Kubernetes v1.36.0-beta.0 has been built and pushed using Golang version 1.26.0.
The release notes have been updated in CHANGELOG-1.36.md, with a pointer to them on GitHub:
| filename | sha512 hash |
|---|---|
| kubernetes.tar.gz | 7e4c5eb75fdcbddb19c94139ead1b7d16bbc9332f319006312441db15cf2d5562625a42cc1a14aad93338a1e48e6c00e2abfe23071626d2a80959ce71c82fc07 |
| kubernetes-src.tar.gz | a97a579bf0b56b408908d1ab58bb75c821e05bb26b301afb223302314a569ebed865b019118ece4a94e598564d21d36ad1f452ea5f64837e3ebbca67b11c1201 |
| filename | sha512 hash |
|---|---|
| kubernetes-client-darwin-amd64.tar.gz | 942e91cc2e59e2b3c6d14d0e3547c349b5fdf573f76861baa78a650871bbddf80c5503b8ab42a7c34481fd5750781722274aae1210cddbb82cccc5ebb38c96f1 |
| kubernetes-client-darwin-arm64.tar.gz | 3d985d2d528017b806cd6073ff4dee53faf3ee8b6a25c994287b82a4b09be6ed0e0ab122c4659b08d61fb0a0603bad00dd6c34f5d08f7d3a9fa7ed810619efd0 |
| kubernetes-client-linux-386.tar.gz | 4631d3edc7dc0fe4dc2cfa6b0b520d167d372b60ea386dcea8c2b59b2e4c37bcf8fff93ef77813a5842dac7d45926efdc78a69fcaafe8aa488dab2d36eb36f37 |
| kubernetes-client-linux-amd64.tar.gz | bc41228fd7e01c94c88b6f6798ae4a37834098880bc00109a5e54bd1138a9b827804426003dfedf92d418c8a1b79bc39443518b1cefbcac616c211528287e26b |
| kubernetes-client-linux-arm.tar.gz | b89b8174eba4fc43560c35f37abb599b326a38963bdf1a4925c1eacbf1090c859ce6fb664475ab953859ea3c9f7e1d7bceaeadb2a9f42d2772efba7dc521917c |
| kubernetes-client-linux-arm64.tar.gz | 4693d9992d1b2148e6cd93eafba1ef03a73a72f1b81c610be6f6597225bc31a7fe60775f04c1b89b7dc669eba16087762b14c21ae7d8fd405e1a9a24bd2b838b |
| kubernetes-client-linux-ppc64le.tar.gz | 166ab0173f7e80f4d584fe2cf61693b3bb0896840d587e7c2b5fd670db5498f8facfefd2ea49c91c50ab53304c9bc430fa29e87420abb552355e1ed9068c7e95 |
| kubernetes-client-linux-s390x.tar.gz | 0b3c66b59cd4935ff56b493a3aae0ddf441f89ab4e52a45edbfbd0cd882af317ddf85e40cb914681fbb89a55ad3707884d0c3046f8df2a9045702ff62df06bf2 |
| kubernetes-client-windows-386.tar.gz | cb4083fed4d5e3140f7dd5730e7dabf681ea11999f0b6e946a6f840380355257f849b35600f29e2d87fc056036e41827fe5596991882eedc4fd9a5c3addf8d97 |
| kubernetes-client-windows-amd64.tar.gz | 9b858b63cea22adfe924f5a583ed398c0c613a436c4f9db625d13ca52f1dd79c49daf7b6d981c2be1d90218385194822908dfdf70e41bc55b58c5ff8c6a32e00 |
| kubernetes-client-windows-arm64.tar.gz | a7982d04ee2c2a804e575c20121036ac5fbfcb82f1c473525635ad7bb816055ec6f223b4c7612b7b87d185816368d2e690a1c3ed47336cc2eebbf6372f0576de |
| filename | sha512 hash |
|---|---|
| kubernetes-server-linux-amd64.tar.gz | 826ce2b809ae92eddacdb7c1dc75108024112457a0c1d48a23809d282707d13292d5fa40502ef7b6f44a9d68821eb556f59af05498a47427fd337634018ed576 |
| kubernetes-server-linux-arm64.tar.gz | 3f70adbb9b1389670b0d77c1caab3b2b83253caa90e4641fc4604a0d559f286a1b083d0111db7c0bc057e25f6184f2b1fed9a206ad21c29b7c0a03869c8cbaf2 |
| kubernetes-server-linux-ppc64le.tar.gz | a092665ee24cdda2800f31be942704340bdd541590d7d752e0ba847fadbcf6eb047954f890476f7b926c49984b3d9cb1ef675eedb76163d3b155ab4f5430fc3d |
| kubernetes-server-linux-s390x.tar.gz | acfb69d1a089bd2bd9250d37ebc705eaf80a3b831b80756cabe90f9a8d92816344a12859ec49e6f6a74e6ec0b2a39d382be7f3061f0ffad3f9d1fdb82e25d5f0 |
| filename | sha512 hash |
|---|---|
| kubernetes-node-linux-amd64.tar.gz | cb8e8ec77f7e4ea9e8db50cb41339b1c1026b3565b0a47a6873156cec58e495897b0a767885838d9f085c1f6b69d40eb2e3b1babc5f9c85c235a13ddd9399670 |
| kubernetes-node-linux-arm64.tar.gz | cea68a83e7b202e273721be4fd708fcd45d4d3e06f1d8b6da5d6282672e11282d0cb162a76595ae4b95381a27afd3eebfe15595b18539dac720658f67e9ab549 |
| kubernetes-node-linux-ppc64le.tar.gz | f1e73ab63bef0a79f8c04a4e123f99d6fcc5efd576766bb84dde9988979a87a7d4aba18e29e3696396cd1fca2281345b353fcd470cfbdfae27a122bdb9270ecd |
| kubernetes-node-linux-s390x.tar.gz | 61f255a0e29fb87b10bf3aa0cd0d48921cf3491662acf39ed455e8322d76034129808a6855a95e451a69960991ee3641d11a1a487bc897b0f0097c4d5eb9bce6 |
| kubernetes-node-windows-amd64.tar.gz | 8e30f607ba4c196ae4fb422fa632d497d940bb82c34f3aef4ee13477070cf932119eb2968065d571bbd1a714f77ca6a6a238013fabfb6f4d580921553fd8abab |
All container images are available as manifest lists and support the described architectures. It is also possible to pull a specific architecture directly by adding the "-$ARCH" suffix to the container image name.
Raw field of metav1.FieldsV1 is deprecated. Code that constructs or reads FieldsV1 should migrate to the new NewFieldsV1(string), GetRawBytes(), GetRawString(), and SetRawBytes() accessor methods. (#137304, @aaron-prindle) [SIG API Machinery, Apps and Testing]AllowlistEntry.Name to AllowlistEntry.Command in the credential plugin allowlist (#137272, @pmengelbert) [SIG API Machinery, Auth, CLI and Testing]A few log calls which did not properly format their parameters were fixed. (#137108, @pohly) [SIG API Machinery, Apps, Auth, Cluster Lifecycle, Network, Node, Scheduling and Testing]
Add --tls-curve-preferences flag for configuring TLS key exchange mechanism (#137115, @damdo) [SIG API Machinery, Architecture, CLI, Cloud Provider, Node and Testing]
Add a deletion protection mechanism for PodGroup objects. (#137641, @helayoty) [SIG API Machinery, Apps, Auth, Scheduling and Storage]
Add admission plugin that validates PodGroup resources reference an existing Workload and match the declared PodGroupTemplate spec. (#137464, @helayoty) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling and Testing]
Add alpha support for manifest-based admission control configuration (KEP-5793). When the ManifestBasedAdmissionControlConfig feature gate is enabled, admission webhooks and CEL-based policies can be loaded from static manifest files on disk via the staticManifestsDir field in AdmissionConfiguration. These policies are active from API server startup, survive etcd unavailability, and can protect API-based admission resources from modification. (#137346, @aramase) [SIG API Machinery, Apps, Architecture, Auth, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling, Storage, Testing and Windows]
Add opt-in alpha support in kubeletplugin framework for DRA drivers to publish DRA Device metadata in pod CDI mounts (#137086, @alaypatel07) [SIG Apps, Network, Node and Testing]
Add tlsServerName field to EgressSelectorConfiguration TLSConfig to allow overriding the server name used for TLS certificate verification (#136640, @kennangaibel) [SIG API Machinery, Apps, Auth, Storage and Testing]
Added MemoryReservationPolicy cgroup v2 MemoryQoS support to KubeletConfiguration for memory.min protection. (#137584, @QiWang19) [SIG Node and Storage]
Added PlacementGenerate extension point to the scheduler. It's used to generate placements for placement-based pod group scheduling. Its use is guarded by the TopologyAwareWorkloadScheduling feature gate. (#137083, @brejman) [SIG Scheduling]
Added PlacementScore extension point to the scheduler. It's used to score placements in order to choose the best one for placement-based pod group scheduling. Its use is guarded by the TopologyAwareWorkloadScheduling feature gate.
Deprecated MinNodeScore and MaxNodeScore in favor of MinScore and MaxScore. (#137201, @brejman) [SIG Scheduling]
Added SchedulingConstraints to express TAS constraints for pod group scheduling behind TopologyAwareWorkloadScheduling feature gate.
Added TopologyPlacement plugin implementing PlacementGenerate extension point to take the constraints into consideration during pod group scheduling. The usage of this plugin is guarded by the TopologyAwareWorkloadScheduling feature gate. (#137271, @brejman) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling and Testing]
Added TAS logic to the pod group scheduling cycle behind TopologyAwareWorkloadScheduling feature gate. This feature supports scheduling pod groups on nodes with matching topology domains. (#137489, @brejman) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling and Testing]
Added PodGroupPodsCount scheduler plugin to support workload-aware scheduling by prioritizing placements with higher pod counts within a group. (#137488, @vshkrabkov) [SIG Scheduling and Testing]
Added alpha support (behind PersistentVolumeClaimUnusedSinceTime feature gate) for tracking PVC unused status via a new Unused condition on PersistentVolumeClaimStatus. When enabled, the PVC protection controller sets Unused=True with a lastTransitionTime when no non-terminal Pods reference the PVC, enabling external automation to identify and manage unused storage. (#137862, @gnufied) [SIG Apps, Auth, Storage and Testing]
Added placement-based pod group scheduling algorithm to scheduler. Its use is guarded by the TopologyAwareWorkloadScheduling feature gate. (#136944, @brejman) [SIG Scheduling and Testing]
Allow users to opt-in to scheduling behaviour for CSI volume (#137343, @gnufied) [SIG API Machinery, Scheduling and Storage]
Config.k8s.io.flagz API is graduated to v1beta1 (#137174, @richabanker) [SIG API Machinery, Instrumentation, Node, Scheduling and Testing]
Config.k8s.io.statusz API is graduated to v1beta1 (#137173, @richabanker) [SIG API Machinery, Instrumentation, Scheduling and Testing]
DRA DeviceTaintRules: the TimeAdded of the taint is not only added automatically, it now also gets updated automatically when changing the effect. (#137167, @pohly) [SIG API Machinery, Node and Testing]
DRA extended resource feature is promoted to beta in 1.36 (#135048, @yliaog) [SIG API Machinery, Architecture, Auth, Network, Node, Scheduling and Testing]
DRA: graduate Device Binding Conditions (KEP #5007) to beta. The feature is now enabled by default in v1.36. (#137795, @ttsuuubasa) [SIG API Machinery, Node, Scheduling and Testing]
DRA: graduated device taints and tolerations (KEP #5055) to beta. Support for DeviceTaints in ResourceSlices is on by default. Support for DeviceTaintRules depends on enabling resource.k8s.io/v1beta2 and the DeviceTaintRules feature gate. (#137170, @pohly) [SIG API Machinery, Apps, Auth, Cluster Lifecycle, Etcd, Node, Scheduling and Testing]
DRAConsumableCapacity is enabled by default. (#136611, @sunya-ch) [SIG API Machinery, Cluster Lifecycle, Node, Scheduling and Testing]
Extended NodeResourcesFit to implement the PlacementScore extension point. The usage of the PlacementScore extension point is guarded by the TopologyAwareWorkloadScheduling feature gate. (#136652, @brejman) [SIG Scheduling]
Feature gate UserNamespacesSupport is now GA. (#136792, @rata) [SIG API Machinery, Apps, CLI, Node, Storage and Testing]
For pod resizes requested on nodes where the resize request exceeds the node's allocatable capacity or the node is running an OS that does not support resize, the request will now fail in admission rather than be marked as Infeasible in the pod status later. (#136043, @natasha41575) [SIG API Machinery, Node, Release, Scheduling, Storage and Testing]
Graduate metric 'apiserver_storage_events_received_total' to BETA (#136314, @petern48) [SIG API Machinery, Etcd, Instrumentation and Testing]
Graduated ImageVolume feature to stable. (#136711, @saschagrunert) [SIG Apps, Architecture, Node and Testing]
HPA: Improved scaling to and from zero with enabled HPAScaleToZero feature gate. (#135118, @johanneswuerbach) [SIG Apps, Autoscaling and Testing]
Integrate Workload and PodGroup APIs with the Job controllers to support gang-scheduling. (#137032, @helayoty) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Instrumentation, Node, Scheduling and Testing]
Introduced scheduling.k8s.io/v1alpha2 Workload and PodGroup API to allow for expressing workload-level scheduling requirements and let kube-scheduler act on those. Removed scheduling.k8s.io/v1alpha1 Workload API. (#136976, @tosi3k) [SIG API Machinery, Apps, Auth, CLI, Cloud Provider, Etcd, Node, Scheduling, Storage and Testing]
Kube-scheduler now updates PodGroup status with a PodGroupScheduled condition reflecting whether the group was successfully scheduled or is unschedulable. (#137611, @helayoty) [SIG API Machinery, Apps, Scheduling and Testing]
Promote DRAPrioritizedList to GA (#136924, @troychiu) [SIG Apps, Architecture, Autoscaling, CLI, Cloud Provider, Cluster Lifecycle, Network, Node, Release, Scheduling, Storage and Testing]
Promote ProcMountType feature to GA (#137454, @haircommander) [SIG API Machinery, Apps, Auth, CLI, Node, Storage and Testing]
Promote NodeDeclaredFeatures to beta. (#136042, @pravk03) [SIG API Machinery, Apps, Cluster Lifecycle, Instrumentation, Node, Scheduling, Storage and Testing]
Promoted mutable CSI node allocatable count to GA. The MutableCSINodeAllocatableCount feature gate is now locked to enabled. (#136230, @torredil) [SIG API Machinery and Storage]
Promoted several endpointslice metrics from Alpha to Beta stability. (#136368, @bhope) [SIG Instrumentation and Network]
Promoted several scheduler metrics (scheduler_goroutines, scheduler_permit_wait_duration_seconds, scheduler_plugin_evaluation_total, scheduler_plugin_execution_duration_seconds, scheduler_scheduling_algorithm_duration_seconds, scheduler_unschedulable_pods) from Alpha to Beta stability, providing stronger API and label stability guarantees for metric consumers. (#136155, @bhope) [SIG Instrumentation and Scheduling]
Promoted the DRAAdminAccess feature gate to GA. (#137373, @ritazh) [SIG API Machinery, Auth, Node, Scheduling and Testing]
Promoted two Job controller metrics from Alpha to Beta stability, providing stronger API and label stability guarantees for metric consumers. (#136367, @bhope) [SIG Apps and Instrumentation]
Remove CRD stored versions from status upon SVM migration (#135297, @michaelasp) [SIG API Machinery, Apps, Auth and Testing]
Renamed metric 'etcd_bookmark_counts' to 'etcd_bookmark_total'. If you are using custom monitoring dashboards or alerting rules based on the 'etcd_bookmark_counts' metric, please update them to use the new 'etcd_bookmark_total' metric. (#136483, @petern48) [SIG API Machinery, Etcd, Instrumentation and Testing]
Slow requests that use impersonation can now be tracked via the apiserver.latency.k8s.io/impersonation audit event annotation when the ConstrainedImpersonation feature is enabled. (#137523, @enj) [SIG API Machinery, Auth and Testing]
The /configz endpoint of kubelet, scheduler, cloud controller manager, and kube-proxy serializes the APIVersion and Kind fields as well as using public types instead of internal. (#136044, @SergeyKanzhelev) [SIG API Machinery, Cloud Provider, Cluster Lifecycle, Network, Node, Scheduling and Testing]
The ConstrainedImpersonation feature is now beta and enabled by default. (#137609, @enj) [SIG API Machinery and Testing]
The StrictIPCIDRValidation feature gate to kube-apiserver is now enabled by default, meaning that API fields no longer allow IP or CIDR values with extraneous leading "0"s (e.g., 010.000.000.005 rather than 10.0.0.5) or CIDR subnet/mask values with ambiguous semantics (e.g., 192.168.0.5/24 rather than 192.168.0.0/24 or 192.168.0.5/32). (#137053, @danwinship) [SIG Network and Testing]
This change adds a new alpha feature DRANativeResources, which includes:
#### Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.:
<!--
This section can be blank if this pull request does not require a release note.
When adding links which point to resources within git repositories, like
KEPs or supporting documentation, please reference a specific commit and avoid
linking directly to the master branch. This ensures that links reference a
specific point in time, rather than a document that may change over time.
See here for guidance on getting permanent links to files: https://help.github.com/en/articles/getting-permanent-links-to-files
Please use the following format for linking documentation:
- [KEP]: <link>
- [Usage]: <link>
- [Other doc]: <link>
--> ([#136725](https://github.com/kubernetes/kubernetes/pull/136725), [@pravk03](https://github.com/pravk03)) [SIG API Machinery, Apps, Node, Scheduling and Testing]
SnapshotMetadataService is now available in v1beta1 version. The support for the v1alpha1 version have been removed. (#137564, @iPraveenParihar) [SIG Storage and Testing]
A new gRPC service is added to the Kubelet that provides information about pods running on the node. (#134627, @briansonnenberg) [SIG Node and Testing]
Add alpha metrics tracking the resource version the cache layer of an informer is at. (#137419, @michaelasp) [SIG API Machinery, Architecture, Instrumentation and Testing]
Add the timezone field to the cronjob describe output. (#136663, @kfess) [SIG CLI]
Add the ability for statefulset controller to read its own pod and pvc writes (#137254, @michaelasp) [SIG Apps]
Add tracing for WatchList requests (#137202, @serathius) [SIG API Machinery and Testing]
Added ControllerManagerReleaseLeaderElectionLockOnCancel feature gate to gate leader election lock release on exit for kube-controller-manager (#136279, @tchap) [SIG API Machinery and Cloud Provider]
Added New RuntimeService streaming RPCs (StreamPodSandboxes, StreamContainers, StreamContainerStats, StreamPodSandboxStats, StreamPodSandboxMetrics) and New ImageService streaming RPC (StreamImages). (#136987, @bitoku) [SIG Cluster Lifecycle, Node and Testing]
Added the metric terminated_containers_total to track the number of containers failed or succeeded broken down by exit code (#137453, @rawsocket) [SIG Instrumentation, Node and Testing]
Added two scheduler metrics for Device Binding Conditions, covering allocation attempts and PreBind duration with status and driver labels. (#137284, @ttsuuubasa) [SIG Node and Scheduling]
Added warning when kubectl rollout undo is used on resources managed with kubectl apply to prevent unexpected behavior from annotation mismatch (#137064, @olamilekan000) [SIG CLI]
Adding multiple conditions support to kubectl wait command. (#136855, @ardaguclu) [SIG CLI and Testing]
Adds metrics for constrained impersonation as described in https://kep.k8s.io/5284
apiserver_impersonation_attempts_total{mode, decision} apiserver_impersonation_attempts_duration_seconds{mode, decision} apiserver_impersonation_authorization_attempts_total{mode, decision} apiserver_impersonation_authorization_attempts_duration_seconds{mode, decision} (#137374, @enj) [SIG API Machinery, Auth and Testing]
Adds the ExtendWebSocketsToKubelet feature gate (Beta, default true in v1.36). When enabled, the API server proxies WebSocket exec/attach/portforward requests directly to the kubelet rather than translating or tunneling them at the API server. The kubelet now handles WebSocket-to-SPDY stream translation (exec/attach) and WebSocket tunneling (portforward) using the same handlers previously used at the API server. The kubelet advertises support for this feature to the API server via the NodeDeclaredFeatures mechanism; the API server only proxies directly to a kubelet that has advertised support. Two new ALPHA metrics are added to track routing decisions and WebSocket streaming volume: apiserver_websocket_streaming_requests_total (labels: subresource, proxy_type) and kubelet_streaming_websocket_requests_total (label: subresource). (#136256, @seans3) [SIG API Machinery, Autoscaling, Node, Scheduling and Testing]
Allow the CRI (and NRI) to block pod-level resizes. (#137555, @natasha41575) [SIG Node]
Bump coredns to 1.14.2 (#137605, @pacoxu) [SIG Cloud Provider and Cluster Lifecycle]
CRI API: A new field is added to the PullImageResponse message - image_id. This field serves as a unique identifier for the image on the node as returned by the container runtimes. (#137217, @stlaz) [SIG Node]
DRA ResourceSlice controller: new optional ReconcilePoolWithName allows per-pool reconciliation without setting NodeName on slices, so the scheduler can use NodeSelector or allNodes for node-owned, cluster-visible resources (e.g. network-shared devices). "All nodes" is no longer the default. When publishing devices for the entire cluster, it must be set explicitly. (#137365, @yaroslavborbat) [SIG Node and Testing]
Enable the feature gate RestartAllContainersOnContainerExits by default. The RestartAllContainersOnContainerExits feature is promoted to beta. (#136681, @yuanwang04) [SIG Node and Testing]
Enables Prometheus native histogram support in apiserver when feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160) (#136763, @richabanker) [SIG API Machinery, Architecture, Cloud Provider, Instrumentation, Network, Node, Scheduling and Testing]
Enables Prometheus native histogram support in kube-controller-manager when feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160) (#137779, @richabanker) [SIG API Machinery, Instrumentation and Testing]
Enables Prometheus native histogram support in kube-proxy when feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160) (#137781, @richabanker) [SIG Network]
Enables Prometheus native histogram support in kubelet when feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160) (#137780, @richabanker) [SIG Node]
Enables Prometheus native histogram support in scheduler when feature gate is enabled. Histograms are exposed in both classic and native formats using exponential bucket configuration (factor=1.1, max buckets=160) (#137466, @richabanker) [SIG API Machinery, Architecture, Instrumentation, Scheduling and Testing]
Ensures single-container pod can restart quickly with RestartAllContainers action. (#136966, @yuanwang04) [SIG Node and Testing]
Fix missing field conversions (BindsToNode, BindingConditions, BindingFailureConditions, AllowMultipleAllocations, Capacity) in DRA API v1beta1 hand-written conversion code (#137240, @yykkibbb) [SIG Node]
Graduate ComponentFlagz to beta (#137386, @richabanker) [SIG API Machinery, Architecture, Auth, Instrumentation, Node and Testing]
Graduate ComponentStatusz to beta (#137384, @richabanker) [SIG API Machinery, Architecture, Auth and Instrumentation]
Instrument /flagz and /statusz endpoints with apiserver request metrics (apiserver_request_total, apiserver_request_duration_seconds), with group and version labels reflecting the content-negotiated API version. (#137021, @yongruilin) [SIG API Machinery and Instrumentation]
Introduce index-based naming in ResourceSlice controller and ensure ResourceSlices and pools are sorted lexicographically before allocation, allowing users to control allocation priority. (#136641, @troychiu) [SIG Node and Testing]
Introduces new staging modules k8s.io/streaming and k8s.io/cri-streaming for Kubernetes streaming transport and CRI streaming server code.
k8s.io/apimachinery/pkg/util/httpstream (including spdy and wsstream) remains available as a deprecated compatibility wrapper backed by k8s.io/streaming.
The extracted SPDY roundtripper preserves CIDR matching in NO_PROXY/no_proxy. (#137298, @dims) [SIG API Machinery, Architecture, Auth, CLI, Cloud Provider, Cluster Lifecycle, Instrumentation, Network, Node, Release, Scheduling, Storage and Testing]
Kube-apiserver: The UnknownVersionInteroperabilityProxy feature gate graduates to beta and enabled by default. The --peer-ca-file flag is required to turn on the proxy. (#137172, @richabanker) [SIG API Machinery]
Kubeadm: when using '--v=1' or higher log verbosity, print information of the CA certificate used for discovery when using 'kubeadm join'. (#137102, @sivchari) [SIG Cluster Lifecycle]
Kubectl explain: when a schema or field includes an externalDocs section, it is now displayed as:
EXTERNAL DOCS:
<description>
URL: <url>
This appears after the DESCRIPTION block for top-level resources and after the field description for individual fields. The section is omitted in short mode and when externalDocs is absent. (#136988, @pedjak) [SIG CLI]
Kubectl: kubectl describe node now lists aggregated ResourceSlices when the ResourceSlice API is present, detailing slice name, driver, and pool. (#131744, @ArangoGutierrez) [SIG CLI]
Kubelet: if the --client-ca-file is updated while kubelet is running, the updated root certificates are now correctly used to advertise accepted authorities to TLS clients connecting to the kubelet endpoints. This behavior is guarded by the ReloadKubeletClientCAFile feature gate, which is enabled by default. (#136762, @HarshalNeelkamal) [SIG API Machinery, Auth, Node and Testing]
Kubernetes is now built using Go 1.26.0 (#137080, @cpanato) [SIG Release and Testing]
Preserve the logs of restarted containers for containers restarted by feature RestartAllContainers. (#136963, @yuanwang04) [SIG Node]
Promote DRAPartitionableDevices to beta (#137350, @mortent) [SIG Node, Scheduling and Testing]
Promoted the KubeletPodResourcesDynamicResources and KubeletPodResourcesGet feature gates to GA. (#136728, @guptaNswati) [SIG Node and Testing]
REVERT: CRI API: A new field is added to the PullImageResponse message - image_id. This field serves as a unique identifier for the image on the node as returned by the container runtimes. (#137574, @SergeyKanzhelev) [SIG Node]
Reduces the needs of the setcap build image for kube-apiserver by no longer requiring that image to contain a shell (sh or dash or bash). (#136633, @addyess) [SIG Release]
Server images now use staging/src/k8s.io/component-base/logs/kube-log-runner instead of go-runner, full compatability is maintained (including the same /go-runner executable path).
In the future Kubernetes will use base-images without go-runner. (#136954, @BenTheElder) [SIG Instrumentation and Release]
Support in-place pod resize of running non-sidecar initContainers. (#137352, @natasha41575) [SIG API Machinery, Apps, Autoscaling, Node, Scheduling, Storage and Testing]
The KubeletPSI feature has graduated to General Availability (GA) and continues to be enabled by default. This feature allows the Kubelet to expose Linux cgroup Pressure Stall Information (PSI) metrics, providing deeper visibility into system and pod-level resource contention (CPU, Memory, and I/O) via the Kubelet Summary API. (#136548, @mariafromano-25) [SIG Node]
This change allows the Topology, CPU, and Memory managers to recognize and act upon pod.spec.resources, enabling two flexible resource management models. Both models support guaranteed pods that contain a mix of containers that may be eligible to receive exclusive resource allocation or be part of the pod-allocated shared resource pool. (#134768, @KevinTMtz) [SIG Node and Testing]
Update kubectl kuberc set with options for setting credentialPluginPolicy and credentialPluginAllowlist (#137300, @pmengelbert) [SIG CLI]
When kubectl exec or kubectl logs are run with a specified container name, and no container with that name is found, kubectl now lists the names of containers that would be valid to specify. (#136973, @ardaguclu) [SIG CLI and Testing]
--detach-keys flag to kubectl attach and kubectl run, allowing detach without terminating the container (#134997, @yangjunmyfm192085) [SIG API Machinery and CLI]RestartContainer on non-sidecar initContainers, as the resize of such containers has never been supported. (#137458, @natasha41575) [SIG Apps, Node and Testing]preloadedImagesVerificationAllowlist in Kubelet's configuration. Previously, the use of "familiar" image names (e.g. "alpine") from a Pod wouldn't properly match the same name in preloadedImagesVerificationAllowlist in Kubelet's configuration. (#137629, @stlaz) [SIG Auth, Node and Testing]batch.Job's status.startTime. The error for unsuspended jobs now correctly indicates the field is immutable once set, instead of incorrectly referring to the action as a "removal". (#136585, @zhzhuang-zju) [SIG Apps]PodReadyToStartContainers condition immediately after sandbox creation rather than after image pull, reducing the time to condition True. (#134660, @Priyankasaggu11929) [SIG Apps, Node and Testing]GuaranteedQoSPodCPUResize from node declared features. (#136759, @pravk03) [SIG Node and Testing]status.resourceClaimStatuses[].resourceClaimName now refer correctly to the resourceClaimName field instead of the name field. (#137321, @nojnhuh) [SIG Apps]kubectl describe now defaults to showing related events only when describing a single object. Passing --show-events explicitly when describing multiple objects or fuzzy matching on prefix will still show related events if desired. (#137145, @mark-liu) [SIG CLI]SELinuxChangePolicy & SELinuxMountReadWriteOncePod to GA; it is now enabled unconditionally. (#136912, @dfajmon) [SIG Apps, Storage and Testing]SuggestFor entries from kubectl wait so that it is no longer suggested when users type kubectl list or kubectl ps (#137266, @kfess) [SIG CLI and Testing]--bounding-dirs flag and BoundingDirs field from deepcopy-gen. (#137348, @Jefftree) [SIG API Machinery]fs.ReadLinkFS optional argument to be filesystem-independenent (#137220, @ffromani) [SIG Node]v1alpha1 WebhookAdmissionConfiguration has been removed. It was deprecated in v1.17 in favor of apiserver.config.k8s.io/v1. (#137379, @aramase) [SIG API Machinery and Testing]Nothing has changed.
Contributors, the CHANGELOG-1.36.md has been bootstrapped with v1.36.0-beta.0 release notes and you may edit now as needed.
Published by your Kubernetes Release Managers.