io/v1beta1
API. -
PriorityClass resources will no longer be served from
scheduling.k8s.io/v1beta1
andscheduling.k8s.io/v1alpha1
in v1.17. Migrate to thescheduling.k8s.io/v1
API, available since v1.14. Existing persisted data can be retrieved via thescheduling.k8s.io/v1
API. -
The
export
query parameter for list API calls, deprecated since v1.14, will be removed in v1.18. -
The
series.state
field in the events.k8s.io/v1beta1 Event API is deprecated and will be removed in v1.18 (#75987, @yastij) -
The
apiextensions.k8s.io/v1beta1
version ofCustomResourceDefinition
is deprecated and will no longer be served in v1.19. Useapiextensions.k8s.io/v1
instead. (#79604, @liggitt) -
The
admissionregistration.k8s.io/v1beta1
versions ofMutatingWebhookConfiguration
andValidatingWebhookConfiguration
are deprecated and will no longer be served in v1.19. Useadmissionregistration.k8s.io/v1
instead. (#79549, @liggitt) -
The alpha
metadata.initializers
field, deprecated in 1.13, has been removed. (#79504, @yue9944882) -
The deprecated node condition type
OutOfDisk
has been removed. Use theDiskPressure
condition instead. (#72420, @Pingan2017) -
The
metadata.selfLink
field is deprecated in individual and list objects. It will no longer be returned starting in v1.20, and the field will be removed entirely in v1.21. (#80978, @wojtek-t) -
The deprecated cloud providers
ovirt
,cloudstack
andphoton
have been removed (#72178, @dims) -
The
Cinder
andScaleIO
volume providers have been deprecated and will be removed in a future release. (#80099, @dims) -
The GA
PodPriority
feature gate is now on by default and cannot be disabled. The feature gate will be removed in v1.18. (#79262, @draveness) -
Aggregated discovery requests can now timeout. Aggregated API servers must complete discovery calls within 5 seconds (other requests can take longer). Use the feature gate
EnableAggregatedDiscoveryTimeout=false
to temporarily revert behavior to the previous 30 second timeout if required (the temporaryEnableAggregatedDiscoveryTimeout
feature gate will be removed in v1.17). (#82146, @deads2k) -
the
scheduler.alpha.kubernetes.io/critical-pod
annotation is removed. Pod priority (spec.priorityClassName
) should be used instead to mark pods as critical. (#80342, @draveness) -
the NormalizeScore plugin set is removed from scheduler framework config API. Use ScorePlugin only. (#80930, @liu-cong)
-
-
Features:
- The following features are now GA, and the associated feature gates are deprecated and will be removed in v1.17:
GCERegionalPersistentDisk
(since 1.15.0)CustomResourcePublishOpenAPI
CustomResourceSubresources
CustomResourceValidation
CustomResourceWebhookConversion
- The feature flags
HugePages
,VolumeScheduling
,CustomPodDNS
andPodReadinessGates
have been removed (#79307, @draveness)
- The following features are now GA, and the associated feature gates are deprecated and will be removed in v1.17:
-
hyperkube
- the
--make-symlinks
flag, deprecated in v1.14, has been removed. (#80017, @Pothulapati)
- the
-
kube-apiserver
- the
--basic-auth-file
flag and authentication mode is deprecated and will be removed in a future release. It is not recommended for production environments. (#81152, @tedyu) - the
--cloud-provider-gce-lb-src-cidrs
flag has been deprecated. This flag will be removed once the GCE Cloud Provider is removed from kube-apiserver. (#81094, @andrewsykim) - the
--enable-logs-handler
flag and log-serving functionality is deprecated since v1.15, and scheduled to be removed in v1.19. (#77611, @rohitsardesai83) - Deprecate the default service IP CIDR. The previous default was
10.0.0.0/24
which will be removed in 6 months/2 releases. Cluster admins must specify their own desired value, by using--service-cluster-ip-range
on kube-apiserver. (#81668, @darshanime)
- the
-
kube-proxy
-
kube-scheduler
-
kubeadm
- The CoreDNS Deployment now checks readiness via the
ready
plugin. - The
proxy
plugin has been deprecated. Theforward
plugin is to be used instead. kubernetes
plugin removes theresyncperiod
option.- The
upstream
option is deprecated and ignored if included. (#82127, @rajansandeep)
- The CoreDNS Deployment now checks readiness via the
-
kubectl
kubectl convert
, deprecated since v1.14, will be removed in v1.17.- The
--export
flag for thekubectl get
command, deprecated since v1.14, will be removed in v1.18. kubectl cp
no longer supports copying symbolic links from containers; to support this use case, seekubectl exec --help
for examples usingtar
directly (#82143, @soltysh)- Removed deprecated flag
--include-uninitialized
. (#80337, @draveness)
-
kubelet
- the
--containerized
flag was deprecated in 1.14 and has been removed (#80043, @dims) - the
beta.kubernetes.io/os
andbeta.kubernetes.io/arch
labels, deprecated since v1.14, are targeted for removal in v1.18. - cAdvisor json endpoints have been deprecated since 1.15. (#78504, @dashpole)
- removed the ability to set
kubernetes.io
- ork8s.io
-prefixed labels via--node-labels
, other than the specifically allowed labels/prefixes. (#79305, @paivagustavo)
- the
-
client-go
- Remove
DirectCodecFactory
(replaced withserializer.WithoutConversionCodecFactory
),DirectEncoder
(replaced withruntime.WithVersionEncoder
) andDirectDecoder
(replaced withruntime.WithoutVersionDecoder
). (#79263, @draveness)
- Remove
- Added metrics
aggregator_openapi_v2_regeneration_count
,aggregator_openapi_v2_regeneration_gauge
andapiextension_openapi_v2_regeneration_count
counting the triggering APIService and CRDs and the reason (add, update, delete) when kube-apiserver regenerates the OpenAPI spec. (#81786, @sttts) - Added metrics
authentication_attempts
that can be used to understand the attempts of authentication. (#81509, @RainbowMango) - Add a new counter metrics
apiserver_admission_webhook_rejection_count
with details about the causing for a webhook rejection. (#81399, @roycaihw) - NFS Drivers are now enabled to collect metrics, StatFS metrics provider is used to collect the metrics. (@brahmaroutu) (#75805, @brahmaroutu)
- Add
container_sockets
,container_threads
, andcontainer_threads_max
metrics (#81972, @dashpole) - Add
container_state
label torunning_container_count
kubelet metrics, to get count of containers based on their state(running/exited/created/unknown) (#81573, @irajdeep) - Added metric
apiserver_watch_events_total
that can be used to understand the number of watch events in the system. (#78732, @mborsz) - Added metric
apiserver_watch_events_sizes
that can be used to estimate sizes of watch events in the system. (#80477, @mborsz) - Added a new Prometheus counter metric
sync_proxy_rules_iptables_restore_failures_total
for kube-proxy iptables-restore failures (both ipvs and iptables modes) (#81210, @figo) - kubelet now exports an
kubelet_evictions
metric that counts the number of pod evictions carried out by the kubelet to reclaim resources (#81377, @sjenning)
- Removed cadvisor metric labels
pod_name
andcontainer_name
to match instrumentation guidelines. Any Prometheus queries that matchpod_name
andcontainer_name
labels (e.g. cadvisor or kubelet probe metrics) must be updated to usepod
andcontainer
instead. (#80376, @ehashman)
- kube-controller-manager and cloud-controller-manager metrics are now marked as with the ALPHA stability level. (#81624, @logicalhan)
- kube-proxy metrics are now marked as with the ALPHA stability level. (#81626, @logicalhan)
- kube-apiserver metrics are now marked as with the ALPHA stability level. (#81531, @logicalhan)
- kubelet metrics for /metrics and /metrics/probes are now marked as with the ALPHA stability level. (#81534, @logicalhan)
- Scheduler metrics are now marked as with the ALPHA stability level. (#81576, @logicalhan)
- The
rejected
label inapiserver_admission_webhook_admission_duration_seconds
metrices now properly indicates if the request was rejected. (#81399, @roycaihw) - Fixed a bug in the CSI metrics that does not return not supported error when a CSI driver does not support metrics. (#79851, @jparklab)
- Fix disk stats in LXD using ZFS storage pool and CRI-O missing network metris bug (#81972, @dashpole)
- Promote WatchBookmark feature to beta and enable it by default. With WatchBookmark feature, clients are able to request watch events with BOOKMARK type. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session. (#79786, @wojtek-t)
- The server-side apply feature is now beta (#81956, @apelisse)
- Server-side apply will now use the openapi provided in the CRD validation field to help figure out how to correctly merge objects and update ownership. (#77354, @jennybuckley)
- The
CustomResourceDefaulting
feature is promoted to beta and enabled by default. Defaults may be specified in structural schemas via theapiextensions.k8s.io/v1
API. See https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/#specifying-a-structural-schema for details. (#81872, @sttts) - Finalizer Protection for Service LoadBalancers is now in beta (enabled by default). This feature ensures the Service resource is not fully deleted until the correlating load balancer resources are deleted. (#81691, @MrHohn)
- Graduating Windows GMSA support from alpha to beta (#82110, @wk8)
- Introduce a new admission controller for RuntimeClass. Initially, RuntimeClass will be used to apply the pod overhead associated with a given RuntimeClass to the Pod
spec
if a corresponding RuntimeClassName is specified. PodOverhead is an alpha feature as of Kubernetes 1.16. (#78484, @egernst) - Introduction of the pod overhead feature to the scheduler. This functionality is alpha-level as of Kubernetes v1.16, and is only honored by servers that enable the PodOverhead feature.gate. (#78319, @egernst)
- Ephemeral containers have been added in alpha. These temporary containers can be added to running pods for purposes such as debugging, similar to how
kubectl exec
runs a process in an existing container. Also likekubectl exec
, no resources are reserved for ephemeral containers and they are not restarted when they exit. Note that container namespace targeting is not yet implemented, so process namespace sharing must be enabled to view process from other containers in the pod. (#59484, @verb) - Pod spread constraints have been added in alpha. You can use these constraints to control how Pods are spread across the cluster among failure-domains. (#77327, #77760, #77828, #79062, #80011, #81068, @Huang-Wei)
- the new flag
--endpoint-updates-batch-period
in kube-controller-manager can be used to reduce the number of endpoints updates generated by pod changes. (#80509, @mborsz) - the kubectl
--all-namespaces
flag is now honored bykubectl wait
(#81468, @ashutoshgngwr) kubectl get -w
now takes an--output-watch-events
flag to indicate the event type (ADDED, MODIFIED, DELETED) (#72416, @liggitt)- Adds Endpoint Slice support for kubectl when discovery API group is enabled. (#81795, @robscott)
- Add
--shutdown-delay-duration
to kube-apiserver in order to delay a graceful shutdown./healthz
will keep returning success during this time and requests are normally served, but/readyz
will return failure immediately. This delay can be used to allow the SDN to update iptables on all nodes and stop sending traffic. (#74416, @sttts) Kubeadm now seamlessly migrates the CoreDNS Configuration when upgrading CoreDNS. (#78033, @rajansandeep) - Add Endpoint Slice Controller for managing new EndpointSlice resource, disabled by default. (#81048, @robscott)
- Adds
\livez
for liveness health checking for kube-apiserver. Using the parameter--maximum-startup-sequence-duration
will allow the liveness endpoint to defer boot-sequence failures for the specified duration period. (#81969, @logicalhan) - Adds EndpointSlice integration to kube-proxy, can be enabled with EndpointSlice feature gate. (#81430, @robscott)
- Add status condition to namespace resource (#73405, @wozniakjan)
- Enhance Azure cloud provider code to support both AAD and ADFS authentication. (#80841, @rjaini)
- kubeadm: implement support for concurrent add/remove of stacked etcd members (#79677, @neolit123)
- kubeadm: support any Linux kernel version newer than 3.10 (#81623, @neolit123)
- Volume expansion is enabled in the default GCE storageclass (#78672, @msau42)
- kubeadm ClusterConfiguration now supports featureGates: IPv6DualStack: true (#80145, @Arvinderpal)
- In order to enable dual-stack support within kubeadm and kubernetes components, as part of the init config file, the user should set feature-gate
IPv6DualStack=true
in the ClusterConfiguration. Additionally, for each worker node, the user should set the feature-gate for kubelet using eithernodeRegistration.kubeletExtraArgs
orKUBELET_EXTRA_ARGS
. (#80531, @Arvinderpal) - Add possibility to configure controller manager to use IPv6 dual stack:
use
--cluster-cidr="<cidr1>,<cidr2>"
. Notes: - Add scheduling support for RuntimeClasses. RuntimeClasses can now specify nodeSelector constraints & tolerations, which are merged into the PodSpec for pods using that RuntimeClass. (#80825, @tallclair)
- When specifying
--(kube|system)-reserved-cgroup
, with--cgroup-driver=systemd
, it is now possible to use the fully qualified cgroupfs name (i.e./test-cgroup.slice
). (#78793, @mattjmcnaughton) - Adds support for vSphere volumes on Windows (#80911, @gab-satchi)
- The
MutatingWebhookConfiguration
andValidatingWebhookConfiguration
APIs have been promoted toadmissionregistration.k8s.io/v1
:failurePolicy
default changed fromIgnore
toFail
for v1matchPolicy
default changed fromExact
toEquivalent
for v1timeout
default changed from30s
to10s
for v1sideEffects
default value is removed, and the field made required, and onlyNone
andNoneOnDryRun
are permitted for v1admissionReviewVersions
default value is removed and the field made required for v1 (supported versions for AdmissionReview arev1
andv1beta1
)- The
name
field for specified webhooks must be unique forMutatingWebhookConfiguration
andValidatingWebhookConfiguration
objects created viaadmissionregistration.k8s.io/v1
- The
AdmissionReview
API sent to and received from admission webhooks has been promoted toadmission.k8s.io/v1
. Webhooks can specify a preference for receivingv1
AdmissionReview objects withadmissionReviewVersions: ["v1","v1beta1"]
, and must respond with an API object in the sameapiVersion
they are sent. When webhooks useadmission.k8s.io/v1
, the following additional validation is performed on their responses:response.patch
andresponse.patchType
are not permitted from validating admission webhooksapiVersion: "admission.k8s.io/v1"
is requiredkind: "AdmissionReview"
is requiredresponse.uid: "<value of request.uid>"
is requiredresponse.patchType: "JSONPatch"
is required (ifresponse.patch
is set) (#80231, @liggitt)
- The
CustomResourceDefinition
API type is promoted toapiextensions.k8s.io/v1
with the following changes:- Use of the new
default
feature in validation schemas is limited to v1 spec.scope
is no longer defaulted toNamespaced
and must be explicitly specifiedspec.version
is removed in v1; usespec.versions
insteadspec.validation
is removed in v1; usespec.versions[*].schema
insteadspec.subresources
is removed in v1; usespec.versions[*].subresources
insteadspec.additionalPrinterColumns
is removed in v1; usespec.versions[*].additionalPrinterColumns
insteadspec.conversion.webhookClientConfig
is moved tospec.conversion.webhook.clientConfig
in v1spec.conversion.conversionReviewVersions
is moved tospec.conversion.webhook.conversionReviewVersions
in v1spec.versions[*].schema.openAPIV3Schema
is now required when creating v1 CustomResourceDefinitionsspec.preserveUnknownFields: true
is disallowed when creating v1 CustomResourceDefinitions; it must be specified within schema definitions asx-kubernetes-preserve-unknown-fields: true
- In
additionalPrinterColumns
items, theJSONPath
field was renamed tojsonPath
in v1 (fixes kubernetes#66531) Theapiextensions.k8s.io/v1beta1
version ofCustomResourceDefinition
is deprecated and will no longer be served in v1.19. (#79604, @liggitt)
- Use of the new
- The
ConversionReview
API sent to and received from custom resource CustomResourceDefinition conversion webhooks has been promoted toapiextensions.k8s.io/v1
. CustomResourceDefinition conversion webhooks can now indicate they support receiving and responding withConversionReview
API objects in theapiextensions.k8s.io/v1
version by includingv1
in theconversionReviewVersions
list in their CustomResourceDefinition. Conversion webhooks must respond with a ConversionReview object in the same apiVersion they receive.apiextensions.k8s.io/v1
ConversionReview
responses must specify aresponse.uid
that matches therequest.uid
of the object they were sent. (#81476, @liggitt) - Add scheduling support for RuntimeClasses. RuntimeClasses can now specify nodeSelector constraints & tolerations, which are merged into the PodSpec for pods using that RuntimeClass. (#80825, @tallclair)
- Kubelet should now more reliably report the same primary node IP even if the set of node IPs reported by the CloudProvider changes. (#79391, @danwinship)
- Omit nil or empty field when calculating container hash value to avoid hash changed. For a new field with a non-nil default value in the container spec, the hash would still get changed. (#57741, @dixudx)
- Property
conditions
inapiextensions.v1beta1.CustomResourceDefinitionStatus
andapiextensions.v1.CustomResourceDefinitionStatus
is now optional instead of required. (#64996, @roycaihw) - When the status of a CustomResourceDefinition condition changes, its corresponding
lastTransitionTime
is now updated. (#69655, @CaoShuFeng)
- Remove
GetReference()
andGetPartialReference()
function frompkg/api/ref
, as the same function exists also instaging/src/k8s.io/client-go/tools/ref
(#80361, @wojtek-t) - Verify that CRD default values in OpenAPI specs are pruned, with the exceptions of values under
metadata
. (#78829, @sttts) - Fixes a bug that when there is a "connection refused" error, the reflector's ListAndWatch func will return directly but what expected is that sleep 1 second and rewatch since the specified resourceVersion. (#81634, @likakuli)
- Resolves an issue serving aggregated APIs backed by services that respond to requests to
/
with non-2xx HTTP responses (#79895, @deads2k) - The CRD handler now properly re-creates stale CR storage to reflect CRD update. (#79114, @roycaihw)
- Fix CVE-2019-11247: API server allows access to custom resources via wrong scope (#80750, @sttts)
- Fixed a bug with the openAPI definition for
io.k8s.apimachinery.pkg.runtime.RawExtension
, which previously required a fieldraw
to be specified (#80773, @jennybuckley) - Property
conditions
inapiextensions.v1beta1.CustomResourceDefinitionStatus
andapiextensions.v1.CustomResourceDefinitionStatus
is now optional instead of required. (#64996, @roycaihw) - Resolves a transient 404 response to custom resource requests during server startup (#81244, @liggitt)
- OpenAPI now advertises correctly supported patch types for custom resources (#81515, @liggitt)
- When the status of a CRD Condition changes, it's corresponding
LastTransitionTime
is now updated. (#69655, @CaoShuFeng) - Add
metadata.generation=1
to old CustomResources. (#82005, @sttts) - Fix a bug in the apiserver that could cause a valid update request to be rejected with a precondition check failure. (#82303, @roycaihw)
- Fixes regression in logging spurious stack traces when proxied connections are closed by the backend (#82588, @liggitt)
- RateLimiter add a context-aware method, fix client-go request goruntine backlog in async timeout scene. (#79375, @answer1991)
- Add a
Patch
method toScaleInterface
(#80699, @knight42) - CRDs under k8s.io and kubernetes.io must have the
api-approved.kubernetes.io
set to eitherunapproved.*
or a link to the pull request approving the schema. See kubernetes/enhancements#1111 for more details. (#79992, @deads2k) - KMS Providers will install a healthz check for the status of kms-plugin in kube-apiservers' encryption config. (#78540, @immutableT)
- Improves validation errors for custom resources (#81212, @liggitt)
- Populate object name for admission attributes when CREATE (#53185, @dixudx)
- Add Overhead field to the PodSpec and RuntimeClass types as part of the Pod Overhead KEP (#76968, @egernst)
- Fix a bug that pods not be deleted from unmatched nodes by daemon controller (#78974, @DaiHao)
- Fix a bug that causes DaemonSet rolling update hang when there exist failed pods. (#78170, @DaiHao)
- Service account tokens now include the JWT Key ID field in their header. (#78502, @ahmedtd)
- The nbf (not before) claim, if present in ID token, is now enforced. (#81413, @anderseknert)
- Fix CVE-2019-11249: Incomplete fixes for CVE-2019-1002101 and CVE-2019-11246, kubectl cp potential directory traversal (#80436, @M00nF1sh)
- Fix the bash completion error with override flags. (#80802, @dtaniwaki)
- Fix a bug in server printer that could cause kube-apiserver to panic. (#79349, @roycaihw)
- Fix invalid "time stamp is the future" error when kubectl cp-ing a file (#73982, @tanshanshan)
- Fix a bug where
kubectl set config
hangs and uses 100% CPU on some invalid property names (#79000, @pswica) - Fix output of
kubectl get --watch-only
when watching a single resource (#79345, @liggitt) - Make kubectl get
--ignore-not-found
continue processing when encountering error. (#82120, @soltysh) - Correct a reference to a not/no longer used kustomize subcommand in the documentation (#82535, @demobox)
- kubectl could scale custom resource again (#81342, @knight42)
- Add PodOverhead awareness to kubectl (#81929, @egernst)
- When a load balancer type service is created in a k8s cluster that is backed by Azure Standard Load Balancer, the corresponding load balancer rule added in the Azure Standard Load Balancer would now have the "EnableTcpReset" property set to true. (#80624, @xuto2)
- Switch to VM Update call in attach/detach disk operation, original CreateOrUpdate call may lead to orphaned VMs or blocked resources (#81208, @andyzhangx)
- Fix azure disk naming matching issue due to case sensitive comparison (#81720, @andyzhangx)
- Fix retry issues when the nodes are under deleting on Azure (#80419, @feiskyer)
- Fix conflicted cache when the requests are canceled by other Azure operations. (#81282, @feiskyer)
- Fix make azure disk URI as case insensitive (#79020, @andyzhangx)
- Fix VMSS LoadBalancer backend pools so that the network won't be broken when instances are upgraded to latest model (#81411, @nilo19)
- Default resourceGroup should be used when the value of annotation azure-load-balancer-resource-group is an empty string. (#79514, @feiskyer)
- Kubelet could be run with no Azure identity without subscriptionId configured now. A sample cloud provider configure is: '{"vmType": "vmss", "useInstanceMetadata": true}'. (#81500, @feiskyer)
- Fix public IP not found issues for VMSS nodes (#80703, @feiskyer)
- Fix Azure client requests stuck issues on http.StatusTooManyRequests (HTTP Code 429). (#81279, @feiskyer)
- Add a service annotation
service.beta.kubernetes.io/azure-pip-name
to specify the public IP name for Azure load balancer. (#81213, @nilo19) - Optimize EC2 DescribeInstances API calls in aws cloud provider library by querying instance ID instead of EC2 filters when possible (#78140, @zhan849)
- Creates an annotation
service.beta.kubernetes.io/aws-load-balancer-eip-allocations
to assign AWS EIP to the newly created Network Load Balancer. Number of allocations and subnets must match. (#69263, @brooksgarrett) - Add an azure cloud configuration
LoadBalancerName
andLoadBalancerResourceGroup
to allow the corresponding customizations of azure load balancer. (#81054, @nilo19)
-
Fix error handling and potential go null pointer exception in kubeadm upgrade diff (#80648, @odinuge)
-
kubeadm: fall back to client version in case of certain HTTP errors (#80024, @RainbowMango)
-
kubeadm: fix a potential panic if kubeadm discovers an invalid, existing kubeconfig file (#79165, @neolit123)
-
kubeadm: treat non-fatal errors as warnings when doing reset (#80862, @drpaneas)
-
kubeadm: prevent PSP blocking of upgrade image prepull by using a non-root user (#77792, @neolit123)
-
kubeadm: fix "certificate-authority" files not being pre-loaded when using file discovery (#80966, @neolit123)
-
Add instruction to setup "Application Default Credentials" to run GCE Windows e2e tests locally. (#81337, @YangLu1031)
-
Fix error in
kubeadm join --discovery-file
when using discovery files with embedded credentials (#80675, @fabriziopandini) -
Fix remove the etcd member from the cluster during a kubeadm reset. (#79326, @bradbeam)
-
kubeadm: the permissions of generated CSR files are changed from 0644 to 0600 (#81217, @SataQiu)
-
kubeadm: avoid double deletion of the upgrade prepull DaemonSet (#80798, @xlgao-zju)
-
kubeadm: introduce deterministic ordering for the certificates generation in the phase command
kubeadm init phase certs
. (#78556, @neolit123) -
kubeadm: implement retry logic for certain ConfigMap failures when joining nodes (#78915, @ereslibre)
-
kubeadm: use etcd's /health endpoint for a HTTP liveness probe on localhost instead of having a custom health check using etcdctl (#81385, @neolit123)
-
kubeadm reset: unmount directories under
/var/lib/kubelet
for Linux only (#81494, @Klaven) -
kubeadm: fix the bug that
--cri-socket
flag does not work forkubeadm reset
(#79498, @SataQiu) -
kubeadm: produce errors if they occur when resetting cluster status for a control-plane node (#80573, @bart0sh)
-
Fix an error when using external etcd but storing etcd certificates in the same folder with the same name used by kubeadm for local etcd certificates; for an older version of kubeadm, the workaround is to avoid file name used by kubeadm for local etcd. (#80867, @fabriziopandini)
-
kubeadm join
fails if file-based discovery is too long, with a default timeout of 5 minutes. (#80804, @olivierlemasle) -
kubeadm: fixed ignoring errors when pulling control plane images (#80529, @bart0sh)
-
Fix a bug in kube-addon-manager's leader election logic that made all replicas active. (#80575, @mborsz)
-
kubeadm: prevent overriding of certain kubelet security configuration parameters if the user wished to modify them (#81903, @jfbai)
-
kubeadm no longer performs IPVS checks as part of its preflight checks (#81791, @yastij)
-
kubeadm: fix for HTTPProxy check for IPv6 addresses (#82267, @kad)
-
kubeadm: Allow users to skip the kube-proxy init addon phase during init and still be able to join a cluster and perform some other minor operations (but not upgrade). (#82248, @rosti)
-
Mounts
/home/kubernetes/bin/nvidia/vulkan/icd.d
on the host to/etc/vulkan/icd.d
inside containers requesting GPU. (#78868, @chardch) -
kubeadm: use the
--pod-network-cidr
flag to init or use the podSubnet field in the kubeadm config to pass a comma separated list of pod CIDRs. (#79033, @Arvinderpal) -
kubeadm: provide
--control-plane-endpoint
flag forcontrolPlaneEndpoint
(#79270, @SataQiu) -
kubeadm: enable secure serving for the kube-scheduler (#80951, @neolit123)
-
kubeadm: print the stack trace of an error for klog level
--v>=5
(#80937, @neolit123) -
Add
--kubernetes-version
tokubeadm init phase certs ca
andkubeadm init phase kubeconfig
(#80115, @gyuho) -
kubeadm: support fetching configuration from the original cluster for
upgrade diff
(#80025, @SataQiu) -
When using the conformance test image, a new environment variable
E2E_USE_GO_RUNNER
will cause the tests to be run with the new golang-based test runner rather than the current bash wrapper. (#79284, @johnSchnake) -
Implement a new feature that allows applying kustomize patches to static pod manifests generated by kubeadm. (#80905, @fabriziopandini)
-
The 404 request handler for the GCE Ingress load balancer now exports prometheus metrics, including:
http_404_request_total
(the number of 404 requests handled)http_404_request_duration_ms
(the amount of time the server took to respond in ms)
Also includes percentile groupings. The directory for the default 404 handler includes instructions on how to enable prometheus for monitoring and setting alerts. (#79106, @vbannai)
- Fix a string comparison bug in IPVS graceful termination where UDP real servers are not deleted. (#78999, @andrewsykim)
kube-proxy --cleanup will
return the correct exit code if the cleanup was successful (#78775, @johscheuer)- Fix a bug in the IPVS proxier where virtual servers are not cleaned up even though the corresponding Service object was deleted. (#80942, @gongguan)
- kube-proxy waits for some duration for the node to be defined. (#77167, @paulsubrata55)
- Increase log level for graceful termination to
v=5
(#80100, @andrewsykim) - Reduce kube-proxy CPU usage in IPVS mode when a large number of nodePort services exist. (#79444, @cezarsa)
- Fix in kube-proxy for SCTP nodeport service which only works for node's InternalIP, but doesn't work for other IPs present in the node when ipvs is enabled. (#81477, @paulsubrata55)
- Ensure the
KUBE-MARK-DROP
chain in kube-proxy IPVS mode. The chain is ensured for both IPv4 and IPv6 in dual-stack operation. (#82214, @uablrek) - Introduce
node.kubernetes.io/exclude-balancer
andnode.kubernetes.io/exclude-disruption
labels in alpha to prevent cluster deployers from being dependent on the optionalnode-role
labels which not all clusters may provide. (#80238, @smarterclayton) - If targetPort is changed that will process by service controller (#77712, @Sn0rt)
- Remove PIDs cgroup controller requirement when related feature gates are disabled (#79073, @rafatio)
- Fix kubelet NodeLease potential performance issues. Kubelet now will try to update lease using cached one instead of get from API Server every time. (#81174, @answer1991)
- Passing an invalid policy name in the
--cpu-manager-policy
flag will now cause the kubelet to fail instead of simply ignoring the flag and running thecpumanager
’s default policy instead. (#80294, @klueska) - Make node lease renew interval more heuristic based on node-status-update-frequency in kubelet (#80173, @gaorong)
- Kubelet should now more reliably report the same primary node IP even if the set of node IPs reported by the CloudProvider changes. (#79391, @danwinship)
- Omit
nil
or empty field when calculating container hash value to avoid hash changed. For a new field with a non-nil default value in the container spec, the hash would still get changed. (#57741, @dixudx) - Fix a bug where kubelet would not retry pod sandbox creation when the restart policy of the pod is Never (#79451, @yujuhong)
- Limit the body length of exec readiness/liveness probes. remote CRIs and Docker shim read a max of 16MB output of which the exec probe itself inspects 10kb. (#82514, @dims)
- Single static pod files and pod files from http endpoints cannot be larger than 10 MB. HTTP probe payloads are now truncated to 10KB. (#82669, @rphillips)
- Introduce support for applying pod overhead to pod cgroups, if the PodOverhead feature is enabled. (#79247, @egernst)
- Node-Problem-Detector v0.7.1 is used on GCI (#80726, @wangzhen127)
- Node-Problem-Detector v0.7.1 is used for addon daemonset. (#82140, @wangzhen127)
- Enable cAdvisor ProcessMetrics collecting. (#79002, @jiayingz)
- kubelet: change
node-lease-renew-interval
to 0.25 of lease-renew-duration (#80429, @gaorong) - Attempt to set the kubelet's hostname & internal IP if
--cloud-provider=external
and no node addresses exists (#75229, @andrewsykim)
- Scheduler should terminate when it loses leader lock. (#81306, @ravisantoshgudimetla)
- If scheduler extender filtered a not found node, current scheduling round for this pod will just be skipped. (#79641, @yqwang-ms)
- Extender bind should respect IsInterested (#79804, @yqwang-ms)
- Fix an issue with toleration merging & whitelist checking in the PodTolerationRestriction admission controller. (#81732, @tallclair)
- Add a helper function to decode scheduler plugin args. (#80696, @hex108)
- Fix filter plugins are not been called during preemption (#81876, @wgliang)
- Fix an issue that the correct PluginConfig.Args is not passed to the corresponding PluginFactory in kube-scheduler when multiple PluginConfig items are defined. (#82483, @everpeace)
- Take the context as the first argument of Schedule. (#82119, @wgliang)
- Implement
post-filter
extension point for scheduling framework (#78097, @draveness) - Add Bind extension point of the scheduling framework (#78513, @chenchun)
- Add Filter extension point to the scheduling framework. (#78477, @YoubingLi)
- Return error when the scoring plugin returns score out of range
[0, 100]
. (#81015, @draveness) - Use a named array instead of a score array in normalizing-score phase. (#80901, @draveness)
- Updates the
requestedToCapacityRatioArguments
to add resources parameter that allows the users to specify the resource name along with weights for each resource to score nodes based on the request to capacity ratio. (#77688, @sudeshsh) - Add
UnschedulableAndUnresolvable
status code for scheduling framework (#82034, @alculquicondor) - Add normalize plugin extension point for the scheduling framework. (#80383, @liu-cong)
- Add Bind extension point to the scheduling framework. (#79313, @chenchun)
- Add Score extension point to the scheduling framework. (#79109, @ahg-g)
- Add Pre-filter extension point to the scheduling framework. (#78005, @ahg-g)
- Add support for writing out of tree custom scheduler plugins. (#78162, @hex108)
- Fix possible file descriptor leak and closing of dirs in
doSafeMakeDir
(#79534, @odinuge) - Azure disks of shared kind will no longer fail if they do not contain
skuname
orstorageaccounttype
. (#80837, @rmweir) - Fix CSI plugin supporting raw block that does not need attach mounted failed (#79920, @cwdsuzhou)
- Reduces GCE PD Node Attach Limits by 1 since the node boot disk is considered an attachable disk (#80923, @davidz627)
- Remove iSCSI volume storage cleartext secrets in logs (#81215, @zouyee)
- Fixes validation of VolumeAttachment API objects created with inline volume sources. (#80945, @tedyu)
- Changes timeout value in csi plugin from 15s to 2min which fixes the timeout issue (#79529, @andyzhangx)
- Fix kubelet fail to delete orphaned pod directory when the kubelet's pods directory (default is
/var/lib/kubelet/pods
) symbolically links to another disk device's directory (#79094, @gaorong)
- Fix pod list return value of
framework.WaitForPodsWithLabelRunningReady
(#78687, @pohly) - Adding
TerminationGracePeriodSeconds
to the test framework API (#82170, @vivekbagade) /test/e2e/framework
: Adds a flagnon-blocking-taints
which allows tests to run in environments with tainted nodes. String value should be a comma-separated list. (#81043, @johnSchnake)- Move CSI volume expansion to beta. (#81467, @bertinatto)
- Added E2E tests validating WindowsOptions.RunAsUserName. (#79539, @bclau)
framework.ExpectNoError
no longer logs the error and instead relies on using the newlog.Fail
as gomega fail handler. (#80253, @pohly)
- On Windows systems,
%USERPROFILE%
is now preferred over%HOMEDRIVE%\%HOMEPATH%
as the home folder if%HOMEDRIVE%\%HOMEPATH%
does not contain a.kube\config
file, and%USERPROFILE%
exists and is writable. (#73923, @liggitt) - Add support for AWS EBS on windows (#79552, @wongma7)
- Support Kubelet plugin watcher on Windows nodes. (#81397, @ddebroy)
- the default Go version was updated to v1.12.9. (#78958, #79966, #81390, #81489)
- etcd has been updated to v3.3.15 (#82199, @dims)
- CoreDNS for kubeadm and kube-up has been updated to v1.6.2 (#82127)
- Cluster Autoscaler has been updated to v1.16.0 (#82501, @losipiuk)
- fluentd has been updated to v1.5.1 (#79014)
- fluentd-elasticsearch plugin has been updated to v3.5.3 (#79014)
- elasticsearch has been updated to v7.1.1 (#79014)
- kibana has been updated to v7.1.1 (#79014)
- Azure SDK and go-autorest API versions have been updated (#79574)
- Azure API versions have been updated (container registry to 2018-09-01, network to 2018-08-01) (#79583)
- kube-addon-manager has been updated to v9.0.2 (#80861)
- golang/x/net has been updated to bring in fixes for CVE-2019-9512, CVE-2019-9514 (#81394)
- GCE windows node image has been updated. (#81106)
- portworx plugin has been updated on libopenstorage/openstorage to v1.0.0 (#80495)
- metrics-server has been updated to v0.3.4 (#82322, @olagacek)
- klog has been updated to v0.4.0 (#81164)
- The list of validated docker versions remains unchanged.
- CNI remains unchanged at v0.7.5. (#75455)
- cri-tools remains unchanged at v1.14.0. (#75658)
- CAdvisor remains unchanged at v0.33.2. (#76291)
- event-exporter remains unchanged at v0.2.5. (#77815)
- ip-masq-agent remains unchanged at v2.4.1. (#77844)
- k8s-dns-node-cache remains unchanged at v1.15.1 (#76640, @george-angel)
- CSI remains unchanged at to v1.1.0. (#75391)
- The dashboard add-on remains unchanged at v1.10.1. (#72495)
- kube-dns is unchanged at v1.14.13 as of Kubernetes 1.12. (#68900)
- Influxdb is unchanged at v1.3.3 as of Kubernetes 1.10. (#53319)
- Grafana is unchanged at v4.4.3 as of Kubernetes 1.10. (#53319)
- The fluent-plugin-kubernetes_metadata_filter plugin in fluentd-elasticsearch is unchanged at v2.1.6. (#71180)
- fluentd-gcp is unchanged at v3.2.0 as of Kubernetes 1.13. (#70954)
- OIDC authentication is unchanged at coreos/go-oidc v2 as of Kubernetes 1.10. (#58544)
- Calico is unchanged at v3.3.1 as of Kubernetes 1.13. (#70932)
- GLBC remains unchanged at v1.2.3 as of Kubernetes 1.12. (#66793)
- Ingress-gce remains unchanged at v1.2.3 as of Kubernetes 1.12. (#66793)
- Remove deprecated github.com/kardianos/osext dependency (#80142)
- github.com/Azure/go-autorest/autorest/adal: v0.5.0
- github.com/Azure/go-autorest/autorest/date: v0.1.0
- github.com/Azure/go-autorest/autorest/mocks: v0.2.0
- github.com/Azure/go-autorest/autorest/to: v0.2.0
- github.com/Azure/go-autorest/autorest/validation: v0.1.0
- github.com/Azure/go-autorest/autorest: v0.9.0
- github.com/Azure/go-autorest/logger: v0.1.0
- github.com/Azure/go-autorest/tracing: v0.5.0
- github.com/armon/consul-api: eb2c6b5
- github.com/bifurcation/mint: 93c51c6
- github.com/caddyserver/caddy: v1.0.3
- github.com/cenkalti/backoff: v2.1.1+incompatible
- github.com/checkpoint-restore/go-criu: bdb7599
- github.com/cheekybits/genny: 9127e81
- github.com/coredns/corefile-migration: v1.0.2
- github.com/coreos/go-etcd: v2.0.0+incompatible
- github.com/dustin/go-humanize: v1.0.0
- github.com/fatih/color: v1.6.0
- github.com/flynn/go-shlex: 3f9db97
- github.com/go-acme/lego: v2.5.0+incompatible
- github.com/go-bindata/go-bindata: v3.1.1+incompatible
- github.com/go-logr/logr: v0.1.0
- github.com/google/martian: v2.1.0+incompatible
- github.com/google/pprof: 3ea8567
- github.com/google/renameio: v0.1.0
- github.com/googleapis/gax-go/v2: v2.0.4
- github.com/hashicorp/go-syslog: v1.0.0
- github.com/jimstudt/http-authentication: 3eca13d
- github.com/kisielk/errcheck: v1.2.0
- github.com/kisielk/gotool: v1.0.0
- github.com/klauspost/cpuid: v1.2.0
- github.com/kr/pty: v1.1.5
- github.com/kylelemons/godebug: d65d576
- github.com/lucas-clemente/aes12: cd47fb3
- github.com/lucas-clemente/quic-clients: v0.1.0
- github.com/lucas-clemente/quic-go-certificates: d2f8652
- github.com/lucas-clemente/quic-go: v0.10.2
- github.com/marten-seemann/qtls: v0.2.3
- github.com/mattn/go-colorable: v0.0.9
- github.com/mattn/go-isatty: v0.0.3
- github.com/mholt/certmagic: 6a42ef9
- github.com/mitchellh/go-homedir: v1.1.0
- github.com/naoina/go-stringutil: v0.1.0
- github.com/naoina/toml: v0.1.1
- github.com/rogpeppe/go-internal: v1.3.0
- github.com/thecodeteam/goscaleio: v0.1.0
- github.com/ugorji/go/codec: d75b2dc
- github.com/xordataexchange/crypt: b2862e3
- go.opencensus.io: v0.21.0
- golang.org/x/mod: 4bf6d31
- gopkg.in/airbrake/gobrake.v2: v2.0.9
- gopkg.in/errgo.v2: v2.1.0
- gopkg.in/gemnasium/logrus-airbrake-hook.v2: v2.1.2
- gopkg.in/mcuadros/go-syslog.v2: v2.2.1
- gotest.tools/gotestsum: v0.3.5
- honnef.co/go/tools: v0.0.1-2019.2.2
- cloud.google.com/go: v0.34.0 → v0.38.0
- github.com/Azure/azure-sdk-for-go: v21.4.0+incompatible → v32.5.0+incompatible
- github.com/BurntSushi/toml: v0.3.0 → v0.3.1
- github.com/GoogleCloudPlatform/k8s-cloud-provider: f8e9959 → 27a4ced
- github.com/PuerkitoBio/purell: v1.1.0 → v1.1.1
- github.com/asaskevich/govalidator: f9ffefc → f61b66f
- github.com/client9/misspell: 9ce5d97 → v0.3.4
- github.com/containernetworking/cni: v0.6.0 → v0.7.1
- github.com/coreos/etcd: v3.3.13+incompatible → v3.3.15+incompatible
- github.com/coreos/go-oidc: 065b426 → v2.1.0+incompatible
- github.com/coreos/go-semver: e214231 → v0.3.0
- github.com/cpuguy83/go-md2man: v1.0.4 → v1.0.10
- github.com/cyphar/filepath-securejoin: ae69057 → v0.2.2
- github.com/dgrijalva/jwt-go: 01aeca5 → v3.2.0+incompatible
- github.com/docker/distribution: edc3ab2 → v2.7.1+incompatible
- github.com/emicklei/go-restful: ff4f55a → v2.9.5+incompatible
- github.com/evanphx/json-patch: 5858425 → v4.2.0+incompatible
- github.com/fatih/camelcase: f6a740d → v1.0.0
- github.com/go-openapi/analysis: v0.17.2 → v0.19.2
- github.com/go-openapi/errors: v0.17.2 → v0.19.2
- github.com/go-openapi/jsonpointer: v0.19.0 → v0.19.2
- github.com/go-openapi/jsonreference: v0.19.0 → v0.19.2
- github.com/go-openapi/loads: v0.17.2 → v0.19.2
- github.com/go-openapi/runtime: v0.17.2 → v0.19.0
- github.com/go-openapi/spec: v0.17.2 → v0.19.2
- github.com/go-openapi/strfmt: v0.17.0 → v0.19.0
- github.com/go-openapi/swag: v0.17.2 → v0.19.2
- github.com/go-openapi/validate: v0.18.0 → v0.19.2
- github.com/godbus/dbus: c7fdd8b → v4.1.0+incompatible
- github.com/gogo/protobuf: 342cbe0 → 65acae2
- github.com/golang/mock: bd3c8e8 → v1.2.0
- github.com/golang/protobuf: v1.2.0 → v1.3.1
- github.com/google/btree: 7d79101 → 4030bb1
- github.com/google/cadvisor: 9db8c7d → v0.34.0
- github.com/google/gofuzz: 24818f7 → v1.0.0
- github.com/google/uuid: v1.0.0 → v1.1.1
- github.com/gophercloud/gophercloud: c818fa6 → v0.1.0
- github.com/gorilla/websocket: 4201258 → v1.4.0
- github.com/grpc-ecosystem/go-grpc-prometheus: 2500245 → v1.2.0
- github.com/hashicorp/golang-lru: v0.5.0 → v0.5.1
- github.com/hashicorp/hcl: d8c773c → v1.0.0
- github.com/heketi/heketi: 558b292 → v9.0.0+incompatible
- github.com/jonboulle/clockwork: 72f9bd7 → v0.1.0
- github.com/json-iterator/go: ab8a2e0 → v1.1.7
- github.com/kr/pretty: f31442d → v0.1.0
- github.com/kr/text: 6807e77 → v0.1.0
- github.com/libopenstorage/openstorage: 093a0c3 → v1.0.0
- github.com/magiconair/properties: 61b492c → v1.8.1
- github.com/mailru/easyjson: 60711f1 → 94de47d
- github.com/mattn/go-shellwords: f8471b0 → v1.0.5
- github.com/miekg/dns: 5d001d0 → v1.1.4
- github.com/mistifyio/go-zfs: 1b4ae6f → v2.1.1+incompatible
- github.com/mitchellh/go-wordwrap: ad45545 → v1.0.0
- github.com/mvdan/xurls: 1b768d7 → v1.1.0
- github.com/onsi/ginkgo: v1.6.0 → v1.8.0
- github.com/onsi/gomega: 5533ce8 → v1.5.0
- github.com/opencontainers/go-digest: a6d0ee4 → v1.0.0-rc1
- github.com/opencontainers/image-spec: 372ad78 → v1.0.1
- github.com/opencontainers/runc: f000fe1 → 6cc5158
- github.com/opencontainers/selinux: 4a2974b → v1.2.2
- github.com/robfig/cron: df38d32 → v1.1.0
- github.com/russross/blackfriday: 300106c → v1.5.2
- github.com/seccomp/libseccomp-golang: 1b506fc → v0.9.1
- github.com/sirupsen/logrus: v1.2.0 → v1.4.2
- github.com/spf13/afero: b28a7ef → v1.2.2
- github.com/spf13/cast: e31f36f → v1.3.0
- github.com/spf13/cobra: c439c4f → v0.0.5
- github.com/spf13/jwalterweatherman: 33c24e7 → v1.1.0
- github.com/spf13/pflag: v1.0.1 → v1.0.3
- github.com/spf13/viper: 7fb2782 → v1.3.2
- github.com/stretchr/objx: v0.1.1 → v0.2.0
- github.com/stretchr/testify: v1.2.2 → v1.3.0
- golang.org/x/net: 65e2d4e → cdfb69a
- golang.org/x/tools: aa82965 → 6e04913
- google.golang.org/api: 583d854 → 5213b80
- google.golang.org/genproto: 09f6ed2 → 54afdca
- google.golang.org/grpc: v1.13.0 → v1.23.0
- gopkg.in/check.v1: 20d25e2 → 788fd78
- gopkg.in/natefinch/lumberjack.v2: 20b71e5 → v2.0.0
- gopkg.in/square/go-jose.v2: 89060de → v2.2.2
- gopkg.in/yaml.v2: v2.2.1 → v2.2.2
- k8s.io/gengo: f8a0810 → 26a6646
- k8s.io/klog: v0.3.1 → v0.4.0
- k8s.io/kube-openapi: b3a7cee → 743ec37
- k8s.io/utils: c2654d5 → 581e001
- sigs.k8s.io/structured-merge-diff: e85c7b2 → 6149e45
- github.com/Azure/go-autorest: v11.1.2+incompatible
- github.com/codedellemc/goscaleio: 20e2ce2
- github.com/d2g/dhcp4: a1d1b6c
- github.com/d2g/dhcp4client: 6e570ed
- github.com/jteeuwen/go-bindata: a0ff256
- github.com/kardianos/osext: 8fef92e
- github.com/kr/fs: 2788f0d
- github.com/marstr/guid: 8bdf7d1
- github.com/mholt/caddy: 2de4950
- github.com/natefinch/lumberjack: v2.0.0+incompatible
- github.com/pkg/sftp: 4d0e916
- github.com/shurcooL/sanitized_anchor_name: 10ef21a
- github.com/sigma/go-inotify: c87b6cf
- github.com/vmware/photon-controller-go-sdk: 4a435da
- github.com/xanzy/go-cloudstack: 1e2cbf6
- gopkg.in/yaml.v1: 9f9df34
- v1.16.0-rc.2
- v1.16.0-rc.1
- v1.16.0-beta.2
- v1.16.0-beta.1
- v1.16.0-alpha.3
- v1.16.0-alpha.2
- v1.16.0-alpha.1
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 68837f83bcf380e22b50f145fb64404584e96e5714a6c0cbc1ba76e290dc267f6b53194e2b51f19c1145ae7c3e5874124d35ff430cda15f67b0f9c954803389c |
kubernetes-src.tar.gz | 922552ed60d425fa6d126ffb34db6a7f123e1b9104e751edaed57b4992826620383446e6cf4f8a9fd55aac72f95a69b45e53274a41aaa838c2c2ae15ff4ddad2 |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | d0df8f57f4d9c2822badc507345f82f87d0e8e49c79ca907a0e4e4dd634db964b84572f88b8ae7eaf50a20965378d464e0d1e7f588e84e926edfb741b859e7d2 |
kubernetes-client-darwin-amd64.tar.gz | 0bc7daaf1165189b57dcdbe59f402731830b6f4db53b853350056822602579d52fe43ce5ac6b7d4b6d89d81036ae94eab6b7167e78011a96792acfbf6892fa39 |
kubernetes-client-linux-386.tar.gz | 7735c607bb99b47924140a6a3e794912b2b97b6b54024af1de5db6765b8cc518cba6b145c25dc67c8d8f827805d9a61f676b4ae67b8ef86cfda2fe76de822c6a |
kubernetes-client-linux-amd64.tar.gz | d35f70cea4780a80c24588bc760c38c138d73e5f80f9fe89d952075c24cbf179dd504c2bd7ddb1756c2632ffbcc69a334684710a2d702443043998f66bec4a25 |
kubernetes-client-linux-arm.tar.gz | e1fc50b6884c42e92649a231db60e35d4e13e58728e4af7f6eca8b0baa719108cdd960db1f1dbd623085610dbccf7f17df733de1faf10ebf6cd1977ecd7f6213 |
kubernetes-client-linux-arm64.tar.gz | defc25fe403c20ef322b2149be28a5b44c28c7284f11bcf193a07d7f45110ce2bd6227d3a4aa48859aaeb67796809962785651ca9f76121fb9534366b40c4b7d |
kubernetes-client-linux-ppc64le.tar.gz | e87b16c948d09ddbc5d6e3fab05ad3c5a58aa7836d4f42c59edab640465531869c92ecdfa2845ec3eecd95b8ccba3dafdd9337f4c313763c6e5105b8740f2dca |
kubernetes-client-linux-s390x.tar.gz | 2c25a1860fa81cea05a1840d6a200a3a794cc50cfe45a4efec57d7122208b1354e86f698437bbe5c915d6fb70ef9525f844edc0fa63387ab8c1586a6b22008a5 |
kubernetes-client-windows-386.tar.gz | 267654a7ecfa37c800c1c94ea78343f5466783881cfac62091cfbd8c62489f04bd74a7a39a08253cb51d7ba52c207f56da371f992f61c1468b595c094f0e080f |
kubernetes-client-windows-amd64.tar.gz | bd4c25b80e54f9fc0c07f64550d020878f899e4e3a28ca57dd532fdbab9ab700d296d2890185591ac27bce6fde336ab90f3102a6797e174d233db76f24f5ac1b |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 13a93bb9bd5599b669af7bd25537ee81cefd6d8c73bedfbac845703c01950c70b2aa39f94f2346d935bc167bae435dbcd6e1758341b634102265657e1b1c1259 |
kubernetes-server-linux-arm.tar.gz | 781d127f32d8479bc21beed855ec73e383702e6e982854138adce8edb0ee4d1d4b0c6e723532bc761689d17512c18b1945d05b0e4adb3fe4b98428cce40d52c8 |
kubernetes-server-linux-arm64.tar.gz | 6d6dfa49288e4a4ce77ca4f7e83a51c78a2b1844dd95df10cb12fff5a104e750d8e4e117b631448e066487c4c71648e822c87ed83a213f17f27f8c7ecb328ca4 |
kubernetes-server-linux-ppc64le.tar.gz | 97804d87ea984167fdbdedcfb38380bd98bb2ef150c1a631c6822905ce5270931a907226d5ddefc8d98d5326610daa79a08964fc4d7e8b438832beb966efd214 |
kubernetes-server-linux-s390x.tar.gz | d45bd651c7f4b6e62ceb661c2ec70afca06a8d1fde1e50bb7783d05401c37823cf21b9f0d3ac87e6b91eeec9d03fc539c3713fd46beff6207e8ebac1bf9d1dd5 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 42c57b59ce43f8961e427d622ee9cfa85cc23468779945262d59aa8cd31afd495c7abaaef7263b9db60ec939ba5e9898ebc3281e8ec81298237123ce4739cbff |
kubernetes-node-linux-arm.tar.gz | 034a5611909df462ef6408f5ba5ff5ebfb4e1178b2ad06a59097560040c4fcdb163faec48ab4297ca6c21282d7b146f9a5eebd3f2573f7d6d7189d6d29f2cf34 |
kubernetes-node-linux-arm64.tar.gz | df1493fa2d67b59eaf02096889223bbf0d71797652d3cbd89e8a3106ff6012ea17d25daaa4baf9f26c2e061afb4b69e3e6814ba66e9c4744f04230c922fbc251 |
kubernetes-node-linux-ppc64le.tar.gz | 812a5057bbf832c93f741cc39d04fc0087e36b81b6b123ec5ef02465f7ab145c5152cfc1f7c76032240695c7d7ab71ddb9a2a4f5e1f1a2abb63f32afa3fb6c7c |
kubernetes-node-linux-s390x.tar.gz | 2a58a4b201631789d4309ddc665829aedcc05ec4fe6ad6e4d965ef3283a381b8a4980b4b728cfe9a38368dac49921f61ac6938f0208b671afd2327f2013db22a |
kubernetes-node-windows-amd64.tar.gz | 7fb09e7667715f539766398fc1bbbc4bf17c64913ca09d4e3535dfc4d1ba2bf6f1a3fcc6d81dbf473ba3f10fd29c537ce5debc17268698048ce7b378802a6c46 |
- Single static pod files and pod files from http endpoints cannot be larger than 10 MB. HTTP probe payloads are now truncated to 10KB. (#82669, @rphillips)
- Restores compatibility with <=1.15.x custom resources by not publishing OpenAPI for non-structural custom resource definitions (#82653, @liggitt)
- Fixes regression in logging spurious stack traces when proxied connections are closed by the backend (#82588, @liggitt)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 2feadb470a8b0d498dff2c122d792109bc48e24bfc7f49b4b2b40a268061c83d9541cbcf902f2b992d6675e38d69ccdded9435ac488e041ff73d0c2dc518a5a9 |
kubernetes-src.tar.gz | 6d8877e735e041c989c0fca9dd9e57e5960299e74f66f69907b5e1265419c69ed3006c0161e0ced63073e28073355a5627154cf5db53b296b4a209b006b45db0 |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | 27bbfcb709854a9625dbb22c357492c1818bc1986b94e8cf727c046d596c4f1fe385df5b2ce61baaf95b066d584a8c04190215eaf979e12707c6449766e84810 |
kubernetes-client-darwin-amd64.tar.gz | 9c2ea22e188282356cd532801cb94d799bde5a5716f037b81e7f83273f699bf80776b253830e3a4e1a72c420f0c0b84e28ae043c9d28a49e9455e6b1449a353c |
kubernetes-client-linux-386.tar.gz | bbba78b8f972d0c247ed11e88010fc934a694efce8d2605635902b4a22f5ecc7e710f640bcefbba97ef28f6db68b9d8fb9e6a4a099603493c1ddcc5fd50c0d17 |
kubernetes-client-linux-amd64.tar.gz | f2f04dc9b93d1c8f5295d3f559a3abdd19ea7011741aa006b2cd96542c06a6892d7ed2bad8479c89e7d6ae0ed0685e68d5096bd5a46431c8cab8a90c04f1f00c |
kubernetes-client-linux-arm.tar.gz | 77d1f5b4783f7480d879d0b7682b1d46e730e7fb8edbc6eccd96986c31ceecbf123cd9fd11c5a388218a8c693b1b545daed28ca88f36ddaca06adac4422e4be5 |
kubernetes-client-linux-arm64.tar.gz | 0b57aa1dbbce51136789cb373d93e641d1f095a4bc9695d60917e85c814c8959a4d6e33224dc86295210d01e73e496091a191f303348f3b652a2b6160b1e6059 |
kubernetes-client-linux-ppc64le.tar.gz | 847065d541dece0fc931947146dbc90b181f923137772f26c7c93476e022f4f654e00f9928df7a13a9dec27075dd8134bdb168b5c57d4efa29ed20a6a2112272 |
kubernetes-client-linux-s390x.tar.gz | d7e8a808da9e2551ca7d8e7cb25222cb9ac01595f78ebbc86152ae1c21620d4d8478ef3d374d69f47403ca913fc716fbaa81bd3ff082db2fc5814ef8dc66eeec |
kubernetes-client-windows-386.tar.gz | c9cf6a6b9f2f29152af974d30f3fd97ba33693d5cbbf8fc76bcf6590979e7ac8307e5da4f84a646cec6b68f6fa1a83aa1ce24eb6429baa0a39c92d5901bd80be |
kubernetes-client-windows-amd64.tar.gz | ebea0c0b64d251e6023e8a5a100aa609bc278c797170765da2e35c8997efc233bec9f8d1436aeee1cd6459e30ec78ba64b84de47c26a4e4645e153e5e598202b |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 2fe7ccce15e705826c4ccfce48df8130ba89a0c930bca4b61f49267e9d490f57cf6220671752e44e55502bee501a9af2f0ac3927378a87b466f2526fa6e45834 |
kubernetes-server-linux-arm.tar.gz | 6eb77e59095a1de9eb21e7065e8d10b7d0baf1888991a42089ede6d4f8a8cac0b17ae793914eef5796d56d8f0b958203d5df1f7ed45856dce7244c9f047f9793 |
kubernetes-server-linux-arm64.tar.gz | 429ce0d5459384c9d3a2bb103924eebc4c30343c821252dde8f4413fcf29cc73728d378bfd193c443479bde6bfd26e0a13c036d4d4ae22034d66f6cad70f684d |
kubernetes-server-linux-ppc64le.tar.gz | 18041d9c99efc00c8c9dbb6444974efdbf4969a4f75faea75a3c859b1ee8485d2bf3f01b7942a524dcd6a71c82af7a5937fc9120286e920cf2d501b7c76ab160 |
kubernetes-server-linux-s390x.tar.gz | 2124c3d8856e50ca6b2b61d83f108ab921a1217fac2a80bf765d51b68f4e67d504471787d375524974173782aa37c57b6bf1fc6c7704ed7e6cabe15ec3c543b1 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | ea1bcd8cc51fbc95058a8a592eb454c07ab5dadc1c237bbc59f278f8adc46bda1f334e73463e1edbd6da5469c4a527ceb1cb0a96686493d3ff4e8878dd1c9a20 |
kubernetes-node-linux-arm.tar.gz | e5d62df5fd086ff5712f59f71ade9efcf617a13c567de965ce54c79f3909372bed4edbf6639cf058fe1d5c4042f794e1c6a91e5e20d9dcce597a95dedf2474b2 |
kubernetes-node-linux-arm64.tar.gz | 5aa0a7a3d02b65253e4e814e51cea6dd895170f2838fea02f94e4efd3f938dbf83bc7f209801856b98420373c04147fab9cb8791d24d51dcedf960068dfe6fda |
kubernetes-node-linux-ppc64le.tar.gz | f54bc5ae188f8ecb3ddcae20e06237430dd696f444a5c65b0aa3be79ad85c5b500625fa47ed0e126f6e738eb5d9ee082b52482a6913ec6d22473520fa6582e66 |
kubernetes-node-linux-s390x.tar.gz | afa4f9b747fff20ed03d40092a2df60dbd6ced0de7fd0c83c001866c4fe5b7117468e2f8c73cbef26f376b69b4750f188143076953fc200e8a5cc002c8ac705b |
kubernetes-node-windows-amd64.tar.gz | e9b76014a1d4268ad66ade06883dd3344c6312ece14ee988af645bdf9c5e9b62c31a0e339f774c67799b777314db6016d86a3753855c7d2eb461fbbf4e154ae7 |
- Update Cluster Autoscaler to 1.16.0; changelog: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.16.0 (#82501, @losipiuk)
- Resolved regression serving custom resources with unhandled validation schemas with the ServerSideApply feature enabled (#82438, @liggitt)
- Fix filter plugins are not been called during preemption (#81876, @wgliang)
- Fix the dns suffix search list for GCE window clusters. (#82314, @lzang)
- Install and start logging agent based on kube env ENABLE_NODE_LOGGING. (#81300, @liyanhui1228)
- kubeadm: Allow users to skip the kube-proxy init addon phase during init and still be able to join a cluster and perform some other minor operations (but not upgrade). (#82248, @rosti)
- Bump metrics-server to v0.3.4 (#82322, @olagacek)
- Updated default etcd service used by kubernetes to 3.3.15 (#82199, @dims)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | d1f4e9badc6a4422b9a261a5375769d63f0cac7fff2aff4122a325417b77d5e5317ba76a180cda2baa9fb1079c33e396fc16f82b31eeebea61004b0aabdf8c32 |
kubernetes-src.tar.gz | 2ab20b777311746bf9af0947a2bea8ae36e27da7d917149518d7c2d2612f513bbf88d1f2c7efff6dc169aa43c2dd3be73985ef619172d50d99faa56492b35ce4 |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | 55523fd5cfce0c5b79e981c6a4d5572790cfe4488ed23588be45ee13367e374cf703f611769751583986557b2607f271704d9f27e03f558e35e7c75796476b10 |
kubernetes-client-darwin-amd64.tar.gz | 13e696782713da96f5fb2c3fa54d99ca40bc71262cb2cbc8e77a6d19ffd33b0767d3f27e693aa84103aca465f9b00ed109996d3579b4bd28566b8998212a0872 |
kubernetes-client-linux-386.tar.gz | 7f4818599b84712edd2bf1d94f02f9a53c1f827b428a888356e793ff62e897276afcbc97f03bc0317e7d729740410037c57e6443f65c691eb959b676833511fa |
kubernetes-client-linux-amd64.tar.gz | 8a2656289d7d86cbded42831f6bc660b579609622c16428cf6cc782ac8b52df4c8511c5aad65aa520f398a65e35dee6ea5b5ad8e5fd14c5a8690a7248dc4c109 |
kubernetes-client-linux-arm.tar.gz | 418606bc109b9acb2687ed297fa2eec272e8cb4ad3ce1173acd15a4b43cec0ecfd95e944faeecf862b349114081dd99dfac8615dc95cffc1cd4983c5b38e9c4e |
kubernetes-client-linux-arm64.tar.gz | 2eb943b745c270cd161e01a12195cfb38565de892a1da89e851495fb6f9d6664055e384e30d3551c25f120964e816e44df5415aff7c12a8639c30a42271abef7 |
kubernetes-client-linux-ppc64le.tar.gz | 262e7d61e167e7accd43c47e9ce28323ae4614939a5af09ecc1023299cd2580220646e7c90d31fee0a17302f5d9df1e7da1e6774cc7e087248666b33399e8821 |
kubernetes-client-linux-s390x.tar.gz | 8f0cfe669a211423dd697fdab722011ea9641ce3db64debafa539d4a424dd26065c8de5da7502a4d40235ff39158f3935bd337b807a63771391dffb282563ccf |
kubernetes-client-windows-386.tar.gz | b1deab89653f4cd3ad8ad68b8ec3e1c038d1ef35bd2e4475d71d4781acf0b2002443f9c2b7d2cf06cbb9c568bea3881c06d723b0529cc8210f99450dc2dc5e43 |
kubernetes-client-windows-amd64.tar.gz | 0e3b5150767efd0ed5d60b2327d2b7f6f2bda1a3532fca8e84a7ca161f6e069fae15af37d3fe8a641d34c9a65fc61f1c44dd3265ef6cacfd2df55c9c004bc6bd |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 32688295df1fcdb9472ed040dc5e8b19d04d62789d2eca64cfe08080d08ffee1eaa4853ce40bd336aabd2f764dd65b36237d4f9f1c697e2d6572861c0c8eff01 |
kubernetes-server-linux-arm.tar.gz | c8ea6d66e966889a54194f9dce2021131e9bae34040c56d8839341c47fc4074d6322cc8aadce28e7cdcee88ec79d37a73d52276deb1cc1eee231e4d3083d54e5 |
kubernetes-server-linux-arm64.tar.gz | 12b42cfa33ff824392b81a604b7edcab95ecc67cddfc24c47ef67adb356a333998bc7b913b00daf7a213692d8d441153904474947b46c7f76ef03d4b2a63eab0 |
kubernetes-server-linux-ppc64le.tar.gz | e03f0eba181c03ddb7535e56ff330dafebb7dcb40889fd04f5609617ebb717f9f833e89810bff36d5299f72ae75d356fffb80f7b3bab2232c7597abcc003b8ba |
kubernetes-server-linux-s390x.tar.gz | 4e7bd061317a3445ad4b6b308f26218777677a1fef5fda181ee1a19e532a758f6bd3746a3fe1917a057ed71c94892aeaf00dd4eb008f61418ec3c80169a1f057 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | dc5606c17f0191afc6f28dce5ab566fd8f21a69fa3989a1c8f0976d7b8ccd32e26bb21e9fec9f4529c5a6c8301747d278484688a0592da291866f8fa4893dcbb |
kubernetes-node-linux-arm.tar.gz | 3d5d9893e06fd7be51dca11182ecb9e93108e86af40298fe66bb62e5e86f0bf4713667ba63d00b02cfddaf20878dd78cc738e76bf1ca715bbbe79347ca518ec4 |
kubernetes-node-linux-arm64.tar.gz | fd18a02f32aeafc5cce8f3f2eadd0e532857bd5264b7299b4e48f458f77ebaa53be94b1d1fe2062168f9d88c8a97e6c2d904fc3401a2d9e69dd4e8c87d01d915 |
kubernetes-node-linux-ppc64le.tar.gz | 703afd80140db2fae897d83b3d2bc8889ff6c6249bb79be7a1cce6f0c9326148d22585a5249c2e976c69a2518e3f887eef4c9dc4a970ebb854a78e72c1385ccb |
kubernetes-node-linux-s390x.tar.gz | 445d4ef4f9d63eabe3b7c16114906bc450cfde3e7bf7c8aedd084c79a5e399bd24a7a9c2283b58d382fb11885bb2b412773a36fffb6fc2fac15d696439a0b800 |
kubernetes-node-windows-amd64.tar.gz | 88b04171c3c0134044b7555fbc9b88071f5a73dbf2dac21f8a27b394b0870dff349a56b0ee4d8e1d9cfbeb98645e485f40b8d8863f3f3e833cba0ca6b1383ccf |
- Fix a bug in apiserver that could cause a valid update request to be rejected with a precondition check failure. (#82303, @roycaihw)
- Webhook client credentials configured with
--admission-control-config-file
must include non-default ports in the configured hostnames. For example, a webhook configured to speak to port 8443 on servicemysvc
in namespacemyns
would specify client credentials in a stanza withname: mysvc.myns.svc:8443
. See https://kubernetes.io/docs/reference/access-authn-authz/extensible-admission-controllers/#authenticate-apiservers for more details. (#82252, @liggitt) - Ensure the KUBE-MARK-DROP chain in kube-proxy mode=ipvs. The chain is ensured for both ipv4 and ipv6 in dual-stack operation. (#82214, @uablrek)
kubectl cp
no longer supports copying symbolic links from containers; to support this use case, seekubectl exec --help
for examples usingtar
directly (#82143, @soltysh)- kubeadm: fix for HTTPProxy check for IPv6 addresses (kubernetes/kubeadm#1769) (#82267, @kad)
- Add PodOverhead awareness to kubectl (#81929, @egernst)
- The nbf (not before) claim, if present in ID token, is now enforced. (#81413, @anderseknert)
- Server-side apply will now use the openapi provided in the CRD validation field to help figure out how to correctly merge objects and update ownership. (#77354, @jennybuckley)
- Adds Endpoint Slice support for kubectl when discovery API group is enabled. (#81795, @robscott)
- Node-Problem-Detector v0.7.1 is used for addon daemonset. (#82140, @wangzhen127)
- aggregated discovery requests can now timeout. Aggregated apiserver must complete discovery calls within five seconds. Other requests can take longer. (#82146, @deads2k)
- Use feature gate
EnableAggregatedDiscoveryTimeout=false
if you must remove this check, but that feature gate will be removed next release.
- Use feature gate
- Graduating Windows GMSA support from alpha to beta (#82110, @wk8)
- Add UnschedulableAndUnresolvable status code for Scheduler Framework (#82034, @alculquicondor)
- Kubeadm now includes CoreDNS version 1.6.2 (#82127, @rajansandeep)
-
- The CoreDNS Deployment now checks readiness via the `ready` plugin.
-
- The `proxy` plugin has been deprecated. The `forward` plugin is to be used instead.
-
- `kubernetes` plugin removes the `resyncperiod` option.
-
- The `upstream` option is deprecated and ignored if included.
-
- Make kubectl get --ignore-not-found continue processing when encountering error. (#82120, @soltysh)
- Dual stack services (Phase II of IPv6DualStack feature) are enabled via the IPVS proxier. iptables proxier does not support dualstack yet. Dualstack iptables proxier is WIP and should catchup soon. (#82091, @khenidak)
- to enable, kube-proxy must be have the following flags:
- --proxy-mode=ipvs
- --cluster-cidrs=,
- The apiserver now uses http/1.1 to communicate with admission webhooks, opening multiple connections to satisfy concurrent requests, and allowing spreading requests across multiple backing pods. (#82090, @liggitt)
- Added support to specify a global-access annotation for gce ILB. (#81549, @prameshj)
- Added new startupProbe, related to KEP kubernetes/enhancements#950. (#77807, @matthyx)
- Adds \livez for liveness health checking for kube-apiserver. Using the parameter
--maximum-startup-sequence-duration
will allow the liveness endpoint to defer boot-sequence failures for the specified duration period. (#81969, @logicalhan) - Server-side apply is now Beta. (#81956, @apelisse)
- The
rejected
label inapiserver_admission_webhook_admission_duration_seconds
metrices now properly indicates if a request was rejected. Add a new counter metricsapiserver_admission_webhook_rejection_count
with details about the causing for a webhook rejection. (#81399, @roycaihw) - Add
container_state
label torunning_container_count
kubelet metrics, to get count of containers based on their state(running/exited/created/unknown) (#81573, @irajdeep) - Fix a bug in CRD openapi controller that user-defined CRD can overwrite OpenAPI definition/path for the CRD API. (#81436, @roycaihw)
- Service account tokens now include the JWT Key ID field in their header. (#78502, @ahmedtd)
- Adds EndpointSlice integration to kube-proxy, can be enabled with EndpointSlice feature gate. (#81430, @robscott)
- Azure supports IPv6 only on ELB not ILB. The cloud provider will return an error if the service is internal and is IPv6. (#80485, @khenidak)
- Notes on LB name:
- to ensure backword and forward compat:
-
- SingleStack -v4 (pre v1.16) => BackendPool name == clusterName
-
- SingleStack -v6 => BackendPool name == clusterName (all cluster bootstrap uses this name)
- DualStack:
- => IPv4 BackendPool name == clusterName
- => IPv6 BackendPool name == -IPv6
- This result into:
-
- clusters moving from IPv4 to duakstack will require no changes
-
- clusters moving from IPv6 (while not seen in the wild, we can not rule out thier existance) to dualstack will require deleting backend pools (the reconciler will take care of creating correct backendpools)
- Promotes VolumePVCDataSource (Cloning) feature to beta for 1.16 release (#81792, @j-griffith)
- Remove kubectl log, use kubectl logs instead (#78098, @soltysh)
- CSI ephemeral inline volume support is beta, i.e. the CSIInlineVolume feature gate is enabled by default (#82004, @pohly)
- kubectl: the --all-namespaces flag is now honored by
kubectl wait
(#81468, @ashutoshgngwr) - Kube-proxy metrics are now marked as with the ALPHA stability level. (#81626, @logicalhan)
- Kube-controller-manager and cloud-controller-manager metrics are now marked as with the ALPHA stability level. (#81624, @logicalhan)
- Adds Endpoint Slice Controller for managing new EndpointSlice resource, disabled by default. (#81048, @robscott)
-
- to run: (#79386, @khenidak)
- Master: convert service CIDR to list
--service-cluster-ip-range=<CIDR>,<CIDR>
and make sureIPv6DualStack
feature flag is turned on. The flag is validated and used as the following: -
--service-cluster-ip-range[0]
is consider primary service range, and will be used for any service withService.Spec.IPFamily = nil
or any service in the at the time of turning on the feature flag.
-
- A cluster can be dualstack (i.e. Pods and nodes carry dualstack IPs) but does not need to support ingress on dualstack. In this case the cluster can perform egress using
PodIPs
(according to family and binding selection in user code) but will ingress will only be performed against the pod primary IP. This can be configured by supplying single entry to--service-cluster-ip-range
flag.
- A cluster can be dualstack (i.e. Pods and nodes carry dualstack IPs) but does not need to support ingress on dualstack. In this case the cluster can perform egress using
-
- Maximum of two entries is allowed in
--service-cluster-ip-range
and they are validated to be dual stackedi.e. --service-cluster-ip-range=<v4>,<v6> or --service-cluster-ip-range=<v6>,<v4>
- Maximum of two entries is allowed in
-
- Max 20 bit for range (min network bits
<v6>/108
or /12)
- Max 20 bit for range (min network bits
- kube-controller-manager: convert service CIDR to list
--service-cluster-ip-range=<CIDR>,<CIDR>
and make sureIPv6DualStack
feature flag is turned on. The flag is validated as above. -
- to use:
- A new service spec field
Service.Spec.IPFamily
has been added. The default of this field is family of (first service cidr in --service-cluster-ip-range flag). The value is defaulted as described above once the feature gate is turned on. Here are the possible values for this field: -
- IPv4: api-server will assign an IP from a
service-cluster-ip-range
that isipv4
(either the primary or the secondary, according to how they were configured).
- IPv4: api-server will assign an IP from a
-
- IPv6: api-server will assign an IP from a
service-cluster-ip-range
that isipv6
(either the primary or the secondary, according to how they were configured).
- IPv6: api-server will assign an IP from a
- Notes (v1.16):
-
- IPVS is the only proxy supported (as of v1.16 ) by Dualstack.
-
- Dualstack is mutually exclusive with
EndpointSlice
feature. They can not be turned on together.metaproxy
is yet to implement EndpointSlice handling.
- Dualstack is mutually exclusive with
- Master: convert service CIDR to list
- to run: (#79386, @khenidak)
- Kubelet metrics for /metrics and /metrics/probes are now marked as with the ALPHA stability level. (#81534, @logicalhan)
- Added metrics 'authentication_attempts' that can be used to understand the attempts of authentication. (#81509, @RainbowMango)
- Fix in kube-proxy for SCTP nodeport service which only works for node's InternalIP, but doesn't work for other IPs present in the node when ipvs is enabled. (#81477, @paulsubrata55)
- The
CustomResourceValidation
,CustomResourceSubresources
,CustomResourceWebhookConversion
andCustomResourcePublishOpenAPI
features are now GA, and the associated feature gates deprecated and will be removed in v1.18. (#81965, @roycaihw) - Node-Problem-Detector v0.7.1 is used on GCI. (#80726, @wangzhen127)
- kubeadm: prevent overriding of certain kubelet security configuration parameters if the user wished to modify them (#81903, @jfbai)
- Introduce
node.kubernetes.io/exclude-balancer
andnode.kubernetes.io/exclude-disruption
labels in alpha to prevent cluster deployers from being dependent on the optionalnode-role
labels which not all clusters may provide. (#80238, @smarterclayton) - Scheduler metrics are now marked as with the ALPHA stability level. (#81576, @logicalhan)
- cache-control headers are now set appropriately. Only openapi is cacheable if etags match. (#81946, @deads2k)
- Added E2E tests validating WindowsOptions.RunAsUserName. (#79539, @bclau)
- Kube-apiserver metrics are now marked as with the ALPHA stability level. (#81531, @logicalhan)
- Move CSI volume expansion to beta. (#81467, @bertinatto)
- Support Kubelet plugin watcher on Windows nodes. (#81397, @ddebroy)
- Updates the requestedToCapacityRatioArguments to add resources parameter that allows the users to specify the resource name along with weights for each resource to score nodes based on the request to capacity ratio. (#77688, @sudeshsh)
- Finalizer Protection for Service LoadBalancers is now in Beta (enabled by default). This feature ensures the Service resource is not fully deleted until the correlating load balancer resources are deleted. (#81691, @MrHohn)
- Adds support for vSphere volumes on Windows (#80911, @gab-satchi)
- Log when kube-apiserver regenerates the OpenAPI spec and why. OpenAPI spec generation is a very CPU-heavy process that is sensitive to continuous updates of CRDs and APIServices. (#81786, @sttts)
- Added metrics aggregator_openapi_v2_regeneration_count, aggregator_openapi_v2_regeneration_gauge and apiextension_openapi_v2_regeneration_count metrics counting the triggering APIService and CRDs and the reason (add, update, delete).
- Fix an issue with toleration merging & whitelist checking in the PodTolerationRestriction admission controller. (#81732, @tallclair)
- Add a helper function to decode scheduler plugin args. (#80696, @hex108)
- Add metadata.generation=1 to old CustomResources. (#82005, @sttts)
- kubeadm no longer performs IPVS checks as part of its preflight checks (#81791, @yastij)
- The RemainingItemCount feature is now beta. (#81682, @caesarxuchao)
- remainingItemCount is the number of subsequent items in the list which are not included in this list response. If the list request contained label or field selectors, then the number of remaining items is unknown and the field will be left unset and omitted during serialization. If the list is complete (either because it is not chunking or because this is the last chunk), then there are no more remaining items and this field will be left unset and omitted during serialization. Servers older than v1.15 do not set this field. The intended use of the remainingItemCount is estimating the size of a collection. Clients should not rely on the remainingItemCount to be set or to be exact.
- The CustomResourceDefaulting feature is promoted to beta and enabled by default. Defaults may be specified in structural schemas via the
apiextensions.k8s.io/v1
API. See https://kubernetes.io/docs/tasks/access-kubernetes-api/custom-resources/custom-resource-definitions/#specifying-a-structural-schema for details. (#81872, @sttts) - kubectl could scale custom resource again (#81342, @knight42)
- a CSI driver that supports ephemeral inline volumes must explicitly declare that by providing a CSIDriver object where the new "mode" field is set to "ephemeral" or "persistent+ephemeral" (#80568, @pohly)
framework.ExpectNoError
no longer logs the error and instead relies on using the newlog.Fail
as Gomega fail handler. (#80253, @pohly)- Audit events now log the existence and patch of mutating webhooks. (#77824, @roycaihw) * At Metadata audit level or higher, an annotation with key "mutation.webhook.admission.k8s.io/round_{round idx}index{order idx}" gets logged with JSON payload indicating a webhook gets invoked for given request and whether it mutated the object or not. * At Request audit level or higher, an annotation with key "patch.webhook.admission.k8s.io/round_{round idx}index{order idx}" get logged with the JSON payload logging the patch sent by a webhook for given request.
- Resolves an issue that prevented block volumes from being resized. (#81429, @huffmanca)
- Verify that CRD default values in OpenAPI specs are pruned, with the exceptions of values under
metadata
. (#78829, @sttts) - Use PostFilter instead of Postfilter in the scheduling framework (#81800, @draveness)
- Use PreFilter instead of Prefilter in the scheduling framework
- Use PreBind instead of Prebind in the scheduling framework
- Fix
kubectl logs -f
for windows server containers. (#81747, @Random-Liu) - fix azure disk naming matching issue due to case sensitive comparison (#81720, @andyzhangx)
- Fixes a bug that when there is a "connection refused" error, the reflector's ListAndWatch func will return directly but what expected is that sleep 1 second and rewatch since the specified resourceVersion. (#81634, @likakuli)
- Fixed a bug with the openAPI definition for io.k8s.apimachinery.pkg.runtime.RawExtension, which previously required a field "raw" to be specified (#80773, @jennybuckley)
- kubeadm: print the stack trace of an error for klog level --v>=5 (#80937, @neolit123)
- Fixes a problem with the iptables proxy mode that could result in long delays (#80368, @danwinship)
- updating Service/Endpoints IPs in very large clusters on RHEL/CentOS 7.
- kubeadm: support any Linux kernel version newer than 3.10 (#81623, @neolit123)
- Added a metric 'apiserver_watch_events_sizes' that can be used to estimate sizes of watch events in the system. (#80477, @mborsz)
- NormalizeScore plugin set is removed from scheduler framework config API. Use ScorePlugin only. (#80930, @liu-cong)
- kubeadm reset: unmount directories under "/var/lib/kubelet" for linux only (#81494, @Klaven)
- updates fluentd-elasticsearch docker image to fluentd 1.6.3 (#80912, @monotek)
- Kubeadm now seamlessly migrates the CoreDNS Configuration when upgrading CoreDNS. (#78033, @rajansandeep)
- Introduce support for applying pod overhead to pod cgroups, if the PodOverhead feature is enabled. (#79247, @egernst)
- Windows nodes on GCE now run with Windows Defender enabled. (#81625, @pjh)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 16513ebb52b01afee26156dcd4c449455dc328d7a080ba54b3f3a4584dbd9297025e33a9dafe758b259ae6e33ccb84a18038f6f415e98be298761c4d3dfee94b |
kubernetes-src.tar.gz | 3933f441ebca812835d6f893ec378896a8adb7ae88ca53247fa402aee1fda00d533301ac806f6bf106badf2f91be8c2524fd98e9757244b4b597c39124c59d01 |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | 28f0a8979f956aa5b3be1c1158a3ade1b242aac332696cb604fbdba44c4279caa1008840af01e50692bf48d0342018f882dd6e30f9fe3279e9784094cfc9ff3c |
kubernetes-client-darwin-amd64.tar.gz | 8804f60b690e5180125cf6ac6d739ad5432b364c5e0d0ee0d2f06220c86ca3a2cffc475e0e3c46c19466e5d1566a5b8bf0a33191cba5bbd3ff27ac64ceee57a0 |
kubernetes-client-linux-386.tar.gz | 8f7f86db5a496afd269b926b6baf341bbd4208f49b48fad1a44c5424812667b3bd7912b5b97bd7844dee2a7c6f9441628f7b5db3caa14429020de7788289191c |
kubernetes-client-linux-amd64.tar.gz | 7407dc1216cac39f15ca9f75be47c0463a151a3fda7d9843a67c0043c69858fb36eaa6b4194ce5cefd125acd7f521c4b958d446bb0c95ca73a3b3ae47af2c3ee |
kubernetes-client-linux-arm.tar.gz | 249a82a0af7d8062f49edd9221b3823590b6d166c1bca12c787ae640d6a131bd6a3d7c99136de62074afa6cabe8900dcf4e11037ddbfdf9d5252fc16e256eeb5 |
kubernetes-client-linux-arm64.tar.gz | 3a8416d99b6ae9bb6d568ff15d1783dc521fe58c60230f38126c64a7739bf03d8490a9a10042d1c4ef07290eaced6cb9d42a9728d4b937305d63f8d3cc7a66f8 |
kubernetes-client-linux-ppc64le.tar.gz | 105bf4afeccf0b314673265b969d1a7f3796ca3098afa788c43cd9ff3e14ee409392caa5766631cca180e790d92731a48f5e7156167637b97abc7c178dd390f3 |
kubernetes-client-linux-s390x.tar.gz | 98de73accb7deba9896e14a5012a112f6fd00d6e6868e4d21f61b06605efa8868f1965a1c1ba72bb8847416bc789bd7ef5c1a125811b6c6df060217cd84fdb2c |
kubernetes-client-windows-386.tar.gz | 7a43f3285b0ab617990497d41ceadfbd2be2b72d433b02508c198e9d380fb5e0a96863cc14d0e9bf0317df13810af1ab6b7c47cd4fa1d0619a00c9536dc60f0f |
kubernetes-client-windows-amd64.tar.gz | f3fafcffc949bd7f8657dd684c901e199b21c4812009aca1f8cf3c8bf3c3230cab072208d3702d7a248c0b957bc513306dd437fb6a54e1e64b4d7dc8c3c180cd |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 87b46e73ae2162ee49f510da6549e57503d3ea94b3c4488f39b0b93d45603f540ece30c3784c5e201711a7ddd1260481cd20ac4c618eaf46879e841d054a115a |
kubernetes-server-linux-arm.tar.gz | 80ba8e615497c0b9c339fbd2d6a4dda54fdbd5659abd7d8e8d448d8d8c24ba7f0ec48693e4bf8ed20513c46432f2a0f1039ab9044f0ed006b935a58772372d95 |
kubernetes-server-linux-arm64.tar.gz | b4a76a5fc026b4b3b5f9666df05e46896220591b21c147982ff3d91cec7330ed78cf1fc63f5ab759820aadbcfe400c1ad75d5151d9217d42e3da5873e0ff540d |
kubernetes-server-linux-ppc64le.tar.gz | fb435dfd5514e4cd3bc16b9e71865bff3cdd5123fc272c8cbc5956c260449e0dcfd30d2fdb120da73134e62f48507c5a02d4528d7b9d978765ff4ed740b274e8 |
kubernetes-server-linux-s390x.tar.gz | 65ed3d372a4d03493d0a586c7f67f1236aa99f02552195f1fb58079bc24787200d9a0f34d0c311a846345d0d70d02ad726f74376a91d3ced234bbfdce80c5133 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | c9161689532a5e995a68bb0985a983dc43d8e747a05f37849cd33062c07e5202417b26bff652b8bc9c0005026618b7ebc56f918c71747a3addb5da044e683b4a |
kubernetes-node-linux-arm.tar.gz | 7dba9fdb290f33678983c046eb145446edb1b7479c2403f9e8bd835c3d832ab1f2acb28124c53af5b046d47ab433312d6a654f000a22f8e10795b0bc45bfbddb |
kubernetes-node-linux-arm64.tar.gz | 8c435824667cd9ec7efdfb72c1d060f62ca61b285cbb9575a6e6013e20ec5b379f77f51d43ae21c1778a3eb3ef69df8895213c54e4b9f39c67c929a276be12de |
kubernetes-node-linux-ppc64le.tar.gz | 2cfca30dbe49a38cd1f3c78135f60bf7cb3dae0a8ec5d7fa651e1c5949254876fbab8a724ed9a13f733a85b9960edcc4cc971dc3c16297db609209c4270f144f |
kubernetes-node-linux-s390x.tar.gz | 63bbe469ddd1be48624ef5627fef1e1557a691819c71a77d419d59d101e8e6ee391eb8545da35b412b94974c06d73329a13660484ab26087a178f34a827a3dcb |
kubernetes-node-windows-amd64.tar.gz | 07cb97d5a3b7d0180a9e22696f417422a0c043754c81ae68338aab7b520aa7c119ff53b9ad835f9a0bc9ea8c07483ce506af48d65641dd15d30209a696b064bb |
- scheduler.alpha.kubernetes.io/critical-pod annotation is removed. Pod priority (spec.priorityClassName) should be used instead to mark pods as critical. Action required! (#80342, @draveness)
- Removed cadvisor metric labels
pod_name
andcontainer_name
to match instrumentation guidelines. (#80376, @ehashman)- Action required: any Prometheus queries that match
pod_name
andcontainer_name
labels (e.g. cadvisor or kubelet probe metrics) must be updated to usepod
andcontainer
instead.
- Action required: any Prometheus queries that match
- Remove DirectCodecFactory(replace with serializer.WithoutConversionCodecFactory), DirectEncoder(replace with runtime.WithVersionEncoder) and DirectDecoder(replace with runtime.WithoutVersionDecoder). action required (#79263, @draveness)
- fix: detach azure disk issue using dangling error (#81266, @andyzhangx)
- Conversion webhooks can now indicate they support receiving and responding with
ConversionReview
API objects in theapiextensions.k8s.io/v1
version by includingv1
in theconversionReviewVersions
list in their CustomResourceDefinition. Conversion webhooks must respond with a ConversionReview object in the same apiVersion they receive.apiextensions.k8s.io/v1
ConversionReview
responses must specify aresponse.uid
that matches therequest.uid
of the object they were sent. (#81476, @liggitt) - The
CustomResourceDefinition
API type is promoted toapiextensions.k8s.io/v1
with the following changes: (#79604, @liggitt)- Use of the new
default
feature in validation schemas is limited to v1 spec.scope
is no longer defaulted toNamespaced
and must be explicitly specifiedspec.version
is removed; usespec.versions
insteadspec.validation
is removed; usespec.versions[*].schema
insteadspec.subresources
is removed; usespec.versions[*].subresources
insteadspec.additionalPrinterColumns
is removed; usespec.versions[*].additionalPrinterColumns
insteadspec.conversion.webhookClientConfig
is moved tospec.conversion.webhook.clientConfig
spec.conversion.conversionReviewVersions
is moved tospec.conversion.webhook.conversionReviewVersions
spec.versions[*].schema.openAPIV3Schema
is now required when creating v1 CustomResourceDefinitionsspec.preserveUnknownFields: true
is disallowed when creating v1 CustomResourceDefinitions; it must be specified within schema definitions asx-kubernetes-preserve-unknown-fields: true
- In
additionalPrinterColumns
items, theJSONPath
field was renamed tojsonPath
(fixes kubernetes#66531)
- Use of the new
- openapi now advertises correctly supported patch types for custom resources (#81515, @liggitt)
- Kubelet could be run with no Azure identity without subscriptionId configured now. (#81500, @feiskyer)
- A sample cloud provider configure is: '{"vmType": "vmss", "useInstanceMetadata": true}'.
- Volumes specified in a pod but not used in it are no longer unnecessarily formatted, mounted and reported in
node.status.volumesInUse
. (#81163, @jsafrane) - kubeadm: use etcd's /health endpoint for a HTTP liveness probe on localhost instead of having a custom health check using etcdctl (#81385, @neolit123)
- kubeamd: use the --pod-network-cidr flag to init or use the podSubnet field in the kubeadm config to pass a comma separated list of pod CIDRs. (#79033, @Arvinderpal)
- Update to use go 1.12.9 (#81489, @BenTheElder)
- Update Azure SDK + go-autorest API versions (#79574, @justaugustus)
- Extender bind should respect IsInterested (#79804, @yqwang-ms)
- Add instruction to setup "Application Default Credentials" to run GCE Windows e2e tests locally. (#81337, @YangLu1031)
- Scheduler should terminate when it looses leader lock. (#81306, @ravisantoshgudimetla)
- kubelet now exports an "kubelet_evictions" metric that counts the number of pod evictions carried out by the kubelet to reclaim resources (#81377, @sjenning)
- Return error when the scoring plugin returns score out of range [0, 100]. (#81015, @draveness)
- Update to use go 1.12.8 (#81390, @cblecker)
- kube-proxy --cleanup will return the correct exit code if the cleanup was successful (#78775, @johscheuer)
- remove iSCSI volume storage cleartext secrets in logs (#81215, @zouyee)
- Use a named array instead of a score array in normalizing-score phase. (#80901, @draveness)
- If scheduler extender filtered a not found node, current scheduling round for this pod will just be skipped. (#79641, @yqwang-ms)
- Update golang/x/net dependency to bring in fixes for CVE-2019-9512, CVE-2019-9514 (#81394, @cblecker)
- Fixes CVE-2019-11250: client-go header logging (at verbosity levels >= 7) now masks
Authorization
header contents (#81330, @tedyu) - Resolves a transient 404 response to custom resource requests during server startup (#81244, @liggitt)
- Non nil DataSource entries on PVC's are now displayed as part of
describe pvc
output. (#76463, @j-griffith) - Fix Azure client requests stuck issues on http.StatusTooManyRequests (HTTP Code 429). (#81279, @feiskyer)
- Implement a new feature that allows applying kustomize patches to static pod manifests generated by kubeadm. (#80905, @fabriziopandini)
- Add a service annotation
service.beta.kubernetes.io/azure-pip-name
to specify the public IP name for Azure load balancer. (#81213, @nilo19) - Fix a bug in the IPVS proxier where virtual servers are not cleaned up even though the corresponding Service object was deleted. (#80942, @gongguan)
- Add scheduling support for RuntimeClasses. RuntimeClasses can now specify nodeSelector constraints & tolerations, which are merged into the PodSpec for pods using that RuntimeClass. (#80825, @tallclair)
- etcd Docker image can be run as non-root (#79722, @randomvariable)
- kubeadm: the permissions of generated CSR files are changed from 0644 to 0600 (#81217, @SataQiu)
- Fix conflicted cache when the requests are canceled by other Azure operations. (#81282, @feiskyer)
- Fix kubelet NodeLease potential performance issues. Kubelet now will try to update lease using cached one instead of get from API Server every time. (#81174, @answer1991)
- Improves validation errors for custom resources (#81212, @liggitt)
- Improvement in Kube-proxy. Kube-proxy waits for some duration for the node to be defined. (#77167, @paulsubrata55)
- hyperkube will drop support for cloud-controller-manager in a future release (#81219, @dims)
- added an new Prometheus counter metric "sync_proxy_rules_iptables_restore_failures_total" for kube-proxy iptables-restore failures (both ipvs and iptables modes) (#81210, @figo)
- Add a
Patch
method toScaleInterface
(#80699, @knight42) - switch to VM Update call in attach/detach disk operation, original CreateOrUpdate call may lead to orphaned VMs or blocked resources (#81208, @andyzhangx)
- Add a azure cloud configuration
LoadBalancerName
andLoadBalancerResourceGroup
to allow the corresponding customizations of azure load balancer. (#81054, @nilo19) - Update the GCE windows node image to include hot fixes since July. (#81106, @YangLu1031)
- Kubelet considers all static pods as critical. Static pods pass kubelet admission even if a node does not have enough resources. Users must ensure that they account for resources when creating static pods. (#80491, @hpandeycodeit)
- kube-apiserver: the
--basic-auth-file
flag and authentication mode is deprecated and will be removed in a future release. It is not recommended for production environments. (#81152, @tedyu) - Fix a bug that pretty printer marshals empty byte or uint8 slice as null (#81096, @roycaihw)
- Deprecate the
--cloud-provider-gce-lb-src-cidrs
flag in the kube-apiserver. This flag will be removed once the GCE Cloud Provider is removed from kube-apiserver. (#81094, @andrewsykim) - cloud-controller-manager binaries and docker images are no longer shipped with kubernetes releases. (#81029, @dims)
- API: the metadata.selfLink field is deprecated in individual and list objects. It will no longer be returned starting in v1.20, and the field will be removed entirely in v1.21. (#80978, @wojtek-t)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 82bc119f8d1e44518ab4f4bdefb96158b1a3634c003fe1bc8dcd62410189449fbd6736126409d39a6e2d211a036b4aa98baef3b3c6d9f7505e63430847d127c2 |
kubernetes-src.tar.gz | bbf330b887a5839e3d3219f5f4aa38f1c70eab64228077f846da80395193b2b402b60030741de14a9dd4de963662cfe694f6ab04035309e54dc48e6dddd5c05d |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | 8d509bdc1ca62463cbb25548ec270792630f6a883f3194e5bdbbb3d6f8568b00f695e39950b7b01713f2f05f206c4d1df1959c6ee80f8a3e390eb94759d344b2 |
kubernetes-client-darwin-amd64.tar.gz | 1b00b3a478c210e3c3e6c346f5c4f7f43a00d5ef6acb8d9c1feaf26f913b9d4f97eb6db99bbf67953ef6399abe4fbb79324973c1744a6a8cd76067cb2aeed2ca |
kubernetes-client-linux-386.tar.gz | 82424207b4ef52c3722436eaaf86dbe5c93c6670fd09c2b04320251028fd1bb75724b4f490b6e8b443bd8e5f892ab64612cd22206119924dafde424bdee9348a |
kubernetes-client-linux-amd64.tar.gz | 57ba937e58755d3b7dfd19626fedb95718f9c1d44ac1c5b4c8c46d11ba0f8783f3611c7b946b563cac9a3cf104c35ba5605e5e76b48ba2a707d787a7f50f7027 |
kubernetes-client-linux-arm.tar.gz | 3a3601026e019b299a6f662b887ebe749f08782d7ed0d37a807c38a01c6ba19f23e2837c9fb886053ad6e236a329f58a11ee3ec4ba96a8729905ae78a7f6c58c |
kubernetes-client-linux-arm64.tar.gz | 4cdeb2e678c6b817a04f9f5d92c5c6df88e0f954550961813fca63af4501d04c08e3f4353dd8b6dce96e2ee197a4c688245f03c888417a436b3cf70abd4ba53a |
kubernetes-client-linux-ppc64le.tar.gz | 0cc7c8f7b48f5affb679352a94e42d8b4003b9ca6f8cbeaf315d2eceddd2e8446a58ba1d4a0df18e8f9c69d0d3b5a46f25b2e6a916e57975381e504d1a4daa1b |
kubernetes-client-linux-s390x.tar.gz | 9d8fa639f543e707dc65f24ce2f8c73a50c606ec7bc27d17840f45ac150d00b3b3f83de5e3b21f72b598acf08273e4b9a889f199f4ce1b1d239b28659e6cd131 |
kubernetes-client-windows-386.tar.gz | 05bf6e696da680bb8feec4f411f342a9661b6165f4f0c72c069871983f199418c4d4fa1e034136bc8be41c5fecc9934a123906f2d5666c09a876db16ae8c11ad |
kubernetes-client-windows-amd64.tar.gz | b2097bc851f5d3504e562f68161910098b46c66c726b92b092a040acda965fed01f45e7b9e513a4259c7a5ebd65d7aa3e3b711f4179139a935720d91216ef5c2 |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 721bd09b64e5c8f220332417089a772d9073c0dc5cdfa240984cfeb0d681b4a02620fb3ebf1b9f6a82a4dd3423f5831c259d4bad502dce87f145e0a08cb73ee9 |
kubernetes-server-linux-arm.tar.gz | e7638ce4b88b4282f0a157593cfe809fa9cc9139ea7ebae4762ef5ac1dfaa516903a8acb34a45937eb94b2699e5d4c68c639cbe40cbed2a6b97681aeace9948e |
kubernetes-server-linux-arm64.tar.gz | 395566c4be3c2ca5b07e81221b3370bc7ccbef0879f96a9384650fcaf4f699f3b2744ba1d97ae42cc6c5d9e1a65a41a793a8b0c9e01a0a65f57c56b1420f8141 |
kubernetes-server-linux-ppc64le.tar.gz | 90fcba066efd76d2f271a0eb26ed4d90483674d04f5e8cc39ec1e5b7f343311f2f1c40de386f35d3c69759628a1c7c075559c09b6c4542e42fbbe0daeb61a5fa |
kubernetes-server-linux-s390x.tar.gz | b25014bcf4138722a710451f6e58ee57588b4d47fcceeda8f6866073c1cc08641082ec56e94b0c6d586c0835ce9b55d205d254436fc22a744b24d8c74e8e5cce |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | 6925a71096530f7114a68e755d07cb8ba714bc60b477360c85d76d7b71d3a3c0b78a650877d81aae35b308ded27c8207b5fe72d990abc43db3aa8a7d6d7f94f4 |
kubernetes-node-linux-arm.tar.gz | 073310e1ccf9a8af998d4c0402ae86bee4f253d2af233b0c45cea55902268c2fe7190a41a990b079e24536e9efa27b94249c3a9236531a166ba3ac06c0f26f92 |
kubernetes-node-linux-arm64.tar.gz | c55e9aecef906e56a6003f441a7d336846edb269aed1c7a31cf834b0730508706e73ea0ae135c1604b0697c9e2582480fbfba8ba105152698c240e324da0cbd2 |
kubernetes-node-linux-ppc64le.tar.gz | e89d72d27bb0a7f9133ef7310f455ba2b4c46e9852c43e0a981b68a413bcdd18de7168eb16d93cf87a5ada6a4958592d3be80c9be1e6895fa48e2f7fa70f188d |
kubernetes-node-linux-s390x.tar.gz | 6ef8a25f2f80a806672057dc030654345e87d269babe7cf166f7443e04c0b3a9bc1928cbcf5abef1f0f0fcd37f3a727f789887dbbdae62f9d1fd90a71ed26b39 |
kubernetes-node-windows-amd64.tar.gz | 22fd1cea6e0150c06dbdc7249635bbf93c4297565d5a9d13e653f9365cd61a0b8306312efc806d267c47be81621016b114510a269c622cccc916ecff4d10f33c |
- ACTION REQUIRED: (#80676, @fabriziopandini)
- kubeadm now deletes the bootstrap-kubelet.conf file after TLS bootstrap
- User relying on bootstrap-kubelet.conf should switch to kubelet.conf that contains node credentials
- Fixes validation of VolumeAttachment API objects created with inline volume sources. (#80945, @tedyu)
- Azure disks of shared kind will no longer fail if they do not contain skuname or (#80837, @rmweir)
-
storageaccounttype.
-
- kubeadm: fix "certificate-authority" files not being pre-loaded when using file discovery (#80966, @neolit123)
- Errors from pod volume set up are now propagated as pod events. (#80369, @jsafrane)
- kubeadm: enable secure serving for the kube-scheduler (#80951, @neolit123)
- Kubernetes client users may disable automatic compression when invoking Kubernetes APIs by setting the
DisableCompression
field on their rest.Config. This is recommended when clients communicate primarily over high bandwidth / low latency networks where response compression does not improve end to end latency. (#80919, @smarterclayton) - kubectl get did not correctly count the number of binaryData keys when listing config maps. (#80827, @smarterclayton)
- Implement "post-filter" extension point for scheduling framework (#78097, @draveness)
- Reduces GCE PD Node Attach Limits by 1 since the node boot disk is considered an attachable disk (#80923, @davidz627)
- This PR fixes an error when using external etcd but storing etcd certificates in the same folder and with the same name used by kubeadm for local etcd certificates; for an older version of kubeadm, the workaround is to avoid file name used by kubeadm for local etcd. (#80867, @fabriziopandini)
- When specifying
--(kube|system)-reserved-cgroup
, with--cgroup-driver=systemd
, it is now possible to use the fully qualified cgroupfs name (i.e./test-cgroup.slice
). (#78793, @mattjmcnaughton) - kubeadm: treat non-fatal errors as warnings when doing reset (#80862, @drpaneas)
- kube-addon-manager has been updated to v9.0.2 to fix a bug in leader election (kubernetes#80575) (#80861, @mborsz)
- Determine system model to get credentials for windows nodes. (#80764, @liyanhui1228)
- TBD (#80730, @jennybuckley)
- The
AdmissionReview
API sent to and received from admission webhooks has been promoted toadmission.k8s.io/v1
. Webhooks can specify a preference for receivingv1
AdmissionReview objects withadmissionReviewVersions: ["v1","v1beta1"]
, and must respond with an API object in the sameapiVersion
they are sent. When webhooks useadmission.k8s.io/v1
, the following additional validation is performed on their responses: (#80231, @liggitt) *response.patch
andresponse.patchType
are not permitted from validating admission webhooks *apiVersion: "admission.k8s.io/v1"
is required *kind: "AdmissionReview"
is required *response.uid: "<value of request.uid>"
is required *response.patchType: "JSONPatch"
is required (ifresponse.patch
is set) - "kubeadm join" fails if file-based discovery is too long, with a default timeout of 5 minutes. (#80804, @olivierlemasle)
- enhance Azure cloud provider code to support both AAD and ADFS authentication. (#80841, @rjaini)
- Attempt to set the kubelet's hostname & internal IP if
--cloud-provider=external
and no node addresses exists (#75229, @andrewsykim) - kubeadm: avoid double deletion of the upgrade prepull DaemonSet (#80798, @xlgao-zju)
- Fixes problems with connecting to services on localhost on some systems; in particular, DNS queries to systemd-resolved on Ubuntu. (#80591, @danwinship)
- Implement normalize plugin extension point for the scheduler framework. (#80383, @liu-cong)
- Fixed the bash completion error with override flags. (#80802, @dtaniwaki)
- Fix CVE-2019-11247: API server allows access to custom resources via wrong scope (#80750, @sttts)
- Failed iscsi logout is now re-tried periodically. (#78941, @jsafrane)
- Fix public IP not found issues for VMSS nodes (#80703, @feiskyer)
- In order to enable dual-stack support within kubeadm and kubernetes components, as part of the init config file, the user should set feature-gate IPv6DualStack=true in the ClusterConfiguration. Additionally, for each worker node, the user should set the feature-gate for kubelet using either nodeRegistration.kubeletExtraArgs or KUBELET_EXTRA_ARGS. (#80531, @Arvinderpal)
- Fix error in
kubeadm join --discovery-file
when using discovery files with embedded credentials (#80675, @fabriziopandini)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 7dfa3f8b9e98e528e2b49ed9cca5e95f265b9e102faac636ff0c29e045689145be236b98406a62eb0385154dc0c1233cac049806c99c9e46590cad5aa729183f |
kubernetes-src.tar.gz | 7cf14b92c96cab5fcda3115ec66b44562ca26ea6aa46bc7fa614fa66bda1bdf9ac1f3c94ef0dfa0e37c992c7187ecf4205b253f37f280857e88a318f8479c9a9 |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | 4871756de2cd1add0b07ec1e577c500d18a59e2f761595b939e1d4e10fbe0a119479ecaaf53d75cb2138363deae23cc88cba24fe3018cec6a27a3182f37cae92 |
kubernetes-client-darwin-amd64.tar.gz | dbd9ca5fd90652ffc1606f50029d711eb52d34b707b7c04f29201f85aa8a5081923a53585513634f3adb6ace2bc59be9d4ad2abc49fdc3790ef805378c111e68 |
kubernetes-client-linux-386.tar.gz | 6b049098b1dc65416c5dcc30346b82e5cf69a1cdd7e7b065429a76d302ef4b2a1c8e2dc621e9d5c1a6395a1fbd97f196d99404810880d118576e7b94e5621e4c |
kubernetes-client-linux-amd64.tar.gz | 7240a9d49e445e9fb0c9d360a9287933c6c6e7d81d6e11b0d645d3f9b6f3f1372cc343f03d10026518df5d6c95525e84c41b06a034c9ec2c9e306323dbd9325b |
kubernetes-client-linux-arm.tar.gz | 947b0d9aeeef08961c0582b4c3c94b7ae1016d20b0c9f50af5fe760b3573f17497059511bcb57ac971a5bdadeb5c77dfd639d5745042ecc67541dd702ee7c657 |
kubernetes-client-linux-arm64.tar.gz | aff0258a223f5061552d340cda36872e3cd7017368117bbb14dc0f8a3a4db8c715c11743bedd72189cd43082aa9ac1ced64a6337c2f174bdcbeef094b47e76b0 |
kubernetes-client-linux-ppc64le.tar.gz | 3eabecd62290ae8d876ae45333777b2c9959e39461197dbe90e6ba07d0a4c50328cbdf44e77d2bd626e435ffc69593d0e8b807b36601c19dd1a1ef17e6810b4f |
kubernetes-client-linux-s390x.tar.gz | 6651b2d95d0a8dd748c33c9e8018ab606b4061956cc2b6775bd0b008b04ea33df27be819ce6c391ceb2191b53acbbc088d602ed2d86bdd7a3a3fc1c8f876798a |
kubernetes-client-windows-386.tar.gz | 4b6c11b7a318e5fcac19144f6ab1638126c299e08c7b908495591674abcf4c7dd16f63c74c7d901beff24006150d2a31e0f75e28a9e14d6d0d88a09dafb014f0 |
kubernetes-client-windows-amd64.tar.gz | 760ae08da6045ae7089fb27a9324e77bed907662659364857e1a8d103d19ba50e80544d8c21a086738b15baebfd9a5fa78d63638eff7bbe725436c054ba649cc |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | 69db41f3d79aa0581c36a3736ab8dc96c92127b82d3cf25c5effc675758fe713ca7aa7e5b414914f1bc73187c6cee5f76d76b74a2ee1c0e7fa61557328f1b8ef |
kubernetes-server-linux-arm.tar.gz | ca302f53ee91ab4feb697bb34d360d0872a7abea59c5f28cceefe9237a914c77d68722b85743998ab12bf8e42005e63a1d1a441859c2426c1a8d745dd33f4276 |
kubernetes-server-linux-arm64.tar.gz | 79ab1f0a542ce576ea6d81cd2a7c068da6674177b72f1b5f5e3ca47edfdb228f533683a073857b6bc53225a230d15d3ba4b0cb9b6d5d78a309aa6e24c2f6c500 |
kubernetes-server-linux-ppc64le.tar.gz | fbe5b45326f1d03bcdd9ffd46ab454917d79f629ba23dae9d667d0c7741bc2f5db2960bf3c989bb75c19c9dc1609dacbb8a6dc9a440e5b192648e70db7f68721 |
kubernetes-server-linux-s390x.tar.gz | eb13ac306793679a3a489136bb7eb6588472688b2bb2aa0e54e61647d8c9da6d3589c19e7ac434c24defa78cb65f7b72593eedec1e7431c7ecae872298efc4de |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | a4bde88f3e0f6233d04f04d380d5f612cd3c574bd66b9f3ee531fa76e3e0f1c6597edbc9fa61251a377e8230bce0ce6dc1cf57fd19080bb7d13f14a391b27fe8 |
kubernetes-node-linux-arm.tar.gz | 7d72aa8c1d883b9f047e5b98dbb662bdfd314f9c06af4213068381ffaac116e68d1aad76327ead7a4fd97976ea72277cebcf765c56b265334cb3a02c83972ec1 |
kubernetes-node-linux-arm64.tar.gz | c9380bb59ba26dcfe1ab52b5cb02e2d920313defda09ec7d19ccbc18f54def4b57cf941ac8a397392beb5836fdc12bc9600d4055f2cfd1319896cfc9631cab10 |
kubernetes-node-linux-ppc64le.tar.gz | 7bcd79b368a62c24465fce7dcb024bb629eae034e09fb522fb43bb5798478ca2660a3ccc596b424325c6f69e675468900f3b41f3924e7ff453e3db40150b3c16 |
kubernetes-node-linux-s390x.tar.gz | 9bda9dd24ee5ca65aaefece4213b46ef57cde4904542d94e6147542e42766f8b80fe24d99a6b8711bd7dbe00c415169a9f258f433c5f5345c2e17c2bb82f2670 |
kubernetes-node-windows-amd64.tar.gz | d5906f229d2d8e99bdb37e7d155d54560b82ea28ce881c5a0cde8f8d20bff8fd2e82ea4b289ae3e58616d3ec8c23ac9b473cb714892a377feb87ecbce156147d |
- Revert "scheduler.alpha.kubernetes.io/critical-pod annotation is removed. Pod priority (spec.priorityClassName) should be used instead to mark pods as critical. Action required!" (#80277, @draveness)
- ACTION REQUIRED: container images tar files for 'amd64' will now contain the architecture in the RepoTags manifest.json section. (#80266, @javier-b-perez)
- If you are using docker manifests there are not visible changes.
- Use HTTPS as etcd-apiserver protocol when mTLS between etcd and kube-apiserver on master is enabled, change etcd metrics/health port to 2382. (#77561, @wenjiaswe)
- kubelet: change node-lease-renew-interval to 0.25 of lease-renew-duration (#80429, @gaorong)
- Fix error handling and potential go null pointer exception in kubeadm upgrade diff (#80648, @odinuge)
- New flag --endpoint-updates-batch-period in kube-controller-manager can be used to reduce number of endpoints updates generated by pod changes. (#80509, @mborsz)
- kubeadm: produce errors if they occur when resetting cluster status for a control-plane node (#80573, @bart0sh)
- When a load balancer type service is created in a k8s cluster that is backed by Azure Standard Load Balancer, the corresponding load balancer rule added in the Azure Standard Load Balancer would now have the "EnableTcpReset" property set to true. (#80624, @xuto2)
- Update portworx plugin dependency on libopenstorage/openstorage to v1.0.0 (#80495, @adityadani)
- Fixed detachment of deleted volumes on OpenStack / Cinder. (#80518, @jsafrane)
- when PodInfoOnMount is enabled for a CSI driver, the new csi.storage.k8s.io/ephemeral parameter in the volume context allows a driver's NodePublishVolume implementation to determine on a case-by-case basis whether the volume is ephemeral or a normal persistent volume (#79983, @pohly)
- Update gogo/protobuf to serialize backward, as to get better performance on deep objects. (#77355, @apelisse)
- Remove GetReference() and GetPartialReference() function from pkg/api/ref, as the same function exists also in staging/src/k8s.io/client-go/tools/ref (#80361, @wojtek-t)
- Fixed a bug in the CSI metrics that does not return not supported error when a CSI driver does not support metrics. (#79851, @jparklab)
- Fixed a bug in kube-addon-manager's leader election logic that made all replicas active. (#80575, @mborsz)
- Kibana has been slightly revamped/improved in the latest version (#80421, @lostick)
- kubeadm: fixed ignoring errors when pulling control plane images (#80529, @bart0sh)
- CRDs under k8s.io and kubernetes.io must have the "api-approved.kubernetes.io" set to either
unapproved.*
or a link to the pull request approving the schema. See kubernetes/enhancements#1111 for more details. (#79992, @deads2k) - Reduce kube-proxy cpu usage in IPVS mode when a large number of nodePort services exist. (#79444, @cezarsa)
- Add CSI Migration Shim for VerifyVolumesAreAttached and BulkVolumeVerify (#80443, @davidz627)
- Fix a bug that causes DaemonSet rolling update hang when there exist failed pods. (#78170, @DaiHao)
- Fix retry issues when the nodes are under deleting on Azure (#80419, @feiskyer)
- Add support for AWS EBS on windows (#79552, @wongma7)
- Passing an invalid policy name in the
--cpu-manager-policy
flag will now cause the kubelet to fail instead of simply ignoring the flag and running thecpumanager
s default policy instead. (#80294, @klueska) - Add Filter extension point to the scheduling framework. (#78477, @YoubingLi)
- cpuUsageNanoCores is now reported in the Kubelet summary API on Windows nodes (#80176, @liyanhui1228)
[]TopologySpreadConstraint
is introduced into PodSpec to support the "Even Pods Spread" alpha feature. (#77327, @Huang-Wei)- kubeadm: fall back to client version in case of certain HTTP errors (#80024, @RainbowMango)
- NFS Drivers are now enabled to collect metrics, StatFS metrics provider is used to collect the metrics. (#75805 , @brahmaroutu) (#75805, @brahmaroutu)
- make node lease renew interval more heuristic based on node-status-update-frequency in kubelet (#80173, @gaorong)
- Introduction of the pod overhead feature to the scheduler. This functionality is alpha-level as of (#78319, @egernst)
- Kubernetes v1.16, and is only honored by servers that enable the PodOverhead feature.gate.
- N/A (#80260, @khenidak)
- Add v1.Container.SecurityContext.WindowsOptions.RunAsUserName to the pod spec (#79489, @bclau)
- Pass-through volume MountOptions to global mount (NodeStageVolume) on the node for CSI (#80191, @davidz627)
- Add Score extension point to the scheduling framework. (#79109, @ahg-g)
filename | sha512 hash |
---|---|
kubernetes.tar.gz | 4834c52267414000fa93c0626bded5a969cf65d3d4681c20e5ae2c5f62002a51dfb8ee869484f141b147990915ba57be96108227f86c4e9f571b4b25e7ed0773 |
kubernetes-src.tar.gz | 9329d51f5c73f830f3c895c2601bc78e51d2d412b928c9dae902e9ba8d46338f246a79329a27e4248ec81410ff103510ba9b605bb03e08a48414b2935d2c164b |
filename | sha512 hash |
---|---|
kubernetes-client-darwin-386.tar.gz | 3cedffb92a0fca4f0b2d41f8b09baa59dff58df96446e8eece4e1b81022d9fdda8da41b5f73a3468435474721f03cffc6e7beabb25216b089a991b68366c73bc |
kubernetes-client-darwin-amd64.tar.gz | 14de6bb296b4d022f50778b160c98db3508c9c7230946e2af4eb2a1d662d45b86690e9e04bf3e592ec094e12bed1f2bb74cd59d769a0eaac3c81d9b80e0a79c8 |
kubernetes-client-linux-386.tar.gz | 8b2b9fa55890895239b99fabb866babe50aca599591db1ecf9429e49925ae478b7c813b9d7704a20f41f2d50947c3b3deecb594544f1f3eae6c4e97ae9bb9b70 |
kubernetes-client-linux-amd64.tar.gz | e927ac7b314777267b95e0871dd70c352ec0fc967ba221cb6cba523fa6f18d9d193e4ce92a1f9fa669f9c961de0e34d69e770ef745199ed3693647dd0d692e57 |
kubernetes-client-linux-arm.tar.gz | 4a230a6d34e2ffd7df40c5b726fbcbb7ef1373d81733bfb75685b2448ed181eb49ef27668fc33700f30de88e5bbdcc1e52649b9d31c7940760f48c6e6eb2f403 |
kubernetes-client-linux-arm64.tar.gz | 87c8d7185df23b3496ceb74606558d895a64daf0c41185c833a233e29216131baac6e356a57bb78293ed9d0396966ecc3b00789f2b66af352dc286b101bcc69a |
kubernetes-client-linux-ppc64le.tar.gz | 16ea5efa2fc29bc7448a609a7118e7994e901ab26462aac52f03b4851d4c9d103ee12d2335360f8aa503ddbb2a71f3000f0fcb33597dd813df4f5ad5f4819fa9 |
kubernetes-client-linux-s390x.tar.gz | 7390ad1682227a70550b20425fa5287fecf6a5d413493b03df3a7795614263e7883f30f3078bbb9fbd389d2a1dab073f8f401be89b82bd5861fa6b0aeda579eb |
kubernetes-client-windows-386.tar.gz | 88251896dfe38e59699b879f643704c0195e7a5af2cb00078886545f49364a2e3b497590781f135b80d60e256bad3a4ea197211f4f061c98dee096f0845e7a9b |
kubernetes-client-windows-amd64.tar.gz | 766b2a9bf097e45b2549536682cf25129110bd0562ab0df70e841ff8657dd7033119b0929e7a213454f90594b19b90fa57d89918cee33ceadba7d689449fe333 |
filename | sha512 hash |
---|---|
kubernetes-server-linux-amd64.tar.gz | dfd5c2609990c9b9b94249c654931b240dc072f2cc303e1e1d6dec1fddfb0a9e127e3898421ace00ab1947a3ad2f87cfd1266fd0b6193ef00f942269388ef372 |
kubernetes-server-linux-arm.tar.gz | 7704c2d3c57950f184322263ac2be1649a0d737d176e7fed1897031d0efb8375805b5f12c7cf9ba87ac06ad8a635d6e399382d99f3cbb418961a4f0901465f50 |
kubernetes-server-linux-arm64.tar.gz | fbbd87cc38cfb6429e3741bfd87ecec4b69b551df6fb7c121900ced4c1cd0bc77a317ca8abd41f71ffd7bc0b1c7144fecb22fa405d0b211b238df24d28599333 |
kubernetes-server-linux-ppc64le.tar.gz | cfed5b936eb2fe44df5d0c9c6484bee38ef370fb1258522e8c62fb6a526e9440c1dc768d8bf33403451ae00519cab1450444da854fd6c6a37665ce925c4e7d69 |
kubernetes-server-linux-s390x.tar.gz | 317681141734347260ad9f918fa4b67e48751f5a7df64a848d2a83c79a4e9dba269c51804b09444463ba88a2c0efa1c307795cd8f06ed840964eb2c725a4ecc3 |
filename | sha512 hash |
---|---|
kubernetes-node-linux-amd64.tar.gz | b3b1013453d35251b8fc4759f6ac26bdeb37f14a98697078535f7f902e8ebca581b5629bbb4493188a7e6077eb5afc61cf275f42bf4d9f503b70bfc58b9730b2 |
kubernetes-node-linux-arm.tar.gz | 0bacc1791d260d2863ab768b48daf66f0f7f89eeee70e68dd515b05fc9d7f14b466382fe16fa84a103e0023324f681767489d9485560baf9eb80fe0e7ffab503 |
kubernetes-node-linux-arm64.tar.gz | 73bd70cb9d27ce424828a95d715c16fd9dd22396dbe1dfe721eb0aea9e186ec46e6978956613b0978a8da3c22df39790739b038991c0192281881fce41d7c9f1 |
kubernetes-node-linux-ppc64le.tar.gz | a865f98838143dc7e1e12d1e258e5f5f2855fcf6e88488fb164ad62cf886d8e2a47fdf186ad6b55172f73826ae19da9b2642b9a0df0fa08f9351a66aeef3cf17 |
kubernetes-node-linux-s390x.tar.gz | d2f9f746ed0fe00be982a847a3ae1b6a698d5c506be1d3171156902140fec64642ec6d99aa68de08bdc7d65c9a35ac2c36bda53c4db873cb8e7edc419a4ab958 |
kubernetes-node-windows-amd64.tar.gz | 37f48a6d8174f38668bc41c81222615942bfe07e01f319bdfed409f83a3de3773dceb09fd86330018bb05f830e165e7bd85b3d23d26a50227895e4ec07f8ab98 |
- Migrate scheduler to use v1beta1 Event API. action required: any tool targeting scheduler events needs to use v1beta1 Event API (#78447, @yastij)
- scheduler.alpha.kubernetes.io/critical-pod annotation is removed. Pod priority (spec.priorityClassName) should be used instead to mark pods as critical. Action required! (#79554, @draveness)
- hyperkube: the
--make-symlinks
flag, deprecated in v1.14, has been removed. (#80017, @Pothulapati) - Node labels
beta.kubernetes.io/metadata-proxy-ready
,beta.kubernetes.io/metadata-proxy-ready
andbeta.kubernetes.io/kube-proxy-ds-ready
are no longer added on new nodes. (#79305, @paivagustavo) * ip-mask-agent addon starts to use the labelnode.kubernetes.io/masq-agent-ds-ready
instead ofbeta.kubernetes.io/masq-agent-ds-ready
as its node selector. * kube-proxy addon starts to use the labelnode.kubernetes.io/kube-proxy-ds-ready
instead ofbeta.kubernetes.io/kube-proxy-ds-ready
as its node selector. * metadata-proxy addon starts to use the labelcloud.google.com/metadata-proxy-ready
instead ofbeta.kubernetes.io/metadata-proxy-ready
as its node selector. * Kubelet removes the ability to setkubernetes.io
ork8s.io
labels via --node-labels other than the specifically allowed labels/prefixes. - The following APIs are no longer served by default: (#70672, @liggitt)
* All resources under
apps/v1beta1
andapps/v1beta2
- useapps/v1
instead *daemonsets
,deployments
,replicasets
resources underextensions/v1beta1
- useapps/v1
instead *networkpolicies
resources underextensions/v1beta1
- usenetworking.k8s.io/v1
instead *podsecuritypolicies
resources underextensions/v1beta1
- usepolicy/v1beta1
instead- Serving these resources can be temporarily re-enabled using the
--runtime-config
apiserver flag.apps/v1beta1=true
apps/v1beta2=true
extensions/v1beta1/daemonsets=true,extensions/v1beta1/deployments=true,extensions/v1beta1/replicasets=true,extensions/v1beta1/networkpolicies=true,extensions/v1beta1/podsecuritypolicies=true
- The ability to serve these resources will be completely removed in v1.18.
- Serving these resources can be temporarily re-enabled using the
- ACTION REQUIRED: Removed deprecated flag
--resource-container
from kube-proxy. (#78294, @vllry)- The deprecated
--resource-container
flag has been removed from kube-proxy, and specifying it will now cause an error. The behavior is now as if you specified--resource-container=""
. If you previously specified a non-empty--resource-container
, you can no longer do so as of kubernetes 1.16.
- The deprecated
- When HPAScaleToZero feature gate is enabled HPA supports scaling to zero pods based on object or external metrics. HPA remains active as long as at least one metric value available. (#74526, @DXist)
- To downgrade the cluster to version that does not support scale-to-zero feature:
-
- make sure there are no hpa objects with minReplicas=0. Here is a oneliner to update it to 1:
-
$ kubectl get hpa --all-namespaces --no-headers=true | awk '{if($6==0) printf "kubectl patch hpa/%s --namespace=%s -p \"{\\"spec\\":{\\"minReplicas\\":1}}\"
", $2, $1 }' | sh * 2. disable HPAScaleToZero feature gate
- Add support for writing out of tree custom scheduler plugins. (#78162, @hex108)
- Remove deprecated github.com/kardianos/osext dependency (#80142, @loqutus)
- Add Bind extension point to the scheduling framework. (#79313, @chenchun)
- On Windows systems, %USERPROFILE% is now preferred over %HOMEDRIVE%%HOMEPATH% as the home folder if %HOMEDRIVE%%HOMEPATH% does not contain a .kube* Add --kubernetes-version to "kubeadm init phase certs ca" and "kubeadm init phase kubeconfig" (#80115, @gyuho)
- kubeadm ClusterConfiguration now supports featureGates: IPv6DualStack: true (#80145, @Arvinderpal)
- Fix a bug that ListOptions.AllowWatchBookmarks wasn't propagating correctly in kube-apiserver. (#80157, @wojtek-t)
- Bugfix: csi plugin supporting raw block that does not need attach mounted failed (#79920, @cwdsuzhou)
- Increase log level for graceful termination to v=5 (#80100, @andrewsykim)
- kubeadm: support fetching configuration from the original cluster for 'upgrade diff' (#80025, @SataQiu)
- The sample-apiserver gains support for OpenAPI v2 spec serving at
/openapi/v2
. (#79843, @sttts)- The
generate-internal-groups.sh
script in k8s.io/code-generator will generate OpenAPI definitions by default inpkg/generated/openapi
. Additional API group dependencies can be added viaOPENAPI_EXTRA_PACKAGES=<group>/<version> <group2>/<version2>...
.
- The
- Cinder and ScaleIO volume providers have been deprecated and will be removed in a future release. (#80099, @dims)
- kubelet's --containerized flag was deprecated in 1.14. This flag is removed in 1.16. (#80043, @dims)
- Optimize EC2 DescribeInstances API calls in aws cloud provider library by querying instance ID instead of EC2 filters when possible (#78140, @zhan849)
- etcd migration image no longer supports etcd2 version. (#80037, @dims)
- Promote WatchBookmark feature to beta and enable it by default. (#79786, @wojtek-t)
- With WatchBookmark feature, clients are able to request watch events with BOOKMARK type. Clients should not assume bookmarks are returned at any specific interval, nor may they assume the server will send any BOOKMARK event during a session.
- update to use go 1.12.7 (#79966, @tao12345666333)
- Add --shutdown-delay-duration to kube-apiserver in order to delay a graceful shutdown.
/healthz
will keep returning success during this time and requests are normally served, but/readyz
will return faillure immediately. This delay can be used to allow the SDN to update iptables on all nodes and stop sending traffic. (#74416, @sttts) - The
MutatingWebhookConfiguration
andValidatingWebhookConfiguration
APIs have been promoted toadmissionregistration.k8s.io/v1
: (#79549, @liggitt) *failurePolicy
default changed fromIgnore
toFail
for v1 *matchPolicy
default changed fromExact
toEquivalent
for v1 *timeout
default changed from30s
to10s
for v1 *sideEffects
default value is removed and the field made required for v1 *admissionReviewVersions
default value is removed and the field made required for v1 (supported versions for AdmissionReview arev1
andv1beta1
) * Thename
field for specified webhooks must be unique forMutatingWebhookConfiguration
andValidatingWebhookConfiguration
objects created viaadmissionregistration.k8s.io/v1
- The
admissionregistration.k8s.io/v1beta1
versions ofMutatingWebhookConfiguration
andValidatingWebhookConfiguration
are deprecated and will no longer be served in v1.19.
- The
- The garbage collector and generic object quota controller have been updated to use the metadata client which improves memory (#78742, @smarterclayton)
- and CPU usage of the Kube controller manager.
- SubjectAccessReview requests sent for RBAC escalation, impersonation, and pod security policy authorization checks now populate the version attribute. (#80007, @liggitt)
- na (#79892, @mikebrow)
- Use O_CLOEXEC to ensure file descriptors do not leak to subprocesses. (#74691, @cpuguy83)
- The namespace controller has been updated to use the metadata client which improves memory (#78744, @smarterclayton)
- and CPU usage of the Kube controller manager.
- NONE (#79933, @mm4tt)
- add
kubectl replace --raw
andkubectl delete --raw
to have parity with create and get (#79724, @deads2k) - E2E tests no longer add command line flags directly to the command line, test suites that want that need to be updated if they don't use HandleFlags (#75593, @pohly)
- loading a -viper-config=e2e.yaml with suffix (introduced in 1.13) works again and now has a regression test
- Kubernetes now supports transparent compression of API responses. Clients that send
Accept-Encoding: gzip
will now receive a GZIP compressed response body if the API call was larger than 128KB. Go clients automatically request gzip-encoding by default and should see reduced transfer times for very large API requests. Clients in other languages may need to make changes to benefit from compression. (#77449, @smarterclayton) - Resolves an issue serving aggregated APIs backed by services that respond to requests to
/
with non-2xx HTTP responses (#79895, @deads2k) - updated fluentd to 1.5.1, elasticsearchs & kibana to 7.1.1 (#79014, @monotek)
- kubeadm: implement support for concurrent add/remove of stacked etcd members (#79677, @neolit123)
- Added a metric 'apiserver_watch_events_total' that can be used to understand the number of watch events in the system. (#78732, @mborsz)
- KMS Providers will install a healthz check for the status of kms-pluign in kube-apiservers' encryption config. (#78540, @immutableT)
- Fixes a bug in openapi published for custom resources using x-kubernetes-preserve-unknown-fields extensions, so that kubectl will allow sending unknown fields for that portion of the object. (#79636, @liggitt)
- A new client
k8s.io/client-go/metadata.Client
has been added for accessing objects generically. This client makes it easier to retrieve only the metadata (themetadata
sub-section) from resources on the cluster in an efficient manner for use cases that deal with objects generically, like the garbage collector, quota, or the namespace controller. The client asks the server to return ameta.k8s.io/v1 PartialObjectMetadata
object for list, get, delete, watch, and patch operations on both normal APIs and custom resources which can be encoded in protobuf for additional work. If the server does not yet support this API the client will gracefully fall back to JSON and transform the response objects into PartialObjectMetadata. (#77819, @smarterclayton) - changes timeout value in csi plugin from 15s to 2min which fixes the timeout issue (#79529, @andyzhangx)
- kubeadm: provide "--control-plane-endpoint" flag for
controlPlaneEndpoint
(#79270, @SataQiu) - Fixes invalid "time stamp is the future" error when kubectl cp-ing a file (#73982, @tanshanshan)
- Kubelet should now more reliably report the same primary node IP even if the set of node IPs reported by the CloudProvider changes. (#79391, @danwinship)
- To configure controller manager to use ipv6dual stack: (#73977, @khenidak)
-
use --cluster-cidr=",".
-
Notes:
-
- Only the first two cidrs are used (soft limits for Alpha, might be lifted later on).
-
- Only the "RangeAllocator" (default) is allowed as a value for --cidr-allocator-type . Cloud allocators are not compatible with ipv6dualstack
-
- When using the conformance test image, a new environment variable E2E_USE_GO_RUNNER will cause the tests to be run with the new Golang-based test runner rather than the current bash wrapper. (#79284, @johnSchnake)
- kubeadm: prevent PSP blocking of upgrade image prepull by using a non-root user (#77792, @neolit123)
- kubelet now accepts a --cni-cache-dir option, which defaults to /var/lib/cni/cache, where CNI stores cache files. (#78908, @dcbw)
- Update Azure API versions (containerregistry --> 2018-09-01, network --> 2018-08-01) (#79583, @justaugustus)
- Fix possible fd leak and closing of dirs in doSafeMakeDir (#79534, @odinuge)
- kubeadm: fix the bug that "--cri-socket" flag does not work for
kubeadm reset
(#79498, @SataQiu) - kubectl logs --selector will support --tail=-1. (#74943, @JishanXing)
- Introduce a new admission controller for RuntimeClass. Initially, RuntimeClass will be used to apply the pod overhead associated with a given RuntimeClass to the Pod.Spec if a corresponding RuntimeClassName is specified. (#78484, @egernst)
- PodOverhead is an alpha feature as of Kubernetes 1.16.
- Fix kubelet errors in AArch64 with huge page sizes smaller than 1MiB (#78495, @odinuge)
- The alpha
metadata.initializers
field, deprecated in 1.13, has been removed. (#79504, @yue9944882) - Fix duplicate error messages in cli commands (#79493, @odinuge)
- Default resourceGroup should be used when the value of annotation azure-load-balancer-resource-group is an empty string. (#79514, @feiskyer)
- Fixes output of
kubectl get --watch-only
when watching a single resource (#79345, @liggitt) - RateLimiter add a context-aware method, fix client-go request goruntine backlog in async timeout scene. (#79375, @answer1991)
- Fix a bug where kubelet would not retry pod sandbox creation when the restart policy of the pod is Never (#79451, @yujuhong)
- Fix CRD validation error on 'items' field. (#76124, @tossmilestone)
- The CRD handler now properly re-creates stale CR storage to reflect CRD update. (#79114, @roycaihw)
- Integrated volume limits for in-tree and CSI volumes into one scheduler predicate. (#77595, @bertinatto)
- Fix a bug in server printer that could cause kube-apiserver to panic. (#79349, @roycaihw)
- Mounts /home/kubernetes/bin/nvidia/vulkan/icd.d on the host to /etc/vulkan/icd.d inside containers requesting GPU. (#78868, @chardch)
- Remove CSIPersistentVolume feature gates (#79309, @draveness)
- Init container resource requests now impact pod QoS class (#75223, @sjenning)
- Correct the maximum allowed insecure bind port for the kube-scheduler and kube-apiserver to 65535. (#79346, @ncdc)
- Fix remove the etcd member from the cluster during a kubeadm reset. (#79326, @bradbeam)
- Remove KubeletPluginsWatcher feature gates (#79310, @draveness)
- Remove HugePages, VolumeScheduling, CustomPodDNS and PodReadinessGates feature flags (#79307, @draveness)
- The GA PodPriority feature gate is now on by default and cannot be disabled. The feature gate will be removed in v1.18. (#79262, @draveness)
- Remove pids cgroup controller requirement when related feature gates are disabled (#79073, @rafatio)
- Add Bind extension point of the scheduling framework (#78513, @chenchun)
- if targetPort is changed that will process by service controller (#77712, @Sn0rt)
- update to use go 1.12.6 (#78958, @tao12345666333)
- kubeadm: fix a potential panic if kubeadm discovers an invalid, existing kubeconfig file (#79165, @neolit123)
- fix kubelet fail to delete orphaned pod directory when the kubelet's pods directory (default is "/var/lib/kubelet/pods") symbolically links to another disk device's directory (#79094, @gaorong)
- Addition of Overhead field to the PodSpec and RuntimeClass types as part of the Pod Overhead KEP (#76968, @egernst)
- fix pod list return value of framework.WaitForPodsWithLabelRunningReady (#78687, @pohly)
- The behavior of the default handler for 404 requests fro the GCE Ingress load balancer is slightly modified in the sense that it now exports metrics using prometheus. The metrics exported include: (#79106, @vbannai)
-
- http_404_request_total (the number of 404 requests handled)
-
- http_404_request_duration_ms (the amount of time the server took to respond in ms)
- Also includes percentile groupings. The directory for the default 404 handler includes instructions on how to enable prometheus for monitoring and setting alerts.
-
- The kube-apiserver has improved behavior for both startup and shutdown sequences and also now exposes
/readyz
for readiness checking. Readyz includes all existing healthz checks but also adds a shutdown check. When a cluster admin initiates a shutdown, the kube-apiserver will try to process existing requests (for the duration of request timeout) before killing the apiserver process. (#78458, @logicalhan)- The apiserver also now takes an optional flag "--maximum-startup-sequence-duration". This allows you to explicitly define an upper bound on the apiserver startup sequences before healthz begins to fail. By keeping the kubelet liveness initial delay short, this can enable quick kubelet recovery as soon as we have a boot sequence which has not completed in our expected time frame, despite lack of completion from longer boot sequences (like RBAC). Kube-apiserver behavior when the value of this flag is zero is backwards compatible (this is as the defaulted value of the flag).
- fix: make azure disk URI as case insensitive (#79020, @andyzhangx)
- Enable cadvisor ProcessMetrics collecting. (#79002, @jiayingz)
- Fixes a bug where
kubectl set config
hangs and uses 100% CPU on some invalid property names (#79000, @pswica) - Fix a string comparison bug in IPVS graceful termination where UDP real servers are not deleted. (#78999, @andrewsykim)
- Reflector watchHandler Warning log 'The resourceVersion for the provided watch is too old.' is now logged as Info. (#78991, @sallyom)
- fix a bug that pods not be deleted from unmatched nodes by daemon controller (#78974, @DaiHao)
- NONE (#78821, @jhedev)
- Volume expansion is enabled in the default GCE storageclass (#78672, @msau42)
- kubeadm: use the service-cidr flag to pass the desired service CIDR to the kube-controller-manager via its service-cluster-ip-range flag. (#78625, @Arvinderpal)
- kubeadm: introduce deterministic ordering for the certificates generation in the phase command "kubeadm init phase certs" . (#78556, @neolit123)
- Add Pre-filter extension point to the scheduling framework. (#78005, @ahg-g)
- fix pod stuck issue due to corrupt mnt point in flexvol plugin, call Unmount if PathExists returns any error (#75234, @andyzhangx)