Kubernetes v1.36.0 has been built and pushed using Golang version 1.26.2.
The release notes have been updated in CHANGELOG-1.36.md, with a pointer to them on GitHub:
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 3c9b9225c75080950fdb53fdeb326606133eeb5efbc8ecdd7514c290f1aaf8fa247a6f6f5b34beb87658a0ba5533c1f3cc7a8c680fc30785775ad73702374834 |
| kubernetes-src.tar.gz | 0b2c28c5b9f58c3ac6286e892f0bfeb1dbf8bcb9a76dc6128c080ab4f39d861af9b0ae50bf4a819d6ec376b4e8d2a55122d51d5fb26a69dc8af29bcd2406fb48 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 4be41ab0e38d809fad076b2c811124d93a6b48d696843f5bd85e5c77e27a112ee526f95de82c57d9f59060b27a7d2e036d6989246510f9772862b9f2ca87c5ed |
| kubernetes-client-darwin-arm64.tar.gz | 57b90606b066b6073362ee06ff8b00198abe2590ae89216f001a7d3bcd339dc8ede6616ad498eeaa65328a39834bc71e8c18944df0e90fc89139ac8d7290cfe9 |
| kubernetes-client-linux-386.tar.gz | d1964452b0276b83933c1642743bb0058212bb88b41a5601e446ea49bb06fa1bb682d2cba4afd72896faf860a61e68494cb159db51c4c2ec5928de533f6cc9b9 |
| kubernetes-client-linux-amd64.tar.gz | cac4ee270f7a5ca8e96f2b86f1b822bdc66168253b253f4838caf5bd16b8e314ae307c7ba718f32e9543d502f5d0c703bd3358449718c6956436969e125011cf |
| kubernetes-client-linux-arm.tar.gz | 76117398c77401cb62303f765c6e42f93bff42d3f04d6501b282e14013fdce1ed57c743ed049995575c1326817c57db57523fdcca3ea3a7b7d58fe586d491bf1 |
| kubernetes-client-linux-arm64.tar.gz | d669cc342059d88cf93db37d2bd41b444e352a9af64cc14767d77321e8e9bcdbdce886d605bf09b5dad09500a9d7b10023e3f07539915df4f175b56e0de8f5bb |
| kubernetes-client-linux-ppc64le.tar.gz | 4245f7ec5bbc53b4b375c855110295d3e9640833e916ce83cdc9f610047442a705c17a641d8590c250d3c511771f478beab0f19d0258211d9fd1f97f7f00fcf3 |
| kubernetes-client-linux-s390x.tar.gz | 538b0b193767272ada79b832ec994d2172a7b88933c62711a117f6b0476902d7f4c771400e7468020dca8cb968d5ee220627a5249db2f16efb27bfa29e0570fc |
| kubernetes-client-windows-386.tar.gz | b97a5b7bcc96b42648fe9ea639742d05dc699a6394d3da246bfc72c810b650cb440f96319f0064e5479cd885aced8310640d5c8fcf6256fe5e88c0de93d27e9d |
| kubernetes-client-windows-amd64.tar.gz | d1d3ca9de4c5917538b0865aa28a1fa9b2c7cad46921ab85f661025f5ddc277755cda46d441359d2d5717b908d9bc3fd7fe2aae22d95deeb172b1fdd49b0c9b3 |
| kubernetes-client-windows-arm64.tar.gz | 4cbe90820c58892bf4327634dcfdca64c7db36cf09e2beae2f417248abe05fa01f8ae7a2edec08fa2ea28a368bc6e3bba7431be30a138bfaf78ba4e433bfa463 |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 1c64da92575451c2c7ff97c79b772e603995f8e76da1371a6b0746aaa27b65dce81c4d734cbb50f40e71486a8e08df36f14e12974f97d4d29e41f23a172a6a25 |
| kubernetes-server-linux-arm64.tar.gz | 7f95e451baedd9368a2fa637afa84c9ed1b958736540ca27a379e5e292e1a10c5d9a29539f833047574bf5d3b6f907f32dee5735acecc11aa4686f078108dcf8 |
| kubernetes-server-linux-ppc64le.tar.gz | 4d3f6b70ccb785d3264acf6b3cf0565560bb3c2ba9db85a06fa10c020ee248318ee009f9cc5b6d7171bda7ec2f96cf0f9a1a57ba857a4fa5331022c9122692d9 |
| kubernetes-server-linux-s390x.tar.gz | 7c12c4c89522c449fcd96837c27659edef53245b7a39e4802a7c00c6497624eff15b2d53ec7a70328176681967fa7e22bbf5c4b0f3fc32996daaf696ca54bc25 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | 8bba5bd0cb77997ad965739caff3c8839fd16f284cf28a0e46c44538ce0b6fd83c5f3c608dd86c4831c3de9306bbfd02ce26bbe9a426754b6253efa1d5cc030f |
| kubernetes-node-linux-arm64.tar.gz | 10a4c3660e6e19fae998b04345dbe42711e61745bf374405c33e8604335b12ff55ce7b68f8a0d67d1f7ce4519f706fbd8d80781b7128369fe047c38915e8d189 |
| kubernetes-node-linux-ppc64le.tar.gz | 9eb7a4df4b518df4b846bd12ec25b50908b610b823f4d781094e0667e47d607209acbace2747955a373366a68b77f32170e2de71f0b2ee8a87723bac30c41d95 |
| kubernetes-node-linux-s390x.tar.gz | 492a71b292953ee5ccb603bf132a99fdbf6ae6fa8ae6c02139887b77ae6e1d7d77e65429bf37bb46eee33bf32cee3fe8ead03f74cd7b0f1f5a7c7126ba839800 |
| kubernetes-node-windows-amd64.tar.gz | a4f2bdb613da646877aacae6a2c39cbb18d74f164973fa033b5f042f1ed8a4de0285e0d99f303d8fdd89cecaa341c6e29361d7677a6bde5bbfc956dd156ac55c |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
volume_operation_total_errors to volume_operation_errors_total. If you are using custom monitoring dashboards or alerting rules based on the volume_operation_total_errors metric, update them to use the new volume_operation_errors_total metric. (#136399, @tico88612) [SIG Apps, Instrumentation, Storage and Testing]AllowParallel: true from the PreBindPreFlight method. PreBind plugin implementations need to be updated to return PreBindPreFlightResult from the PreBindPreFlight method; returning nil retains the existing sequential behavior. (#135393, @tosi3k) [SIG Node, Scheduling, Storage and Testing]v3.6.8. (#137225, @joshjms) [SIG API Machinery, Auth, Cloud Provider, Cluster Lifecycle, Etcd, Node, Scheduling and Testing].spec.externalIPs. (#137293, @adrianmoisey) [SIG Apps, Network and Windows]Raw field of metav1.FieldsV1 is deprecated. Code that constructs or reads FieldsV1 should migrate to the new NewFieldsV1(string), GetRawBytes(), GetRawString(), and SetRawBytes() accessor methods. (#137304, @aaron-prindle) [SIG API Machinery, Apps and Testing]git-repo volume plugin by default, with no option to turn it back on. (#136400, @vinayakankugoyal) [SIG Storage]AllowlistEntry.Name to AllowlistEntry.Command in the credential plugin allowlist. (#137272, @pmengelbert) [SIG API Machinery, Auth, CLI and Testing]DRAResourceClaimGranularStatusAuthorization feature gate is enabled (beta in v1.36). Schedulers and controllers must be granted update/patch on resourceclaims/binding. DRA drivers must be granted associated-node:update or arbitrary-node:update (or patch equivalents) on resourceclaims/driver, restricted by their specific resourceNames. (#134947, @aojea) [SIG API Machinery, Apps, Auth, Instrumentation, Node, Scheduling and Testing]v1.22. If kubeadm users wish to continue using the feature, they need a custom image for the KCM that is not based on distroless, pass the KCM flag --flex-volume-plugin-dir, and mount the directory /usr/libexec/kubernetes/kubelet-plugins/volume/exec in the KCM static pod using kubeadm's extraVolumes mechanism before upgrading to v1.36. Previously, kubeadm automatically did the mounting if the user passed the flag. (#136423, @neolit123) [SIG Cluster Lifecycle]etcd_bookmark_counts to etcd_bookmark_total. If you are using custom monitoring dashboards or alerting rules based on the etcd_bookmark_counts metric, update them to use the new etcd_bookmark_total metric. (#136483, @petern48) [SIG API Machinery, Etcd, Instrumentation and Testing]TopologyAwareWorkloadScheduling feature gate. Added the TopologyPlacement plugin implementing the PlacementGenerate extension point to take constraints into consideration during PodGroup scheduling. (#137271, @brejman) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling and Testing]DisruptionMode, PriorityClassName, and Priority fields to the Workload and PodGroup APIs to support workload-aware preemption when the WorkloadAwarePreemption feature gate is enabled. (#136589, @tosi3k) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling and Testing]ImageVolumeWithDigest which includes the digest of image volumes in the container status. (#132807, @iholder101) [SIG API Machinery, Apps, Node and Testing]MemoryReservationPolicy cgroup v2 MemoryQoS support to KubeletConfiguration for memory.min protection. (#137584, @QiWang19) [SIG Node and Storage]spec.stubPKCS10Request to the Pod Certificates beta API to improve compatibility with existing certificate authority implementations that expect a PKCS#10 certificate signing request. spec.pkixPublicKey and spec.proofOfPossession were deprecated in favor of this field. (#136729, @ahmedtd) [SIG API Machinery, Auth, Node and Testing]PersistentVolumeClaimUnusedSinceTime feature gate) for tracking PersistentVolumeClaim unused status via a new Unused condition on PersistentVolumeClaimStatus. When enabled, the PVC protection controller sets Unused=True with a lastTransitionTime when no non-terminal Pods reference the PersistentVolumeClaim. (#137862, @gnufied) [SIG Apps, Auth, Storage and Testing]ManifestBasedAdmissionControlConfig feature gate is enabled, admission webhooks and CEL-based policies can be loaded from static manifest files on disk via the staticManifestsDir field in AdmissionConfiguration. These policies are active from API server startup, survive etcd unavailability, and can protect API-based admission resources from modification. (#137346, @aramase) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows]DRAListTypeAttributes feature gate (disabled by default) activates the following enhancements:
bools/ints/strings/versions) for device attributes in ResourceSlice. The number of attribute values, including scalars and lists, per single device is limited to 48.matchAttribute/distinctAttribute constraints in ResourceClaim now work on both scalar and list attributes. The matchAttribute constraint matches when the intersection of all list values among candidate devices is non-empty. The distinctAttribute constraint (behind the ConsumableCapacity feature gate) matches when all list values among candidate devices are pairwise disjoint. Scalar values are implicitly treated as a singleton set..includes that works on both scalar and list attributes to test inclusion (e.g., device.attributes["dra.example.com"].model.includes("model-a")), supporting migration when a DRA driver changes an attribute value type from scalar to list or vice versa. (#137190, @everpeace) [SIG API Machinery, Node, Scheduling and Testing]concurrent-node-status-updates flag that is split from the concurrent-node-syncs flag. (#136716, @yonizxz) [SIG Cloud Provider]TopologyAwareWorkloadScheduling feature gate. (#136944, @brejman) [SIG Scheduling and Testing]v1alpha1 now uses explicit declarative enforcement. (#136793, @yongruilin) [SIG API Machinery and Scheduling]TopologyAwareWorkloadScheduling feature gate. (#137083, @brejman) [SIG Scheduling]TopologyAwareWorkloadScheduling feature gate. Deprecated MinNodeScore and MaxNodeScore in favor of MinScore and MaxScore. (#137201, @brejman) [SIG Scheduling]v1alpha1) for querying DRA resource pool availability. External schedulers can discover available devices across pools before submitting workloads. Requires the DRAResourcePoolStatus feature gate (alpha). (#137028, @nmn3m) [SIG API Machinery, Apps, Auth, Etcd, Instrumentation, Node, Scheduling, Storage and Testing]--concurrent-resourceclaim-syncs flag to kube-controller-manager to configure ResourceClaim reconcile concurrency. (#134701, @anson627) [SIG API Machinery, Apps, Node and Testing]--tls-curve-preferences flag for configuring TLS key exchange mechanism. (#137115, @damdo) [SIG API Machinery, Architecture, CLI, Cloud Provider, Node and Testing]PodGroupPodsCount scheduler plugin to support workload-aware scheduling by prioritizing placements with higher Pod counts within a group. (#137488, @vshkrabkov) [SIG Scheduling and Testing]tlsServerName field to EgressSelectorConfiguration TLSConfig to allow overriding the server name used for TLS certificate verification. (#136640, @kennangaibel) [SIG API Machinery, Apps, Auth, Storage and Testing]DRANativeResources feature, which includes a new ResourceSlice.Spec.Devices[*].NativeResourceMappings field for DRA drivers to declare how device resources map to native Kubernetes resources (e.g., cpu, memory), changes in the DynamicResources plugin and the scheduler framework to correctly account for native resources requested through resource claims, and kubelet admission handler validation for native resource DRA requests along with standard requests in the Pod spec. (#136725, @pravk03) [SIG API Machinery, Apps, Node, Scheduling and Testing]TopologyAwareWorkloadScheduling feature gate, supporting scheduling of PodGroups on nodes with matching topology domains. (#137489, @brejman) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling and Testing]imageMinimumGCAge. (#135997, @ngopalak-redhat) [SIG API Machinery and Node]sets.String with sets.Set[string] in apiserver admission subsystem. This is a breaking change for consumers of the NewLifecycle function. (#134044, @mcallzbl) [SIG API Machinery and Auth]cpuCFSQuotaPeriod kubelet config field requires the CustomCPUCFSQuotaPeriod feature gate when using non-default values. No functional changes introduced. (#133845, @rbiamru) [SIG Node and Release]PodGroupPolicy struct in scheduling.k8s.io/v1alpha1. (#136424, @JoelSpeed) [SIG API Machinery and Scheduling]DeviceTaintRules: the TimeAdded field of the taint is now automatically updated when changing the effect. (#137167, @pohly) [SIG API Machinery, Node and Testing]spec.resourceClaims field to PodGroup resources for referencing ResourceClaims and ResourceClaimTemplates. Claims made by a PodGroup are reserved for the entire PodGroup instead of individual Pods, supporting more than 256 Pods sharing a single ResourceClaim. ResourceClaimTemplates referenced by a PodGroup's claim replicate into a ResourceClaim specific to that PodGroup, shared by all of the group's Pods. (#136989, @nojnhuh) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling and Testing]v1.36. (#137795, @ttsuuubasa) [SIG API Machinery, Node, Scheduling and Testing]DeviceTaintRules depends on enabling resource.k8s.io/v1beta2 and the DeviceTaintRules feature gate. (#137170, @pohly) [SIG API Machinery, Apps, Auth, Cluster Lifecycle, Etcd, Node, Scheduling and Testing]NodeResourcesFit to implement the PlacementScore extension point. The usage of the PlacementScore extension point is guarded by the TopologyAwareWorkloadScheduling feature gate. (#136652, @brejman) [SIG Scheduling]fake.NewClientset() to work properly with correct schema. (#131068, @soltysh) [SIG API Machinery]NodeResourcesFitArgs validation when using RequestedToCapacityRatio scoring strategy. (#132120, @flpanbin) [SIG Scheduling]kube-apiserver, allowing it to recover from an established connection to an incorrect server that never returns the expected response during APIService availability checks. (#137157, @bsalamat) [SIG API Machinery]fake.NewClientset which replaces the deprecated NewSimpleClientset for kube-aggregator and sample-apiserver. (#136537, @soltysh) [SIG API Machinery]apiserver_storage_events_received_total to beta. (#136314, @petern48) [SIG API Machinery, Etcd, Instrumentation and Testing]ImageVolume feature to stable. (#136711, @saschagrunert) [SIG Apps, Architecture, Node and Testing]InPlacePodLevelResourcesVerticalScaling feature gate to beta, enabled by default. Pod-level CPU and memory resources can be resized in place for Pods with pod-level resources configured. (#137684, @ndixita) [SIG API Machinery, Apps, Autoscaling, Node, Release, Scheduling and Testing]UserNamespacesSupport feature gate to GA. (#136792, @rata) [SIG API Machinery, Apps, CLI, Node, Storage and Testing]config.k8s.io/flagz API to v1beta1. (#137174, @richabanker) [SIG API Machinery, Instrumentation, Node, Scheduling and Testing]config.k8s.io/statusz API to v1beta1. (#137173, @richabanker) [SIG API Machinery, Instrumentation, Scheduling and Testing]HPAScaleToZero feature gate is enabled. (#135118, @johanneswuerbach) [SIG Apps, Autoscaling and Testing]scheduling.k8s.io/v1alpha2 Workload and PodGroup API to express workload-level scheduling requirements and let kube-scheduler act on those. Removed scheduling.k8s.io/v1alpha1 Workload API. (#136976, @tosi3k) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling, Storage and Testing]--audit-policy-file config file now supports specifying group: "*" in resource rules to match all API groups. (#135262, @cmuuss) [SIG API Machinery, Auth and Testing]informer_queued_items for informer queue length, published as informer_queued_items{name=kube-controller-manager,group=<group>,resource=<resource>,version=<version>} <count>. (#135782, @richabanker) [SIG API Machinery, Architecture, Instrumentation and Testing]memory.min for Guaranteed pods and memory.low for Burstable pods, with node-level metrics and rollback reconciliation (KEP-2570). (#137719, @sohankunkerkar) [SIG Node, Storage and Testing]VolumeAttributesClass feature gate to true and updated the preferred storage version to storage.k8s.io/v1. (#134556, @carlory) [SIG API Machinery, Apps, Etcd, Network, Node, Scheduling, Storage and Testing]endpoints field as optional in the OpenAPI spec for discovery.k8s.io/v1 EndpointSlice. This matches server behavior and resolves validation issues. (#136111, @aojea) [SIG Network]DRAPrioritizedList to GA. (#136924, @troychiu) [SIG Apps, Architecture, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Network, Node, Release, Scheduling, Storage and Testing]NodeDeclaredFeatures to beta. (#136042, @pravk03) [SIG API Machinery, Apps, Cluster Lifecycle, Instrumentation, Node, Scheduling, Storage and Testing]SnapshotMetadataService to v1beta1. Removed support for the v1alpha1 version. (#137564, @iPraveenParihar) [SIG Storage and Testing]MutableCSINodeAllocatableCount feature gate is locked to enabled. (#136230, @torredil) [SIG API Machinery and Storage]kubernetes_build_info, rest_client_requests_total, rest_client_request_duration_seconds, running_managed_controllers) from Alpha to Beta stability, providing stronger API and label stability guarantees for consumers. (#136154, @bhope) [SIG API Machinery, Apps, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Etcd, Instrumentation, Network, Node, Scalability, Scheduling, Storage and Testing]scheduler_goroutines, scheduler_permit_wait_duration_seconds, scheduler_plugin_evaluation_total, scheduler_plugin_execution_duration_seconds, scheduler_scheduling_algorithm_duration_seconds, scheduler_unschedulable_pods) from alpha to beta stability, providing stronger API and label stability guarantees for metric consumers. (#136155, @bhope) [SIG Instrumentation and Scheduling]v1.36. (#135048, @yliaog) [SIG API Machinery, Architecture, Auth, Network, Node, Scheduling and Testing]ConstrainedImpersonation feature to beta, enabled by default. (#137609, @enj) [SIG API Machinery and Testing]DRAAdminAccess feature gate to GA. (#137373, @ritazh) [SIG API Machinery, Auth, Node, Scheduling and Testing]MutatingAdmissionPolicy to GA (v1) in Kubernetes v1.36. The feature is now enabled by default. (#136039, @lalitc375) [SIG API Machinery, Architecture, Etcd and Testing]NodeLogQuery feature gate to GA. (#137544, @jrvaldes) [SIG Node and Windows]ProcMountType feature to GA. (#137454, @haircommander) [SIG API Machinery, Apps, Auth, CLI, Node, Storage and Testing]watch_list_duration_seconds metric from ALPHA to BETA. (#136086, @richabanker) [SIG API Machinery, Instrumentation, Node and Testing]CSIMigrationPortworx feature gate (locked since v1.33) and alpha InTreePluginPortworxUnregister feature gate, with all operations now redirected to CSI. (#135322, @carlory) [SIG API Machinery, Apps, Auth, Node, Scalability, Scheduling, Storage and Testing]ProtoMessage() marker method implementations from Kubernetes REST API types in k8s.io/api, which had incorrectly identified them as standard v1 proto messages. Protobuf serialization of Kubernetes API types should use k8s.io/apimachinery/pkg/runtime/serializer/protobuf. (#137084, @liggitt) [SIG API Machinery, Apps, Architecture, Auth, Node, Scheduling and Storage]apiserver.latency.k8s.io/impersonation audit event annotation when the ConstrainedImpersonation feature is enabled. (#137523, @enj) [SIG API Machinery, Auth and Testing]DRAConsumableCapacity feature gate is enabled by default. (#136611, @sunya-ch) [SIG API Machinery, Cluster Lifecycle, Node, Scheduling and Testing]StrictIPCIDRValidation feature gate in kube-apiserver is enabled by default, meaning that API fields no longer allow IP or CIDR values with extraneous leading "0"s (e.g., 010.000.000.005 rather than 10.0.0.5) or CIDR subnet/mask values with ambiguous semantics (e.g., 192.168.0.5/24 rather than 192.168.0.0/24 or 192.168.0.5/32). (#137053, @danwinship) [SIG Network and Testing]kube-scheduler now updates PodGroup status with a PodGroupScheduled condition reflecting whether the group was successfully scheduled or is unschedulable. (#137611, @helayoty) [SIG API Machinery, Apps, Scheduling and Testing]/configz endpoint of kubelet, kube-scheduler, cloud controller manager, and kube-proxy to serialize the APIVersion and Kind fields and use public types instead of internal. (#136044, @SergeyKanzhelev) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Network, Node, Scheduling and Testing]scheduler_pod_scheduled_after_flush_total to track pods successfully scheduled after timeout flush from the unschedulablePods queue. (#135126, @mrvarmazyar) [SIG Scheduling]ARCH column in the kubectl get node -o wide output. (#132402, @astraw99) [SIG CLI]apiserver_peer_proxy_errors_total and apiserver_peer_discovery_sync_errors_total alpha metrics to apiserver to track errors encountered in peer proxying and peer discovery. (#137065, @richabanker) [SIG API Machinery]kubectl explain -r flag as a shorthand for --recursive. (#135283, @laervn) [SIG CLI]kubelet_metrics_provider metric to help users identify where kubelet's metrics are coming from. (#136952, @dgrisonnet) [SIG Node]PodGroup scheduling cycle to kube-scheduler's main scheduling loop, enabling all pods within a PodGroup to be scheduled within a single cycle. (#136618, @macsko) [SIG Scheduling and Testing]show-secret flag to the diff command to explicitly allow secret values to be displayed during the diff operation. (#137019, @olamilekan000) [SIG CLI]kubelet that provides information about Pods running on the node. (#134627, @briansonnenberg) [SIG Node and Testing]kubectl rollout undo is used on resources managed with kubectl apply to prevent unexpected behavior from annotation mismatch. (#137064, @olamilekan000) [SIG CLI]route_controller_route_sync_total to Cloud Controller Manager to track route syncs with cloud providers. This metric is in alpha stage. (#136539, @lukasmetzner) [SIG API Machinery, Cloud Provider and Instrumentation]informer_processing_latency_seconds histogram metric to measure event handler execution time in RealFIFO. (#137101, @richabanker) [SIG API Machinery, Architecture, Instrumentation and Testing]apiserver_impersonation_attempts_total, apiserver_impersonation_attempts_duration_seconds, apiserver_impersonation_authorization_attempts_total, and apiserver_impersonation_authorization_attempts_duration_seconds (labels: mode, decision). (#137374, @enj) [SIG API Machinery, Auth and Testing]webhook serving options for k8s.io/cloud-provider. (#136816, @damdo) [SIG Cloud Provider]kubectl wait command. (#136855, @ardaguclu) [SIG CLI and Testing]StreamPodSandboxes, StreamContainers, StreamContainerStats, StreamPodSandboxStats, StreamPodSandboxMetrics) and new ImageService streaming RPC (StreamImages). (#136987, @bitoku) [SIG Cluster Lifecycle, Node and Testing]ResourceClaim status.reservedFor. The controller now gracefully skips these entries instead of halting sync, ensuring stale pod references can still be cleaned up. (#136450, @MohammedSaalif) [SIG Apps and Node]ControllerManagerReleaseLeaderElectionLockOnCancel feature gate to gate leader election lock release on exit for kube-controller-manager. (#136279, @tchap) [SIG API Machinery and Cloud Provider]ExtendWebSocketsToKubelet feature gate (beta, default true in v1.36). When enabled, the API server proxies WebSocket exec/attach/portforward requests directly to the kubelet rather than translating or tunneling them at the API server. The kubelet handles WebSocket-to-SPDY stream translation (exec/attach) and WebSocket tunneling (portforward) using the same handlers previously used at the API server. The kubelet advertises support for this feature to the API server via the NodeDeclaredFeatures mechanism; the API server only proxies directly to a kubelet that has advertised support. Two new alpha metrics track routing decisions and WebSocket streaming volume: apiserver_websocket_streaming_requests_total (labels: subresource, proxy_type) and kubelet_streaming_websocket_requests_total (label: subresource). (#136256, @seans3) [SIG API Machinery, Autoscaling, Node, Scheduling and Testing]UserNamespacesHostNetwork runtime handler and integrated the UserNamespacesHostNetworkSupport feature gate with the NodeDeclaredFeatures feature gate. The UserNamespacesHostNetworkSupport feature gate only takes effect when the container runtime's UserNamespacesHostNetwork runtime handler returns true and the NodeDeclaredFeatures feature gate is enabled. (#135828, @HirazawaUi) [SIG Autoscaling, Node, Scheduling and Testing]appProtocol field to kubectl describe service output. (#135744, @ali-a-a) [SIG CLI]timezone field to the kubectl describe CronJob output. (#136663, @kfess) [SIG CLI]ReplicaSet controller to read its own writes, preventing spurious reconciliation loops while the cache catches up to recent updates. (#137212, @michaelasp) [SIG Apps]terminated_containers_total to track the number of failed or succeeded containers, broken down by exit code. (#137453, @rawsocket) [SIG Instrumentation, Node and Testing]admin cluster role, write permissions to the edit cluster role, and read permissions to the view cluster role. (#135418, @carlory) [SIG Auth]scheduler_preemption_victims metric definition between asynchronous and synchronous preemption modes. The metric now consistently reports the number of pods chosen as victims across both modes. (#135955, @utam0k) [SIG Scheduling]image_id field to the PullImageResponse message, serving as a unique identifier for the image on the node as returned by the container runtimes. (#137217, @stlaz) [SIG Node]legacy to general. The legacy profile is planned to be removed in v1.39. (#135874, @mochizuki875) [SIG CLI and Testing]OnDelete, OnAdd, or OnUpdate methods for individual items which were deleted, added, or removed. This ensures that the store state which can be inspected by handlers corresponds to a set of objects that existed at a particular resource version on the server. This behavior is guarded by the AtomicFIFO feature gate, which is enabled by default in v1.36 but can be disabled if needed to temporarily regain the previous behavior. (#135462, @michaelasp) [SIG API Machinery]AtomicFIFO feature gate, which is enabled by default in v1.36 but can be disabled if needed to temporarily regain the previous behavior. (#136008, @michaelasp) [SIG API Machinery]UnlockWhileProcessing client-go feature gate, which is enabled by default. (#136264, @michaelasp) [SIG API Machinery and Scheduling]LastStoreSyncResourceVersion method to obtain this resource version. This method can return "" if the store has not been synced to yet, and depends on the AtomicFIFO feature being enabled. (#134827, @michaelasp) [SIG API Machinery and Testing]int32, int64, float, double) when specified in the schema. Existing objects with out-of-range values are preserved via validation ratcheting. (#136582, @yongruilin) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Scheduling and Storage]ReconcilePoolWithName to allow per-pool reconciliation without setting NodeName on slices, so the scheduler can use NodeSelector or allNodes for node-owned, cluster-visible resources (e.g. network-shared devices). "All nodes" is no longer the default. When publishing devices for the entire cluster, it must be set explicitly. (#137365, @yaroslavborbat) [SIG Node and Testing]kube-apiserver when the feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160). (#136763, @richabanker) [SIG API Machinery, Architecture, Cloud Provider, Instrumentation, Network, Node, Scheduling and Testing]kube-controller-manager when the feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160). (#137779, @richabanker) [SIG API Machinery, Instrumentation and Testing]kube-proxy when the feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160). (#137781, @richabanker) [SIG Network]kube-scheduler when the feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160). (#137466, @richabanker) [SIG API Machinery, Architecture, Instrumentation, Scheduling and Testing]kubelet when the feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160). (#137780, @richabanker) [SIG Node]pod.spec.resources, enabling two flexible resource management models. Both models support guaranteed Pods that contain a mix of containers that may be eligible to receive exclusive resource allocation or be part of the Pod-allocated shared resource pool. (#134768, @KevinTMtz) [SIG Node and Testing]WatchCacheInitializationPostStartHook feature gate by default. (#135777, @serathius) [SIG API Machinery]WorkloadAwarePreemption feature gate is active. When PodGroup scheduling fails to find placement for a PodGroup, workload-aware preemption runs for the entire group instead of running default preemption for each individual Pod. (#137606, @Argh4k) [SIG Apps, Node, Scheduling, Storage and Testing]RestartAllContainers action. (#136966, @yuanwang04) [SIG Node and Testing]BindsToNode, BindingConditions, BindingFailureConditions, AllowMultipleAllocations, Capacity) in DRA API v1beta1 hand-written conversion code. (#137240, @yykkibbb) [SIG Node]ComponentFlagz to beta. (#137386, @richabanker) [SIG API Machinery, Architecture, Auth, Instrumentation, Node and Testing]ComponentStatusz to beta. (#137384, @richabanker) [SIG API Machinery, Architecture, Auth and Instrumentation]KubeletPSI feature to GA, enabled by default. The kubelet exposes Linux cgroup Pressure Stall Information (PSI) metrics, providing deeper visibility into system and Pod-level resource contention (CPU, Memory, and I/O) via the kubelet Summary API. (#136548, @mariafromano-25) [SIG Node]PreBind phase are now re-queued into the backoff queue instead of being deleted via the API server, enabling more graceful handling of preemption during binding. (#135502, @Argh4k) [SIG Scheduling and Testing]/flagz and /statusz endpoints with apiserver request metrics (apiserver_request_total, apiserver_request_duration_seconds), with group and version labels reflecting the content-negotiated API version. (#137021, @yongruilin) [SIG API Machinery and Instrumentation]k8s.io/streaming and k8s.io/cri-streaming for Kubernetes streaming transport and CRI streaming server code. k8s.io/apimachinery/pkg/util/httpstream (including spdy and wsstream) remains available as a deprecated compatibility wrapper backed by k8s.io/streaming. The extracted SPDY roundtripper preserves CIDR matching in NO_PROXY/no_proxy. (#137298, @dims) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling, Storage and Testing]UnknownVersionInteroperabilityProxy feature gate to beta, enabled by default. The --peer-ca-file flag is required to turn on the proxy. (#137172, @richabanker) [SIG API Machinery]ExternalServiceAccountTokenSigner feature gate to GA. (#136118, @HarshalNeelkamal) [SIG API Machinery and Auth]daemonset_controller_stale_sync_skips_total metric is incremented and a message is logged by the daemonset controller. This behavior can be temporarily disabled by setting the StaleControllerConsistencyDaemonSet feature gate to false. (#134937, @michaelasp) [SIG API Machinery, Apps, Node, Scheduling and Testing]job_controller_stale_sync_skips_total metric is incremented and a message is logged by the job controller. This behavior can be temporarily disabled by setting the StaleControllerConsistencyJob feature gate to false. (#137210, @michaelasp) [SIG API Machinery and Apps]--allow-deprecated-api flag to kubeadm config validate. By default the command prints a warning for deprecated APIs unless the flag is passed. Additionally, added missing support for v1beta4 UpgradeConfiguration to kubeadm config migrate and kubeadm config validate commands. (#135148, @neolit123) [SIG Cluster Lifecycle]kubeadm upgrade CreateJob preflight check to 1 minute. This allows Windows worker nodes to have more time to run the preflight check. The check uses the pause image, so if you are experiencing slow pull times, you can either pre-pull the image on the worker using kubeadm config images pull --kubernetes-version TARGET or skip the preflight check with --ignore-preflight-errors. (#136273, @neolit123) [SIG Cluster Lifecycle]NodeLocalCRISocket feature gate to GA and locked it to enabled. (#135742, @HirazawaUi) [SIG Cluster Lifecycle]ControlPlaneKubeletLocalMode feature gate, which graduated to GA in v1.35 and was locked to enabled. (#135773, @neolit123) [SIG Cluster Lifecycle]ContainerRuntimeVersion validates if the installed container runtime supports the RuntimeConfig gRPC method. For older kubelet versions than v1.37, it will return a preflight warning. (#136898, @carlory) [SIG Cluster Lifecycle]--v=1 or higher log verbosity, prints information about the CA certificate used for discovery when using kubeadm join. (#137102, @sivchari) [SIG Cluster Lifecycle]--client-ca-file is updated while kubelet is running, the updated root certificates are correctly used to advertise accepted authorities to TLS clients connecting to the kubelet endpoints. This behavior is guarded by the ReloadKubeletClientCAFile feature gate, which is enabled by default. (#136762, @HarshalNeelkamal) [SIG API Machinery, Auth, Node and Testing]v1.26.2. (#138299, @xmudrii) [SIG Release and Testing]v1.26.0. (#137080, @cpanato) [SIG Release and Testing]v1.25.6. (#136257, @BenTheElder) [SIG Release]v1.25.6. (#136465, @cpanato) [SIG Release and Testing]v1.25.7. (#136750, @BenTheElder) [SIG Release]v1.25.7. (#136982, @cpanato) [SIG Release and Testing]RestartAllContainers feature. (#136963, @yuanwang04) [SIG Node]DRAPartitionableDevices to beta. (#137350, @mortent) [SIG Node, Scheduling and Testing]kubectl kuberc commands to beta. (#136643, @ardaguclu) [SIG CLI and Testing]CSIServiceAccountTokenSecrets feature gate to GA. (#136596, @aramase) [SIG Auth and Storage]KubeletPodResourcesDynamicResources and KubeletPodResourcesGet feature gates to GA. (#136728, @guptaNswati) [SIG Node and Testing]RelaxedServiceNameValidation feature gate to beta and enabled it by default.
Service names are now validated with NameIsDNSLabel(), relaxing the pre-existing validation. (#136389, @adrianmoisey) [SIG Network]RestartAllContainersOnContainerExits feature gate to beta, enabled by default. (#136681, @yuanwang04) [SIG Node and Testing]kube-apiserver by no longer requiring that image to contain a shell (sh or dash or bash). (#136633, @addyess) [SIG Release]image_id field to the CRI API PullImageResponse message. (#137574, @SergeyKanzhelev) [SIG Node]staging/src/k8s.io/component-base/logs/kube-log-runner instead of go-runner; full compatibility is maintained (including the same /go-runner executable path). In the future Kubernetes will use base-images without go-runner. (#136954, @BenTheElder) [SIG Instrumentation and Release]v1.14.2. (#137605, @pacoxu) [SIG Cloud Provider and Cluster Lifecycle]kubectl describe node to list aggregated ResourceSlices when the ResourceSlice API is present, detailing slice name, driver, and pool. (#131744, @ArangoGutierrez) [SIG CLI]kubectl explain to display an EXTERNAL DOCS section when a schema or field includes an externalDocs section. This appears after the DESCRIPTION block for top-level resources and after the field description for individual fields. The section is omitted in short mode and when externalDocs is absent. (#136988, @pedjak) [SIG CLI]kubectl get ingressclass to display a (default) marker for the default IngressClass. (#134422, @jaehanbyun) [SIG CLI and Network]kubectl kuberc set with options for setting credentialPluginPolicy and credentialPluginAllowlist. (#137300, @pmengelbert) [SIG CLI]v0.55.0 in vendor dependencies. (#135829, @dims) [SIG Node]MutablePodResourcesForSuspendedJobs and MutableSchedulingDirectivesForSuspendedJobs to be enabled by default. (#135965, @kannon92) [SIG Apps and Testing]ImageLocality scheduler plugin to consider ImageVolume images when scoring nodes for Pod scheduling. (#130231, @Barakmor1) [SIG Scheduling]kubectl exec or kubectl logs are run with a specified container name, and no container with that name is found, kubectl lists the names of containers that would be valid to specify. (#136973, @ardaguclu) [SIG CLI and Testing]PLEGOnDemandRelist feature flag is kept at beta level, but switched off by default. (#137909, @dims) [SIG Node]--detach-keys flag to kubectl attach and kubectl run, allowing detach without terminating the container. (#134997, @yangjunmyfm192085) [SIG API Machinery and CLI]nf_conntrack_max to 1,048,576 to prevent excessive memory consumption on high-core machines when using automatic calculation. (#137002, @kairosci) [SIG Apps and Network]controller/resourcequota and controller/garbagecollector. (#136040, @petern48) [SIG API Machinery and Apps]nodeGetCapabilities method of csiDriverClient to return NewUncertainProgressError when receiving a non-final gRPC error. This resolves residual global mount paths during rapid pod creation-deletion cycles. (#135930, @249043822) [SIG Node and Storage]WaitOnPermit phase. They are now moved to the scheduler backoff queue instead of being marked as unschedulable. (#135719, @Argh4k) [SIG Scheduling and Testing]/status subresource.
Custom Resources: Fixed server-side apply field ownership to not update metadata from the /status subresource since these writes are wiped for custom resources. (#137689, @jpbetz) [SIG API Machinery, Network and Testing]DRABindingConditions feature was enabled and the same claim was reused among different Pods while deallocation happened in parallel. (#137371, @pohly) [SIG Node, Scheduling and Testing]SchedulerAsyncAPICalls feature gate due to performance issues caused by API client throttling. (#135903, @macsko) [SIG Scheduling]RestartContainer on non-sidecar initContainers, as the resize of such containers has never been supported. (#137458, @natasha41575) [SIG Apps, Node and Testing]memory.min=0 for QoS cgroups when the calculated requests are zero. (#137637, @QiWang19) [SIG Node].status.availableReplicas at the correct time without delay, resulting in faster StatefulSet rollout progress. (#135428, @atiratree) [SIG Apps]DRA manager not initializing sharedID from cache when DRAConsumableCapacity is enabled. (#136734, @sunya-ch) [SIG Node and Scheduling]PodCertificateRequest OwnerReference using incorrect apiVersion "core/v1" instead of "v1", which prevented garbage collection of PodCertificateRequests when their owning Pod was deleted. (#137008, @srhppr) [SIG Auth and Node]ReadWriteOncePod preemption e2e test to run as serial, preventing it from causing other random e2e tests to flake. (#135623, @jsafrane) [SIG Storage and Testing]container_swap_usage_bytes in the /metrics/resource endpoint to correctly report container-level swap usage instead of always reporting 0. The root cause was missing logic in addCadvisorContainerCPUAndMemoryStats to propagate swap stats from cadvisor to the container stats object. (#137098, @yuanwang04) [SIG Apps, Node and Testing]event_handling_duration_seconds, preemption_goroutines_duration_seconds, run_podsandbox_duration_seconds, and store_schedule_results_duration_seconds metrics incorrectly recording near-zero latency values instead of actual durations, caused by premature evaluation of SinceInSeconds(startTime) in a deferred call. (#135749, @novahe) [SIG Architecture, Instrumentation, Node and Scheduling]kube-apiserver startup failure during upgrade when MultiCIDRServiceAllocator is enabled and the cluster has a large number of namespaces. The IP address repair controller retries on Forbidden errors from admission plugins that are not yet ready. (#137147, @haojiwu) [SIG Testing]kube-proxy log spam when all of a Service's endpoints were unready. (#136743, @ansilh) [SIG Network]kubectl delete to properly handle deletion of multiple StatefulSet pods and exit normally. (#135563, @yangjunmyfm192085) [SIG CLI, Network and Node]kubectl describe node to correctly display resource requests and limits for Pods using Pod-level resources. (#137394, @Nikateen) [SIG CLI]kubectl describe to correctly recognize uppercase acronyms as a single element when displaying Custom Resource field names. (#135683, @uozalp) [SIG CLI]kubectl label output message to display modified when labels are both added and removed. (#134849, @tchap) [SIG CLI]kubectl logs -f to wait for containers to start instead of failing immediately when pods are in ContainerCreating or PodInitializing states. (#136411, @olamilekan000) [SIG CLI]v1.29 regression in the apiserver_watch_events_sizes metric to report total outgoing watch traffic again. (#135367, @mborsz) [SIG API Machinery]v1.34 regression in ipvs and winkernel kube-proxy backends. These backends now revert to their pre-v1.34 behavior of regularly rechecking all rules even when no Services or EndpointSlices change. (#135631, @danwinship) [SIG Network and Windows]v1.34 regression when starting pods with environment variables containing a value with $ followed by a multi-byte character. (#136325, @AutuSnow) [SIG Architecture]v1.35 regression in StatefulSet parallel Pod management by disabling the MaxUnavailableStatefulSet feature by default. (#137904, @soltysh) [SIG Apps]DeepEqualWithNilDifferentFromEmpty where empty slices and maps were incorrectly considered equal to non-empty ones due to using OR (||) instead of AND (&&) logic. This could cause managed fields timestamps to not update when the only change was adding or removing all elements from a list or map. (#135636, @mikecook) [SIG API Machinery]dra_operations_duration_seconds metric where the is_error label was recording inverted values. Error operations now correctly report is_error=true, and successful operations report is_error=false. (#135227, @hime) [SIG Node]EndpointSlice churn for headless services with no ports defined. (#136502, @tzneal) [SIG Network]kubectl apply --dry-run=client would only output server state instead of merged manifest values when the resource already exists. (#135513, @grandeit) [SIG CLI]kubectl plugin list failed to detect overshadowed plugins on Windows. (#136689, @kfess) [SIG CLI]scheduler_unschedulable_pods metric could be artificially inflated (leak) when a pod fails PreEnqueue plugins after being previously marked unschedulable. (#135981, @vshkrabkov) [SIG Scheduling]averageValue via the v1 HPA API. (#137856, @adrianmoisey) [SIG Autoscaling]kubelet restart, regular containers in a Pod with a sidecar (initContainer with restartPolicy: Always) and a startupProbe failed to restart after crashing. Affected Pods remained stuck with RestartCount: 0 indefinitely. (#137146, @george-angel) [SIG Node and Testing]PopulateRefs function in k8s.io/apiserver/pkg/cel/openapi/resolver where concurrent goroutines could simultaneously modify shared pointer fields from a shallow-copied schema struct. (#136802, @pohly) [SIG API Machinery, Node and Testing]kube-apiserver to crash with a concurrent map read and map write error under high load. (#135759, @Abhigyan-Shekhar) [SIG API Machinery and CLI]ResourceClaims when scheduling many pods very rapidly. Depending on whether DRA drivers check for this during NodePrepareResources (they should, but not all may implement this properly), the second pod using the same device could fail to start until the first one is done or (worse) run in parallel. (#136269, @pohly) [SIG Node, Scheduling and Testing]kube-proxy (winkernel) where IPv4 and IPv6 Service load balancers could be incorrectly shared, causing broken dual-stack Service behavior. The kube-proxy now tracks load balancers per IP family, enabling correct support for PreferDualStack and RequireDualStack Services on Windows nodes. (#136241, @princepereira) [SIG Network and Windows]kubelet when the OS does not support PSI, even if the KubeletPSI feature gate was enabled. (#137326, @amritansh1502) [SIG Node]RestartAllContainersOnContainerExits feature gate is enabled. (#137369, @kfess) [SIG Apps]InPlacePodLevelResourcesVerticalScaling feature gate is enabled. (#138049, @ndixita) [SIG Node and Testing]ChangeContainerStatusOnKubeletRestart and StatefulSetSemanticRevisionComparison to be visible in --help output across different components. (#135515, @dims) [SIG Architecture]StartEventWatcher when the event broadcaster shuts down before the cancellation context fires. (#137398, @Rajneesh180) [SIG API Machinery]preloadedImagesVerificationAllowlist in the kubelet's configuration. Previously, the use of "familiar" image names (e.g. "alpine") from a Pod did not properly match the same name in preloadedImagesVerificationAllowlist in the kubelet's configuration. (#137629, @stlaz) [SIG Auth, Node and Testing]Extract{TypeName}() and Extract{TypeName}From() functions where empty arrays and maps were incorrectly treated as absent, and atomic elements from associative lists were incorrectly duplicated. (#135391, @jpbetz) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Network, Node, Scheduling and Storage]c.Endpoints, since learners do not serve client traffic. (#137251, @pacoxu) [SIG Cluster Lifecycle]interpodaffinity plugin in case target pod labels change. (#135394, @brejman) [SIG Scheduling]etcd failure e2e test. (#137001, @kairosci) [SIG API Machinery and Testing]Init:0/1 when unable to retrieve init container status from container runtime. (#131317, @bitoku) [SIG Node and Testing]lastTerminationStatus to match the RestartAllContainers action if the container was restarted this way. (#136964, @yuanwang04) [SIG Node]Table object detection to cover all List and Watch operations, preventing the reflector from incorrectly processing resources returned in Table format. (#136937, @p0lyn0mial) [SIG API Machinery and Testing]restartPolicyRules and exitCodes.values to report "items" instead of "bytes". (#137136, @kfess) [SIG Apps]nftables mode of kube-proxy when loading very large rulesets. (#135800, @danwinship) [SIG Network]DRA scheduling performance by splitting ResourceSlice entries into shared and onNode categories, reducing Filter stage latency by ~50% in large clusters. (#136588, @abel-von) [SIG API Machinery, Apps, Auth, Node and Scheduling]batch.Job's status.startTime. The error for unsuspended Jobs correctly indicates the field is immutable once set, instead of incorrectly referring to the action as a "removal". (#136585, @zhzhuang-zju) [SIG Apps]apiserver.latency.k8s.io/total in the audit log when request took more than 500ms. (#135685, @chaochn47) [SIG API Machinery]--audit-log-maxsize=0 now disables audit log rotation (the default remains 100 MB). To avoid outages due to filling disks with ever-growing audit logs, --audit-log-maxage now defaults to 366 (1 year) and --audit-log-maxbackup now defaults to 100. If retention of all rotated logs is desired, age and count-based pruning can be disabled by explicitly specifying --audit-log-maxage=0 and --audit-log-maxbackup=0. (#136478, @kairosci) [SIG API Machinery]VolumeAttachment cleanup when CSI's attachRequired switches from true to false. (#129664, @hkttty2009) [SIG Storage and Testing]nft v1.1.3. (#137501, @danwinship) [SIG Network]kubeadm join to wait for the etcd learner member to start before promoting it. (#136014, @SataQiu) [SIG Cluster Lifecycle]kubeadm upgrade failed if the content of the /var/lib/kubelet/kubeadm-flags.env file was KUBELET_KUBEADM_ARGS="". (#136127, @carlory) [SIG Cluster Lifecycle]/var/lib/kubelet peer mounts during reset. (#137494, @fuweid) [SIG Cluster Lifecycle]extraArgs, the resulting list of arguments is no longer sorted alphanumerically. Only default arguments are sorted, while overrides preserve their order. This allows finer control for flags where order matters, such as --service-account-issuer for kube-apiserver. (#135400, @neolit123) [SIG Cluster Lifecycle]kyaml output of kubectl get ... --output-watch-events -o kyaml. (#136110, @liggitt) [SIG CLI]kubectl exec when the terminal size queue delegate is uninitialized. (#135918, @MarcosDaNight) [SIG CLI]kubectl run -i/-it would miss container output written before the attach connection was established. (#136010, @olamilekan000) [SIG CLI]ResourceClaims even if one is already prepared. (#135919, @rogowski-piotr) [SIG Node and Testing]WaitForAllPodsUnmount that could cause errors to be lost during concurrent pod unmount operations. (#135794, @AutuSnow) [SIG Node and Storage]NodeDeclaredFeatures feature gate enabled. (#136037, @pravk03) [SIG Node]V().Error() would always be printed regardless of the configured log verbosity. (#136028, @thc1006) [SIG Node]NodeAllocatableResourceClaimStatuses in PodStatus. (#138030, @askervin) [SIG Node]PLEGOnDemandRelist. (#137362, @tallclair) [SIG Node]500ms, doubling each failure up to ~2 minutes maximum) to protect against broken plugins causing denial of service while still allowing recovery from transient failures. (#133335, @bart0sh) [SIG Node, Storage and Testing]v1.26.1. (#137474, @BenTheElder) [SIG Release and Testing]kubectl scale command. (#136945, @ardaguclu) [SIG CLI and Testing]GuaranteedQoSPodCPUResize from node declared features. (#136759, @pravk03) [SIG Node and Testing]container_cpu_load_average_10s, container_cpu_load_d_average_10s, and cpu_tasks_state metrics from being reported by cadvisor. This is done because the values were always 0, because a flag was not enabled in the kubelet. (#134981, @haircommander) [SIG Node and Testing]k8s.io/client-go/transport package automatically reloads certificate authority roots from disk when they are supplied via a file path. This functionality is enabled by default and can be disabled via the ClientsAllowCARotation feature gate. (#132922, @yt2985) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Instrumentation, Network, Node, Release, Scheduling and Testing]k8s.io/client-go/transport package garbage collects TLS cache entries and client certificate rotation goroutines when a transport is no longer used. This functionality is enabled by default and can be controlled via the ClientsAllowTLSCacheGC feature gate. Binaries embedding k8s.io/client-go but not wiring the feature gates can disable it by setting the KUBE_FEATURE_ClientsAllowTLSCacheGC=false environment variable. When the feature is disabled, the TLS cache can grow indefinitely and client certificate rotation goroutines are leaked. The new rest_client_transport_cert_rotation_gc_calls_total{} and rest_client_transport_cache_gc_calls_total{result: deleted/skipped} counter metrics can be used with the preexisting rest_client_transport_* metrics to help with debugging. (#136355, @enj) [SIG API Machinery, Architecture, Auth, Instrumentation, Node and Testing]kubelet_pod_start_sli_duration_seconds_bucket metric matches Pod startup latency SLI/SLO documentation. (#131950, @alimaazamat) [SIG Node]kubelet sets the PodReadyToStartContainers condition immediately after sandbox creation rather than after image pull, reducing the time to condition True. (#134660, @Priyankasaggu11929) [SIG Apps, Node and Testing]NodeResourcesBalancedAllocation scoring algorithm to align with the documentation. The score will now take into consideration both balance with and without the requested pod. Previous algorithm only considered balance with the requested pod. This can change the scheduling decisions in some cases. (#135573, @brejman) [SIG Scheduling]v0.5.0. (#138035, @alaypatel07) [SIG Node]v3.10.2. (#138199, @neolit123) [SIG CLI, Cloud Provider, Cluster Lifecycle, Scheduling and Testing]status.resourceClaimStatuses[].resourceClaimName refer correctly to the resourceClaimName field instead of the name field. (#137321, @nojnhuh) [SIG Apps]ServiceCIDRStatusFieldWiping feature gate can be disabled to restore the previous behavior; it will be locked to enabled in a future release. (#137715, @jpbetz) [SIG API Machinery, Network and Testing]audit-id to the "Starting watch" log line. (#136084, @richabanker) [SIG API Machinery]WatchList requests complete their initial listing phase. (#136085, @richabanker) [SIG API Machinery]apiserver_rerouted_request_total. (#137063, @richabanker) [SIG API Machinery]k8s.io/client-go/testing) now supports separate List+Watch calls with checking of ResourceVersion in the Watch call. This closes a race condition where creating an object directly after an informer cache has synced (List call completed) and before the Watch call completed would cause that object to not be sent to the informer. A visible side-effect of adding that support is that List metadata contains a ResourceVersion (starting at 1 for the empty set, incremented by one for each add/update) and that Watch may return objects where it previously did not.
Note that this List+Watch is not to be confused with the ListWatch feature, which uses a single call. That feature is still not supported by fake client-go. (#136143, @pohly) [SIG API Machinery, Apps, Auth and CLI]resourceVersion 0 or empty string (""). (#136583, @michaelasp) [SIG API Machinery]SeparateCacheWatchRPC feature gate. It is now locked to its default value (false) and can no longer be overridden. The feature gate will be removed in a future release. (#135808, @tico88612) [SIG API Machinery]/statusz and /flagz endpoints. (#135309, @richabanker) [SIG API Machinery, Instrumentation and Testing]kubectl describe defaults to showing related events only when describing a single object. Passing --show-events explicitly when describing multiple objects or fuzzy matching on prefix still shows related events if desired. (#137145, @mark-liu) [SIG CLI]kubeGenericRuntimeManager.GetPods() and GetPod(). (#137566, @yangjunmyfm192085) [SIG Node]--pod-infra-container-image kubelet flag from /var/lib/kubelet/kubeadm-flags.env on upgrade. This cleanup was necessary when upgrading to v1.35. (#135807, @carlory) [SIG Cluster Lifecycle]etcd flags --experimental-initial-corrupt-check and --experimental-watch-progress-notify-interval if the etcd version is < v3.6.0. In this version of kubeadm, etcd < v3.6.0 is no longer supported in terms of the Kubernetes / etcd version mapping. These deprecated flags have been replaced by --feature-gates=InitialCorruptCheck=true and --watch-progress-notify-interval. (#135701, @neolit123) [SIG Cluster Lifecycle]v1.26.2. (#138261, @dims) [SIG Architecture and Testing]DisableNodeKubeProxyVersion feature gate to enabled by default. (#136673, @HirazawaUi) [SIG CLI and Network]reconciliations_total, reconciliation_duration_seconds, metric_computation_total, and metric_computation_duration_seconds to beta. (#136178, @omerap12) [SIG Apps, Autoscaling and Instrumentation]InOrderInformers to GA via the usage of RealFIFO. This means that DeltaFIFO will gradually be deprecated in favor of RealFIFO in internal implementations. (#136601, @michaelasp) [SIG API Machinery]SELinuxChangePolicy and SELinuxMountReadWriteOncePod to GA; they are enabled unconditionally. (#136912, @dfajmon) [SIG Apps, Storage and Testing]v1alpha1 WebhookAdmissionConfiguration. It was deprecated in v1.17 in favor of apiserver.config.k8s.io/v1. (#137379, @aramase) [SIG API Machinery and Testing]kubectl describe -f, ensuring consistent NotFound error handling across all resource types. (#135281, @scaliby) [SIG CLI]SuggestFor entries from kubectl wait so that it is no longer suggested when users type kubectl list or kubectl ps. (#137266, @kfess) [SIG CLI and Testing]WatchFromStorageWithoutResourceVersion feature gate in v1.36. (#136066, @serathius) [SIG API Machinery]NewLogOptions; LogOptions must be constructed directly. This eliminates the unwanted dependency from cri-client to apimachinery. (#137827, @SergeyKanzhelev) [SIG Node and Release]--bounding-dirs flag and BoundingDirs field from deepcopy-gen. (#137348, @Jefftree) [SIG API Machinery]HonorPVReclaimPolicy, which was locked and enabled since v1.33. (#135335, @carlory) [SIG Apps and Storage]PodGroupInfo to PodGroupState, which may break custom scheduler plugins that use Handle.WorkloadManager. (#136344, @brejman) [SIG Scheduling]maxLength property. (#137274, @lalitc375) [SIG API Machinery]GetPCIeRootAttributeByPCIBusID helper accepts a fs.ReadLinkFS optional argument to be filesystem-independent. (#137220, @ffromani) [SIG Node]cri-tools to v1.35.0. (#135694, @saschagrunert) [SIG Cloud Provider and Node]v3.6.6. (#135331, @yashsingh74) [SIG API Machinery, Auth, Cloud Provider, Etcd, Node and Scheduling]v3.6.7. (#136407, @ivanvc) [SIG API Machinery, Auth, Cloud Provider, Node and Scheduling]v3.6.8. (#137107, @joshjms) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Etcd and Testing]v1.26.7. (#134394, @toredash) [SIG Cloud Provider]v5.8.1. (#136892, @koba1t) [SIG Architecture and CLI]
Contributors, the
CHANGELOG-1.36.md has been bootstrapped with
v1.36.0 release notes and you may edit now as needed.
Published by your
Kubernetes Release
Managers.