Kubernetes v1.32.0-beta.0 is live!

138 views
Skip to first unread message

Jim Angel

unread,
Nov 6, 2024, 9:56:31 AM11/6/24
to dev, kubernete...@googlegroups.com
Kubernetes Community,

Kubernetes v1.32.0-beta.0 has been built and pushed using Golang version 1.23.2.

The release notes have been updated in CHANGELOG-1.32.md, with a pointer to them on GitHub:


v1.32.0-beta.0

Downloads for v1.32.0-beta.0

Source Code

filenamesha512 hash
kubernetes.tar.gzbb901478a959462a53748044c13fc4bd724ee8ac778c2c474446ce4229c925664e45744f37f16d278926348528076051ecd5b52035fe4deddd87a6dc7399a691
kubernetes-src.tar.gz9c3d0ab91df95d62801501de594d988e296061ba8eb48172aa11c54a851915e7090b8beeb54890fa1dbc4068f9f255c5daa5f0f58b399b065ab40b13397956d1

Client Binaries

filenamesha512 hash
kubernetes-client-darwin-amd64.tar.gzb3241c51e8dd477e4fea33bfbf6fb4703d7496751af3694908477134401a42f10c6fb94335821b0a8ee674e33ef61cbe34e095561d479ba9178470e6b07fbec7
kubernetes-client-darwin-arm64.tar.gza8cf6c966a74e17d94ba237b305abe7731429c5cb1b937a7aaa97b28e3e65ce5b4dc386095fbc6929a61f04159c72857dce937f737630e7f9f9acbcf3e7d4621
kubernetes-client-linux-386.tar.gze95240b371c4bc1076fc1fce8b09e1997068b7dd238a037b4940b3b970024b83146f528d562b9d9522acdd24a16bfacae45079c92eaafe8fa052b380c4e46d68
kubernetes-client-linux-amd64.tar.gz9dd52cd0e433ee9d4045495288da615281980fbf22c2a889494e7811bacc9fe5269aa475c34421671090fec3a14e16c41a254e2047b4363731dc7e390e0c747c
kubernetes-client-linux-arm.tar.gzc31a8d7046cf87b7b10100dc185d793cb46ea6c15822feb05b0203bd463714627c4722f048cff6d1128e323847df167aaa8659c37a2c897576feadb74898ca8e
kubernetes-client-linux-arm64.tar.gzcce0c249dd0ea45b7a39ca3c3a45b2779a105c6422f0c6b90d5085b3a2f3f926180735efdcabc1f17076d7f3858429bc69f2c2c623047e9bfc96d3aebc9d7b65
kubernetes-client-linux-ppc64le.tar.gz12e41f7b22ad3303b97a05988e2fe53d783ca76df6c2c01d6045c0d3503e5abe62dc5dafe2f04fd1b9f83467b5b31e94da15b4034f1efdfb8a24f61d71f5fb7a
kubernetes-client-linux-s390x.tar.gz6c6987962d7b4919f560a0242eaf948b739fc5dc0a992dfc410e39cb75da6ca869a08c51e6b3fab0b341cb00da3a6eb36842421b16f3f1b6119334282cf56043
kubernetes-client-windows-386.tar.gz0f2adfe62d917d405bf7d238adfbf945b6aa898c7d9d536afd457f7b71727dd99853b42cc8ecd61435f6e1816689afed359bed88492906f4607a2cfac1bd8076
kubernetes-client-windows-amd64.tar.gzd26970c2331a18ededd36b4bbf3ccd1b4b9d27dec4bce5ef5b84a78c55a698ea2a898deaa2d12f8093bcca9c5f4e9d53cedd3eebed81be44e40ff4a88a9b2751
kubernetes-client-windows-arm64.tar.gze80c1a02d23c156c9c448e33e405f5b7d9a8919236219efb9bfac34a4d0bf3935063d5e0570359bf3260f167ab443e49b46bbcfcee61ac160d2f513fff56e7e2

Server Binaries

filenamesha512 hash
kubernetes-server-linux-amd64.tar.gz0f7150b39e607e8543296b46b32c7b90a8afe4980051f3d15a447091d6019db501a6de37ecd94e24cfc943b6edb3e555f09ed5098dae070f38fbf439720a69c7
kubernetes-server-linux-arm64.tar.gz925964b3dbbb96cb4f8e78a983d49926304a63b216a0163d6602c564614f090fe0db55da31b808643ed77e238c03775e91664c614f4a05fb6309119106585f22
kubernetes-server-linux-ppc64le.tar.gz8b1c42c01db9687b948082aa93ef3ce9ea33aa36c4c55de471c12e06f71a2f4af4c1942f8a8f7744fc5cb28fefdf77d8784ff33d9af8d401c3bed2fa835142ae
kubernetes-server-linux-s390x.tar.gz8833ad6e984ffa427cb125cdc15759d1f03cebecd4f723209481d7ffcc1abc259851d7e8ffbf531af2bbd9166c1594e9730197edff157b8719b93e62af71bbcb

Node Binaries

filenamesha512 hash
kubernetes-node-linux-amd64.tar.gz40d539f90ec3c3d9a8bc9df533dc6185a8313a0fb83045b77294e5896c6d9517941ceb5aa58012364136490b5c2ad73df59deb1f5e5a526177137cd08bacf360
kubernetes-node-linux-arm64.tar.gzd2edaba95fda9f658b16dfc127451ad3f2d89a2ddc832caa1bf8d97c69931820675264593803042584dd7bcb1ea881c6b53e588e50a414d32fb9f643c36c5c90
kubernetes-node-linux-ppc64le.tar.gz32bbf383c9d3f1386313f57096c51e5cb21fdd7842758abd99cf7e3275f78da70208534ec417d1ad2af1b54dc976416d1a007eb4e501db5b8a4757fc0cd7ccac
kubernetes-node-linux-s390x.tar.gzcfc11d4d2d26df6c4504f620691e01a47250cf3b23a7337ffa63d36da91fca89b191f59e7f0d77395c91fa687829ff8bf228ee1cfb0c939f1b810756f0ae2ded
kubernetes-node-windows-amd64.tar.gzb635f0e8a033ef48d519e1da6803a328aaacc0ddd8ae59e7b6b9b8908143c470e4a553a6723f13e795ba1d71ec3803bb976ec0a30896d4df0cc85178463b66a9

Container Images

All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.

namearchitectures
registry.k8s.io/conformance:v1.32.0-beta.0amd64arm64ppc64les390x
registry.k8s.io/kube-apiserver:v1.32.0-beta.0amd64arm64ppc64les390x
registry.k8s.io/kube-controller-manager:v1.32.0-beta.0amd64arm64ppc64les390x
registry.k8s.io/kube-proxy:v1.32.0-beta.0amd64arm64ppc64les390x
registry.k8s.io/kube-scheduler:v1.32.0-beta.0amd64arm64ppc64les390x
registry.k8s.io/kubectl:v1.32.0-beta.0amd64arm64ppc64les390x

Changelog since v1.32.0-alpha.3

Urgent Upgrade Notes

(No, really, you MUST read this before you upgrade)

  • Fix the bug of InPlacePodVerticalScaling state un-marshalling. State stored in /var/lib/kubelet/pod_status_manager_state is now can always be read back after kubelet restart.

Since the checkpoint format was changed to fix the issue, if you are using the feature InPlacePodVerticalScaling, please clean up the state file /var/lib/kubelet/pod_status_manager_state when upgrading the kubelet as failrue to do it will lead to incompatible state formats and kubelet's failure to start. (#126620@yunwang0911) [SIG Node]

Changes by Kind

Deprecation

API Change

  • DRA: scheduling pods is up to 16x faster, depending on the scenario. Scheduling throughput depends a lot on cluster utilization. It is higher for lightly loaded clusters with free resources and gets lower when the cluster utilization increases. (#127277@pohly) [SIG API Machinery, Apps, Architecture, Auth, Etcd, Instrumentation, Node, Scheduling and Testing]
  • DRA: the DeviceRequestAllocationResult struct now has an "AdminAccess" field which should be used instead of the corresponding field in the DeviceRequest field when dealing with an allocation. If a device is only allocated for admin access, allocating it again for normal usage is now supported, as originally intended. To allow admin access, starting with 1.32 the DRAAdminAccess feature gate must be enabled. (#127266@pohly) [SIG API Machinery, Apps, Auth, Etcd, Network, Node, Scheduling and Testing]
  • Implemented a new, alpha seLinuxChangePolicy field within a Pod-level securityContext, under SELinuxChangePolicy feature gate. This field allows for opting out from mounting Pod volumes with SELinux label when SELinuxMount feature is enabled (it is alpha and disabled by default now). Please see the KEP how we expect to warn users before any SELinux behavior changes and how they can opt-out before. Note that this field and feature gate is useful only with clusters that run with SELinux enabled. No action is required on clusters without SELinux. (#127981@jsafrane) [SIG API Machinery, Apps, Architecture, Node, Storage and Testing]
  • Introduce v1alpha1 API for mutating admission policies, enabling extensible admission control via CEL expressions (KEP 3962: Mutating Admission Policies). To use, enable the MutatingAdmissionPolicy feature gate and the admissionregistration.k8s.io/v1alpha1 API via --runtime-config. (#127134@jpbetz) [SIG API Machinery, Auth, Etcd and Testing]
  • Kube-proxy now reconciles Service/Endpoint changes with conntrack table and cleans up only stale UDP flow entries (#127318@aroradaman) [SIG Network and Windows]
  • Removed generally available feature gate HPAContainerMetrics (#126862@carlory) [SIG API Machinery, Apps and Autoscaling]

Feature

  • Add --concurrent-daemonset-syncs command line flag to kube-controller-manager. The value sets the number of workers for the daemonset controller. (#128444@tosi3k) [SIG API Machinery]
  • Added a kubelet metrics to report informations about the cpu pools managed by cpumanager when the static policy is in use. (#127506@ffromani) [SIG Node and Testing]
  • Added a new option strict-cpu-reservation for CPU Manager static policy. When this option is enabled, CPU cores in reservedSystemCPUs will be strictly used for system daemons and interrupt processing no longer available for any workload. (#127483@jingczhang) [SIG Node]
  • Added metrics to measure latency of DRA Node operations and DRA GRPC calls (#127146@bart0sh) [SIG Instrumentation, Network, Node and Testing]
  • Adopted a new implementation of watch caches for list verbs, using a btree data structure. The new implementation is active by default; you can opt out by disabling the BtreeWatchCache feature gate. (#128415@serathius) [SIG API Machinery, Auth and Cloud Provider]
  • Allows PreStop lifecycle handler's sleep action to have a zero value (#127094@sreeram-venkitesh) [SIG Apps, Node and Testing]
  • Fix: Avoid overwriting in-pod vertical scaling updates on systemd daemon reloads when using systemd (#124216@iholder101) [SIG Node]
  • Graduate Kubelet Memory Manager to GA. (#128517@Tal-or) [SIG Node]
  • Kubeadm: consider --bind-address or --advertise-address and --secure-port for control plane components when the feature gate WaitForAllControlPlaneComponents is enabled. Use /livez for kube-apiserver and kube-scheduler, but continue using /healthz for kube-controller-manager until it supports /livez. (#128474@neolit123) [SIG Cluster Lifecycle]
  • Label apps.kubernetes.io/pod-index added to Pod from StatefulSets is promoted to stable Label batch.kubernetes.io/job-completion-index added to Pods from Indexed Jobs is promoted to stable (#128387@alaypatel07) [SIG Apps]
  • PodLifecycleSleepAction is graduated to GA (#128046@AxeZhan) [SIG Architecture, Node and Testing]
  • Promoted RecoverVolumeExpansionFailure feature gate to beta. (#128342@gnufied) [SIG Apps and Storage]
  • Realign line breaks from kubectl explain descriptions. (#126533@ah8ad3) [SIG CLI]
  • Vendor: update system-validators to v1.9.1 (#128533@neolit123) [SIG Node]
  • Windows: Support CPU and Topology manager on Windows (#125296@jsturtevant) [SIG Node and Windows]

Bug or Regression

  • Fix an issue where eviction manager was not deleting unused images or containers when it detected containerfs signal. (#127874@AnishShah) [SIG Node]
  • Fixed a suboptimal scheduler preemption behavior where potential preemption victims were violating Pod Disruption Budgets. (#128307@NoicFank) [SIG Scheduling]
  • Fixed an issue in the kubelet that showed when writeable layers and read-only layers were at different paths within the same mount. Kubernetes was previously detecting that the image filesystem was split, even when that was not really the case (#128344@kannon92) [SIG Node]
  • Fixes a race condition that could result in erroneous volume unmounts for flex volume plugins on kubelet restart (#127669@olyazavr) [SIG Storage]
  • Fixes the reporting of elapsed times during evaluation of ValidatingAdmissionPolicy decisions and annotations. The apiserver_validating_admission_policy_check_duration metrics will now show elapsed times and no longer be zero. (#128463@knrc) [SIG API Machinery]
  • Kubeadm: added "disable success" and "disable denial" as parameters of the "cache" plugin in the Corefile managed by kubeadm. This is to prevent conflicting responses during CoreDNS cache updates. (#128359@matteriben) [SIG Cluster Lifecycle]
  • Kubelet: Fix the volume manager didn't check the device mount state in the actual state of the world before marking the volume as detached. It may cause a pod to be stuck in the Terminating state due to the above issue when it was deleted. (#128219@carlory) [SIG Node]
  • Makes kubelet's /metrics/slis endpoint always available (#128430@richabanker) [SIG Architecture, Instrumentation and Node]
  • Tighten validation on the qosClass field of pod status. This field is immutable but it would be populated with the old status by kube-apiserver if it is unset in the new status when updating this field via the status subsource. (#127744@carlory) [SIG Apps, Instrumentation, Node, Storage and Testing]

Other (Cleanup or Flake)

  • Removed generally available feature-gate ZeroLimitedNominalConcurrencyShares (#126894@carlory) [SIG API Machinery]
  • The dynamicResources has been refactored to DynamicResources, now users can introduce the DynamicResources struct outside the dynamicresources package. (#128399@JesseStutler) [SIG Node and Scheduling]

Dependencies

Added

Changed

Removed


Contributors, the CHANGELOG-1.32.md has been bootstrapped with v1.32.0-beta.0 release notes and you may edit now as needed.

Published by your Kubernetes Release Managers.

Reply all
Reply to author
Forward
0 new messages