1 Star 0 Fork 0

zhuchance / kubernetes

加入 Gitee
与超过 1200万 开发者一起发现、参与优秀开源项目,私有仓库也完全免费 :)
免费加入
克隆/下载
CHANGELOG-1.11.md 320.60 KB
一键复制 编辑 原始数据 按行查看 历史
Anago GCB 提交于 2019-03-25 07:54 . Update CHANGELOG-1.11.md for v1.11.9.

v1.11.9

Documentation

Downloads for v1.11.9

filename sha512 hash
kubernetes.tar.gz 41566482c4decf1ed6c1d40a103cfad394a7b67a3139399f9d09d95ba8c2b7977fa812a068c5811c0445b904c5899139fb954b8fba90bfaba8f908f8b2e16a57
kubernetes-src.tar.gz 05dd958daead86f3a1822e5a7c4c387912559c71bca74c81629f7ac659086035667b02df5480631c20eece243ca808415bca41e3792eb8842cd8a8527e4a78a3

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz c3c6e04368e0b9da324dccb945bab8e7d34514e2cd4525fe7ba91035ba6a8af978c82b8f5f1d3065558b8bb1cd49699f225c8d634a69f7ade150d32f54f338c8
kubernetes-client-darwin-amd64.tar.gz 057014e823f35395d47424381d47cca6de91f8c234803b50966577da2c1c8fcb019e3241bb4b584681b24297be2486827a53ca9ace2c2ba5741fb86149159b27
kubernetes-client-linux-386.tar.gz 03c3a5fa4568985bca3b55652d62450e00db5564999b18648744ff5ef365ba110c821e6f4c7478e5f9b20745b48938f6f36e390e6788d0162732a8f0737153c7
kubernetes-client-linux-amd64.tar.gz d4a8ad7411ab9fc2a72fc6495870f1e34de66561b4d89b46cee710ea3e0965c31286bb05e95c4a82b6857fe75fdd118544dd94b53537bb83d3662765937f0d6f
kubernetes-client-linux-arm.tar.gz ad940e68378b8a03a98c47e166c46a377638d6b74cf75ceeebd5c5de15ea6d8a9d18bb2ae918a3b0681f3a8d4be191c5b8bcba0e7943b69cf3fd2a5db4633592
kubernetes-client-linux-arm64.tar.gz b621de9283e98c807468a4bc983959dacb191747c36ec1eb07bdd682f8bb7e5daa7336ca08b659de9e8827149d2031b10334386cf41818a4a3ad7fb092e3099b
kubernetes-client-linux-ppc64le.tar.gz e61f621d988ccd1bc13550b81d10cd5832159a76794b6414a47005a89ef9a17f195a2b9e51560202a4b31718f13c9e136abf68b1c11ec6ed9949dbf2966b83c2
kubernetes-client-linux-s390x.tar.gz f6079c05fb69c3e83a27206596be494369850f1286a8c94af6e3e0c78142723c4d9cdaa8d0f158c7a9bf6d6c25685e9b16fc2bda4a54eb547b5f576136891a6a
kubernetes-client-windows-386.tar.gz 76c6ebb850415675d9dac9d718dc11e146f7ebb07d324cca6ffd5c703ca8c2186f63786db05875eb10199f562131ef1f47cdaadb2b6546078d7db179ec892126
kubernetes-client-windows-amd64.tar.gz dc11c189f3cfb029710044e61fbd0395712639873950d27c7a19429ab4fb2569fa961dcb78883f2c19993c0daf2a8ce40a5eefda8c14f9b189c10228570fcfcd

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 7c30fb2696e93470bddd7d67f898a4603e79cd1766e90162efda6189d2912772efff8d17b7925156b41ce98a550f41ba2b3f1e8169e09dc441b5b9270f24e293
kubernetes-server-linux-arm.tar.gz 9716d34dfbf50091b611cd5002291976492411f50c3f1fda92d45d8865499717446812053c8fbbc47d82486b915ce6e9079a3307f0df54d0b2d5e600a29a597b
kubernetes-server-linux-arm64.tar.gz de2b769e6e694d8497311f293efd81ecddceea331a072bd97262b3fd9a356c600b9645fa91bcc4e955babcc2bd49c2863872f2350f214e267e75824a7c2d1f6f
kubernetes-server-linux-ppc64le.tar.gz 396b4c531b30ee0ad9b14b1b08fb7c81c4bed15e93857723aa60b1980a10ace574aa1bf02f0935edef5101ffdaa694154ab94eb872e9dd02c2ca3dd3da904741
kubernetes-server-linux-s390x.tar.gz ef6ea8fdc511163cc349204f6a3d8659e977edd1ddbd1e798e288dcff232eb21757280bae046f8896f7700e50376b7ffb25eab806c9e8a636e003b53feda62c6

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 1371a7ee273d429526e99262d66233adb6f8406a8d83eb03a31eaab238fefdf007fedb846210cbb244f3371f13b5a3af08acf0eb9ffb90ee707bf801185ba3ba
kubernetes-node-linux-arm.tar.gz fbc7df0635e804770eed6eb5b62b813303e15de8102a554a3599f7e89a8fe3754eb294049abed2edc3d82091352195aad933c2ac841ca95fd61880443a33e2e2
kubernetes-node-linux-arm64.tar.gz 036e4fb0aa0010920aa313c8af17778a0f5bbb52ab14c33e04e378b9d2b53e2af0a4ff618dbf70ba4c4bcdbf29415b657fac0db94bf6b95682af99a90f9799d0
kubernetes-node-linux-ppc64le.tar.gz 8959fac67dfa7aa97e55a8c8d30e6aaedff313e3cecaefa13c7fbd9bdd838e81c50e0896274d1298460d0b9da13faf4c036f1999d02ac4edafc69c6bb5a45439
kubernetes-node-linux-s390x.tar.gz 6fec9fedec5efc78664045b2090fca077cd3822ed5872481d467431483212b3e04911f74778b1eb0faef2aab907597be052e8d1622a9e59d50347d4c2ef04118
kubernetes-node-windows-amd64.tar.gz b029552d9211ae7fa3c8168f3887ca07b590501ee5863dc00c66c218134e4a046fd040d3824f31cf104f96c64d12b5504ae23d61a230413dc926b5fcbac72804

Changelog since v1.11.8

Other notable changes

  • Prevent AWS Network Load Balancer security groups ingress rules to be deleted by ensuring target groups are tagged. (#73594, @masterzen)
  • Allow disable outbound SNAT when Azure standard load balancer is used together with outbound rules. (#75282, @feiskyer)
  • Ensure Azure load balancer cleaned up on 404 or 403 when deleting LoadBalancer services. (#75256, @feiskyer)
  • Fix kubelet start failure issue on Azure Stack due to InstanceMetadata setting (#74936, @rjaini)
  • Fix panic in kubectl cp command (#75037, @soltysh)
  • Fixes an issue with missing apiVersion/kind in object data sent to admission webhooks (#74448, @liggitt)
  • fix get azure accounts timeout issue when there is no out-bound IP (#74191, @andyzhangx)
  • fix issue: fail to detach azure disk when there is server side error (#74398, @andyzhangx)
  • fix parse devicePath issue on Azure Disk (#74499, @andyzhangx)
  • fix Azure Container Registry anonymous repo image pull error (#74715, @andyzhangx)
  • Add metrics-port to kube-proxy cmd flags. (#72682, @whypro)
  • Reduce memory utilization of admission webhook metrics by removing resource related labels. (#69895, @jpbetz)

v1.11.8

Documentation

Downloads for v1.11.8

filename sha512 hash
kubernetes.tar.gz 65ef9150911023033efd486148d6827a9531ef29e2bd5ec0d6269b1e1d5bd1e0497a31a1675c39f54695ba4b526b4619ebf6525b4aab07e10d368ca21c6aeeff
kubernetes-src.tar.gz bea4877aa38da12a3bf99200b02c51a9db8f4f0e58e1b28158fa816e1dc5de0a64edc3e93a2de24720c316a20964ff74754f6511379f1be7952a1cad711537a7

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz 002b24d8026be295df278d02f40261b07f6fecf413c794e95ce4501f313e9a5d7fd2098d051a6b5e57c653058bcd4060f1f73a6dfdcb43c9239bb912206a9042
kubernetes-client-darwin-amd64.tar.gz 4120da867ed18d1fd5dedbf290c107a5769b767d18c42d4ef9f9e4ed0bd076635abc85e69ca0d5c3d65934266a9ce4869e597ce7152e673d6db689b8c492c208
kubernetes-client-linux-386.tar.gz e9b2053e3b09e895f9149bb94a432ba62a980ea26efddb9f8ab6cc5123db21044028f7072ca3e0180eecb58cb201c326a3d175039f9fbe83abeaf42aa87747be
kubernetes-client-linux-amd64.tar.gz 95bc0c1d9b7eea56d5cc20c8f92a486adba379602b9cb6280670e4be458f7f723909fd27898f22500589b3c9c8a6c4bf50b6880d4aef7ab38a5c7dc80254c497
kubernetes-client-linux-arm.tar.gz 1a92e09afb9c64be08b45e228c62a4fb69611d8d7d106adf57e8b82ce9774ac2cba4c94092166658b5601b85e784de66c191b854c7ff9dd29219616055477da6
kubernetes-client-linux-arm64.tar.gz a9a823bd51f7a27bd5158edea5fd4ae40f527e4028a8d3e2a2820862593f10e37f37f5bcc767a193e6669390e7e6e6b50c13a44c16805c1370ff99aaf1563444
kubernetes-client-linux-ppc64le.tar.gz 8b351358175833a970e664e35ef24b14af6fbe5286983d781856ce6a7a3fdaacf2154fce1bc126dbb07db3118e7cecf5d05ac27e5decee2ad4c1332417ee33ec
kubernetes-client-linux-s390x.tar.gz c110b67a6b73e542af9f20991d4f9d6e80542555a6b7158b629cc1f3f69eff90708438834e3672633f1505f0e1a18e7107516258560cb24d601f846681b9310b
kubernetes-client-windows-386.tar.gz 0b5db213b847f49cfd934fa55ee30b1dd6c375d5dd3e6d4e2cfef9742b01afaa4f33ad634d56ef76ea7d0e4a017335c5e3a7221db9f9698d1a6ad8833af81356
kubernetes-client-windows-amd64.tar.gz c842c77215e1d0cf6e7ad8c780488a5085984cbdf0aef46e37709544577b08859daff417db8bec8f130079835ddc2ac521b5418bbe88bd43dd3e5bc04d330402

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 6a5a8764ac75067ea5f81cc8cca179b56d72a2feb870bd096a8cfba4cfcbce72ea38b69773ff888e5463ee7a5403fc123b4f2a4eeb0145017d533f43d60dd4fc
kubernetes-server-linux-arm.tar.gz e5cf04f368e6c5f455bbd2e584bec8774773ea03672697cd43605c96ad2d8915be78160339557568a8570b0331d5df8d892fe18637eda67b0763c113ad41f7ca
kubernetes-server-linux-arm64.tar.gz 4accbd3ce3d1ed5cbe6003ba83ab881378a3fa9e01cebc9d58dc4f8fa10bdb99be469c577c04f3016e83ab9b433526bba17371f3b0b40a64402e905cb6349dbf
kubernetes-server-linux-ppc64le.tar.gz 1004fc3bcb09876d002ae0c273736eca27e54861c3194b822fa6f01245b265dc862e3f611bcca6145f65a535355ac067d874787427122700c2db2b34b406aedc
kubernetes-server-linux-s390x.tar.gz c571688de79022ece009adcee44dd18e614b566f1fafa9c1b87174d57a48403e3d2e2600157199bb48aa611ffcd6d5f2f43620d9190c02ad6bfab86a87c6e3cf

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 224ddda592871d2842c4cea3fdab37e21ea57f355a991f3fcf821305bd72bef942f2fea23407d6555ff5877cf2f495dd97465e44ec3032fc0e39fc77c651792f
kubernetes-node-linux-arm.tar.gz 989aa76291cd8e7c5ac49359b210059cbc7ebe6890cffde930c419fb87b498f9a6bc9cd6b8b746b3da10fc3447c76e0d86ea414dcc4fe9c9ce4f4184c7828a10
kubernetes-node-linux-arm64.tar.gz d5880c71de9991ea3415a7931aa82bf080945632bbb2af92cfda581e619390db7609b7241d4b194a2e4664f7ffe8a863089bc5b2464258de4ff0f8e8a8f77c32
kubernetes-node-linux-ppc64le.tar.gz a8f4362b2d00f298e3abbf056387b1c38673babbc02957f3b78b7b5c1ba59d246a0e6038ad08ffd310ad2a55c79717e97c74ceb4af4f5a6242037519ea19affa
kubernetes-node-linux-s390x.tar.gz 07e39957e314cb2b343a736a5aded1c46a0dbe1980e48d87355ed794c33401d5ab50760081102d29ad75d2dbc798f6e47f88539580e87fc289a33c4488255f55
kubernetes-node-windows-amd64.tar.gz 84b74af3042c301d94136e67fabb9296e72e4574e35bf9b163fb4ba66a6c60f37ff8c1de3b9b25a327d3b90ac50005873c39d03dcb9bade697969334ffd13a13

Changelog since v1.11.7

Other notable changes

  • fix smb remount issue on Windows (#73661, @andyzhangx)
  • kube-apiserver: a request body of a CREATE/UPDATE/PATCH/DELETE resource operation larger than 100 MB will return a 413 "request entity too large" error. (#73805, @caesarxuchao)
    • Custom apiservers built with the latest apiserver library will have the 100MB limit on the body of resource requests as well. The limit can be altered via ServerRunOptions.MaxRequestBodyBytes.
    • The body size limit does not apply to subresources like pods/proxy that proxy request content to another server.
  • The apiserver, including both the kube-apiserver and apiservers built with the generic apiserver library, will now return 413 RequestEntityTooLarge error if a json patch contains more than 10,000 operations. (#74000, @caesarxuchao)
  • Update Cluster Autoscaler to version 1.3.7. (#74136, @jkaniuk)
  • Fix watch to not send the same set of events multiple times causing watcher to go back in time (#73845, @wojtek-t)
  • fixes an error processing watch events when running skewed apiservers (#73482, @liggitt)
  • MAC Address filter has been fixed in vSphere Cloud Provider, it no longer ignores 00:1c:14 and 00:05:69 prefixes (#73721, @frapposelli)
  • add goroutine to move unschedulable pods to activeq if they are not retried for more than 1 minute (#72558, @denkensk)
  • Scale max-inflight limits together with master VM sizes. (#73268, @wojtek-t)
  • Update to go1.10.8 (#73379, @cblecker)

v1.11.7

Documentation

Downloads for v1.11.7

filename sha512 hash
kubernetes.tar.gz 3cc7476722a60c67caa7525e2c2843f0d3369bd16328e8d16ea2a271e097e95b5844215f3cdf3732b4af0a08c7835362a409d34fab480898c91a99b2acf7fa62
kubernetes-src.tar.gz 2aed3dd96137cd3503fd9239934d4cdcaf87bf1bc2e14cdc2cc1b0bd7b53da48c985d0bb8d7c60639b41f6da3a1152b19be255bc572ddc121e4649897a60c6ee

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz 3229c0e19b0e9f5f830ba6078b924251a35e77170b55f06cbf1f645b3db6139ef6f3aa2d08f2a5c6f1e93189897f4c928d215058ed456a898bda6eebd917c7ca
kubernetes-client-darwin-amd64.tar.gz 2e3458e278a3c7fedc705d12cb3a0285267c009f14609fd575f38ed29f1ccba041f8c6dceec6953f5e88ff06f67a8b5a2ce1272a628efb9a1f68e47e31babf4e
kubernetes-client-linux-386.tar.gz 6d5a67e5b3c5b07e2da17bb260402c2d587399db76613a7189b62557b7a46d48ead9d8878c030475206e9e3b018da7a3d99098b2b10083c8100dd730c0e9c7bb
kubernetes-client-linux-amd64.tar.gz da620f9ade85a0da2e9b4fb36cce08f871be2a0d36034f691ad48161e9c187643778b312e9ecdea348bc7f84c52e541db89d07a5e8f90debff6a618ab08bdd8b
kubernetes-client-linux-arm.tar.gz 53d91312f0003883d27d137e007b90979f38ad75f49c87266967040f4446c467e09b8f29781e3eb24e1f496db04efa03e58a44f6caa5f121181b7e7041460e20
kubernetes-client-linux-arm64.tar.gz 694f206610d732acbdab8bd3d910bcea7f1f8990cf11c7661ae835e3dbb50105c18e549de60146dc4307e4d0e0d0ea205b32d7e7d41bb713dda573ddafc368ca
kubernetes-client-linux-ppc64le.tar.gz 2319bbc4d8fe722a8594a5e11857a5beb6362267668cee05fd66d6730ece9ffb7104a17a9455b91114d0037a3dda1d4d7688ad24eaf62008d802ed11ea9ea477
kubernetes-client-linux-s390x.tar.gz 1bd93bfeac5a74e554d1d70dcd843be7a4abd9d8e2c138898dbc95821043194104ee671bef23f78b6289fb4c758a97d29eecf3227d5b6e21b42ae6051cd2fe8a
kubernetes-client-windows-386.tar.gz 51ace4ae0aa19c67294a7d9ba3ef054a736f61c8f38e649796cdf899cde904547a076aaeb987ea222c0bb6a01a91ff770723bad0e20b87f49b1399b06cdc3233
kubernetes-client-windows-amd64.tar.gz 55120afdcb5a9a6fa510c951e939372c4fb87d78505e925168212d2b209e745393a9941189013a4fa65d82c3dd7ebf801512d9d37c08ba1365a06d629f2e7a63

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 71348acb1a132eec6acc901f35064befc4023f1a281b92d4eeab5e30121e4124b698c9c4a32c8fec86ade483b384a100e87fa1b65a048597d2a75bfd1b8b0ce3
kubernetes-server-linux-arm.tar.gz a64f15f4297051f3446207afc9e0a7b93565cc9b4e22e5efce46b51233b4abebbccd14eb3a4277cc8d75a77bcd82287064461bea9c76dd424a916b3d83b2c2be
kubernetes-server-linux-arm64.tar.gz f05f894a7001ec6b4775f4cec9957e44af93e00a25850213ad19baa4508e893d0a78102045c12dbec97451de9b14beab7cb101f07f36af58299b696db2d93a57
kubernetes-server-linux-ppc64le.tar.gz 4df94d9242da30d291b44fe1436728c5f402173a99cb57566a936edd7e4bd23e460aea4a944690ef0bfbf5ba7c8b90b2340839b6df2b4a75cf87100c3be83939
kubernetes-server-linux-s390x.tar.gz b683bab4fed8ddff8d70ce1dce10ec7c687604f2729aac7739d93afcc99e9390b470c9389c1b9056a6c4f19ab46d2a39b31bde2c653c4ddc39dc3c4a832b1254

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 75422281977ed68021ff5ddd3e8d67837f47a12e01c54212a935e76c2e4f9ef29dbd37ab730b42761bcc9e8f8a5b2216aa3b351c330503114f207e51ba2e9c9d
kubernetes-node-linux-arm.tar.gz f5def4c21097d953b19195b58ee702aeee6f68e795f8b29ba8d1fa7d31c62ca235cdcd4b2e34b854771f2c2dff5b128ad2774a62a1d8c70f3555b74c2f96eec6
kubernetes-node-linux-arm64.tar.gz da2e9c20c9f052aa49aec2c6805297d969769cc584ffe3600d6c9f0ade1f2d851f76982bc52c85c6c03b32891d1cf8aad6ff6d98ef04f803a98aadbb17e37e4c
kubernetes-node-linux-ppc64le.tar.gz 5c6b8148a9058f2941214b56896cfbca4a5294149e878b6a9b41a52c2f3a767ed3102f75359319d9ef46583781670c417993268f12c99a5ff6e2a54cc2eac837
kubernetes-node-linux-s390x.tar.gz fc5709208ab6b0c07a42aa38f86ae37f62abb237e08184dd2e440a6bae5f9950794b0084fa7148ae2323e823f227aa334bcbe62c2b18f0df987ea8cedb6f6594
kubernetes-node-windows-amd64.tar.gz 4e42f8c431680066c91b86f0974c9f805ebfe59d0d5dc8fb4c8706a26bcda563c8fee788e20331803ebb4fc6c4ff4859847c80deaea9121cd04e4ed65dfeee5d

Changelog since v1.11.6

Other notable changes

  • Allow for watching objects larger than 1MB given etcd accepts objects of size up to 1.5MB (#72053, @wojtek-t)
  • Fix AWS NLB security group updates where valid security group ports were incorrectly removed (#68422, @kellycampbell)
    • when updating a service or when node changes occur.
  • kubectl: fixed an issue with "too old resource version" errors continuously appearing when calling kubectl delete (#72825, @liggitt)
  • Fixes issue where subpath volume content was deleted during orphaned pod cleanup for Local volumes that are directories (and not mount points) on the root filesystem. (#72291, @msau42)
  • Fixes spurious 0-length API responses. (#72856, @liggitt)
  • Do not detach volume if mount in progress (#71145, @gnufied)
  • Improve efficiency of preemption logic in clusters with many pending pods. (#72895, @bsalamat)
  • Fix scheduling starvation of pods in cluster with large number of unschedulable pods. (#72619, @everpeace)
  • change azure disk host cache to ReadOnly by default (#72229, @andyzhangx)
  • Fixes issue with cleaning up stale NFS subpath mounts (#71804, @msau42)
  • Update Cluster Autoscaler to version 1.3.5. Release notes: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.3.5 (#72579, @MaciekPytel)
  • Fix kube-proxy PodSecurityPolicy binding on GCE & GKE. This was only an issue when running kube-proxy as a DaemonSet, with PodSecurityPolicy enabled. (#72761, @tallclair)
  • Scheduler only activates unschedulable pods if node's scheduling related properties change. (#71551, @mlmhl)
  • Fix a race condition in the scheduler preemption logic that could cause nominatedNodeName of a pod not to be considered in one or more scheduling cycles. (#72504, @bsalamat)
  • fix race condition when attach azure disk in vmss (#71992, @andyzhangx)
  • Fixed kubelet reporting "resource name may not be empty" when mounting a volume very quickly after unmount. (#71074, @jsafrane)
  • Fix race condition introduced by graceful termination which can lead to a deadlock in kube-proxy (#72361, @lbernail)
  • Fixes an issue where Portworx volumes cannot be mounted if 9001 port is already in use on the host and users remap 9001 to another port. (#70392, @harsh-px)
  • kube-proxy in IPVS mode will stop initiating connections to terminating pods for services with sessionAffinity set. (#71834, @lbernail)
  • Update to use go1.10.7 with fix for CVE-2018-16875 (#72074, @ixdy)

v1.11.6

Documentation

Downloads for v1.11.6

filename sha512 hash
kubernetes.tar.gz 78e865de9aa6065a48027fc2c9c5e9e957c36dd69d1859e29db283875562cf11d54cb50910151e320f08554a5a530f9af83e8c437bd78e8feef038514be303a9
kubernetes-src.tar.gz e9309ebcc5ca68c86ff623c45af0a91c4d9b11d4a39df6f6df98101aea22422ada4e4be243eabf8e7134fe38ff899da9f504c7abed6d482d0222ada0e0b65d81

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz b5b3bcf9aab8694647bb03d13c83fdc5250d29f52cdf3ff9e52147f8be5fad9713242ad6996a84bcb6aaa76739abc392a8774b14c12d6896923ec0671eda84d9
kubernetes-client-darwin-amd64.tar.gz dc25f6121501d79c3871848dc91a4528e24031ef7c7c52f85e1706e5d83b41ae1aabb33824ddbb456283f204d61853cf2daed6dd433dbb2ed16f67f7b32c8e52
kubernetes-client-linux-386.tar.gz 8e8e22e03126c8de297ca45b7e1b292ac1c0fd1e5cc119964de2332457c63df16a2aa43fd3dcef6cff4224324dddcc497932533c3fed5c55a0d097bb364dc8e9
kubernetes-client-linux-amd64.tar.gz 6048e7ccb5c084f7582511cba3bd0db2c8ccb237d409956d08cb3c20735e076b52bc3a0aa3d7cce8d1d8d980e5e3bb72ebe25107f17c1ec86a1841cfadd7dbc7
kubernetes-client-linux-arm.tar.gz 3fcc09d617949c09fc0a470633460b534092f45e47b74365bbed243f582817f0a63a73ff39c90e298894334085ec3c32d8a75b1c742ac782beff4f5ed36fb070
kubernetes-client-linux-arm64.tar.gz 5fc0c5d1f1580080ac383cdef61ce11d21845a84e2f196ccbc826ec565ad34755ec746be741ed46de93d782d1e5f1ea9991a8583cbe6f34222d56ff4f7aef67a
kubernetes-client-linux-ppc64le.tar.gz 95f986284501b681ba45158383248dacdb42b95445776509844a34e7939116c61db3c7b37fb0b390a8ff5d0a5354ec5e9e98048117f2e716c28e87bcef9e19d7
kubernetes-client-linux-s390x.tar.gz a83f75d6698b8586c7974d2fb67b7f25aaf591ee6b17381b0d415a170941969c65e97df679b4efc6df7ea4f1424339ceb210b5e64c12bee923988cd5a24761e7
kubernetes-client-windows-386.tar.gz f083073409ef17c29a4791163d6ca0cbb19d61dbd79f8057c2e7056951638d6600b7047b7638394d1f1847179897c30e3c5666665d937fca50f2221fbfa43cef
kubernetes-client-windows-amd64.tar.gz 3a8198a787c2efc74e40e7eaa2c66ff76b3ae13656ba49382de0fbda6ff21bbe17b5b8cf7672b2e538e017a9773ad172df3cbdb4e1c800b535cb84e5f66078ea

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 4aa44b92ecaed54ff3535687729d8a3e4421a9c3772937b7a26bb813d1cce06785ad4a746c40654bf3b3f57b1ece1691a244220693ed0db402b2430bd94119af
kubernetes-server-linux-arm.tar.gz 56f2b429e48858bbac7a28a46c4a59b942fbcad14da8c89d997f87b84268a7f5e8e7b591f326b3e51cdac2ec86ed4bb20eb1de62fdc595f1cea6acbc9117c8e1
kubernetes-server-linux-arm64.tar.gz afd2aa213c6485591faf734d58415aef44f887bd4da4a895f37f091665c372ebeecc8c3daeafc47864ae376b457a6d134d535d021f5601a7e8dddbbe2c8f7ac1
kubernetes-server-linux-ppc64le.tar.gz 0ecf8feafb05746a43fc8e9cd822dbee294f9e02323851b3b9cdf27eba0f40dcbf5a047a54f09f248496191688fe1f8422dc9a02973644bf8853427e589b2707
kubernetes-server-linux-s390x.tar.gz 88a450b30aa213b30092447761eadd6c8440a406a10819400f365edde42f3ddfb39dd330981fd5d5f6a1d5c15a623ef9e89e97f8571a5762a8b7e5b5b4db9a82

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 5627a6382277e34ad5240b41740b5bb300dd86cbceb9fe8967da07650939b1a5e899dbb2da63bba6202e2ca95dbdd9492b8ce9285a5e57ddbf3b6b52f8f8a8f8
kubernetes-node-linux-arm.tar.gz d6d497bd02eb7b749663f600b11ce5364d79e1a2e7229c9ed9abaf25d99de20f41caa88b1358940986faacdfe4c110afe3f8e63f102fb26b11166611cbe43b89
kubernetes-node-linux-arm64.tar.gz bd23aced861869fb857bf36754882274f3c7353eccdbc9fc7f1b3e24ab80254efb0de6d79783e2438a1eda12d51b807786507c000d5752001b605efac0607a6d
kubernetes-node-linux-ppc64le.tar.gz fb78c12993b800b235fe31a0d21172aeb207b2d2d78bb84a6e4cb1b8536bf3e55b2c139d4f17c3967ebbcb8c296dca5b931b7dcff28a04fa49e71a2e9604be05
kubernetes-node-linux-s390x.tar.gz 15945c55c3665d9694b0a6476e53af5a372742ef59c49a8678141a545db0491f52cd1cc2bc9a9d1a9b3f8f6ad51228651e59bc4a9703e8f8c90d05409e3a92a0
kubernetes-node-windows-amd64.tar.gz 3bf95932081fe7f62741f0ad652d0bef94aa61961a6af4b097b0a92a80deffa2c24b3a8e4a14a881c4474b84af46b6212b1ea5377cba125c7c9eb242adf2cc92

Changelog since v1.11.5

Other notable changes

  • Scheduler only activates unschedulable pods if node's scheduling related properties change. (#71551, @mlmhl)
  • Disable proxy to loopback and linklocal (#71980, @micahhausler)
  • Scheduler only activates unschedulable pods if node's scheduling related properties change. (#71551, @mlmhl)
  • fix issue: vm sku restriction policy does not work in azure disk attach/detach (#71941, @andyzhangx)
  • Include CRD for BGPConfigurations, needed for calico 2.x to 3.x upgrade. (#71868, @satyasm)
  • On GCI, NPD starts to monitor kubelet, docker, containerd crashlooping, read-only filesystem and corrupt docker overlay2 issues. (#71522, @wangzhen127)
  • UDP connections now support graceful termination in IPVS mode (#71515, @lbernail)
  • Fix a potential bug that scheduler preempts unnecessary pods. (#70898, @Huang-Wei)
  • Only use the first IP address got from instance metadata. This is because Azure CNI would set up a list of IP addresses in instance metadata, while only the first one is the Node's IP. (#71736, @feiskyer)
  • Fix scheduling starvation of pods in cluster with large number of unschedulable pods. (#71488, @bsalamat)
  • Fixes an issue with stuck connections handling error responses (#71419, @liggitt)
  • Ensure orphan public IPs on Azure deleted when service recreated with the same name. (#70463, @feiskyer)
  • Upgrade Stackdriver Logging Agent addon image to 0.6-1.6.0-1 to use Fluentd v1.2. This provides nanoseconds timestamp granularity for logs. (#70954, @qingling128)
  • [GCE] Filter out spammy audit logs from cluster autoscaler. (#70696, @loburm)
  • Fix a scheduler panic due to internal cache inconsistency (#71063, @Huang-Wei)
  • apiserver: fixes handling and logging of panics in REST handlers to prevent crashes (#71076, @liggitt)
  • Upgrade golang.org/x/net image to release-branch.go1.10 (#70663, @wenjiaswe)
  • Fixes a bug in previous releases where a pod could be placed inside another pod's cgroup when specifying --cgroup-root (#70678, @dashpole)
  • Fixes ability for admin/edit/view users to see controller revisions, needed for kubectl rollout commands (#70699, @liggitt)
  • remove retry operation on attach/detach azure disk (#70568, @andyzhangx)
  • Fix cloud-controller-manager crash when using OpenStack provider and PersistentVolume initializing controller (#70459, @mvladev)
  • Update defaultbackend to 1.5: move /metrics to a private endpoint (:10254). (#69383, @bowei)
  • Allows changing nodeName in endpoint update. (#68575, @prameshj)
  • Improve Azure instance metadata handling by adding caches. (#70353, @feiskyer)

v1.11.5

Documentation

Downloads for v1.11.5

filename sha512 hash
kubernetes.tar.gz 42d12fec828546af526b1dd9e5a54fd72cebc458b4e0e3ad9ac50d592ca6be3971553cd9415f9e883f49556c2214f62b03d15646781ecba2a136ac036c48ebe2
kubernetes-src.tar.gz c7df3c980bae5bdc9e865846a32b3e8a44650cf1f860eb2a5e444e7b4e07d3702c09a47cc98857527c2acd6a44817149b07eedc87574cccd46d29d621f9567e1

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz 8044fd8afaa1113f6b11f9a24d6236faec281f245f9fcd773e6a70af7388cf7962ac346bc078c587c629c9408edf0348e04ef1d10eb66eeb5e6cfdaa6c6a09fd
kubernetes-client-darwin-amd64.tar.gz 40fdf051aaa3455f3ca289e8b5c6e8835f53f6e034aa622e91a6264b5eca91fb314d49cc2d4d2f48c1469240207f049b4f37f4c155d8307f161f758da51377d9
kubernetes-client-linux-386.tar.gz d947642bd65b08315b998d32afe3b3c03dbc9bda5d0a81fb1364127eae72ba84e6682c7b0d3be6a55ab8c0fa1a4731253438d08de64c6c007fee3c75f5a198fc
kubernetes-client-linux-amd64.tar.gz 7028d357f65603398c35b7578793a153248e17c2ad631541a587f4ae13ef93f058db130390eea4820c2fd7707509ed0eb581cb129790b12680e869829a6fc241
kubernetes-client-linux-arm.tar.gz 141a65303ed15b53f8bbf19031d19e257a8a02bf735b95099f8f1904c51499a33c18f416c40c15fae50ee8754b269e7ea15df53825b8e62d8c653344be70a2fe
kubernetes-client-linux-arm64.tar.gz 35d8e64f641b140e954fc2c79232b73cddec5863a70dc72b700a9eb0f7b245e821b6f6a7ae9465c3b0ce7bcf5ed4432585f2c4b5e3b3984b425a629d190893e1
kubernetes-client-linux-ppc64le.tar.gz 3aa8cc0ef637fd834d5495cf1cd30a4cb2285ee473fd0f9abea71eee559661a45cd6f6e4791a2ab27e2b4e060c642b1c228806aed1bc100ab5c79f052a8cef9c
kubernetes-client-linux-s390x.tar.gz 834367f2f24df60b3786fb526321a7c8efc36f187de6677c8e3f3e90afe0b87b9eff1d6cc4d7e3bf80d65243200bf0e9099808f4d0f5214e98aaabba8c99e012
kubernetes-client-windows-386.tar.gz ff049e98859eb7d1126a2108a51c33f8643a17bc0f5c46990312ac1cbdb20a9bfb9f3aa13e68b55a462c2f7d97eef0d6a2419d6c1539f9475a3fbce8b2cda3d2
kubernetes-client-windows-amd64.tar.gz f813af0f54917dd73b943367ea62f9c412f09a3fa74d8b6fc834f2e2496d4dc323a1670efe41496afd306563b5f9c230dba35323c9c88cbf2743a0c12d28cbf6

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 52ba9a169932e509db13b0ef839c82cc7834b1e8444ab7e59bd99ec95c31996e0dc3fd0c8fcc9c74e116cb74abfaeed8f6c666c62bf305289ce0aca4e3c4cbf0
kubernetes-server-linux-arm.tar.gz 7751c9d6f13944748d4ee514afa53a8c6e897a68edfa0441198d31860fb8b131343e05b9e4da2a234b088429e27e147908e3adcf4ab9a89f6eb3d19dda385465
kubernetes-server-linux-arm64.tar.gz 37b29b0742e1d2c83d2003282f9b0e9fec066dda2b463cc365e66ef69ecaec80404ca0a340fda3c62e324f088f8041abbec35a57ad20d2020f4715a59aa18ce8
kubernetes-server-linux-ppc64le.tar.gz 383a2023249542c75d8ab19e53ae9b27369a55ec81551103ae0e126a761f3e4dd76cbc904961f7ae34e03d3466df8edf66da479cacdded2c7463fdeee9e4fc08
kubernetes-server-linux-s390x.tar.gz aa63b5eeffec85c2e3ba58eb6c92bdb24d65fe6f987be5d0db2f24a4538a2d3fa4876d6e6f7456cd8ec88c93ab63a0d45385fc1b919cd70f34741a70a8dbd0aa

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz fcaea8d5a89ee29e52f59157d746f469078471b316b71e28197986ffe07b419d4459dc889faa7897fe34b86d97dd77e7673ba1a348730d68012e703c5e6e6114
kubernetes-node-linux-arm.tar.gz b6fe554a7a2d2c2123e9362abaa86f0d4434139d2c1f60c7a47d5ba00afd68e2a2f7d8b29a6ac724d7700606fbd692f91b57c1d6e07828a1bfa82e698fcb2908
kubernetes-node-linux-arm64.tar.gz 5d88c504cae76098783d00d17c684c505774f32941d0be476c68e293ea9baf29248ba4fabe13577b04be14f49fcdf0eb5624a1267e866aa3fe0035144acb88a4
kubernetes-node-linux-ppc64le.tar.gz 2238cb556ea3e8d5fe9b58b7c460331c0c2f1390e894d1cf7dfe5f0d9ce779ca181119283955dff2b8412742b12dee2a2bf4914a388c250b5708c58f35ec8ccf
kubernetes-node-linux-s390x.tar.gz 6780f4b5898cfc3685abb46269349a065d28e91f1f29c993ebc7cd769949f675cc2655cfe9a0b0fc9f2e11bc833582bb48e3b52c1b7e3388fc63278155ebc143
kubernetes-node-windows-amd64.tar.gz 0e5cd07333516f53cf728d9223e82c02bf5a0aa83f45392bbf371a676d422b04cb9a388e255ce346886e75e2cd28331be0fb7ee4babd07ba14205d13ede18351

Changelog since v1.11.4

Other notable changes

  • CVE-2018-1002105: Fix critical security issue in kube-apiserver upgrade request proxy handler (#71411, @liggitt)
  • IPVS proxier mode now support connection based graceful termination. (#66012, @Lion-Wei)
  • Update Cluster Autoscaler to 1.3.4 (#70285, @losipiuk)
  • Fix cluster autoscaler addon permissions so it can access batch/job. (#69858, @losipiuk)
  • Do not remove shutdown nodes from api-server for vSphere. (#70291, @gnufied)
    • Fixes volume detach from shutdown nodes.
  • Enable insertId generation, and update Stackdriver Logging Agent image to 0.5-1.5.36-1-k8s. This help reduce log duplication and guarantee log order. (#68920, @qingling128)
  • fix azure disk attachment error on Linux (#70002, @andyzhangx)
  • GCE/GKE load balancer health check default interval changes from 2 seconds to 8 seconds, unhealthyThreshold to 3. (#70099, @grayluck)
    • Health check parameters are configurable to be bigger than default values.

v1.11.4

Documentation

Downloads for v1.11.4

filename sha512 hash
kubernetes.tar.gz 035d123271ca72372be955631cf106b94b53ba7b6d2242e0111c0557fbe2153d549493e5057f7f16b4e8390ecbd44d86c69d96418496b3898c35265706833faf
kubernetes-src.tar.gz b59a340b0f325649648b0a0e361398f613e093f2b4ba087a8b602fc27888eab013377e3516c8fcd80fc2c069811911b558a4b53f24c5c1c47dd266342dc488cc

Client Binaries

filename sha512 hash
kubernetes-client-darwin-386.tar.gz e1914c95260ad7a2418c68017710941151ef069cb2101e404ef17658585dc6d90e90a7534078fd89cb9f3a3e6681c25b7a8a10f7a8cd3b59408383f8ade9aa26
kubernetes-client-darwin-amd64.tar.gz 145d67df9135acf237f41c48dded2e017943a5806bdd1ecc23c33c35befc354a5cdd009eaa8a25ad871f238db6cfcce1bdc8da682d0263fcff7d99cccd11f61d
kubernetes-client-linux-386.tar.gz 586a48872a8e1082c165cee3168babdf925c9e1b3ee7a1e6f38f85acb863de540929b259a19df6122168e0122d7943c60b25ec7ab1fc39a5bebbb451ed57954a
kubernetes-client-linux-amd64.tar.gz 6d9060ab605c3c86dafd40dbfcb25e4f2d8c2a0d4770ab949f57c96a74cdc4ac98c543d0171cab276b88680c0f18eb4acb33689a94a7648c2053ada41233f37b
kubernetes-client-linux-arm.tar.gz 7c12e679f13c6a11ed05df0e4204862a7db3bbf273e5e837eeb59c656c945089a89da01788dd977f735a17f6d541a70f0612520163e9d5431031c04609c88a24
kubernetes-client-linux-arm64.tar.gz 662a33a7f00eb3bb607bfcbd3f599e6a378c9e9e32fe7b4bb697b5858b8cad499f228d80ac0d3dfe93050b808a8adfea4ac3d99d16fdac01020152e449f02370
kubernetes-client-linux-ppc64le.tar.gz 64f07ac851068fa5c784ed9e66551016b9f5436663e2a98a3b07734ecf98a7fea0482a701114e8bc9d1e04f8a122ed047d0049242f790efbf47726a03a22f578
kubernetes-client-linux-s390x.tar.gz bc72689bd75b65820097d640cb3e26fcbf95600438cf9486265b209cd82b16ec742bb96a95d788eab6b483a48f81d8a56962f19e2c8365e0289d87414217e4f2
kubernetes-client-windows-386.tar.gz d5d41f4f70d6e9be229c1c00eb4184d5cd14f9eec78e5ea65481e81d51d4a09ead1b6ae739d385517a901d901a8f06e2fc9f632c1b1766a22a43d8ea535a3ea4
kubernetes-client-windows-amd64.tar.gz 12ef0cc939f6ff834c7e8f4b2a6e441cd5c50aa7a10e3b3545c116c07feb67f1b98f8f56c8aa01b70bd195e59e46be627f3087dfaf7d8d6861cb80304b69676d

Server Binaries

filename sha512 hash
kubernetes-server-linux-amd64.tar.gz 58d22b0c5339d75ef72266c3922ad3c44690ef937703653a966379c6791d527a0d66318b78deb135232b88eee30f8f06d085306df3ea0d08f6625fedc4bb7407
kubernetes-server-linux-arm.tar.gz a1ad67cf28c5d583f103a89070e76f210bdd193b16a7b505b4a2d5d9a9218638af340424dc670e2fbab3c9c3cc55910ea5ab57081c36e34afd6f32102673d6e4
kubernetes-server-linux-arm64.tar.gz 25f544e2834dc2c12f1e22cffb8becbbffae37ffb36232d3100d5944e0d09eb0a25587301c49a9ac86b1c69a99936df1164abb6a85e091559f1df0a5a1134c9b
kubernetes-server-linux-ppc64le.tar.gz 07089eae49a3fc7a368ac8e084041cc28102de2fd3c5fc7354aea14d6f2283d64905eaf109f4e5c9f3ab6cbc5cf71897815fa130de6abf7ee8f11a20d1516378
kubernetes-server-linux-s390x.tar.gz ed4ec0353218e6846cf9e5a6509148cb6ba08c131d48dca8e2bb618eec3fbe3a83bc631696b479bfa8870bfa23abb14fa1b1086ec7d0ba0c7b83daf284c3798c

Node Binaries

filename sha512 hash
kubernetes-node-linux-amd64.tar.gz 43865ed40735aaa36ca8536596972f0b98d238df8f22d22184c9a585d7aedd223b56cabc942f1cb9a3b03d8006f9692a048ccd9e1e85e5184608a5927374ce94
kubernetes-node-linux-arm.tar.gz 453d709310cad4def41d31583c8bb27090e2599befb28974e00fc40886a76ad42c618527be7c496a5b7e0aff71a1e0c044a3628fe428989b56823210a81ed371
kubernetes-node-linux-arm64.tar.gz 0975e8023b4e53b439b20e97378883b1e7c60f451ac853346a3fa6de9ca5186fb0fc1cf8a40874f9ff33cc3fa48be3c279abe1c55cd5a0f726b25f0942e40be0
kubernetes-node-linux-ppc64le.tar.gz 9f3e615e4422c4ffaaf4c583b0f5bbaf45ecc38c678f08621391e1bbb1d370f101f03e55c7585a7ede276ac3e0cd57bddfdaf036a75a5fe1db30c6aaf5fec117
kubernetes-node-linux-s390x.tar.gz 513125ab48ff96e632e17fe15b0e1eadbb77ae1ee19f91089e1f93403771c6b6a59c86a2d42dea4516409116a88db15335f969e27f82a9c761dc2579cee7515c
kubernetes-node-windows-amd64.tar.gz 5826b54be51abc9f874e79347677579fb68d9664e7b058851dbd057640b72bdcbe58cb48167c20eb6d8f3ac559c2b361564c15661c2ee01b22dc8323ce228b41

Changelog since v1.11.3

Other notable changes

  • support cross resource group for azure file (#68117, @andyzhangx)
  • change default azure file mount permission to 0777 (#69854, @andyzhangx)
  • Scheduling conformance tests related to daemonsets should set the annotation that relaxes node selection restrictions, if any are set. This ensures conformance tests can run on a wider array of clusters. (#68793, @aveshagarwal)
  • Add tolerations for Stackdriver Logging and Metadata Agents. (#69737, @qingling128)
  • Fix scheduler crashes when Prioritize Map function returns error. (#69618, @DylanBLE)
  • Add fallbacks to ARM API when getting empty node IP from Azure IMDS (#69077, @feiskyer)
  • Verify invalid secret/configmap/projected volumes before calling setup (#68691, @gnufied)
  • Immediately close the other side of the connection when proxying. (#67288, @MHBauer)
  • fix a bug that overwhelming number of prometheus metrics are generated because $NAMESPACE is not replaced by string "{namespace}" (#68530, @wenjiaswe)
  • locking fix in vSphere cleanup function (#68388, @wgliang)
    • The vSphere cloud provider has a cleanup function with a loop,
    • inside of which a write lock was intended to prevent races against
    • VM creation, but the usage of the sync.RWMutex type is incorrect,
    • plus is placed in a defer call so the locking is effectively
    • nonexistent. This patch adds an anonymous function call inside
    • the loop to correctly handle acquiring the write lock with deferred
    • unlock to run at that function's completion, following the normal
    • golang lock/deferred-unlock pattern.
  • fix UnmountDevice failure on Windows (#68608, @andyzhangx)
  • Get public IP for Azure vmss nodes. (#68498, @feiskyer)
  • Role, ClusterRole and their bindings for cloud-provider is put under system namespace. Their addonmanager mode switches to EnsureExists. (#67224, @grayluck)
  • Bump up version number of debian-base, debian-hyperkube-base and debian-iptables. (#67026, @satyasm)
    • Also updates dependencies of users of debian-base.
    • debian-base version 0.3.1 is already available.
  • Update debian-iptables and hyperkube-base images to include CVE fixes. (#67365, @ixdy)
  • Support configuring the Azure load balancer idle connection timeout for services (#66045, @cpuguy83)
  • Let service controller retry creating load balancer when persistUpdate failed due to conflict. (#68087, @grayluck)
  • Return apiserver panics as 500 errors instead terminating the apiserver process. (#68001, @sttts)
  • adjusted http/2 buffer sizes for apiservers to prevent starvation issues between concurrent streams (#67902, @liggitt)
  • Reduced excessive logging from fluentd-gcp-scaler. (#68837, @x13n)
  • Fix potential panic when getting azure load balancer status (#68609, @feiskyer)
  • Fix an issue where filesystems are not unmounted when a backend is not reachable and returns EIO. (#67097, @chakri-nelluri)
  • [GCE] Enable by default audit logging truncating backend. (#68342, @loburm)
  • [fluentd-gcp-scaler addon] Bump fluentd-gcp-scaler to 0.4 to pick up security fixes. (#67691, @loburm)
    • [prometheus-to-sd addon] Bump prometheus-to-sd to 0.3.1 to pick up security fixes, bug fixes and new features.
    • [event-exporter addon] Bump event-exporter to 0.2.3 to pick up security fixes.
  • [GCP] Added env variables to control CPU requests of kube-controller-manager and kube-scheduler. (#68823, @loburm)
  • Update Cluster Autoscaler to version 1.3.3. (#68936, @losipiuk)
  • Bump addon-manager to v8.7 (#68299, @MrHohn)
      • Support extra --prune-whitelist resources in kube-addon-manager.
      • Update kubectl to v1.10.7.
  • Support extra --prune-whitelist resources in kube-addon-manager. (#67743, @Random-Liu)
    • Before, when users run admission webhook as an addon pod, after they remove the webhook, kube-addon-manager won't cleanup the webhook configuration MutatingWebhookConfiguration/ValidationWebhookConfiguration, because those resources are not prune-whitelisted. Cluster will go into a bad state that no pod can be admitted.
    • With this feature, users can config kube-addon-manager to whitelist those resources to fix this issue.
  • Bump ip-masq-agent to v2.1.1 (#67916, @MrHohn)
      • Update debian-iptables image for CVEs.
      • Change chain name to IP-MASQ to be compatible with the
    • pre-injected masquerade rules.
  • If TaintNodesByCondition is enabled, add node.kubernetes.io/unschedulable and node.kubernetes.io/network-unavailable automatically to DaemonSet pods. (#64954, @k82cn)
  • Fix VMWare VM freezing bug by reverting #51066 (#67825, @nikopen)

v1.11.3

Documentation & Examples

Downloads for v1.11.3

filename sha256 hash
kubernetes.tar.gz 032fd2483176aea999cc92a455676cf1dbf70538e916fedaa6b851b50c6009c3
kubernetes-src.tar.gz bbb1541985eaa3d2ccb5d627196423298e3a2581adb21f0aa3c8650691780e3f

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 983ad8892a392373009fef3aee823aec5c23bec789eb386e889aa5163b887b27
kubernetes-client-darwin-amd64.tar.gz 8e4b0f9cc1918e22c44468c667b2a362d933216ae37cc4d9e770a3e5c8d0ea35
kubernetes-client-linux-386.tar.gz 48ae3e0c9ce4b6964abe5a93cc0677f39e7e23f2ae09ff965e5fb8a807ab930f
kubernetes-client-linux-amd64.tar.gz 14a70ac05c00fcfd7d632fc9e7a5fbc6615ce1b370bb1a0e506a24972d461493
kubernetes-client-linux-arm.tar.gz c62835797d58b50f19706d897a9106b219f5868b0a6c7bb62c6284f809c01473
kubernetes-client-linux-arm64.tar.gz a43510f821d349519ecba27b24788a0e41eae31d79bc7af73b6132190b0dcce2
kubernetes-client-linux-ppc64le.tar.gz 11aca4d23d16b676576c7a78b4ad444b2b478ff60f7ab8838885d5e2c28836da
kubernetes-client-linux-s390x.tar.gz 1dd9204e91f9865fbf85da90f7afbcca6cf00df145627f7d500d9ec865d67f95
kubernetes-client-windows-386.tar.gz e72c2495f9bf8aff2ee8010125371ed00bb048ebd9d800fe3cd7dabf10c23528
kubernetes-client-windows-amd64.tar.gz d1bd2cf1ef21753d572060882c258b30b286bb4376edc7970b0798b40d5c05e8

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz e49d0db1791555d73add107d2110d54487df538b35b9dde0c5590ac4c5e9e039
kubernetes-server-linux-arm.tar.gz 7b0932dc1c48352fa300b5eec66c2222772c5ccadee2d0187558b55d5c780037
kubernetes-server-linux-arm64.tar.gz 9e89136c2e84f2e5e709b84123166f149babb6c3f17efe5a607f7166c2a5ee79
kubernetes-server-linux-ppc64le.tar.gz ffc9b8eb6e421d64c355629c6e1a9bf775ec11ad89a1817983461dc6821dd308
kubernetes-server-linux-s390x.tar.gz 0dbb55cd80ac62d3c8c9859a1d6cb0b55b04ad4b3a880f0c9ff1f1040db6333b

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 14761794210f7b17a0a51ea9746e55eb1d538c7b86601b98e1df562e68f96024
kubernetes-node-linux-arm.tar.gz 578232ffbd559997b0d8302afbe4ef1f425507c8642f8d72f00f5cb3c07c2655
kubernetes-node-linux-arm64.tar.gz d827b87664c5f6fa627fb1294cb816d5f7bc7a959da659319b51e37f0ece2142
kubernetes-node-linux-ppc64le.tar.gz a60b6deccaa6a25276d7ce9a08a038df0aad8f4566ce05a71f4e084d609e6803
kubernetes-node-linux-s390x.tar.gz 5435a7040f0f289619176625084c8ec7c400481931d18b061a7a2697225fd23d
kubernetes-node-windows-amd64.tar.gz b8c9353388390bf256fb8d3d32cc03cd1828aa5f38f94883d41edaec3de21ae7

Changelog since v1.11.2

Action Required

  • action required: the API server and client-go libraries have been fixed to support additional non-alpha-numeric characters in UserInfo "extra" data keys. Both should be updated in order to properly support extra data containing "/" characters or other characters disallowed in HTTP headers. (#65799, @dekkagaijin)

Other notable changes

  • Orphan DaemonSet when deleting with --cascade option set (#68007, @soltysh)
  • Bump event-exporter to 0.2.2 to pick up security fixes. (#66157, @loburm)
  • PVC may not be synced to controller local cache in time if PV is bound by external PV binder (e.g. kube-scheduler), double check if PVC is not found to prevent reclaiming PV wrongly. (#67062, @cofyc)
  • kube-apiserver: fixes error creating system priority classes when starting multiple apiservers simultaneously (#67372, @tanshanshan)
  • Add NoSchedule/NoExecute tolerations to ip-masq-agent, ensuring it to be scheduled in all nodes except master. (#66260, @tanshanshan)
  • Prevent resourceVersion updates for custom resources on no-op writes. (#67562, @nikhita)
  • fix cluster-info dump error (#66652, @charrywanganthony)
  • attachdetach controller attaches volumes immediately when Pod's PVCs are bound (#66863, @cofyc)
  • kube-apiserver now includes all registered API groups in discovery, including registered extension API group/versions for unavailable extension API servers. (#66932, @nilebox)
  • fixes an issue with multi-line annotations injected via downward API files getting scrambled (#65992, @liggitt)
  • Revert #63905: Setup dns servers and search domains for Windows Pods. DNS for Windows containers will be set by CNI plugins. (#66587, @feiskyer)
  • Fix an issue that pods using hostNetwork keep increasing. (#67456, @Huang-Wei)
  • Bump Heapster to v1.6.0-beta.1 (#67074, @kawych)
  • fix azure disk create failure due to sdk upgrade (#67236, @andyzhangx)
  • Fix creation of custom resources when the CRD contains non-conventional pluralization and subresources (#66249, @deads2k)
  • Allows extension API server to dynamically discover the requestheader CA certificate when the core API server doesn't use certificate based authentication for it's clients (#66394, @rtripat)

v1.11.2

Documentation

Downloads for v1.11.2

filename sha256 hash
kubernetes.tar.gz deaabdab00003ef97309cde188a61db8c2737721efeb75f7b19c6240863d9cbe
kubernetes-src.tar.gz 7d98defe2eb909bc5ebcbddd8d55ffaa902d5d3c76d9e42fe0a092c341016a6e

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz bee271bf7b251428fe5cf21fd586cc43dfd2c842932f4d9e0b1b549546dc7a2a
kubernetes-client-darwin-amd64.tar.gz fc1d506c63b48997100aa6099b5d1b019dcd41bb962805f34273ada9a6b2252c
kubernetes-client-linux-386.tar.gz bc7d637eff280bacf2059a487ca374169e63cf311808eb8e8b7504fc8a28a07d
kubernetes-client-linux-amd64.tar.gz f7444a2200092ca6b4cd92408810ae88506fb7a27f762298fafb009b031250e3
kubernetes-client-linux-arm.tar.gz d976e2ca975d5142364df996e4e9597817b65ab6bd0212bde807ec82f7345879
kubernetes-client-linux-arm64.tar.gz 7641599ee2d8743f861ff723cf54d3f01732f354729f4c8c101cad5ceeeb0e62
kubernetes-client-linux-ppc64le.tar.gz ceea9bb4f218b3cd7346b44c56ffc7113540ceb1eb59e34df503b281722516a9
kubernetes-client-linux-s390x.tar.gz e1b3ae15e84c8f911537c5e8af0d79d5187ded344fc3330e9d43f22dff3073bb
kubernetes-client-windows-386.tar.gz 5ea3c0aba710df3c95bb59621c8b220989ac45698b5268a75b17144d361d338c
kubernetes-client-windows-amd64.tar.gz 0499fe3b55fa6252c6c3611c3b22e8f65bf3d2aebcde7b847f7572a539ac9d70

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 1323f4d58522e4480641948299f4804e09c20357682bc12d547f78a60c920836
kubernetes-server-linux-arm.tar.gz a0d145a1794da4ae1018ad2b14c74e564be3c0c13514a3ed32c6177723d2e41f
kubernetes-server-linux-arm64.tar.gz 8f4419ec15470e450094b24299ecae21eb59fc8308009b5b726b98730f7e13a2
kubernetes-server-linux-ppc64le.tar.gz e40aebbaa17976699125913fd6a7d8b66ab343e02c7da674bd4256d1de029950
kubernetes-server-linux-s390x.tar.gz 924d2b177e3646be59f6411b574d99e32ca74e5b7419e12e8642bc085d735560

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz d254aa910a0dc47e587bec5a5fa8544c743835ba6d9ca5627d9d11a2df90c561
kubernetes-node-linux-arm.tar.gz d1104c040efbdca831d5af584ad1482a2ade883af198aefef99ad1884794cefd
kubernetes-node-linux-arm64.tar.gz c983f7e35aaee922865ab5d4d7893f168e026c3216dbc87658ce1bf6d8e67e06
kubernetes-node-linux-ppc64le.tar.gz b8f784a4b142450bb990ab80a76950c8816e96e4b6e15134d0af5bd48f62c9f3
kubernetes-node-linux-s390x.tar.gz b541c476b797f346b5ea68437904995c02d55e089433bdca6fd40531034fc838
kubernetes-node-windows-amd64.tar.gz c3e91f4b30b801cc942bd0f160dc1afd01bebc3d2f11e69f373b1116409ffb44

Changelog since v1.11.1

Action Required

Other notable changes

  • Metadata Agent Improvements (#66485, @bmoyles0117)
    • Bump metadata agent version to 0.2-0.0.21-1.
    • Expand the metadata agent's access to all API groups.
    • Remove metadata agent config maps in favor of command line flags.
    • Update the metadata agent's liveness probe to a new /healthz handler.
    • Logging Agent Improvements
    • Bump logging agent version to 0.2-1.5.33-1-k8s-1.
    • Appropriately set log severity for k8s_container.
    • Fix detect exceptions plugin to analyze message field instead of log field.
    • Fix detect exceptions plugin to analyze streams based on local resource id.
    • Disable the metadata agent for monitored resource construction in logging.
    • Disable timestamp adjustment in logs to optimize performance.
    • Reduce logging agent buffer chunk limit to 512k to optimize performance.
  • Fix a bug on GCE that /etc/crictl.yaml is not generated when crictl is preloaded. (#66877, @Random-Liu)
  • Fix validation for HealthzBindAddress in kube-proxy when --healthz-port is set to 0 (#66138, @wsong)
  • fix acr could not be listed in sp issue (#66429, @andyzhangx)
  • Fixed an issue which prevented gcloud from working on GCE when metadata concealment was enabled. (#66630, @dekkagaijin)
  • Fix for resourcepool-path configuration in the vsphere.conf file. (#66261, @divyenpatel)
  • This fix prevents a GCE PD volume from being mounted if the udev device link is stale and tries to correct the link. (#66832, @msau42)
  • Fix kubelet startup failure when using ExecPlugin in kubeconfig (#66395, @awly)
  • GCE: Fixes loadbalancer creation and deletion issues appearing in 1.10.5. (#66400, @nicksardo)
  • kubeadm: Pull sidecar and dnsmasq-nanny images when using kube-dns (#66499, @rosti)
  • fix smb mount issue (#65751, @andyzhangx)
  • Extend TLS timeouts to work around slow arm64 math/big (#66264, @joejulian)
  • Allow ScaleIO volumes to be provisioned without having to first manually create /dev/disk/by-id path on each kubernetes node (if not already present) (#66174, @ddebroy)
  • kubeadm: stop setting UID in the kubelet ConfigMap (#66341, @runiq)
  • fixes a panic when using a mutating webhook admission plugin with a DELETE operation (#66425, @liggitt)
  • Update crictl to v1.11.1. (#66152, @Random-Liu)
  • kubectl: fixes a panic displaying pods with nominatedNodeName set (#66406, @liggitt)
  • fixes a validation error that could prevent updates to StatefulSet objects containing non-normalized resource requests (#66165, @liggitt)
  • Tolerate missing watch permission when deleting a resource (#65370, @deads2k)
  • prevents infinite CLI wait on delete when item is recreated (#66136, @deads2k)
  • Preserve vmUUID when renewing nodeinfo in vSphere cloud provider (#66007, @w-leads)

v1.11.1

Documentation

Downloads for v1.11.1

filename sha256 hash
kubernetes.tar.gz 77d93c4ab10b1c4421835ebf3c81dc9c6d2a798949ee9132418e24d500c22d6e
kubernetes-src.tar.gz e597a3a73f4c4933e9fb145d398adfc4e245e4465bbea50b0e55c78d2b0e70ef

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz d668a91a52ad9c0a95a94172f89b42b42ca8f9eafe4ac479a97fe2e11f5dbd8e
kubernetes-client-darwin-amd64.tar.gz 5d6ce0f956b789840baf207b6d2bb252a4f8f0eaf6981207eb7df25e39871452
kubernetes-client-linux-386.tar.gz 1e47c66db3b7a194327f1d3082b657140d4cfee09eb03162a658d0604c31028e
kubernetes-client-linux-amd64.tar.gz a6c7537434fedde75fb77c593b2d2978be1aed00896a354120c5b7164e54aa99
kubernetes-client-linux-arm.tar.gz 6eed4c3f11eb844947344e283482eeeb38a4b59eb8e24174fb706e997945ce12
kubernetes-client-linux-arm64.tar.gz c260ee179420ce396ab972ab1252a26431c50b5412de2466ede1fb506d5587af
kubernetes-client-linux-ppc64le.tar.gz 01ec89ebbeb2b673504bb629e6a20793c31e29fc9b96100796533c391f3b13f2
kubernetes-client-linux-s390x.tar.gz 28b171b63d5c49d0d64006d331daba0ef6e9e841d69c3588bb3502eb122ef76a
kubernetes-client-windows-386.tar.gz 9ee394cadd909a937aef5c82c3499ae12da226ccbaa21f6d82c4878b7cb31d6c
kubernetes-client-windows-amd64.tar.gz ab2c21e627a2fab52193ad7af0aabc001520975aac35660dc5f857320176e6c4

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz f120baa4b37323a8d7cd6e8027f7b19a544f528d2cae4028366ffbb28dc68d8a
kubernetes-server-linux-arm.tar.gz eac27b81cf2819619fdda54a83f06aecf77aefef1f2f2accd7adcc725cb607ff
kubernetes-server-linux-arm64.tar.gz 25d87248f0da9ba71a4e6c5d1b7af2259ffd43435715d52db6044ebe85466fad
kubernetes-server-linux-ppc64le.tar.gz 7eba9021f93b6f99167cd088933aabbf11d5a6f990d796fc1b884ed97e066a3b
kubernetes-server-linux-s390x.tar.gz 144fa932ab4bea9e810958dd859fdf9b11a9f90918c22b2c9322b6c21b5c82ed

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 45fae35f7c3b23ff8557dcf638eb631dabbcc46a804534ca9d1043d846ec4408
kubernetes-node-linux-arm.tar.gz 19c29a635807979a87dcac610f79373df8ee90de823cf095362dcca086844831
kubernetes-node-linux-arm64.tar.gz 35b9a5fa8671c46b9c175a4920dce269fccf84b1defdbccb24e76c4eab9fb255
kubernetes-node-linux-ppc64le.tar.gz b4a111ee652b42c9d92288d4d86f4897af524537b9409b1f5cedefb4122bb2d6
kubernetes-node-linux-s390x.tar.gz 4730b9d81cdde078c17c0831b1b20eeda65f4df37e0f595accc63bd2c1635bae
kubernetes-node-windows-amd64.tar.gz d7fdf0341efe3d6a80a295aae19874a4099644c7ddba5fa34bee3a6924e0840b

Changelog since v1.11.0

Action Required

  • ACTION REQUIRED: Removes defaulting of CSI file system type to ext4. All the production drivers listed under https://kubernetes-csi.github.io/docs/Drivers.html were inspected and should not be impacted after this change. If you are using a driver not in that list, please test the drivers on an updated test cluster first. ``` (#65499, @krunaljain)
  • kube-apiserver: the Priority admission plugin is now enabled by default when using --enable-admission-plugins. If using --admission-control to fully specify the set of admission plugins, the Priority admission plugin should be added if using the PodPriority feature, which is enabled by default in 1.11. (#65739, @liggitt)
  • The system-node-critical and system-cluster-critical priority classes are now limited to the kube-system namespace by the PodPriority admission plugin. (#65593, @bsalamat)

Other notable changes

  • kubeadm: run kube-proxy on non-master tainted nodes (#65931, @neolit123)
  • Fix an issue with dropped audit logs, when truncating and batch backends enabled at the same time. (#65823, @loburm)
  • set EnableHTTPSTrafficOnly in azure storage account creation (#64957, @andyzhangx)
  • Re-adds pkg/generated/bindata.go to the repository to allow some parts of k8s.io/kubernetes to be go-vendorable. (#65985, @ixdy)
  • Fix a scalability issue where high rates of event writes degraded etcd performance. (#64539, @ccding)
  • "kubectl delete" no longer waits for dependent objects to be deleted when removing parent resources (#65908, @juanvallejo)
  • Update to use go1.10.3 (#65726, @ixdy)
  • Fix the bug where image garbage collection is disabled by mistake. (#66051, @jiaxuanzhou)
  • Fix RunAsGroup which doesn't work since 1.10. (#65926, @Random-Liu)
  • Fixed cleanup of CSI metadata files. (#65323, @jsafrane)
  • Reload systemd config files before starting kubelet. (#65702, @mborsz)
  • Fix a bug that preempting a pod may block forever. (#65987, @Random-Liu)
  • fixes a regression in kubectl printing behavior when using go-template or jsonpath output that resulted in a "unable to match a printer" error message (#65979, @juanvallejo)
  • add external resource group support for azure disk (#64427, @andyzhangx)
  • Properly manage security groups for loadbalancer services on OpenStack. (#65373, @multi-io)
  • Allow access to ClusterIP from the host network namespace when kube-proxy is started in IPVS mode without either masqueradeAll or clusterCIDR flags (#65388, @lbernail)
  • kubeadm: Fix pause image to not use architecture, as it is a manifest list (#65920, @dims)
  • bazel deb package bugfix: The kubeadm deb package now reloads the kubelet after installation (#65554, @rdodev)
  • The garbage collector now supports CustomResourceDefinitions and APIServices. (#65915, @nikhita)
  • fix azure storage account creation failure (#65846, @andyzhangx)
  • skip nodes that have a primary NIC in a 'Failed' provisioningState (#65412, @yastij)
  • Fix 'kubectl cp' with no arguments causes a panic (#65482, @wgliang)
  • On COS, NPD creates a node condition for frequent occurrences of unregister_netdevice (#65342, @dashpole)
  • bugfix: Do not print feature gates in the generic apiserver code for glog level 0 (#65584, @neolit123)
  • Add prometheus scrape port to CoreDNS service (#65589, @rajansandeep)
  • kubectl: fixes a regression with --use-openapi-print-columns that would not print object contents (#65600, @liggitt)
  • fixes an out of range panic in the NoExecuteTaintManager controller when running a non-64-bit build (#65596, @liggitt)
  • Fixed issue 63608, which is that under rare circumstances the ResourceQuota admission controller could lose track of an request in progress and time out after waiting 10 seconds for a decision to be made. (#64598, @MikeSpreitzer)

v1.11.0

Documentation

Downloads for v1.11.0

filename sha256 hash
kubernetes.tar.gz 3c779492574a5d8ce702d89915184f5dd52280da909abf134232e5ab00b4a885
kubernetes-src.tar.gz f0b2d8e61860acaf50a9bae0dc36b8bfdb4bb41b8d0a1bb5a9bc3d87aad3b794

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 196738ef058510438b3129f0a72544544b7d52a8732948b4f9358781f87dab59
kubernetes-client-darwin-amd64.tar.gz 9ec8357b10b79f8fd87f3a836879d0a4bb46fb70adbb82f1e34dc7e91d74999f
kubernetes-client-linux-386.tar.gz e8ee8a965d3ea241d9768b9ac868ecbbee112ef45038ff219e4006fa7f4ab4e2
kubernetes-client-linux-amd64.tar.gz d31377c92b4cc9b3da086bc1974cbf57b0d2c2b22ae789ba84cf1b7554ea7067
kubernetes-client-linux-arm.tar.gz 9e9da909293a4682a5d6270a39894b056b3e901532b15eb8fdc0814a8d628d65
kubernetes-client-linux-arm64.tar.gz 149df9daac3e596042f5759977f9f9299a397130d9dddc2d4a2b513dd64f1092
kubernetes-client-linux-ppc64le.tar.gz ff3d3e4714406d92e9a2b7ef2887519800b89f6592a756524f7a37dc48057f44
kubernetes-client-linux-s390x.tar.gz e5a39bdc1e474d9d00974a81101e043aaff37c30c1418fb85a0c2561465e14c7
kubernetes-client-windows-386.tar.gz 4ba1102a33c6d4df650c4864a118f99a9882021fea6f250a35f4b4f4a2d68eaa
kubernetes-client-windows-amd64.tar.gz 0bb74af7358f9a2f4139ed1c10716a2f5f0c1c13ab3af71a0621a1983233c8d7

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz b8a8a88afd8a40871749b2362dbb21295c6a9c0a85b6fc87e7febea1688eb99e
kubernetes-server-linux-arm.tar.gz 88b9168013bb07a7e17ddc0638e7d36bcd2984d049a50a96f54cb4218647d8da
kubernetes-server-linux-arm64.tar.gz 12fab9e9f0e032f278c0e114c72ea01899a0430fc772401f23e26de306e0f59f
kubernetes-server-linux-ppc64le.tar.gz 6616d726a651e733cfd4cccd78bfdc1d421c4a446edf4b617b8fd8f5e21f073e
kubernetes-server-linux-s390x.tar.gz 291838980929c8073ac592219d9576c84a9bdf233585966c81a380c3d753316e

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz b23e905efb828fdffc4efc208f7343236b22c964e408fe889f529502aed4a335
kubernetes-node-linux-arm.tar.gz 44bf8973581887a2edd33eb637407e76dc0dc3a5abcc2ff04aec8338b533156d
kubernetes-node-linux-arm64.tar.gz 51e481c782233b46ee21e9635c7d8c2a84450cbe30d7b1cbe5c5982b33f40b13
kubernetes-node-linux-ppc64le.tar.gz d1a3feda31a954d3a83193a51a117873b6ef9f8acc3e10b3f1504fece91f2eb8
kubernetes-node-linux-s390x.tar.gz 0ad76c6e6aef670c215256803b3b0d19f4730a0843429951c6421564c73d4932
kubernetes-node-windows-amd64.tar.gz 8ad26200ed40d40a1b78d7a5dbe56220f0813d31194f40f267b476499fe2c5c3

Kubernetes 1.11 Release Notes

Urgent Upgrade Notes

(No, really, you MUST do this before you upgrade)

Before upgrading to Kubernetes 1.11, you must keep the following in mind:

  • JSON configuration files that contain fields with incorrect case will no longer be valid. You must correct these files before upgrading. When specifying keys in JSON resource definitions during direct API server communication, the keys are case-sensitive. A bug introduced in Kubernetes 1.8 caused the API server to accept a request with incorrect case and coerce it to correct case, but this behaviour has been fixed in 1.11 and the API server will once again be enforcing the correct case. It’s worth noting that during this time, the kubectl tool continued to enforce case-sensitive keys, so users that strictly manage resources with kubectl will be unaffected by this change. (#65034, @caesarxuchao)
  • Pod priority and preemption is now enabled by default. Note that this means that pods from any namespace can now request priority classes that compete with and/or cause preemption of critical system pods that are already running. If that is not desired, disable the PodPriority feature by setting --feature-gates=PodPriority=false on the kube-apiserver, kube-scheduler, and kubelet components before upgrading to 1.11. Disabling the PodPriority feature limits critical pods to the kube-system namespace.

Major Themes

SIG API Machinery

This release SIG API Machinery focused mainly on CustomResources. For example, subresources for CustomResources are now beta and enabled by default. With this, updates to the /status subresource will disallow updates to all fields other than .status (not just .spec and .metadata as before). Also, required and description can be used at the root of the CRD OpenAPI validation schema when the /status subresource is enabled.

In addition, users can now create multiple versions of CustomResourceDefinitions, but without any kind of automatic conversion, and CustomResourceDefinitions now allow specification of additional columns for kubectl get output via the spec.additionalPrinterColumns field.

SIG Auth

Work this cycle focused on graduating existing functions, and on making security functions more understandable for users.

RBAC cluster role aggregation, introduced in 1.9, graduated to stable status with no changes in 1.11, and client-go credential plugins graduated to beta status, while also adding support for obtaining TLS credentials from an external plugin.

Kubernetes 1.11 also makes it easier to see what's happening, as audit events can now be annotated with information about how an API request was handled:

  • Authorization sets authorization.k8s.io/decision and authorization.k8s.io/reason annotations with the authorization decision ("allow" or "forbid") and a human-readable description of why the decision was made (for example, RBAC includes the name of the role/binding/subject which allowed a request).
  • PodSecurityPolicy admission sets podsecuritypolicy.admission.k8s.io/admit-policy and podsecuritypolicy.admission.k8s.io/validate-policy annotations containing the name of the policy that allowed a pod to be admitted. (PodSecurityPolicy also gained the ability to limit hostPath volume mounts to be read-only.)

In addition, the NodeRestriction admission plugin now prevents kubelets from modifying taints on their Node API objects, making it easier to keep track of which nodes should be in use.

SIG CLI

SIG CLI's main focus this release was on refactoring kubectl internals to improve composability, readability and testability of kubectl commands. Those refactors will allow the team to extract a mechanism for extensibility of kubectl -- that is, plugins -- in the next releases.

SIG Cluster Lifecycle

SIG Cluster Lifecycle focused on improving kubeadm’s user experience by including a set of new commands related to maintaining the kubeadm configuration file, the API version of which has now has been incremented to v1alpha2. These commands can handle the migration of the configuration to a newer version, printing the default configuration, and listing and pulling the required container images for bootstrapping a cluster.

Other notable changes include:

  • CoreDNS replaces kube-dns as the default DNS provider
  • Improved user experience for environments without a public internet connection and users using other CRI runtimes than Docker
  • Support for structured configuration for the kubelet, which avoids the need to modify the systemd drop-in file
  • Many improvements to the upgrade process and other bug fixes

SIG Instrumentation

As far as Sig Instrumentation, the major change in Kubernetes 1.11 is the deprecation of Heapster as part of ongoing efforts to move to the new Kubernetes monitoring model. Clusters still using Heapster for autoscaling should be migrated over to metrics-server and the custom metrics API. See the deprecation section for more information.

SIG Network

The main milestones for SIG Network this release are the graduation of IPVS-based load balancing and CoreDNS to general availability.

IPVS is an alternative approach to in-cluster load balancing that uses in-kernel hash tables rather than the previous iptables approach, while CoreDNS is a replacement for kube-dns for service discovery.

SIG Node

SIG-Node advanced several features and made incremental improvements in a few key topic areas this release.

The dynamic kubelet config feature graduated to beta, so it is enabled by default, simplifying management of the node object itself. Kubelets that are configured to work with the CRI may take advantage of the log rotation feature, which is graduating to beta this release.

The cri-tools project, which aims to provide consistent tooling for operators to debug and introspect their nodes in production independent of their chosen container runtime, graduated to GA.

As far as platforms, working with SIG-Windows, enhancements were made to the kubelet to improve platform support on Windows operating systems, and improvements to resource management were also made. In particular, support for sysctls on Linux graduated to beta.

SIG OpenStack

SIG-OpenStack continued to build out testing, with eleven acceptance tests covering a wide-range of scenarios and use-cases. During the 1.11 cycle our reporting back to test-grid has qualified the OpenStack cloud provider as a gating job for the Kubernetes release.

New features include improved integration between the Keystone service and Kubernetes RBAC, and a number of stability and compatibility improvements across the entire provider code-base.

SIG Scheduling

Pod Priority and Preemption has graduated to Beta, so it is enabled by default. Note that this involves significant and important changes for operators. The team also worked on improved performance and reliability of the scheduler.

SIG Storage

Sig Storage graduated two features that had been introduced in previous versions and introduced three new features in an alpha state.

The StorageProtection feature, which prevents deletion of PVCs while Pods are still using them and of PVs while still bound to a PVC, is now generally available, and volume resizing, which lets you increase size of a volume after a Pod restarts is now beta, which means it is on by default.

New alpha features include:

  • Online volume resizing will increase the filesystem size of a resized volume without requiring a Pod restart.
  • AWS EBS and GCE PD volumes support increased limits on the maximum number of attached volumes per node.
  • Subpath volume directories can be created using DownwardAPI environment variables.

SIG Windows

This release supports more of Kubernetes API for pods and containers on Windows, including:

  • Metrics for Pod, Container, Log filesystem
  • The run_as_user security contexts
  • Local persistent volumes and fstype for Azure disk

Improvements in Windows Server version 1803 also bring new storage functionality to Kubernetes v1.11, including:

  • Volume mounts for ConfigMap and Secret
  • Flexvolume plugins for SMB and iSCSI storage are also available out-of-tree at Microsoft/K8s-Storage-Plugins

Known Issues

  • IPVS based kube-proxy doesn't support graceful close connections for terminating pod. This issue will be fixed in a future release. (#57841, @jsravn)
  • kube-proxy needs to be configured to override hostname in some environments. (#857, @detiber)
  • There's a known issue where the Vertical Pod Autoscaler will radically change implementation in 1.12, so users of VPA (alpha) in 1.11 are warned that they will not be able to automatically migrate their VPA configs from 1.11 to 1.12.

Before Upgrading

  • When Response is a metav1.Status, it is no longer copied into the audit.Event status. Only the "status", "reason" and "code" fields are set. For example, when we run kubectl get pods abc, the API Server returns a status object: {"kind":"Status","apiVersion":"v1","metadata":{},"status":"Failure","message":"pods \"abc\" not found","reason":"NotFound","details":{"name":"abc","kind":"pods"},"code":404} In previous versions, the whole object was logged in audit events. Starting in 1.11, only status, reason, and code are logged. Code that relies on the older version must be updated to avoid errors. (#62695, @CaoShuFeng)
  • HTTP transport now uses context.Context to cancel dial operations. k8s.io/client-go/transport/Config struct has been updated to accept a function with a context.Context parameter. This is a breaking change if you use this field in your code. (#60012, @ash2k)
  • kubectl: This client version requires the apps/v1 APIs, so it will not work against a cluster version older than v1.9.0. Note that kubectl only guarantees compatibility with clusters that are +/-1 minor version away. (#61419, @enisoc)
  • Pod priority and preemption is now enabled by default. Even if you don't plan to use this feature, you might need to take some action immediately after upgrading. In multi-tenant clusters where not all users are trusted, you are advised to create appropriate quotas for two default priority classes, system-cluster-critical and system-node-critical, which are added to clusters by default. ResourceQuota should be created to limit users from creating Pods at these priorities if not all users of your cluster are trusted. We do not advise disabling this feature because critical system Pods rely on the scheduler preemption to be scheduled when cluster is under resource pressure.
  • Default mount propagation has changed from HostToContainer ("rslave" in Linux terminology), as it was in 1.10, to None ("private") to match the behavior in 1.9 and earlier releases; HostToContainer as a default caused regressions in some pods. If you are relying on this behavior you will need to set it explicitly. (#62462, @jsafrane)
  • The kube-apiserver --storage-version flag has been removed; you must use --storage-versions instead. (#61453, @hzxuzhonghu)
  • Authors of aggregated API servers must not rely on authorization being done by the kube-apiserver, and must do delegated authorization in addition. (#61349, @sttts)
  • GC is now bound by QPS so if you need more QPS to avoid ratelimiting GC, you'll have to set it explicitly. (#63657, @shyamjvs)
  • kubeadm join is now blocking on the kubelet performing the TLS Bootstrap properly. Earlier, kubeadm join only did the discovery part and exited successfully without checking that the kubelet actually started properly and performed the TLS bootstrap correctly. Now, as kubeadm runs some post-join steps (for example, annotating the Node API object with the CRISocket), kubeadm join is now waiting for the kubelet to perform the TLS Bootstrap, and then uses that credential to perform further actions. This also improves the UX, as kubeadm will exit with a non-zero code if the kubelet isn't in a functional state, instead of pretending everything's fine. (#64792, @luxas)
  • The structure of the kubelet dropin in the kubeadm deb package has changed significantly. Instead of hard-coding the parameters for the kubelet in the dropin, a structured configuration file for the kubelet is used, and is expected to be present in /var/lib/kubelet/config.yaml. For runtime-detected, instance-specific configuration values, a environment file with dynamically-generated flags at kubeadm init or kubeadm join run time is used. Finally, if you want to override something specific for the kubelet that can't be done via the kubeadm Configuration file (which is preferred), you might add flags to the KUBELET_EXTRA_ARGS environment variable in either /etc/default/kubelet or /etc/sysconfig/kubelet, depending on the system you're running on. (#64780, @luxas)
  • The --node-name flag for kubeadm now dictates the Node API object name the kubelet uses for registration, in all cases but where you might use an in-tree cloud provider. If you're not using an in-tree cloud provider, --node-name will set the Node API object name. If you're using an in-tree cloud provider, you MUST make --node-name match the name the in-tree cloud provider decides to use. (#64706, @liztio)
  • The PersistentVolumeLabel admission controller is now disabled by default. If you depend on this feature (AWS/GCE) then ensure it is added to the --enable-admission-plugins flag on the kube-apiserver. (#64326, @andrewsykim)
  • kubeadm: kubelets in kubeadm clusters now disable the readonly port (10255). If you're relying on unauthenticated access to the readonly port, please switch to using the secure port (10250). Instead, you can now use ServiceAccount tokens when talking to the secure port, which will make it easier to get access to, for example, the /metrics endpoint of the kubelet, securely. (#64187, @luxas)
  • The formerly publicly-available cAdvisor web UI that the kubelet ran on port 4194 by default is now turned off by default. The flag configuring what port to run this UI on --cadvisor-port was deprecated in v1.10. Now the default is --cadvisor-port=0, in other words, to not run the web server. If you still need to run cAdvisor, the recommended way to run it is via a DaemonSet. Note that the --cadvisor-port will be removed in v1.12 (#63881, @luxas)

New Deprecations

  • As a reminder, etcd2 as a backend is deprecated and support will be removed in Kubernetes 1.13. Please ensure that your clusters are upgraded to etcd3 as soon as possible.
  • InfluxDB cluster monitoring has been deprecated as part of the deprecation of Heapster. Instead, you may use the metrics server. It's a simplified heapster that is able to gather and serve current metrics values. It provides the Metrics API that is used by kubectl top, and horizontal pod autoscaler. Note that it doesn't include some features of Heapster, such as short term metrics for graphs in kube-dashboard and dedicated push sinks, which proved hard to maintain and scale. Clusters using Heapster for transferring metrics into long-term storage should consider using their metric solution's native Kubernetes support, if present, or should consider alternative solutions. (#62328, @serathius)
  • The kubelet --rotate-certificates flag is now deprecated, and will be removed in a future release. The kubelet certificate rotation feature can now be enabled via the .RotateCertificates field in the kubelet's config file. (#63912, @luxas)
  • The kubeadm configuration file version has been upgraded from v1alpha1 to v1alpha2. v1alpha1 read support exists in v1.11, but will be removed in v1.12. (#63788, @luxas) The following PRs changed the API spec:
    • In the new v1alpha2 kubeadm Configuration API, the .CloudProvider and .PrivilegedPods fields don't exist anymore. Instead, you should use the out-of-tree cloud provider implementations, which are beta in v1.11.
    • If you have to use the legacy in-tree cloud providers, you can rearrange your config like the example below. If you need the cloud-config file (located in {cloud-config-path}), you can mount it into the API Server and controller-manager containers using ExtraVolumes, as in:
kind: MasterConfiguration
apiVersion: kubeadm.k8s.io/v1alpha2
apiServerExtraArgs:
  cloud-provider: "{cloud}"
  cloud-config: "{cloud-config-path}"
apiServerExtraVolumes:
- name: cloud
  hostPath: "{cloud-config-path}"
  mountPath: "{cloud-config-path}"
controllerManagerExtraArgs:
  cloud-provider: "{cloud}"
  cloud-config: "{cloud-config-path}"
controllerManagerExtraVolumes:
- name: cloud
  hostPath: "{cloud-config-path}"
  mountPath: "{cloud-config-path}"
  • If you need to use the .PrivilegedPods functionality, you can still edit the manifests in /etc/kubernetes/manifests/, and set .SecurityContext.Privileged=true for the apiserver and controller manager. (#63866, @luxas)
  • kubeadm: The Token-related fields in the MasterConfiguration object have now been refactored. Instead of the top-level .Token, .TokenTTL, .TokenUsages, .TokenGroups fields, there is now a BootstrapTokens slice of BootstrapToken objects that support the same features under the .Token, .TTL, .Usages, .Groups fields. (#64408, @luxas)
  • .NodeName and .CRISocket in the MasterConfiguration and NodeConfiguration v1alpha1 API objects are now .NodeRegistration.Name and .NodeRegistration.CRISocket respectively in the v1alpha2 API. The .NoTaintMaster field has been removed in the v1alpha2 API. (#64210, @luxas)
  • kubeadm: Support for .AuthorizationModes in the kubeadm v1alpha2 API has been removed. Instead, you can use the .APIServerExtraArgs and .APIServerExtraVolumes fields to achieve the same effect. Files using the v1alpha1 API and setting this field will be automatically upgraded to this v1alpha2 API and the information will be preserved. (#64068, @luxas)
  • The annotation service.alpha.kubernetes.io/tolerate-unready-endpoints is deprecated. Users should use Service.spec.publishNotReadyAddresses instead. (#63742, @thockin)
  • --show-all, which only affected pods, and even then only for human readable/non-API printers, is inert in v1.11, and will be removed in a future release. (#60793, @charrywanganthony)
  • The kubectl rolling-update is now deprecated. Use kubectl rollout instead. (#61285, @soltysh)
  • kube-apiserver: the default --endpoint-reconciler-type is now lease. The master-count endpoint reconciler type is deprecated and will be removed in 1.13. (#63383, @liggitt)
  • OpenStack built-in cloud provider is now deprecated. Please use the external cloud provider for OpenStack. (#63524, @dims)
  • The Kubelet's deprecated --allow-privileged flag now defaults to true. This enables users to stop setting --allow-privileged in order to transition to PodSecurityPolicy. Previously, users had to continue setting --allow-privileged, because the default was false. (#63442, @mtaufen)
  • The old dynamic client has been replaced by a new one. The previous dynamic client will exist for one release in client-go/deprecated-dynamic. Switch as soon as possible. (#63446, @deads2k)
  • In-tree support for openstack credentials is now deprecated. please use the "client-keystone-auth" from the cloud-provider-openstack repository. details on how to use this new capability is documented here (#64346, @dims)
  • The GitRepo volume type is deprecated. To provision a container with a git repo, mount an EmptyDir into an InitContainer that clones the repo using git, then moEmptyDir` into the Pod's container. (#63445, @ericchiang)
  • Alpha annotation for PersistentVolume node affinity has been removed. Update your PersistentVolumes to use the beta PersistentVolume.nodeAffinity field before upgrading to this release. (#61816, @wackxu )

Removed Deprecations

  • kubeadm has removed the .ImagePullPolicy field in the v1alpha2 API version. Instead it's set statically to IfNotPresent for all required images. If you want to always pull the latest images before cluster init (as Always would do), run kubeadm config images pull before each kubeadm init. If you don't want the kubelet to pull any images at kubeadm init time, for example if you don't have an internet connection, you can also run kubeadm config images pull before kubeadm init or side-load the images some other way (such as docker load -i image.tar). Having the images locally cached will result in no pull at runtime, which makes it possible to run without any internet connection. (#64096, @luxas)
  • kubeadm has removed .Etcd.SelfHosting from its configuration API. It was never used in practice (#63871, @luxas)
  • The deprecated and inactive option '--enable-custom-metrics' has been removed in 1.11. (#60699, @CaoShuFeng)
  • --include-extended-apis, which was deprecated back in #32894, has been removed. (#62803, @deads2k)
  • Kubelets will no longer set externalID in their node spec. This feature has been deprecated since v1.1. (#61877, @mikedanese)
  • The initresource admission plugin has been removed. (#58784, @wackxu)
  • ObjectMeta , ListOptions, and DeleteOptions have been removed from the core api group. Please reference them in meta/v1 instead. (#61809, @hzxuzhonghu)
  • The deprecated --mode flag in check-network-mode has been removed. (#60102, @satyasm)
  • Support for the alpha.kubernetes.io/nvidia-gpu resource, which was deprecated in 1.10, has been removed. Please use the resource exposed by DevicePlugins instead (nvidia.com/gpu). (#61498, @mindprince)
  • The kube-cloud-controller-manager flag --service-account-private-key-file has been removed. Use --use-service-account-credentials instead. (#60875, @charrywanganthony)
  • The rknetes code, which was deprecated in 1.10, has been removed. Use rktlet and CRI instead. (#61432, @filbranden)
  • DaemonSet scheduling associated with the alpha ScheduleDaemonSetPods feature flag has been emoved. See https://github.com/kubernetes/enhancements/issues/548 for feature status. (#61411, @liggitt)
  • The METADATA_AGENT_VERSION configuration option has been removed to keep metadata agent version consistent across Kubernetes deployments. (#63000, @kawych)
  • The deprecated --service-account-private-key-file flag has been removed from the cloud-controller-manager. The flag is still present and supported in the kube-controller-manager. (#65182, @liggitt)
  • Removed alpha functionality that allowed the controller manager to approve kubelet server certificates. This functionality should be replaced by automating validation and approval of node server certificate signing requests. (#62471, @mikedanese)

Graduated to Stable/GA

  • IPVS-based in-cluster load balancing is now GA (ref)
  • Enable CoreDNS as a DNS plugin for Kubernetes (ref)
  • Azure Go SDK is now GA (#63063, @feiskyer)
  • ClusterRole aggregation is now GA (ref)
  • CRI validation test suite is now GA (ref)
  • StorageObjectInUseProtection is now GA (ref) and (ref)

Graduated to Beta

  • Supporting out-of-tree/external cloud providers is now considered beta (ref)
  • Resizing PersistentVolumes after pod restart is now considered beta. (ref)
  • sysctl support is now considered beta (ref)
  • Support for Azure Virtual Machine Scale Sets is now considered beta. (ref)
  • Azure support for Cluster Autoscaler is now considered beta. (ref)
  • The ability to limit a node's access to the API is now considered beta. (ref)
  • CustomResource versioning is now considered beta. (ref)
  • Windows container configuration in CRI is now considered beta (ref)
  • CRI logging and stats are now considered beta (ref)
  • The dynamic Kubelet config feature is now beta, and the DynamicKubeletConfig feature gate is on by default. In order to use dynamic Kubelet config, ensure that the Kubelet's --dynamic-config-dir option is set. (#64275, @mtaufen)
  • The Sysctls experimental feature has been promoted to beta (enabled by default via the Sysctls feature flag). PodSecurityPolicy and Pod objects now have fields for specifying and controlling sysctls. Alpha sysctl annotations will be ignored by 1.11+ kubelets. All alpha sysctl annotations in existing deployments must be converted to API fields to be effective. (#6371, @ingvagabund)
  • Volume expansion is now considered Beta. (#64288, @gnufied)
  • CRI container log rotation is now considered beta, and is enabled by default. (#64046, @yujuhong)
  • The PriorityClass API has been promoted to scheduling.k8s.io/v1beta1 (#63100, @ravisantoshgudimetla)
  • The priorityClass feature is now considered beta. (#63724, @ravisantoshgudimetla)
  • client-go: credential exec plugins is now considered beta. (#64482, @ericchiang)
  • Subresources for custom resources is now considered beta and enabled by default. With this, updates to the /status subresource will disallow updates to all fields other than .status (not just .spec and .metadata as before). Also, required can be used at the root of the CRD OpenAPI validation schema when the /status subresource is enabled. (#63598, @nikhita)

New alpha features

  • kube-scheduler can now schedule DaemonSet pods (ref)
  • You can now resize PersistentVolumes without taking them offline (ref)
  • You can now set a maximum volume count (ref)
  • You can now do environment variable expansion in a subpath mount. (ref)
  • You can now run containers in a pod as a particular group. (ref) You can now bind tokens to service requests. (ref)
  • The --experimental-qos-reserve kubelet flags has been replaced by the alpha level --qos-reserved flag or the QOSReserved field in the kubeletconfig, and requires the QOSReserved feature gate to be enabled. (#62509, @sjenning)

Other Notable Changes

SIG API Machinery

  • Orphan delete is now supported for custom resources. (#63386, @roycaihw)
  • Metadata of CustomResources is now pruned and schema-checked during deserialization of requests and when read from etcd. In the former case, invalid meta data is rejected, in the later it is dropped from the CustomResource objects. (#64267, @sttts)
  • The kube-apiserver openapi doc now includes extensions identifying APIService and CustomResourceDefinition kinds (#64174, @liggitt)
  • CustomResourceDefinitions Status subresource now supports GET and PATCH (#63619, @roycaihw)
  • When updating /status subresource of a custom resource, only the value at the .status subpath for the update is considered. (#63385, @CaoShuFeng)
  • Added a way to pass extra arguments to etcd. The these extra arguments can be used to adjust runtime configuration like heartbeat interval etc. (#63961, @mborsz)
  • Added Establishing Controller on CRDs to avoid race between Established condition and CRs actually served. In HA setups, the Established condition is delayed by 5 seconds. (#63068, @xmudrii)
  • Added spec.additionalPrinterColumns to CRDs to define server side printing columns. (#60991, @sttts)
  • Added CRD Versioning with NOP converter (#63830, @mbohlool)
  • Allow "required" and "description" to be used at the CRD OpenAPI validation schema root when the /status subresource is enabled. (#63533, @sttts)
  • Etcd health checks by the apiserver now ensure the apiserver can connect to and exercise the etcd API. (#65027, @liggitt) api- machinery
  • The deprecated --service-account-private-key-file flag has been removed from the cloud-controller-manager. The flag is still present and supported in the kube-controller-manager. (#65182, @liggitt)
  • Webhooks for the mutating admission controller now support the "remove" operation. (#64255, @rojkov) sig-API machinery
  • The CRD OpenAPI v3 specification for validation now allows additionalProperties, which are mutually exclusive to properties. (#62333, @sttts)
  • Added the apiserver configuration option to choose the audit output version. (#60056, @crassirostris)
  • Created a new dryRun query parameter for mutating endpoints. If the parameter is set, then the query will be rejected, as the feature is not implemented yet. This will allow forward compatibility with future clients; otherwise, future clients talking with older apiservers might end up modifying a resource even if they include the dryRun query parameter. (#63557, @apelisse)
  • list/watch API requests with a fieldSelector that specifies metadata.name can now be authorized as requests for an individual named resource (#63469, @wojtek-t)
  • Exposed /debug/flags/v to allow dynamically set glog logging level. For example, to change glog level to 3, send a PUT request such as curl -X PUT http://127.0.0.1:8080/debug/flags/v -d "3". (#63777, @hzxuzhonghu)
  • Exec authenticator plugin supports TLS client certificates. (#61803, @awly)
  • The serverAddressByClientCIDRs property in metav1.APIGroup(discovery API) is now optional instead of required. (#61963, @roycaihw)
  • apiservices/status and certificatesigningrequests/status now support GET and PATCH (#64063, @roycaihw)
  • APIServices with kube-like versions (e.g. v1, v2beta1, etc.) will be sorted appropriately within each group. (#64004, @mbohlool)
  • Event object references with apiversion will now that value. (#63913, @deads2k)
  • Fixes the kubernetes.default.svc loopback service resolution to use a loopback configuration. (#62649, @liggitt)

SIG Apps

SIG Auth

  • RBAC information is now included in audit logs via audit.Event annotations:
    • authorization.k8s.io/decision = {allow, forbid}
    • authorization.k8s.io/reason = human-readable reason for the decision (#58807, @CaoShuFeng)
  • kubectl certificate approve|deny will not modify an already approved or denied CSR unless the --force flag is provided. (#61971, @smarterclayton)
  • The --bootstrap-kubeconfig argument to Kubelet previously created the first bootstrap client credentials in the certificates directory as kubelet-client.key and kubelet-client.crt. Subsequent certificates created by cert rotation were created in a combined PEM file that was atomically rotated as kubelet-client-DATE.pem in that directory, which meant clients relying on the node.kubeconfig generated by bootstrapping would never use a rotated cert. The initial bootstrap certificate is now generated into the cert directory as a PEM file and symlinked to kubelet-client-current.pem so that the generated kubeconfig remains valid after rotation. (#62152, @smarterclayton)
  • Owner references can now be set during creation, even if the user doesn't have deletion power (#63403, @deads2k)
  • Laid the groundwork for OIDC distributed claims handling in the apiserver authentication token checker. A distributed claim allows the OIDC provider to delegate a claim to a separate URL. (ref). (#63213, @filmil)
  • RBAC: all configured authorizers are now checked to determine if an RBAC role or clusterrole escalation (setting permissions the user does not currently have via RBAC) is allowed. (#56358, @liggitt)
  • kube-apiserver: OIDC authentication now supports requiring specific claims with --oidc-required-claim=<claim>=<value> Previously, there was no mechanism for a user to specify claims in the OIDC authentication process that were requid to be present in the ID Token with an expected value. This version now makes it possible to require claims support for the OIDC authentication. It allows users to pass in a --oidc-required-claims flag, and key=value pairs in the API config, which will ensure that the specified required claims are checked against the ID Token claims. (#62136, @rithujohn191)
  • Included the list of security groups when failing with the errors that more than one is tagged. (#58874, @sorenmat)
  • Added proxy for container streaming in kubelet for streaming auth. (#64006, @Random-Liu)
  • PodSecurityPolicy admission information has been added to audit logs. (#58143, @CaoShuFeng)
  • TokenRequests now are required to have an expiration duration between 10 minutes and 2^32 seconds. (#63999, @mikedanese)
  • The NodeRestriction admission plugin now prevents kubelets from modifying/removing taints applied to their Node API object. (#63167, @liggitt)
  • authz: nodes should not be able to delete themselves (#62818, @mikedanese)

SIG Autoscaling

  • A cluster-autoscaler ClusterRole is added to cover only the functionality required by Cluster Autoscaler and avoid abusing system:cluster-admin role. Cloud providers other than GCE might want to update their deployments or sample yaml files to reuse the role created via add-on. (#64503, @kgolab)

SIG Azure

  • The Azure cloud provider now supports standard SKU load balancer and public IP. excludeMasterFromStandardLB defaults to true, which means master nodes are excluded from the standard load balancer. Also note that because all nodes (except master) are added as loadbalancer backends, the standard load balancer doesn't work with the service.beta.kubernetes.io/azure-load-balancer-mode annotation. (#61884, #62707, @feiskyer)
  • The Azure cloud provider now supports specifying allowed service tags by the service.beta.kubernetes.io/azure-allowed-service-tags annotation. (#61467, @feiskyer)
  • You can now change the size of an azuredisk PVC using kubectl edit pvc pvc-azuredisk. Note that this operation will fail if the volume is already attached to a running VM. (#64386, @andyzhangx)
  • Block device support has been added for azure disk. (#63841, @andyzhangx)
  • Azure VM names can now contain the underscore (_) character (#63526, @djsly)
  • Azure disks now support external resource groups. (#64427, @andyzhangx)
  • Added reason message logs for non-existant Azure resources. (#64248, @feiskyer)

SIG CLI

  • You can now use the base64decode function in kubectl go templates to decode base64-encoded data, such as kubectl get secret SECRET -o go-template='{{ .data.KEY | base64decode }}'. (#60755, @glb)
  • kubectl patch now supports --dry-run. (#60675, @timoreimann)
  • The global flag --match-server-version is now global. kubectl version will respect it. (#63613, @deads2k)
  • kubectl will list all allowed print formats when an invalid format is passed. (#64371, @CaoShuFeng)
  • The global flag "context" now gets applied to kubectl config view --minify. In previous versions, this command was only available for current-context. Now it will be easier for users to view other non current contexts when minifying. (#64608, @dixudx)
  • kubectl apply --prune supports CronJob resources. (#62991, @tomoe)
  • The --dry-run flag has been enabled for kubectl auth reconcile (#64458, @mrogers950)
  • kubectl wait is a new command that allows waiting for one or more resources to be deleted or to reach a specific condition. It adds a kubectl wait --for=[delete|condition=condition-name] resource/string command. (#64034, @deads2k)
  • kubectl auth reconcile only works with rbac.v1; all the core helpers have been switched over to use the external types. (#63967, @deads2k)
  • kubectl and client-go now detect duplicated names for user, cluster and context when loading kubeconfig and report this condition as an error. (#60464, @roycaihw)
  • Added 'UpdateStrategyType' and 'RollingUpdateStrategy' to 'kubectl describe sts' command output. (#63844, @tossmilestone)
  • Initial Korean translation for kubectl has been added. (#62040, @ianychoi)
  • kubectl cp now supports completion. (#60371, @superbrothers)
  • The shortcuts that were moved server-side in at least 1.9 have been removed from being hardcoded in kubectl. This means that the client-based restmappers have been moved to client-go, where everyone who needs them can have access. (#63507, @deads2k)
  • When using kubectl delete with selection criteria, the defaults to is now to ignore "not found" errors. Note that this does not apply when deleting a speciic resource. (#63490, @deads2k)
  • kubectl create [secret | configmap] --from-file now works on Windows with fully-qualified paths (#63439, @liggitt)
  • Portability across systems has been increased by the use of /usr/bin/env in all script shebangs. (#62657, @matthyx)
  • You can now use kubectl api-resources to discover resources. (#42873, @xilabao)
  • You can now display requests/limits of extended resources in node allocated resources. (#46079, @xiangpengzhao)
  • The --remove-extra-subjects and --remove-extra-permissions flags have been enabled for kubectl auth reconcile (#64541, @mrogers950)
  • kubectl now has improved compatibility with older servers when creating/updating API objects (#61949, @liggitt)
  • kubectl apply view/edit-last-applied now supports completion. (#60499, @superbrothers)

SIG Cluster Lifecycle

  • kubeadm: The :Etcd struct has been refactored in the v1alpha2 API. All the options now reside under either .Etcd.Local or .Etcd.External. Automatic conversions from the v1alpha1 API are supported. (#64066, @luxas)
  • kubeadm now uses an upgraded API version for the configuration file, kubeadm.k8s.io/v1alpha2. kubeadm in v1.11 will still be able to read v1alpha1 configuration, and will automatically convert the configuration to v1alpha2, both internally and when storing the configuration in the ConfigMap in the cluster. (#63788, @luxas)
  • Phase kubeadm alpha phase kubelet has been added to support dynamic kubelet configuration in kubeadm. (#57224, @xiangpengzhao)
  • The kubeadm config option API.ControlPlaneEndpoint has been extended to take an optional port, which may differ from the apiserver's bind port. (#62314, @rjosephwright)
  • The --cluster-name parameter has been added to kubeadm init, enabling users to specify the cluster name in kubeconfig. (#60852, @karan)
  • The logging feature for kubeadm commands now supports a verbosity setting. (#57661, @vbmade2000)
  • kubeadm now has a join timeout that can be controlled via the discoveryTimeout config option. This option is set to 5 minutes by default. (#60983, @rosti)
  • Added the writable boolean option to kubeadm config. This option works on a per-volume basis for ExtraVolumes config keys. (#60428, @rosti)
  • Added a new kubeadm upgrade node config command. (#64624, @luxas)
  • kubeadm now makes the CoreDNS container more secure by dropping (root) capabilities and improves the integrity of the container by running the whole container in read-only. (#64473, @nberlee)
  • kubeadm now detects the Docker cgroup driver and starts the kubelet with the matching driver. This eliminates a common error experienced by new users in when the Docker cgroup driver is not the same as the one set for the kubelet due to different Linux distributions setting different cgroup drivers for Docker, making it hard to start the kubelet properly. (#64347, @neolit123)
  • Added a 'kubeadm config migrate' command to convert old API types to their newer counterparts in the new, supported API types. This is just a client-side tool; it just executes locally without requiring a cluster to be running, operating in much the same way as a Unix pipe that upgrades config files. (#64232, @luxas)
  • kubeadm will now pull required images during preflight checks if it cannot find them on the system. (#64105, @chuckha)
  • "kubeadm init" now writes a structured and versioned kubelet ComponentConfiguration file to /var/lib/kubelet/config.yaml and an environment file with runtime flags that you can source in the systemd kubelet dropin to /var/lib/kubelet/kubeadm-flags.env. (#63887, @luxas)
  • A kubeadm config print-default command has now been added. You can use this command to output a starting point when writing your own kubeadm configuration files. (#63969, @luxas)
  • Updated kubeadm's minimum supported kubernetes in v1.11.x to 1.10 (#63920, @dixudx)
  • Added the kubeadm upgrade diff command to show how static pod manifests will be changed by an upgrade. This command shows the changes that will be made to the static pod manifests before applying them. This is a narrower case than kubeadm upgrade apply --dry-run, which specifically focuses on the static pod manifests. (#63930, @liztio)
  • The kubeadm config images pull command can now be used to pull container images used by kubeadm. (#63833, @chuckha)
  • kubeadm will now deploy CoreDNS by default instead of KubeDNS (#63509, @detiber)
  • Preflight checks for kubeadm no longer validate custom kube-apiserver, kube-controller-manager and kube-scheduler arguments. (#63673, @chuckha)
  • Added a kubeadm config images list command that lists required container images for a kubeadm install. (#63450, @chuckha)
  • You can now use kubeadm token specifying --kubeconfig. In this case, kubeadm searches the current user home path and the environment variable KUBECONFIG for existing files. If provided, the --kubeconfig flag will be honored instead. (#62850, @neolit123) (#64988, @detiber)
  • kubeadm now sets peer URLs for the default etcd instance. Previously we left the defaults, which meant the peer URL was unsecured.
  • Kubernetes now packages crictl in a cri-tools deb and rpm package. (#64836, @chuckha)
  • kubeadm now prompts the user for confirmation when resetting a master node. (#59115, @alexbrand)
  • kubead now creates kube-proxy with a toleration to run on all nodes, no matter the taint. (#62390, @discordianfish)
  • kubeadm now sets the kubelet --resolv-conf flag conditionally on init. (#64665, @stealthybox)
  • Added ipset and udevadm to the hyperkube base image. (#61357, @rphillips)

SIG GCP

  • Kubernetes clusters on GCE now have crictl installed. Users can use it to help debug their nodes. See the crictl documentation for details. (#63357, @Random-Liu)
  • cluster/kube-up.sh now provisions a Kubelet config file for GCE via the metadata server. This file is installed by the corresponding GCE init scripts. (#62183, @mtaufen)
  • GCE: Update cloud provider to use TPU v1 API (#64727, @yguo0905)
  • GCE: Bump GLBC version to 1.1.1 - fixing an issue of handling multiple certs with identical certificates. (#62751, @nicksardo)

SIG Instrumentation

  • Added prometheus cluster monitoring addon to kube-up. (#62195, @serathius)
  • Kubelet now exposes a new endpoint, /metrics/probes, which exposes a Prometheus metric containing the liveness and/or readiness probe results for a container. (#61369, @rramkumar1)

SIG Network

  • The internal IP address of the node is now added as additional information for kubectl. (#57623, @dixudx)
  • NetworkPolicies can now target specific pods in other namespaces by including both a namespaceSelector and a podSelector in the same peer element. (#60452, @danwinship)
  • CoreDNS deployment configuration now uses the k8s.gcr.io imageRepository. (#64775, @rajansandeep)
  • kubelet's --cni-bin-dir option now accepts multiple comma-separated CNI binary directory paths, which are searched for CNI plugins in the given order. (#58714, @dcbw)
  • You can now use --ipvs-exclude-cidrs to specify a list of CIDR's which the IPVS proxier should not touch when cleaning up IPVS rules. (#62083, @rramkumar1)
  • You can now receive node DNS info with the --node-ip flag, which adds ExternalDNS, InternalDNS, and ExternalIP to kubelet's output. (#63170, @micahhausler)
  • You can now have services that listen on the same host ports on different interfaces by specifying --nodeport-addresses. (#62003, @m1093782566)
  • Added port-forward examples for service

SIG Node

  • CRI: The container log path has been changed from containername_attempt#.log to containername/attempt#.log (#62015, @feiskyer)
  • Introduced the ContainersReady condition in Pod status. (#64646, @freehan)
  • Kubelet will now set extended resource capacity to zero after it restarts. If the extended resource is exported by a device plugin, its capacity will change to a valid value after the device plugin re-connects with the Kubelet. If the extended resource is exported by an external component through direct node status capacity patching, the component should repatch the field after kubelet becomes ready again. During the time gap, pods previously assigned with such resources may fail kubelet admission but their controller should create new pods in response to such failures. (#64784, @jiayingz) node
  • You can now use a security context with Windows containers (#64009, @feiskyer)
  • Added e2e regression tests for kubelet security. (#64140, @dixudx)
  • The maximum number of images the Kubelet will report in the Node status can now be controlled via the Kubelet's --node-status-max-images flag. The default (50) remains the same. (#64170, @mtaufen)
  • The Kubelet now exports metrics that report the assigned (node_config_assigned), last-known-good (node_config_last_known_good), and active (node_config_active) config sources, and a metric indicating whether the node is experiencing a config-related error (node_config_error). The config source metrics always report the value 1, and carry the node_config_name, node_config_uid, node_config_resource_version, and node_config_kubelet_key labels, which identify the config version. The error metric reports 1 if there is an error, 0 otherwise. (#57527, @mtaufen)
  • You now have the ability to quota resources by priority. (#57963, @vikaschoudhary16)
  • The gRPC max message size in the remote container runtime has been increased to 16MB. (#64672, @mcluseau)
  • Added a feature gate for the plugin watcher. (#64605, @vikaschoudhary16)
  • The status of dynamic Kubelet config is now reported via Node.Status.Config, rather than the KubeletConfigOk node condition. (#63314, @mtaufen)
  • You must now specify Node.Spec.ConfigSource.ConfigMap.KubeletConfigKey when using dynamic Kubelet config to tell the Kubelet which key of the ConfigMap identifies its config file. (#59847, @mtaufen)
  • The dynamic Kubelet config feature will now update the config in the event of a ConfigMap mutation, which reduces the chance for silent config skew. Only name, namespace, and kubeletConfigKey may now be set in Node.Spec.ConfigSource.ConfigMap. The least disruptive pattern for config management is still to create a new ConfigMap and incrementally roll out a new Node.Spec.ConfigSource. (#63221, @mtaufen)
  • Change seccomp annotation from "docker/default" to "runtime/default" (#62662, @wangzhen127)
  • The node authorizer now automatically sets up rules for Node.Spec.ConfigSource when the DynamicKubeletConfig feature gate is enabled. (#60100, @mtaufen)
  • CRI now defines mounting behavior. If the host path doesn't exist, the runtime should return an error. If the host path is a symlink, the runtime should follow the symlink and mount the real destination to the container. (#61460, @feiskyer)

SIG OpenStack

  • Provide a meaningful error message in the openstack cloud provider when no valid IP address can be found for a node, rather than just the first address of the node, which leads to a load balancer error if that address is a hostname or DNS name instead of an IP address. (#64318, @gonzolino)
  • Restored the pre-1.10 behavior of the openstack cloud provider, which uses the instance name as the Kubernetes Node name. This requires instances be named with RFC-1123 compatible names. (#63903, @liggitt)
  • Kubernetes will try to read the openstack auth config from the client config and fall back to read from the environment variables if the auth config is not available. (#60200, @dixudx)

SIG Scheduling

  • Schedule DaemonSet Pods in scheduler, rather than the Daemonset controller. (#63223, @k82cn)
  • Added MatchFields to NodeSelectorTerm; in 1.11, it only supports metadata.name. (#62002, @k82cn)
  • kube-scheduler now has the --write-config-to flag so that Scheduler canwritets default configuration to a file. (#62515, @resouer)
  • Performance of the affinity/anti-affinity predicate for the default scheduler has been significantly improved. (#62211, @bsalamat)
  • The 'scheduling_latency_seconds' metric into has been split into finer steps (predicate, priority, preemption). (#65306, @shyamjvs)
  • Scheduler now has a summary-type metric, 'scheduling_latency_seconds'. (#64838, @krzysied)
  • nodeSelector.matchFields (node's metadata.node) is now supported in scheduler. (#62453, @k82cn)
  • Added a parametrizable priority function mapping requested/capacity ratio to priority. This function is disabled by default and can be enabled via the scheduler policy config file. (#63929, @losipiuk)
  • System critical priority classes are now automatically added at cluster boostrapping. (#60519, @bsalamat)

SIG Storage

  • AWS EBS, Azure Disk, GCE PD and Ceph RBD volume plugins now support dynamic provisioning of raw block volumes. (#64447, @jsafrane)
  • gitRepo volumes in pods no longer require git 1.8.5 or newer; older git versions are now supported. (#62394, @jsafrane)
  • Added support for resizing Portworx volumes. (#62308, @harsh-px)
  • Added block volume support to Cinder volume plugin. (#64879, @bertinatto)
  • Provided API support for external CSI storage drivers to support block volumes. (#64723, @vladimirvivien)
  • Volume topology aware dynamic provisioning for external provisioners is now supported. (#63193, @lichuqiang)
  • Added a volume projection that is able to project service account tokens. (#62005, @mikedanese)
  • PodSecurityPolicy now supports restricting hostPath volume mounts to be readOnly and under specific path prefixes (#58647, @jhorwit2)
  • Added StorageClass API to restrict topologies of dynamically provisioned volumes. (#63233, @lichuqiang)
  • Added Alpha support for dynamic volume limits based on node type (#64154, @gnufied)
  • AWS EBS volumes can be now used as ReadOnly in pods. (#64403, @jsafrane)
  • Basic plumbing for volume topology aware dynamic provisionin has been implemented. (#63232, @lichuqiang)
  • Changed ext3/ext4 volume creation to not reserve any portion of the volume for the root user. When creating ext3/ext4 volume, mkfs defaults to reserving 5% of the volume for the super-user (root). This patch changes the mkfs to pass -m0 to disable this setting. (#64102, @atombender)
  • Added support for NFS relations on kubernetes-worker charm. (#63817, @hyperbolic2346)
  • Implemented kubelet side online file system resizing (#62460, @mlmhl)
  • Generated subpath name from Downward API env (#49388, @kevtaylor)

SIG vSphere

  • Added a mechanism in vSphere Cloud Provider to get credentials from Kubernetes secrets, rather than the plain text vsphere.conf file.(#63902, @abrarshivani)
  • vSphere Cloud Provider: added SAML token authentication support (#63824, @dougm)

SIG Windows

  • Added log and fs stats for Windows containers. (#62266, @feiskyer)
  • Added security contexts for Windows containers. #64009, (@feiskyer)
  • Added local persistent volumes for Windows containers. (#62012, @andyzhangx) and fstype for Azure disk (#61267, @andyzhangx)
  • Improvements in Windows Server version 1803 also bring new storage functionality to Kubernetes v1.11, including:
    • Volume mounts for ConfigMap and Secret
    • Flexvolume plugins for SMB and iSCSI storage are also available out-of-tree at Microsoft/K8s-Storage-Plugins
  • Setup dns servers and search domains for Windows Pods in dockershim. Docker EE version >= 17.10.0 is required for propagating DNS to containers. (#63905, @feiskyer)

Additional changes

  • Extended the Stackdriver Metadata Agent by adding a new Deployment for ingesting unscheduled pods and services. (#62043, @supriyagarg)
  • Added all kinds of resource objects' statuses in HPA description. (#59609, @zhangxiaoyu-zidif)
  • Implemented preemption for extender with a verb and new interface (#58717, @resouer)
  • Updated nvidia-gpu-device-plugin DaemonSet config to use RollingUpdate updateStrategy instead of OnDelete. (#64296, @mindprince)
  • increased grpc client default response size. (#63977, @runcom)
  • Applied pod name and namespace labels to pod cgroup in cAdvisor metrics (#63406, @derekwaynecarr)
  • [fluentd-gcp addon] Use the logging agent's node name as the metadata agent URL. (#63353, @bmoyles0117)
  • The new default value for the --allow-privileged parameter of the Kubernetes-worker charm has been set to true based on changes which went into the Kubernetes 1.10 release. Before this change the default value was set to false. If you're installing Canonical Kubernetes you should expect this value to now be true by default and you should now look to use PSP (pod security policies). (#64104, @CalvinHartwell)

External Dependencies

  • Default etcd server version is v3.2.18 compared with v3.1.12 in v1.10 (#61198)
  • Rescheduler is v0.4.0, compared with v0.3.1 in v1.10 (#65454)
  • The validated docker versions are the same as for v1.10: 1.11.2 to 1.13.1 and 17.03.x (ref)
  • The Go version is go1.10.2, as compared to go1.9.3 in v1.10. (#63412)
  • The minimum supported go is the same as for v1.10: go1.9.1. (#55301)
  • CNI is the same as v1.10: v0.6.0 (#51250)
  • CSI is updated to 0.3.0 as compared to 0.2.0 in v1.10. (#64719)
  • The dashboard add-on is the same as v1.10: v1.8.3. (#517326)
  • Bump Heapster to v1.5.2 as compared to v1.5.0 in v1.10 (#61396)
  • Updates Cluster Autoscaler version to v1.3.0 from v1.2.0 in v1.10. See release notes for details. (#65219)
  • Kube-dns has been updated to v1.14.10, as compared to v1.14.8 in v1.10 (#62676)
  • Influxdb is unchanged from v1.10: v1.3.3 (#53319)
  • Grafana is unchanged from v1.10: v4.4.3 (#53319)
  • CAdvisor is v0.30.1, as opposed to v0.29.1 in v1.10 (#64987)
  • fluentd-gcp-scaler is unchanged from v1.10: v0.3.0 (#61269)
  • fluentd in fluentd-es-image is unchanged from 1.10: v1.1.0 (#58525)
  • fluentd-elasticsearch is unchanged from 1.10: v2.0.4 (#58525)
  • fluentd-gcp is unchanged from 1.10: v3.0.0. (#60722)
  • Ingress glbc is unchanged from 1.10: v1.0.0 (#61302)
  • OIDC authentication is unchanged from 1.10: coreos/go-oidc v2 (#58544)
  • Calico is unchanged from 1.10: v2.6.7 (#59130)
  • hcsshim has been updated to v0.6.11 (#64272)
  • gitRepo volumes in pods no longer require git 1.8.5 or newer; older git versions are now supported. (#62394)
  • Update crictl on GCE to v1.11.0. (#65254)
  • CoreDNS is now v1.1.3 (#64258)
  • Setup dns servers and search domains for Windows Pods in dockershim. Docker EE version >= 17.10.0 is required for propagating DNS to containers. (#63905)
  • Update version of Istio addon from 0.5.1 to 0.8.0. See full Istio release notes.(#64537)
  • Update cadvisor godeps to v0.30.0 (#64800)
  • Update event-exporter to version v0.2.0 that supports old (gke_container/gce_instance) and new (k8s_container/k8s_node/k8s_pod) stackdriver resources. (#63918)
  • Rev the Azure SDK for networking to 2017-06-01 (#61955)

Bug Fixes

  • Fixed spurious "unable to find api field" errors patching custom resources (#63146, @liggitt)
  • Nodes are not deleted from kubernetes anymore if node is shutdown in Openstack. (#59931, @zetaab)
  • Re-enabled nodeipam controller for external clouds. Re-enables nodeipam controller for external clouds. Also does a small refactor so that we don't need to pass in allocateNodeCidr into the controller. (#63049, @andrewsykim)
  • Fixed a configuration error when upgrading kubeadm from 1.9 to 1.10+; Kubernetes must have the same major and minor versions as the kubeadm library. (#62568, @liztio)
  • kubectl no longer renders a List as suffix kind name for CRD resources (#62512, @dixudx)
  • Restored old behavior to the --template flag in get.go. In old releases, providing a --template flag value and no --output value implicitly assigned a default value ("go-template") to --output, printing using the provided template argument. (#65377,@juanvallejo)
  • Ensured cloudprovider.InstanceNotFound is reported when the VM is not found on Azure (#61531, @feiskyer)
  • Kubernetes version command line parameter in kubeadm has been updated to drop an unnecessary redirection from ci/latest.txt to ci-cross/latest.txt. Users should know exactly where the builds are stored on Google Cloud storage buckets from now on. For example for 1.9 and 1.10, users can specify ci/latest-1.9 and ci/latest-1.10 as the CI build jobs what build images correctly updates those. The CI jobs for master update the ci-cross/latest location, so if you are looking for latest master builds, then the correct parameter to use would be ci-cross/latest. (#63504, @dims)
  • Fixes incompatibility with custom scheduler extender configurations specifying bindVerb (#65424, @liggitt)
  • kubectl built for darwin from darwin now enables cgo to use the system-native C libraries for DNS resolution. Cross-compiled kubectl (e.g. from an official kubernetes release) still uses the go-native netgo DNS implementation. (#64219, @ixdy)
  • API server properly parses propagationPolicy as a query parameter sent with a delete request (#63414, @roycaihw)
  • Corrected a race condition in bootstrapping aggregated cluster roles in new HA clusters (#63761, @liggitt)
  • kubelet: fix hangs in updating Node status after network interruptions/changes between the kubelet and API server (#63492, @liggitt)
  • Added log and fs stats for Windows containers (#62266, @feiskyer)
  • Fail fast if cgroups-per-qos is set on Windows (#62984, @feiskyer)
  • Minor fix for VolumeZoneChecker predicate, storageclass can be in annotation and spec. (#63749, @wenlxie)
  • Fixes issue for readOnly subpath mounts for SELinux systems and when the volume mountPath already existed in the container image. (#64351, @msau42)
  • Fixed CSI gRPC connection leak during volume operations. (#64519, @vladimirvivien)
  • Fixed error reporting of CSI volumes attachment. (#63303, @jsafrane)
  • Fixed SELinux relabeling of CSI volumes. (#64026, @jsafrane)
  • Fixed detach of already detached CSI volumes. (#63295, @jsafrane)
  • fix rbd device works at block mode not get mapped to container (#64555, @wenlxie)
  • Fixed an issue where Portworx PVCs remain in pending state when created using a StorageClass with empty parameters (#64895, @harsh-px) storage
  • FIX: The OpenStack cloud providers DeleteRoute method fails to delete routes when it can’t find the corresponding instance in OpenStack. (#62729, databus23)
  • [fluentd-gcp addon] Increase CPU limit for fluentd to 1 core to achieve 100kb/s throughput. (#62430, @bmoyles0117)
  • GCE: Fixed operation polling to adhere to the specified interval. Furthermore, operation errors are now returned instead of ignored. (#64630, @nicksardo)
  • Included kms-plugin-container.manifest to master nifests tarball. (#65035, @immutableT)
  • Fixed missing nodes lines when kubectl top nodes (#64389, @yue9944882) sig-cli
  • Fixed kubectl drain --timeout option when eviction is used. (#64378, @wrdls) sig-cli
  • Fixed kubectl auth can-i exit code. It will return 1 if the user is not allowed and 0 if it's allowed. (#59579, @fbac)
  • Fixed data loss issue if using existing azure disk with partitions in disk mount (#63270, @andyzhangx)
  • Fixed azure file size grow issue (#64383, @andyzhangx)
  • Fixed SessionAffinity not updated issue for Azure load balancer (#64180, @feiskyer)
  • Fixed kube-controller-manager panic while provisioning Azure security group rules (#64739, @feiskyer)
  • Fixed API server panic during concurrent GET or LIST requests with non-empty resourceVersion. (#65092, @sttts)
  • Fixed incorrect OpenAPI schema for CustomResourceDefinition objects (#65256, @liggitt)
  • Fixed issue where PersistentVolume.NodeAffinity.NodeSelectorTerms were ANDed instead of ORed. (#62556, @msau42)
  • Fixed potential infinite loop that can occur when NFS PVs are recycled. (#62572, @joelsmith)
  • Fixed column alignment when kubectl get is used with custom columns from OpenAPI schema (#56629, @luksa)
  • kubectl: restore the ability to show resource kinds when displaying multiple objects (#61985, @liggitt)
  • Fixed a panic in kubectl run --attach ... when the api server failed to create the runtime object (due to name conflict, PSP restriction, etc.) (#61713, @mountkin)
  • kube-scheduler has been fixed to use --leader-elect option back to true (as it was in previous versions) (#59732, @dims)
  • kubectl: fixes issue with -o yaml and -o json omitting kind and apiVersion when used with --dry-run (#61808, @liggitt)
  • Ensure reasons end up as comments in kubectl edit. (#60990, @bmcstdio)
  • Fixes issue where subpath readOnly mounts failed (#63045, @msau42)
  • Fix stackdriver metrics for node memory using wrong metric type (#63535, @serathius)
  • fix mount unmount failure for a Windows pod (#63272, @andyzhangx)

General Fixes and Reliability

  • Fixed a regression in kube-scheduler to properly load client connection information from a --config file that references a kubeconfig file. (#65507, @liggitt)
  • Fix regression in v1.JobSpec.backoffLimit that caused failed Jobs to be restarted indefinitely. (#63650, @soltysh)
  • fixes a potential deadlock in the garbage collection controller (#64235, @liggitt)
  • fix formatAndMount func issue on Windows (#63248, @andyzhangx)
  • Fix issue of colliding nodePorts when the cluster has services with externalTrafficPolicy=Local (#64349, @nicksardo)
  • fixes a panic applying json patches containing out of bounds operations (#64355, @liggitt)
  • Fix incorrectly propagated ResourceVersion in ListRequests returning 0 items. (#64150, @wojtek-t)
  • GCE: Fix to make the built-in kubernetes service properly point to the master's load balancer address in clusters that use multiple master VMs. (#63696, @grosskur)
  • Fixes fake client generation for non-namespaced subresources (#60445, @jhorwit2)
  • Schedule even if extender is not available when using extender (#61445, @resouer)
  • Fix panic create/update CRD when mutating/validating webhook configured. (#61404, @hzxuzhonghu)
  • Pods requesting resources prefixed with *kubernetes.io will remain unscheduled if there are no nodes exposing that resource. (#61860, @mindprince)
  • fix scheduling policy on ConfigMap breaks without the --policy-configmap-namespace flag set (#61388, @zjj2wry)
  • Bugfix for erroneous upgrade needed messaging in kubernetes worker charm. (#60873, @wwwtyro)
  • Fix inter-pod anti-affinity check to consider a pod a match when all the anti-affinity terms match. (#62715, @bsalamat)
  • Pod affinity nodeSelectorTerm.matchExpressions may now be empty, and works as previously documented: nil or empty matchExpressions matches no objects in scheduler. (#62448, @k82cn)
  • Fix an issue in inter-pod affinity predicate that cause affinity to self being processed correctly (#62591, @bsalamat)
  • fix WaitForAttach failure issue for azure disk (#62612, @andyzhangx)
  • Fix user visible files creation for windows (#62375, @feiskyer)
  • Fix machineID getting for vmss nodes when using instance metadata (#62611, @feiskyer)
  • Fix Forward chain default reject policy for IPVS proxier (#62007, @m1093782566)
  • fix nsenter GetFileType issue in containerized kubelet (#62467, @andyzhangx)
  • Ensure expected load balancer is selected for Azure (#62450, @feiskyer)
  • Resolves forbidden error when the daemon-set-controller cluster role access controllerrevisions resources. (#62146, @frodenas)
  • fix incompatible file type checking on Windows (#62154, @dixudx)
  • fix local volume absolute path issue on Windows (#620s18, @andyzhangx)
  • fix the issue that default azure disk fsypte(ext4) does not work on Windows (#62250, @andyzhangx)
  • Fixed bug in rbd-nbd utility when nbd is used. (#62168, @piontec)
  • fix local volume issue on Windows (#62012, @andyzhangx)
  • Fix a bug that fluentd doesn't inject container logs for CRI container runtimes (containerd, cri-o etc.) into elasticsearch on GCE. (#61818, @Random-Liu)
  • flexvolume: trigger plugin init only for the relevant plugin while probe (#58519, @linyouchong)
  • Fixed ingress issue with CDK and pre-1.9 versions of kubernetes. (#61859, @hyperbolic2346)
  • Fixed racy panics when using fake watches with ObjectTracker (#61195, @grantr)
  • Fixed mounting of UNIX sockets(and other special files) in subpaths (#61480, @gnufscied)
  • Fixed #61123 by triggering syncer.Update on all cases including when a syncer is created (#61124, @satyasm)
  • Fixed data race in node lifecycle controller (#60831, @resouer)
  • Fixed resultRun by resetting it to 0 on pod restart (#62853, @tony612)
  • Fixed the liveness probe to use /bin/bash -c instead of /bin/bash c. (#63033, @bmoyles0117)
  • Fixed scheduler informers to receive events for all the pods in the cluster. (#63003, @bsalamat)
  • Fixed in vSphere Cloud Provider to handle upgrades from kubernetes version less than v1.9.4 to v1.9.4 and above. (#62919, @abrarshivani)
  • Fixed error where config map for Metadata Agent was not created by addon manager. (#62909, @kawych)
  • Fixed permissions to allow statefulset scaling for admins, editors, and viewers (#62336, @deads2k)
  • GCE: Fixed for internal load balancer management resulting in backend services with outdated instance group links. (#62885, @nicksardo)
  • Deployment will stop adding pod-template-hash labels/selector to ReplicaSets and Pods it adopts. Resources created by Deployments are not affected (will still have pod-template-hash labels/selector). (#61615, @janetkuo)
  • Used inline func to ensure unlock is executed (#61644, @resouer)
  • kubernetes-master charm now properly clears the client-ca-file setting on the apiserver snap (#61479, @hyperbolic2346)
  • Bound cloud allocator to 10 retries with 100 ms delay between retries. (#61375, @satyasm)
  • Respect fstype in Windows for azure disk (#61267, @andyzhangx)
  • Unready pods will no longer impact the number of desired replicas when using horizontal auto-scaling with external metrics or object metrics. (#60886, @mattjmcnaughton)
  • Removed unsafe double RLock in cpumanager (#62464, @choury)

Non-user-facing changes

  • Remove UID mutation from request.context. (#63957, @hzxuzhonghu)
  • Use Patch instead of Put to sync pod status. (#62306, @freehan)
  • Allow env from resource with keys & updated tests (#60636, @PhilipGough)
  • set EnableHTTPSTrafficOnly in azure storage account creation (#64957, @andyzhangx)
  • New conformance test added for Watch. (#61424, @jennybuckley)
  • Use DeleteOptions.PropagationPolicy instead of OrphanDependents in kubectl (#59851, @nilebox)
  • Add probe based mechanism for kubelet plugin discovery (#63328, @vikaschoudhary16)
  • keep pod state consistent when scheduler cache UpdatePod (#64692, @adohe)
  • kubectl delete does not use reapers for removing objects anymore, but relies on server-side GC entirely (#63979, @soltysh)
  • Updated default image for nginx ingress in CDK to match current Kubernetes docs. (#64285, @hyperbolic2346)
  • Increase scheduler cache generation number monotonically in order to avoid collision and use of stale information in scheduler. (#63264, @bsalamat)
  • Adding CSI driver registration code. (#64560, @sbezverk)
  • Do not check vmSetName when getting Azure node's IP (#63541, @feiskyer)
  • [fluentd-gcp addon] Update event-exporter image to have the latest base image. (#61727, @crassirostris)
  • Make volume usage metrics available for Cinder (#62668, @zetaab)
  • cinder volume plugin : When the cinder volume status is error, controller will not do attach and detach operation (#61082, @wenlxie)
  • Allow user to scale l7 default backend deployment (#62685, @freehan)
  • Add support to ingest log entries to Stackdriver against new "k8s_container" and "k8s_node" resources. (#62076, @qingling128)
  • Disabled CheckNodeMemoryPressure and CheckNodeDiskPressure predicates if TaintNodesByCondition enabled (#60398, @k82cn)
  • Support custom test configuration for IPAM performance integration tests (#61959, @satyasm)
  • OIDC authentication now allows tokens without an "email_verified" claim when using the "email" claim. If an "email_verified" claim is present when using the "email" claim, it must be true. (#61508, @rithujohn191)
  • Add e2e test for CRD Watch (#61025, @ayushpateria)
  • Return error if get NodeStageSecret and NodePublishSecret failed in CSI volume plugin (#61096, @mlmhl)
  • kubernetes-master charm now supports metrics server for horizontal pod autoscaler. (#60174, @hyperbolic2346)
  • In a GCE cluster, the default HIRPIN_MODE is now "hairpin-veth". (#60166, @rramkumar1)
  • Balanced resource allocation priority in scheduler to include volume count on node (#60525, @ravisantoshgudimetla)
  • new dhcp-domain parameter to be used for figuring out the hostname of a node (#61890, @dims)
  • Disable ipamperf integration tests as part of every PR verification. (#61863, @satyasm)
  • Enable server-side print in kubectl by default, with the ability to turn it off with --server-print=false (#61477, @soltysh)
  • Updated admission controller settings for Juju deployed Kubernetes clusters (#61427, @hyperbolic2346)
  • Performance test framework and basic tests for the IPAM controller, to simulate behavior of the four supported modes under lightly loaded and loaded conditions, where load is defined as the number of operations to perform as against the configured kubernetes. (#61143, @satyasm)
  • Removed always pull policy from the template for ingress on CDK. (#61598, @hyperbolic2346)
  • make test-cmd now works on OSX. (#61393, @totherme)
  • Conformance: ReplicaSet must be supported in the apps/v1 version. (#61367, @enisoc)
  • Remove 'system' prefix from Metadata Agent rbac configuration (#61394, @kawych)
  • Support new NODE_OS_DISTRIBUTION 'custom' on GCE on a new add event. (#61235, @yguo0905)
  • include file name in the error when visiting files (#60919, @dixudx)
  • Split PodPriority and PodPreemption feature gate (#62243, @resouer)
  • Code generated for CRDs now passes go vet. (#62412, @bhcleek)
  • "beginPort+offset" format support for port range which affects kube-proxy only (#58731, @yue9944882)
  • Added e2e test for watch (#60331, @jennybuckley)
  • add warnings on using pod-infra-container-image for remote container runtime (#62982, @dixudx)
  • Mount additional paths required for a working CA root, for setups where /etc/ssl/certs doesn't contains certificates but just symlink. (#59122, @klausenbusk)
  • Introduce truncating audit bacnd that can be enabled for existing backend to limit the size of individual audit events and batches of events. (#61711, @crassirostris)
  • stop kubelet to cloud provider integration potentially wedging kubelet sync loop (#62543, @ingvagabund)
  • Set pod status to "Running" if there is at least one container still reporting as "Running" status and others are "Completed". (#62642, @ceshihao)
  • Fix memory cgroup notifications, and reduce associated log spam. (#63220, @dashpole)
  • Remove never used NewCronJobControllerFromClient method (#59471, dmathieu)

v1.11.0-rc.3

Documentation

Downloads for v1.11.0-rc.3

filename sha256 hash
kubernetes.tar.gz 25879ba96d7baf1eb9002956cef3ee40597ed7507784262881a09c00d35ab4c6
kubernetes-src.tar.gz 748786c0847e278530c790f82af52797de8b5a9e494e727d0049d4b35e370327

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 7a3c1b89d6787e275b4b6b855237da6964145e0234b82243c7c6803f1cbd3b46
kubernetes-client-darwin-amd64.tar.gz 0265652c3d7f98e36d1d591e3e6ec5018825b6c0cd37bf65c4d043dc313279e3
kubernetes-client-linux-386.tar.gz 600d9c83ba4d2126da1cfcd0c079d97c8ede75fad61bead1135dc9e4f7e325ce
kubernetes-client-linux-amd64.tar.gz 143fdaf82480dab68b1c783ae9f21916783335f3e4eaa132d72a2c1f7b4b393f
kubernetes-client-linux-arm.tar.gz 1bf4a0823c9c8128b19a2f0a8fbaf81226a313bc35132412a9fa1d251c2af07c
kubernetes-client-linux-arm64.tar.gz 643b84a227838dd6f1dc6c874f6966e9f098b64fd7947ff940776613fa2addf0
kubernetes-client-linux-ppc64le.tar.gz f46e1952046e977defd1a308ebe6de3ba6a710d562d17de987966a630ea2f7a3
kubernetes-client-linux-s390x.tar.gz 7ba61a3d8e6b50b238814eb086c6f9a9354342be9ac1882d0751d6cd2ce9f295
kubernetes-client-windows-386.tar.gz 587ca7b09cd45864b8093a8aa10284d473db1f528a6173cd2e58f336673aade0
kubernetes-client-windows-amd64.tar.gz a8b1aac95def9f2bf54a5bbd2d83a1dd7778d0a08f1986187063a9a288a9079b

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz d19cc5604370eb2fa826420c99dcbdbbb9bf096ea2916549a46ace990c09e20e
kubernetes-server-linux-arm.tar.gz 47b4ac984a855df2c78443a527705e45909da27405bb7cd8f257a5cde0314518
kubernetes-server-linux-arm64.tar.gz 09f8c2692f8de291c522fc96a5cbefcd60fe7a1ba9235251be11e6dda8663360
kubernetes-server-linux-ppc64le.tar.gz 594ff5991206887a70ec0c13624fa940f7ef4ce9cb17f9d8906f7a124a7ae4d1
kubernetes-server-linux-s390x.tar.gz 43a635f34ce473dcf52870e1d8fad324776d4d958b9829a3dce49eb07f8c4412

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz b3259ed3bf2063aca9e6061cc27752adc4d787dfada4498bc4495cbc962826a2
kubernetes-node-linux-arm.tar.gz 9c71370709c345e4495708d8a2c03c1698f59cc9ca60678f498e895170530f9f
kubernetes-node-linux-arm64.tar.gz d3d1cb767da267ebe8c03c7c6176490d5d047e33596704d099597ff50e5ae3b6
kubernetes-node-linux-ppc64le.tar.gz d7c623d9ccce9cbb4c8a5d1432ac00222b54f420699d565416e09555e2cc7ff3
kubernetes-node-linux-s390x.tar.gz 288cd27f2e428a3e805c7fcc2c3945c0c6ee2db4812ad293e2bfd9f85bccf428
kubernetes-node-windows-amd64.tar.gz 991765513e0f778ec5416de456dfd709ed90a2fa97741f50dfdb0d30ee4ccbc0

Changelog since v1.11.0-rc.2

Other notable changes

  • Pass cluster_location argument to Heapster (#65176, @kawych)
  • Fix concurrent map access panic (#65331, @dashpole)
    • Don't watch .mount cgroups to reduce number of inotify watches
    • Fix NVML initialization race condition
    • Fix brtfs disk metrics when using a subdirectory of a subvolume
  • User can now use sudo crictl on GCE cluster. (#65389, @Random-Liu)

v1.11.0-rc.2

Documentation

Downloads for v1.11.0-rc.2

filename sha256 hash
kubernetes.tar.gz 30742ea1e24ade88e148db872eeef58597813bc67d485c0ff6e4b7284d59500a
kubernetes-src.tar.gz 77e1f018820542088f1e9af453a139ae8ad0691cbde98ab01695a8f499dbe4cf

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 2f8777fcb938bbc310fb481a56dca62e14c27f6a85e61ab4650aeb28e5f9f05a
kubernetes-client-darwin-amd64.tar.gz 30a5ed844d2b6b6b75e19e1f68f5c18ff8ec4f268c149737a6e715bc0a6e297f
kubernetes-client-linux-386.tar.gz e4c60f463366fdf62e9c10c45c6f6b75d63aa3bd6665a0b56c9c2e2104ea9da6
kubernetes-client-linux-amd64.tar.gz 1d62f9ac92f23897d4545ebaf15d78b13b04157d83a839e347f4bd02cc484af4
kubernetes-client-linux-arm.tar.gz 8f52c6da9f95c7e127a6945a164e66d5266ebf2f4d02261653c5dd6936ec6b00
kubernetes-client-linux-arm64.tar.gz e6b677601f0d78cf9463a86d6cc33b4861a88d2fbf3728b9c449a216fb84578e
kubernetes-client-linux-ppc64le.tar.gz 2cd49eb1d5f6d97f1342ee7f4803e9713a9cf4bfa419c86f4e1f82182d27f535
kubernetes-client-linux-s390x.tar.gz e8134efaea3146336b24e76ae2f6f5cdc63f6aeecc65b52cd0aae92edb8432ac
kubernetes-client-windows-386.tar.gz 226b8c687251c877d5876f95f086b131ff3f831fca01dd07caf168269ee2c51d
kubernetes-client-windows-amd64.tar.gz c590a3a7f2e08f8046752b5bbc0d0b11f174f750fdd7912a68dd5335fcedc03d

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 13c518091348c1b4355bf6b1a72514e71f68ad68a51df7d0706666c488e51158
kubernetes-server-linux-arm.tar.gz d4b4fa98ece74d2cc240cf43b59629fe0115d3750d5938ae5ece972251a96018
kubernetes-server-linux-arm64.tar.gz 6b9e9de414619fb28dbbee05537697c2fdce130abe65372b477d3858571bfabd
kubernetes-server-linux-ppc64le.tar.gz 537f27284ad47d37d9ab8c4f4113b90f55948f88cd5dbab203349a34a9ddeccb
kubernetes-server-linux-s390x.tar.gz 71299a59bd4b7b38242631b3f441885ca9dcd99934427c8399b4f4598cc47fbb

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 792da4aa3c06dee14b10f219591af8e967e466c5d5646d8973abfb1071cb5202
kubernetes-node-linux-arm.tar.gz 40a276dd0efdd6e87206d9b2a994ba49c336a455bad7076ddb22a4a6aa0a885f
kubernetes-node-linux-arm64.tar.gz 867504f25a864130c28f18aa5e99be0b2a8e0223ea86d46a4033e76cbe865533
kubernetes-node-linux-ppc64le.tar.gz b1ff4471acf84a0d4f43854c778d6e18f8d0358da1323d1812f1d1a922b56662
kubernetes-node-linux-s390x.tar.gz b527ab6ad8f7a3220e743780412c2d6c7fdaccc4eaa71ccfe90ad3e4e98d1d80
kubernetes-node-windows-amd64.tar.gz 1643e19c7dd5b139a6ab81768249d62392fcad5f6f2aec7edab279009368898b

Changelog since v1.11.0-rc.1

Other notable changes

  • Prevents a kubectl delete hang when deleting controller managed lists (#65367, @deads2k)
  • fixes a memory leak in the kube-controller-manager observed when large numbers of pods with tolerations are created/deleted (#65339, @liggitt)
  • The "kubectl cp" command now supports path shortcuts (../) in remote paths. (#65189, @juanvallejo)
  • Split 'scheduling_latency_seconds' metric into finer steps (predicate, priority, premption) (#65306, @shyamjvs)
  • fixed incorrect OpenAPI schema for CustomResourceDefinition objects (#65256, @liggitt)

v1.11.0-rc.1

Documentation

Downloads for v1.11.0-rc.1

filename sha256 hash
kubernetes.tar.gz f4d6126030d76f4340bf36ba02562388ea6984aa3d3f3ece39359c2a0f605b73
kubernetes-src.tar.gz 6383966a2bc5b252f1938fdfe4a7c35fafaa7642da22f86a017e2b718dedda92

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 1582a21d8e7c9ec8719a003cd79a7c51e984f2b7b703f0816af50efa4b838c6f
kubernetes-client-darwin-amd64.tar.gz 77ae2765fcac147095d2791f42b212a6c150764a311dfb6e7740a70d0c155574
kubernetes-client-linux-386.tar.gz 87f6e22ef05bcd468424b02da2a58c0d695bd875e2130cb94adb842988aa532c
kubernetes-client-linux-amd64.tar.gz 978147f7989b5669a74be5af7c6fe9b3039956c958d17dc53f65ae2364f8485c
kubernetes-client-linux-arm.tar.gz e7e13c6f500f86641f62fcaa34715fd8aa40913fe97ac507a73a726fb6d2f3f4
kubernetes-client-linux-arm64.tar.gz 5e35f3c80f0811b252c725c938dc4803034b4925d6fa1c2f0042132fd19d6db2
kubernetes-client-linux-ppc64le.tar.gz 0cec908e2f85763e9f066661c2f12122b13901004f552729ced66673f12669da
kubernetes-client-linux-s390x.tar.gz ae6e0d7eb75647531b224d8a873528bb951858bfddc9595771def8a26dd2a709
kubernetes-client-windows-386.tar.gz 9eaba9edce7e06c15088612b90c8adc714509cab8ba612019c960dc3fe306b9d
kubernetes-client-windows-amd64.tar.gz dae41cc0be99bec6b28c8bd96eccd6c41b2d51602bc6a374dff922c34708354f

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 73510e5be3650bdeb219e93f78b042b4c9b616cbe672c68cab2e713c13f040ca
kubernetes-server-linux-arm.tar.gz 00475cb20dbabbc7f1a048f0907ef1b2cf34cfacab3ad82d2d86e2afae466eca
kubernetes-server-linux-arm64.tar.gz 00b1a2fa9e7c6b9929e09d7e0ec9aadc3e697d7527dcda9cd7d57e89daf618f5
kubernetes-server-linux-ppc64le.tar.gz 6c2d303a243ca4452c19b613bc71c92222c33c9322983f9a485231a7d2471681
kubernetes-server-linux-s390x.tar.gz c93d9021bd00bd1adda521e6952c72e08beebe8d994ad92cc14c741555e429a9

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 7d84cd7f60186d59e84e4b48bc5cd25ddd0fbcef4ebb2a2a3bd06831433c0135
kubernetes-node-linux-arm.tar.gz 4fa046b5c0b3d860e741b33f4da722a16d4b7de9674ab6a60da2d5749b3175ef
kubernetes-node-linux-arm64.tar.gz db80b1916da3262b1e3aeb658b9a9c829a76e85f97e30c5fc1b07a3ef331003a
kubernetes-node-linux-ppc64le.tar.gz c693a8b7827f9098e8f407182febc24041dd396fdd66c61f8b666252fbbb342a
kubernetes-node-linux-s390x.tar.gz ee5becf3f2034157e4c50488278095c3685a01b7f715693a1053fa986d983dcf
kubernetes-node-windows-amd64.tar.gz 65f4f7a96f89c8dcba6c21e79aeac677790c8338c3f8f0e9e27fb16154d7e06f

Changelog since v1.11.0-beta.2

Action Required

  • A cluster-autoscaler ClusterRole is added to cover only the functionality required by Cluster Autoscaler and avoid abusing system:cluster-admin role. (#64503, @kgolab)
    • action required: Cloud providers other than GCE might want to update their deployments or sample yaml files to reuse the role created via add-on.

Other notable changes

v1.11.0-beta.2

Documentation

Downloads for v1.11.0-beta.2

filename sha256 hash
kubernetes.tar.gz 0addbff3fc61047460da0fca7413f4cc679fac7482c3f09aa4f4a60d8ec8dd5c
kubernetes-src.tar.gz 943629abc5b046cc5db280417e5cf3a8342c5f67c8deb3d7283b02de67b3a3c3

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 9b714bb99e9d8c51c718d9ec719412b2006c921e6a5566acf387797b57014386
kubernetes-client-darwin-amd64.tar.gz 11fc9f94c82b2adc860964be8e84ed1e17ae711329cac3c7aff58067caeeffe2
kubernetes-client-linux-386.tar.gz 016abd161dc394ab6e1e8f57066ff413b523c71ac2af458bfc8dfa2107530910
kubernetes-client-linux-amd64.tar.gz f98c223c24680aae583ff63fa8e1ef49421ddd660bd748fea493841c24ad6417
kubernetes-client-linux-arm.tar.gz 78cf5dca303314023d6f82c7570e92b814304029fb7d3941d7c04855679e120d
kubernetes-client-linux-arm64.tar.gz c35e03687d491d9ca955121912c56d00741c86381370ed5890b0ee8b629a3e01
kubernetes-client-linux-ppc64le.tar.gz 4e848a58f822f971dbda607d26128d1b718fc07665d2f65b87936eec40b037b2
kubernetes-client-linux-s390x.tar.gz ead83a70e4782efdaea3645ca2a59e51209041ce41f9d805d5c1d10f029b1cb0
kubernetes-client-windows-386.tar.gz c357b28c83e769517d7b19e357260d62485e861005d98f84c752d109fa48bd20
kubernetes-client-windows-amd64.tar.gz 2ae78921a35a8a582b226521f904f0840c17e3e097364d6a3fcd10d196bec0dc

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 26bd6e05a4bf942534f0578b1cdbd11b8c868aa3331e2681734ecc93d75f6b85
kubernetes-server-linux-arm.tar.gz df706ccad0a235613e644eda363c49bfb858860a2ae5219b17b996f36669a7fc
kubernetes-server-linux-arm64.tar.gz 73f3e7a82d7c78a9f03ce0c84ae4904942f0bf88b3bf045fc9b1707b686cb04e
kubernetes-server-linux-ppc64le.tar.gz ebeb67e45e630469d55b442d2c6092065f1c1403d1965c4340d0b6c1fa7f6676
kubernetes-server-linux-s390x.tar.gz c82e6a41b8e451600fb5bfdad3addf3c35b5edb518a7bf9ebd03af0574d57975

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz e6dbd56c10fee83f400e76ae02325eda0a583347f6b965eeb610c90d664d7990
kubernetes-node-linux-arm.tar.gz df9d18c3af4d6ee237a238b3029823f6e90b2ae3f0d25b741d4b3fedb7ea14f8
kubernetes-node-linux-arm64.tar.gz d84e98702651615336256d3453516df9ad39f39400f6091d9e2b4c95b4111ede
kubernetes-node-linux-ppc64le.tar.gz a62037f00ab29302f72aa23116c304b676cc41a6f47f79a2faf4e4ea18059178
kubernetes-node-linux-s390x.tar.gz bef66f2080f7ebf442234d841ec9c994089fa02b400d98e1b01021f1f66c4cd0
kubernetes-node-windows-amd64.tar.gz 2b029715b98c3355a172ed5a6e08e73ad4ef264c74a26ed5a3da67f90764b7dc

Changelog since v1.11.0-beta.1

Action Required

  • [action required] kubeadm join is now blocking on the kubelet performing the TLS Bootstrap properly. (#64792, @luxas)
    • Earlier, kubeadm join only did the discovery part and exited successfully without checking that the
    • kubelet actually started properly and performed the TLS bootstrap correctly. Now, as kubeadm runs
    • some post-join steps (e.g. annotating the Node API object with the CRISocket as in this PR, as a
    • stop-gap until this is discoverable automatically), kubeadm join is now waiting for the kubelet to
    • perform the TLS Bootstrap, and then uses that credential to perform further actions. This also
    • improves the UX, as kubeadm will exit with a non-zero code if the kubelet isn't in a functional
    • state, instead of pretending like everything's fine.
  • [action required] The structure of the kubelet dropin in the kubeadm deb package has changed significantly. (#64780, @luxas)
    • Instead of hard-coding the parameters for the kubelet in the dropin, a structured configuration file
    • for the kubelet is used, and is expected to be present in /var/lib/kubelet/config.yaml.
    • For runtime-detected, instance-specific configuration values, a environment file with
    • dynamically-generated flags at kubeadm init or kubeadm join run time is used.
    • Finally, if the user wants to override something specific for the kubelet that can't be done via
    • the kubeadm Configuration file (which is preferred), they might add flags to the
    • KUBELET_EXTRA_ARGS environment variable in either /etc/default/kubelet
    • or /etc/sysconfig/kubelet, depending on the system you're running on.
  • [action required] The --node-name flag for kubeadm now dictates the Node API object name the (#64706, @liztio)
    • kubelet uses for registration, in all cases but where you might use an in-tree cloud provider.
    • If you're not using an in-tree cloud provider, --node-name will set the Node API object name.
    • If you're using an in-tree cloud provider, you MUST make --node-name match the name the
    • in-tree cloud provider decides to use.
  • [action required] kubeadm: The Token-related fields in the MasterConfiguration object have now been refactored. Instead of the top-level .Token, .TokenTTL, .TokenUsages, .TokenGroups fields, there is now a BootstrapTokens slice of BootstrapToken objects that support the same features under the .Token, .TTL, .Usages, .Groups fields. (#64408, @luxas)

Other notable changes

  • Add Vertical Pod Autoscaler to autoscaling/v2beta1 (#63797, @kgrygiel)
  • kubeadm: only run kube-proxy on architecture consistent nodes (#64696, @dixudx)
  • kubeadm: Add a new kubeadm upgrade node config command (#64624, @luxas)
  • Orphan delete is now supported for custom resources (#63386, @roycaihw)
  • Update version of Istio addon from 0.6.0 to 0.8.0. (#64537, @ostromart)
  • Provides API support for external CSI storage drivers to support block volumes. (#64723, @vladimirvivien)
  • kubectl will list all allowed print formats when an invalid format is passed. (#64371, @CaoShuFeng)
  • Use IONice to reduce IO priority of du and find (#64800, @dashpole)
    • cAdvisor ContainerReference no longer contains Labels. Use ContainerSpec instead.
    • Fix a bug where cadvisor failed to discover a sub-cgroup that was created soon after the parent cgroup.
  • Kubelet will set extended resource capacity to zero after it restarts. If the extended resource is exported by a device plugin, its capacity will change to a valid value after the device plugin re-connects with the Kubelet. If the extended resource is exported by an external component through direct node status capacity patching, the component should repatch the field after kubelet becomes ready again. During the time gap, pods previously assigned with such resources may fail kubelet admission but their controller should create new pods in response to such failures. (#64784, @jiayingz)
  • Introduce ContainersReady condition in Pod Status (#64646, @freehan)
  • The Sysctls experimental feature has been promoted to beta (enabled by default via the Sysctls feature flag). PodSecurityPolicy and Pod objects now have fields for specifying and controlling sysctls. Alpha sysctl annotations will be ignored by 1.11+ kubelets. All alpha sysctl annotations in existing deployments must be converted to API fields to be effective. (#63717, @ingvagabund)
  • kubeadm now configures the etcd liveness probe correctly when etcd is listening on all interfaces (#64670, @stealthybox)
  • Fix regression in v1.JobSpec.backoffLimit that caused failed Jobs to be restarted indefinitely. (#63650, @soltysh)
  • GCE: Update cloud provider to use TPU v1 API (#64727, @yguo0905)
  • Kubelet: Add security context for Windows containers (#64009, @feiskyer)
  • Volume topology aware dynamic provisioning (#63193, @lichuqiang)
  • CoreDNS deployment configuration now uses k8s.gcr.io imageRepository (#64775, @rajansandeep)
  • Updated Container Storage Interface specification version to v0.3.0 (#64719, @davidz627)
  • Kubeadm: Make CoreDNS run in read-only mode and drop all unneeded privileges (#64473, @nberlee)
  • Add a volume projection that is able to project service account tokens. (#62005, @mikedanese)
  • Fix kubectl auth can-i exit code. It will return 1 if the user is not allowed and 0 if it's allowed. (#59579, @fbac)
  • apply global flag "context" for kubectl config view --minify (#64608, @dixudx)
  • Fix kube-controller-manager panic while provisioning Azure security group rules (#64739, @feiskyer)
  • API change for volume topology aware dynamic provisioning (#63233, @lichuqiang)
  • Add azuredisk PV size grow feature (#64386, @andyzhangx)
  • Modify e2e tests to use priorityClass beta version & switch priorityClass feature to beta (#63724, @ravisantoshgudimetla)
  • Adding CSI driver registration code. (#64560, @sbezverk)
  • fixes a potential deadlock in the garbage collection controller (#64235, @liggitt)
  • Fixes issue for readOnly subpath mounts for SELinux systems and when the volume mountPath already existed in the container image. (#64351, @msau42)
  • Add log and fs stats for Windows containers (#62266, @feiskyer)
  • client-go: credential exec plugins have been promoted to beta (#64482, @ericchiang)
  • Revert #64364 to resurrect rescheduler. For More info see[#64725] https://github.com/kubernetes/kubernetes/issues/64725 and (#64592, @ravisantoshgudimetla)
  • Add RequestedToCapacityRatioPriority priority function. Function is parametrized with set of points mapping node utilization (0-100) to score (0-10). (#63929, @losipiuk)
    • Function is linear between points. Resource utilization is defined as one minus ratio of total amount of resource requested by pods on node and node's capacity (scaled to 100).
    • Final utilization used for computation is arithmetic mean of cpu utilization and memory utilization.
    • Function is disabled by default and can be enabled via scheduler policy config file.
    • If no parametrization is specified in config file it defaults to one which gives score 10 to utilization 0 and score 0 to utilization 100.
  • kubeadm init detects if systemd-resolved is running and configures the kubelet to use a working resolv.conf. (#64665, @stealthybox)
  • fix data loss issue if using existing azure disk with partitions in disk mount (#63270, @andyzhangx)
  • Meta data of CustomResources is now pruned and schema checked during deserialization of requests and when read from etcd. In the former case, invalid meta data is rejected, in the later it is dropped from the CustomResource objects. (#64267, @sttts)
  • Add Alpha support for dynamic volume limits based on node type (#64154, @gnufied)
  • Fixed CSI gRPC connection leak during volume operations. (#64519, @vladimirvivien)
  • in-tree support for openstack credentials is now deprecated. please use the "client-keystone-auth" from the cloud-provider-openstack repository. details on how to use this new capability is documented here - https://github.com/kubernetes/cloud-provider-openstack/blob/master/docs/using-client-keystone-auth.md (#64346, @dims)
  • ScheduleDaemonSetPods is an alpha feature (since v1.11) that causes DaemonSet Pods (#63223, @k82cn)
    • to be scheduler by default scheduler, instead of Daemonset controller. When it is enabled,
    • the NodeAffinity term (instead of .spec.nodeName) is added to the DaemonSet Pods;
    • this enables the default scheduler to bind the Pod to the target host. If node affinity
    • of DaemonSet Pod already exists, it will be replaced.
    • DaemonSet controller will only perform these operations when creating DaemonSet Pods;
    • and those operations will only modify the Pods of DaemonSet, no changes are made to the
    • .spec.template of DaemonSet.
  • fix formatAndMount func issue on Windows (#63248, @andyzhangx)
  • AWS EBS, Azure Disk, GCE PD and Ceph RBD volume plugins support dynamic provisioning of raw block volumes. (#64447, @jsafrane)
  • kubeadm upgrade apply can now ignore version errors with --force (#64570, @liztio)
  • Adds feature gate for plugin watcher (#64605, @vikaschoudhary16)
  • Kubelet now proxies container streaming between apiserver and container runtime. The connection between kubelet and apiserver is authenticated. Container runtime should change streaming server to serve on localhost, to make the connection between kubelet and container runtime local. (#64006, @Random-Liu)
    • In this way, the whole container streaming connection is secure. To switch back to the old behavior, set --redirect-container-streaming=true flag.
  • TokenRequests now are required to have an expiration duration between 10 minutes and 2^32 seconds. (#63999, @mikedanese)
  • Expose /debug/flags/v to allow dynamically set glog logging level, if want to change glog level to 3, you only have to send a PUT request with like curl -X PUT http://127.0.0.1:8080/debug/flags/v -d "3". (#63777, @hzxuzhonghu)
  • New conformance test added for Watch. (#61424, @jennybuckley)
  • The GitRepo volume type is deprecated. To provision a container with a git repo, mount an EmptyDir into an InitContainer that clones the repo using git, then mount the EmptyDir into the Pod's container. (#63445, @ericchiang)
  • kubeadm now preserves previous manifests after upgrades (#64337, @liztio)
  • Implement kubelet side online file system resizing (#62460, @mlmhl)

v1.11.0-beta.1

Documentation

Downloads for v1.11.0-beta.1

filename sha256 hash
kubernetes.tar.gz 3209303a10ca8dd311c500ee858b9151b43c1bb5c2b3a9fb9281722e021d6871
kubernetes-src.tar.gz c2e4d3b1beb4cd0b2a775394a30da2c2949d380e57f729dc48c541069c103326

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz cbded4d58b3d2cbeb2e43c48c9dd359834c9c9aa376751a7f8960be45601fb40
kubernetes-client-darwin-amd64.tar.gz ceccd21fda90b96865801053f1784d4062d69b11e2e911483223860dfe6c3a17
kubernetes-client-linux-386.tar.gz 75c9794a7f43f891aa839b2571fa44ffced25197578adc31b4c3cb28d7fbf158
kubernetes-client-linux-amd64.tar.gz 184905f6b8b856306483d811d015cf0b28c0703ceb372594622732da2a07989f
kubernetes-client-linux-arm.tar.gz 2d985829499588d32483d7c6a36b3b0f2b6d4031eda31c65b066b77bc51bae66
kubernetes-client-linux-arm64.tar.gz 268556ede751058162a42d0156f27e42e37b23d60b2485e350cffe6e1b376fa4
kubernetes-client-linux-ppc64le.tar.gz 8859bd7a37bf5a659eb17e47d2c54d228950b2ef48243c93f11799c455789983
kubernetes-client-linux-s390x.tar.gz 90bbe2fc45ae722a05270820336b9178baaab198401bb6888e817afe6a1a304e
kubernetes-client-windows-386.tar.gz 948b01f555abfc30990345004d5ce679d4b9d0a32d699a50b6d8309040b2b2f2
kubernetes-client-windows-amd64.tar.gz 091e9d4e7fa611cf06d2907d159e0cc36ae8602403ad0819d62df4ddbaba6095

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 727a5e8241035d631d90f3d119a27384abe93cde14c242c4d2d1cf948f84a650
kubernetes-server-linux-arm.tar.gz 6eb7479348e9480d9d1ee31dc991297b93e076dd21b567c595f82d45b66ef949
kubernetes-server-linux-arm64.tar.gz 9eab5ccdfba2803a743ed12b4323ad0e8e0215779edf5752224103b6667a35c1
kubernetes-server-linux-ppc64le.tar.gz d86b07ee28ed3d2c0668a2737fff4b3d025d4cd7b6f1aadc85f8f13b4c12e578
kubernetes-server-linux-s390x.tar.gz c2d19acb88684a52a74f469ab26874ab224023f29290865e08c86338d30dd598

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 2957bf3e9dc9cd9570597434909e5ef03e996f8443c02f9d95fa6de2cd17126f
kubernetes-node-linux-arm.tar.gz 5995b8b9628fca9eaa92c283cfb4199ab353efa8953b980eec994f49ac3a0ebd
kubernetes-node-linux-arm64.tar.gz 996691b3b894ec9769be1ee45c5053ff1560e3ef161de8f8b9ac067c0d3559d3
kubernetes-node-linux-ppc64le.tar.gz 8bb7fe72ec704afa5ad96356787972144b0f7923fc68678894424f1f62da7041
kubernetes-node-linux-s390x.tar.gz 4c1f0314ad60537c8a7866b0cabdece21284ee91ae692d1999b3d5273ee7cbaf
kubernetes-node-windows-amd64.tar.gz 158832f41cd452f93482cc8a8f1dd69cc243eb63ce3581e7f2eab2de323f6202

Changelog since v1.11.0-alpha.2

Action Required

  • [action required] .NodeName and .CRISocket in the MasterConfiguration and NodeConfiguration v1alpha1 API objects are now .NodeRegistration.Name and .NodeRegistration.CRISocket respectively in the v1alpha2 API. The .NoTaintMaster field has been removed in the v1alpha2 API. (#64210, @luxas)
  • (ACTION REQUIRED) PersisntVolumeLabel admission controller is now disabled by default. If you depend on this feature (AWS/GCE) then ensure it is added to the --enable-admission-plugins flag on the kube-apiserver. (#64326, @andrewsykim)
  • [action required] kubeadm: The :Etcd struct has been refactored in the v1alpha2 API. All the options now reside under either .Etcd.Local or .Etcd.External. Automatic conversions from the v1alpha1 API are supported. (#64066, @luxas)
  • [action required] kubeadm: kubelets in kubeadm clusters now disable the readonly port (10255). If you're relying on unauthenticated access to the readonly port, please switch to using the secure port (10250). Instead, you can now use ServiceAccount tokens when talking to the secure port, which will make it easier to get access to e.g. the /metrics endpoint of the kubelet securely. (#64187, @luxas)
  • [action required] kubeadm: Support for .AuthorizationModes in the kubeadm v1alpha2 API has been removed. Instead, you can use the .APIServerExtraArgs and .APIServerExtraVolumes fields to achieve the same effect. Files using the v1alpha1 API and setting this field will be automatically upgraded to this v1alpha2 API and the information will be preserved. (#64068, @luxas)
  • [action required] The formerly publicly-available cAdvisor web UI that the kubelet ran on port 4194 by default is now turned off by default. The flag configuring what port to run this UI on --cadvisor-port was deprecated in v1.10. Now the default is --cadvisor-port=0, in other words, to not run the web server. The recommended way to run cAdvisor if you still need it, is via a DaemonSet. The --cadvisor-port will be removed in v1.12 (#63881, @luxas)
  • [action required] kubeadm: The .ImagePullPolicy field has been removed in the v1alpha2 API version. Instead it's set statically to IfNotPresent for all required images. If you want to always pull the latest images before cluster init (like what Always would do), run kubeadm config images pull before each kubeadm init. If you don't want the kubelet to pull any images at kubeadm init time, as you for instance don't have an internet connection, you can also run kubeadm config images pull before kubeadm init or side-load the images some other way (e.g. docker load -i image.tar). Having the images locally cached will result in no pull at runtime, which makes it possible to run without any internet connection. (#64096, @luxas)
  • [action required] In the new v1alpha2 kubeadm Configuration API, the .CloudProvider and .PrivilegedPods fields don't exist anymore. (#63866, @luxas)
    • Instead, you should use the out-of-tree cloud provider implementations which are beta in v1.11.
    • If you have to use the legacy in-tree cloud providers, you can rearrange your config like the example below. In case you need the cloud-config file (located in {cloud-config-path}), you can mount it into the API Server and controller-manager containers using ExtraVolumes like the example below.
    • If you need to use the .PrivilegedPods functionality, you can still edit the manifests in /etc/kubernetes/manifests/, and set .SecurityContext.Privileged=true for the apiserver and controller manager.
kind: MasterConfiguration
apiVersion: kubeadm.k8s.io/v1alpha2
apiServerExtraArgs:
  cloud-provider: "{cloud}"
  cloud-config: "{cloud-config-path}"
apiServerExtraVolumes:
- name: cloud
  hostPath: "{cloud-config-path}"
  mountPath: "{cloud-config-path}"
controllerManagerExtraArgs:
  cloud-provider: "{cloud}"
  cloud-config: "{cloud-config-path}"
controllerManagerExtraVolumes:
- name: cloud
  hostPath: "{cloud-config-path}"
  mountPath: "{cloud-config-path}"
  • [action required] kubeadm now uses an upgraded API version for the configuration file, kubeadm.k8s.io/v1alpha2. kubeadm in v1.11 will still be able to read v1alpha1 configuration, and will automatically convert the configuration to v1alpha2 internally and when storing the configuration in the ConfigMap in the cluster. (#63788, @luxas)
  • The annotation service.alpha.kubernetes.io/tolerate-unready-endpoints is deprecated. Users should use Service.spec.publishNotReadyAddresses instead. (#63742, @thockin)
  • avoid duplicate status in audit events (#62695, @CaoShuFeng)

Other notable changes

  • Remove rescheduler from master. (#64364, @ravisantoshgudimetla)
  • Declare IPVS-based kube-proxy GA (#58442, @m1093782566)
  • kubeadm: conditionally set the kubelet cgroup driver for Docker (#64347, @neolit123)
  • kubectl built for darwin from darwin now enables cgo to use the system-native C libraries for DNS resolution. Cross-compiled kubectl (e.g. from an official kubernetes release) still uses the go-native netgo DNS implementation. (#64219, @ixdy)
  • AWS EBS volumes can be now used as ReadOnly in pods. (#64403, @jsafrane)
  • Exec authenticator plugin supports TLS client certificates. (#61803, @awly)
  • Use Patch instead of Put to sync pod status (#62306, @freehan)
  • kubectl apply --prune supports CronJob resource. (#62991, @tomoe)
  • Label ExternalEtcdClientCertificates can be used for ignoring all preflight check issues related to client certificate files for external etcd. (#64269, @kad)
  • Provide a meaningful error message in openstack cloud provider when no valid IP address can be found for a node (#64318, @gonzolino)
  • kubeadm: Add a 'kubeadm config migrate' command to convert old API types to their newer counterparts in the new, supported API types. This is just a client-side tool, it just executes locally without requiring a cluster to be running. You can think about this as an Unix pipe that upgrades config files. (#64232, @luxas)
  • The --dry-run flag has been enabled for kubectl auth reconcile (#64458, @mrogers950)
  • Add probe based mechanism for kubelet plugin discovery (#63328, @vikaschoudhary16)
  • Add Establishing Controller on CRDs to avoid race between Established condition and CRs actually served. In HA setups, the Established condition is delayed by 5 seconds. (#63068, @xmudrii)
  • CoreDNS is now v1.1.3 (#64258, @rajansandeep)
  • kubeadm will pull required images during preflight checks if it cannot find them on the system (#64105, @chuckha)
  • kubeadm: rename the addon parameter kube-dns to coredns for kubeadm alpha phases addons as CoreDNS is now the default DNS server in 1.11. (#64274, @neolit123)
  • kubeadm: when starting the API server use the arguments --enable-admission-plugins and --disable-admission-plugins instead of the deprecated --admission-control. (#64165, @neolit123)
  • Add spec.additionalPrinterColumns to CRDs to define server side printing columns. (#60991, @sttts)
  • fix azure file size grow issue (#64383, @andyzhangx)
  • Fix issue of colliding nodePorts when the cluster has services with externalTrafficPolicy=Local (#64349, @nicksardo)
  • fixes a panic applying json patches containing out of bounds operations (#64355, @liggitt)
  • Fail fast if cgroups-per-qos is set on Windows (#62984, @feiskyer)
  • Move Volume expansion to Beta (#64288, @gnufied)
  • kubectl delete does not use reapers for removing objects anymore, but relies on server-side GC entirely (#63979, @soltysh)
  • Basic plumbing for volume topology aware dynamic provisioning (#63232, @lichuqiang)
  • API server properly parses propagationPolicy as a query parameter sent with a delete request (#63414, @roycaihw)
  • Property serverAddressByClientCIDRs in metav1.APIGroup (discovery API) now become optional instead of required (#61963, @roycaihw)
  • The dynamic Kubelet config feature is now beta, and the DynamicKubeletConfig feature gate is on by default. In order to use dynamic Kubelet config, ensure that the Kubelet's --dynamic-config-dir option is set. (#64275, @mtaufen)
  • Add reason message logs for non-exist Azure resources (#64248, @feiskyer)
  • Fix SessionAffinity not updated issue for Azure load balancer (#64180, @feiskyer)
  • The kube-apiserver openapi doc now includes extensions identifying APIService and CustomResourceDefinition kinds (#64174, @liggitt)
  • apiservices/status and certificatesigningrequests/status now support GET and PATCH (#64063, @roycaihw)
  • kubectl: This client version requires the apps/v1 APIs, so it will not work against a cluster version older than v1.9.0. Note that kubectl only guarantees compatibility with clusters that are +/-1 minor version away. (#61419, @enisoc)
  • Correct the way we reset containers and pods in kubeadm via crictl (#63862, @runcom)
  • Allow env from resource with keys & updated tests (#60636, @PhilipGough)
  • The kubelet certificate rotation feature can now be enabled via the .RotateCertificates field in the kubelet's config file. The --rotate-certificates flag is now deprecated, and will be removed in a future release. (#63912, @luxas)
  • Use DeleteOptions.PropagationPolicy instead of OrphanDependents in kubectl (#59851, @nilebox)
  • add block device support for azure disk (#63841, @andyzhangx)
  • Fix incorrectly propagated ResourceVersion in ListRequests returning 0 items. (#64150, @wojtek-t)
  • Changes ext3/ext4 volume creation to not reserve any portion of the volume for the root user. (#64102, @atombender)
  • Add CRD Versioning with NOP converter (#63830, @mbohlool)
  • adds a kubectl wait command (#64034, @deads2k)
  • "kubeadm init" now writes a structured and versioned kubelet ComponentConfiguration file to /var/lib/kubelet/config.yaml and an environment file with runtime flags (you can source this file in the systemd kubelet dropin) to /var/lib/kubelet/kubeadm-flags.env. (#63887, @luxas)
  • kubectl auth reconcile only works with rbac.v1 (#63967, @deads2k)
  • The dynamic Kubelet config feature will now update config in the event of a ConfigMap mutation, which reduces the chance for silent config skew. Only name, namespace, and kubeletConfigKey may now be set in Node.Spec.ConfigSource.ConfigMap. The least disruptive pattern for config management is still to create a new ConfigMap and incrementally roll out a new Node.Spec.ConfigSource. (#63221, @mtaufen)
  • Graduate CRI container log rotation to beta, and enable it by default. (#64046, @yujuhong)
  • APIServices with kube-like versions (e.g. v1, v2beta1, etc.) will be sorted appropriately within each group. (#64004, @mbohlool)
  • kubectl and client-go now detects duplicated name for user, cluster and context when loading kubeconfig and reports error (#60464, @roycaihw)
  • event object references with apiversion will now report an apiversion. (#63913, @deads2k)
  • Subresources for custom resources is now beta and enabled by default. With this, updates to the /status subresource will disallow updates to all fields other than .status (not just .spec and .metadata as before). Also, required can be used at the root of the CRD OpenAPI validation schema when the /status subresource is enabled. (#63598, @nikhita)
  • increase grpc client default response size (#63977, @runcom)
  • HTTP transport now uses context.Context to cancel dial operations. k8s.io/client-go/transport/Config struct has been updated to accept a function with a context.Context parameter. This is a breaking change if you use this field in your code. (#60012, @ash2k)
  • Adds a mechanism in vSphere Cloud Provider to get credentials from Kubernetes secrets (#63902, @abrarshivani)
  • kubeadm: A kubeadm config print-default command has now been added that you can use as a starting point when writing your own kubeadm configuration files (#63969, @luxas)
  • Update event-exporter to version v0.2.0 that supports old (gke_container/gce_instance) and new (k8s_container/k8s_node/k8s_pod) stackdriver resources. (#63918, @cezarygerard)
  • Cluster Autoscaler 1.2.2 (release notes: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.2.2) (#63974, @aleksandra-malinowska)
  • Update kubeadm's minimum supported kubernetes in v1.11.x to 1.10 (#63920, @dixudx)
  • Add 'UpdateStrategyType' and 'RollingUpdateStrategy' to 'kubectl describe sts' command output. (#63844, @tossmilestone)
  • Remove UID mutation from request.context. (#63957, @hzxuzhonghu)
  • kubeadm has removed .Etcd.SelfHosting from its configuration API. It was never used in practice. (#63871, @luxas)
  • list/watch API requests with a fieldSelector that specifies metadata.name can now be authorized as requests for an individual named resource (#63469, @wojtek-t)
  • Add a way to pass extra arguments to etcd. (#63961, @mborsz)
  • minor fix for VolumeZoneChecker predicate, storageclass can be in annotation and spec. (#63749, @wenlxie)
  • vSphere Cloud Provider: add SAML token authentication support (#63824, @dougm)
  • adds the kubeadm upgrade diff command to show how static pod manifests will be changed by an upgrade. (#63930, @liztio)
  • Fix memory cgroup notifications, and reduce associated log spam. (#63220, @dashpole)
  • Adds a kubeadm config images pull command to pull container images used by kubeadm. (#63833, @chuckha)
  • Restores the pre-1.10 behavior of the openstack cloud provider which uses the instance name as the Kubernetes Node name. This requires instances be named with RFC-1123 compatible names. (#63903, @liggitt)
  • Added support for NFS relations on kubernetes-worker charm. (#63817, @hyperbolic2346)
  • Stop using InfluxDB as default cluster monitoring (#62328, @serathius)
    • InfluxDB cluster monitoring is deprecated and will be removed in v1.12
  • GCE: Fix to make the built-in kubernetes service properly point to the master's load balancer address in clusters that use multiple master VMs. (#63696, @grosskur)
  • Kubernetes cluster on GCE have crictl installed now. Users can use it to help debug their node. The documentation of crictl can be found https://github.com/kubernetes-incubator/cri-tools/blob/master/docs/crictl.md. (#63357, @Random-Liu)
  • The NodeRestriction admission plugin now prevents kubelets from modifying/removing taints applied to their Node API object. (#63167, @liggitt)
  • The status of dynamic Kubelet config is now reported via Node.Status.Config, rather than the KubeletConfigOk node condition. (#63314, @mtaufen)
  • kubeadm now checks that IPv4/IPv6 forwarding is enabled (#63872, @kad)
  • kubeadm will now deploy CoreDNS by default instead of KubeDNS (#63509, @detiber)
  • This PR will leverage subtests on the existing table tests for the scheduler units. (#63658, @xchapter7x)
    • Some refactoring of error/status messages and functions to align with new approach.
  • kubeadm upgrade now supports external etcd setups again (#63495, @detiber)
  • fix mount unmount failure for a Windows pod (#63272, @andyzhangx)
  • CRI: update documents for container logpath. The container log path has been changed from containername_attempt#.log to containername/attempt#.log (#62015, @feiskyer)
  • Create a new dryRun query parameter for mutating endpoints. If the parameter is set, then the query will be rejected, as the feature is not implemented yet. This will allow forward compatibility with future clients; otherwise, future clients talking with older apiservers might end up modifying a resource even if they include the dryRun query parameter. (#63557, @apelisse)
  • kubelet: fix hangs in updating Node status after network interruptions/changes between the kubelet and API server (#63492, @liggitt)
  • The PriorityClass API is promoted to scheduling.k8s.io/v1beta1 (#63100, @ravisantoshgudimetla)
  • Services can listen on same host ports on different interfaces with --nodeport-addresses specified (#62003, @m1093782566)
  • kubeadm will no longer generate an unused etcd CA and certificates when configured to use an external etcd cluster. (#63806, @detiber)
  • corrects a race condition in bootstrapping aggregated cluster roles in new HA clusters (#63761, @liggitt)
  • Adding initial Korean translation for kubectl (#62040, @ianychoi)
  • Report node DNS info with --node-ip flag (#63170, @micahhausler)
  • The old dynamic client has been replaced by a new one. The previous dynamic client will exist for one release in client-go/deprecated-dynamic. Switch as soon as possible. (#63446, @deads2k)
  • CustomResourceDefinitions Status subresource now supports GET and PATCH (#63619, @roycaihw)
  • Re-enable nodeipam controller for external clouds. (#63049, @andrewsykim)
  • Removes a preflight check for kubeadm that validated custom kube-apiserver, kube-controller-manager and kube-scheduler arguments. (#63673, @chuckha)
  • Adds a list-images subcommand to kubeadm that lists required images for a kubeadm install. (#63450, @chuckha)
  • Apply pod name and namespace labels to pod cgroup in cAdvisor metrics (#63406, @derekwaynecarr)
  • try to read openstack auth config from client config and fall back to read from the environment variables if not available (#60200, @dixudx)
  • GC is now bound by QPS (it wasn't before) and so if you need more QPS to avoid ratelimiting GC, you'll have to set it. (#63657, @shyamjvs)
  • The Kubelet's deprecated --allow-privileged flag now defaults to true. This enables users to stop setting --allow-privileged in order to transition to PodSecurityPolicy. Previously, users had to continue setting --allow-privileged, because the default was false. (#63442, @mtaufen)
  • You must now specify Node.Spec.ConfigSource.ConfigMap.KubeletConfigKey when using dynamic Kubelet config to tell the Kubelet which key of the ConfigMap identifies its config file. (#59847, @mtaufen)
  • Kubernetes version command line parameter in kubeadm has been updated to drop an unnecessary redirection from ci/latest.txt to ci-cross/latest.txt. Users should know exactly where the builds are stored on Google Cloud storage buckets from now on. For example for 1.9 and 1.10, users can specify ci/latest-1.9 and ci/latest-1.10 as the CI build jobs what build images correctly updates those. The CI jobs for master update the ci-cross/latest location, so if you are looking for latest master builds, then the correct parameter to use would be ci-cross/latest. (#63504, @dims)
  • Search standard KubeConfig file locations when using kubeadm token without --kubeconfig. (#62850, @neolit123)
  • Include the list of security groups when failing with the errors that more then one is tagged (#58874, @sorenmat)
  • Allow "required" to be used at the CRD OpenAPI validation schema when the /status subresource is enabled. (#63533, @sttts)
  • When updating /status subresource of a custom resource, only the value at the .status subpath for the update is considered. (#63385, @CaoShuFeng)
  • Supported nodeSelector.matchFields (node's metadata.node) in scheduler. (#62453, @k82cn)
  • Do not check vmSetName when getting Azure node's IP (#63541, @feiskyer)
  • Fix stackdriver metrics for node memory using wrong metric type (#63535, @serathius)
  • [fluentd-gcp addon] Use the logging agent's node name as the metadata agent URL. (#63353, @bmoyles0117)
  • kubectl cp supports completion. (#60371, @superbrothers)
  • Azure VMSS: support VM names to contain the _ character (#63526, @djsly)
  • OpenStack built-in cloud provider is now deprecated. Please use the external cloud provider for OpenStack. (#63524, @dims)
  • the shortcuts which were moved server-side in at least 1.9 have been removed from being hardcoded in kubectl (#63507, @deads2k)
  • Fixes fake client generation for non-namespaced subresources (#60445, @jhorwit2)
  • kubectl delete with selection criteria defaults to ignoring not found errors (#63490, @deads2k)
  • Increase scheduler cache generation number monotonically in order to avoid collision and use of stale information in scheduler. (#63264, @bsalamat)
  • Fixes issue where subpath readOnly mounts failed (#63045, @msau42)
  • Update to use go1.10.2 (#63412, @praseodym)
  • kubectl create [secret | configmap] --from-file now works on Windows with fully-qualified paths (#63439, @liggitt)
  • kube-apiserver: the default --endpoint-reconciler-type is now lease. The master-count endpoint reconciler type is deprecated and will be removed in 1.13. (#63383, @liggitt)
  • owner references can be set during creation without deletion power (#63403, @deads2k)
  • Lays groundwork for OIDC distributed claims handling in the apiserver authentication token checker. (#63213, @filmil)
  • Use /usr/bin/env in all script shebangs to increase portability. (#62657, @matthyx)

v1.11.0-alpha.2

Documentation

Downloads for v1.11.0-alpha.2

filename sha256 hash
kubernetes.tar.gz 8f352d4f44b0c539cfb4fb72a64098c155771916cff31642b131f1eb7879da20
kubernetes-src.tar.gz d2de8df039fd3bd997c992abedb0353e37691053bd927627c6438ad654055f80

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz ca70a374de0c3be4897d913f6ad22e426c6336837be6debff3cbf5f3fcf4b3ae
kubernetes-client-darwin-amd64.tar.gz d6e0e6f286ef20a54047038b337b8a47f6cbd105b69917137c5c30c8fbee006f
kubernetes-client-linux-386.tar.gz 6e73e49fa99391e1474d63a102f3cf758ef84b781bc0c0de42f1e5d1cc89132b
kubernetes-client-linux-amd64.tar.gz 1c0c7a7aefabcda0d0407dfadd2ee7e379b395ae4ad1671535d99305e72eb2ae
kubernetes-client-linux-arm.tar.gz e6310653c31114efe32db29aa06c2c1530c285cda4cccc30edf4926d0417a3a6
kubernetes-client-linux-arm64.tar.gz 188312f25a53cf30f8375ab5727e64067ede4fba53823c3a4e2e4b768938244e
kubernetes-client-linux-ppc64le.tar.gz 875f77e17c3236dde0d6e5f302c52a5193f1bf1d79d72115ae1c6de5f494b0a3
kubernetes-client-linux-s390x.tar.gz 18502d6bd9fb483c3a858d73e2d55e32b946cbb351e09788671aca6010e39ba8
kubernetes-client-windows-386.tar.gz f0e83868dd731365b8e3f95fe33622a59d0b67d97907089c2a1c56a8eca8ebf7
kubernetes-client-windows-amd64.tar.gz 571898fd6f612d75c9cfb248875cefbe9761155f3e8c7df48fce389606414028

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 1f36c8bb40050d4371f0d8362e8fad9d60c39c5f7f9e5569ec70d0731c9dd438
kubernetes-server-linux-arm.tar.gz f503c149c1aaef2df9fea146524c4f2cb505a1946062959d1acf8bc399333437
kubernetes-server-linux-arm64.tar.gz 660d282c18e2988744d902cb2c9f3b962b3418cbfae3644e3ea854835ca19d32
kubernetes-server-linux-ppc64le.tar.gz 0682060c38c704c710cc42a887b40e26726fad9cb23368ef44236527c2a7858f
kubernetes-server-linux-s390x.tar.gz 319337deee4e12e30da57ca484ef435f280a36792c2e2e3cd3515079b911281a

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 8d111b862d4cb3490d5ee2b97acd439e10408cba0c7f04c98a9f0470a4869e20
kubernetes-node-linux-arm.tar.gz e04a30445bdabc0b895e036497fdebd102c39a53660108e45c870ae7ebc6dced
kubernetes-node-linux-arm64.tar.gz 5fea9ce404e76e7d32c06aa2e1fbf2520531901c16a2e5f0047712d0a9422e42
kubernetes-node-linux-ppc64le.tar.gz fc6e0568f5f72790d14260ff70fe0802490a3772ed9aef2723952d706ef0fa3d
kubernetes-node-linux-s390x.tar.gz 54f97b09c5adb4657e48fda59a9f4657386b0aa4be787c188eef1ece41bd4eb8
kubernetes-node-windows-amd64.tar.gz 72dbc9c474b15cc70e7d806cd0f78f10af1f9a7b4a11f014167f1d47277154cf

Changelog since v1.11.0-alpha.1

Other notable changes

  • kubeadm upgrade plan now accepts a version which improves the UX nicer in air-gapped environments. (#63201, @chuckha)
  • kubectl now supports --field-selector for delete, label, and annotate (#60717, @liggitt)
  • kube-apiserver: --endpoint-reconciler-type now defaults to lease. The master-count reconciler is deprecated and will be removed in 1.13. (#58474, @rphillips)
  • OpenStack cloudprovider: Fix deletion of orphaned routes (#62729, @databus23)
  • Fix a bug that headless service without ports fails to have endpoint created. (#62497, @MrHohn)
  • Fix panic for attaching AzureDisk to vmss nodes (#63275, @feiskyer)
  • kubectl api-resources now supports filtering to resources supporting specific verbs, and can output fully qualified resource names suitable for combining with commands like kubectl get (#63254, @liggitt)
  • fix cephfs fuse mount bug when user is not admin (#61804, @zhangxiaoyu-zidif)
  • StorageObjectInUseProtection feature is GA. (#62870, @pospispa)
  • fixed spurious "unable to find api field" errors patching custom resources (#63146, @liggitt)
  • KUBE_API_VERSIONS is no longer respected. It was used for testing, but runtime-config is the proper flag to set. (#63165, @deads2k)
  • Added CheckNodePIDPressurePredicate to checks if a pod can be scheduled on (#60007, @k82cn)
    • a node reporting pid pressure condition.
  • Upgrade Azure Go SDK to stable version (v14.6.0) (#63063, @feiskyer)
  • kubeadm: prompt the user for confirmation when resetting a master node (#59115, @alexbrand)
  • add warnings on using pod-infra-container-image for remote container runtime (#62982, @dixudx)
  • Deprecate kubectl rolling-update (#61285, @soltysh)
  • client-go developers: the new dynamic client is easier to use and the old is deprecated, you must switch. (#62913, @deads2k)
  • Fix issue where on re-registration of device plugin, allocatable was not getting updated. This issue makes devices invisible to the Kubelet if device plugin restarts. Only work-around, if this fix is not there, is to restart the kubelet and then start device plugin. (#63118, @vikaschoudhary16)
  • Remove METADATA_AGENT_VERSION configuration option. (#63000, @kawych)
  • kubelets are no longer allowed to delete their own Node API object. Prior to 1.11, in rare circumstances related to cloudprovider node ID changes, kubelets would attempt to delete/recreate their Node object at startup. If a legacy kubelet encounters this situation, a cluster admin can remove the Node object: (#62818, @mikedanese) * kubectl delete node/<nodeName>
    • or grant self-deletion permission explicitly:
      • kubectl create clusterrole self-deleting-nodes --verb=delete --resource=nodes
      • kubectl create clusterrolebinding self-deleting-nodes --clusterrole=self-deleting-nodes --group=system:nodes
  • kubeadm creates kube-proxy with a toleration to run on all nodes, no matter the taint. (#62390, @discordianfish)
  • fix resultRun by resetting it to 0 on pod restart (#62853, @tony612)
  • Mount additional paths required for a working CA root, for setups where /etc/ssl/certs doesn't contains certificates but just symlink. (#59122, @klausenbusk)
  • Introduce truncating audit backend that can be enabled for existing backend to limit the size of individual audit events and batches of events. (#61711, @crassirostris)
  • kubeadm upgrade no longer races leading to unexpected upgrade behavior on pod restarts (#62655, @stealthybox)
    • kubeadm upgrade now successfully upgrades etcd and the controlplane to use TLS
    • kubeadm upgrade now supports external etcd setups
    • kubeadm upgrade can now rollback and restore etcd after an upgrade failure
  • Add --ipvs-exclude-cidrs flag to kube-proxy. (#62083, @rramkumar1)
  • Fix the liveness probe to use /bin/bash -c instead of /bin/bash c. (#63033, @bmoyles0117)
  • Added MatchFields to NodeSelectorTerm; in 1.11, it only support metadata.name. (#62002, @k82cn)
  • Fix scheduler informers to receive events for all the pods in the cluster. (#63003, @bsalamat)
  • removed unsafe double RLock in cpumanager (#62464, @choury)
  • Fix in vSphere Cloud Provider to handle upgrades from kubernetes version less than v1.9.4 to v1.9.4 and above. (#62919, @abrarshivani)
  • The --bootstrap-kubeconfig argument to Kubelet previously created the first bootstrap client credentials in the certificates directory as kubelet-client.key and kubelet-client.crt. Subsequent certificates created by cert rotation were created in a combined PEM file that was atomically rotated as kubelet-client-DATE.pem in that directory, which meant clients relying on the node.kubeconfig generated by bootstrapping would never use a rotated cert. The initial bootstrap certificate is now generated into the cert directory as a PEM file and symlinked to kubelet-client-current.pem so that the generated kubeconfig remains valid after rotation. (#62152, @smarterclayton)
  • stop kubelet to cloud provider integration potentially wedging kubelet sync loop (#62543, @ingvagabund)
  • Fix error where config map for Metadata Agent was not created by addon manager. (#62909, @kawych)
  • Fixes the kubernetes.default.svc loopback service resolution to use a loopback configuration. (#62649, @liggitt)
  • Code generated for CRDs now passes go vet. (#62412, @bhcleek)
  • fix permissions to allow statefulset scaling for admins, editors, and viewers (#62336, @deads2k)
  • Add support of standard LB to Azure vmss (#62707, @feiskyer)
  • GCE: Fix for internal load balancer management resulting in backend services with outdated instance group links. (#62885, @nicksardo)
  • The --experimental-qos-reserve kubelet flags is replaced by the alpha level --qos-reserved flag or QOSReserved field in the kubeletconfig and requires the QOSReserved feature gate to be enabled. (#62509, @sjenning)
  • Set pod status to "Running" if there is at least one container still reporting as "Running" status and others are "Completed". (#62642, @ceshihao)
  • Split PodPriority and PodPreemption feature gate (#62243, @resouer)
  • Add support to resize Portworx volumes. (#62308, @harsh-px)

v1.11.0-alpha.1

Documentation

Downloads for v1.11.0-alpha.1

filename sha256 hash
kubernetes.tar.gz 8e7f2b4c8f8fb948b4f7882038fd1bb3f2b967ee240d30d58347f40083ed199b
kubernetes-src.tar.gz 62ab39d8fd02309c74c2a978402ef809c0fe4bb576f1366d6bb0cff26d62e2ff

Client Binaries

filename sha256 hash
kubernetes-client-darwin-386.tar.gz 332fd9e243c9c37e31fd26d8fa1a7ccffba770a48a9b0ffe57403f028c6ad6f4
kubernetes-client-darwin-amd64.tar.gz 1703462ad564d2d52257fd59b0c8acab595fd08b41ea73fed9f6ccb4bfa074c7
kubernetes-client-linux-386.tar.gz 61073b7c5266624e0f7be323481b3111ee01511b6b96cf16468044d8a68068e3
kubernetes-client-linux-amd64.tar.gz 9a29117fa44ffc14a7004d55f4de97ad88d94076826cfc0bf9ec73c998c78f64
kubernetes-client-linux-arm.tar.gz 55114364aacd4eb6d080b818c859877dd5ce46b8f1e58e1469dfa9a50ade1cf9
kubernetes-client-linux-arm64.tar.gz 276fb16cf4aef7d1444ca754ec83365ff36184e1bc30104853f791a57934ee37
kubernetes-client-linux-ppc64le.tar.gz 8a9096dd1908b8f4004249daff7ae408e390dbc728cd237bc558192744f52116
kubernetes-client-linux-s390x.tar.gz 9297755244647b90c2d41ce9e04ee31fb158a69f011c0f4f1ec2310fa57234e7
kubernetes-client-windows-386.tar.gz 449562a4d6d82b5eb60151e6ff0b301f92b92f957e3a38b741a4c0d8b3c0611f
kubernetes-client-windows-amd64.tar.gz ab97f150723614bcbacdf27c4ced8b45166425522a44e7de693d0e987c425f07

Server Binaries

filename sha256 hash
kubernetes-server-linux-amd64.tar.gz 4c2db4089271366933d0b63ea7fe8f0d9eb4af06fe91d6aac1b8240e2fbd62e1
kubernetes-server-linux-arm.tar.gz d5abdfe5aa28b23cf4f4f6be27db031f885f87e2defef680f2d5b92098b2d783
kubernetes-server-linux-arm64.tar.gz bd8a8d7c45108f4b0c2af81411c00e338e410b680abe4463f6b6d88e8adcc817
kubernetes-server-linux-ppc64le.tar.gz cb5341af600c82d391fc5ca726ff96c48e741f597360a56cc2ada0a0f9e7ec95
kubernetes-server-linux-s390x.tar.gz 91009df3801430afde03e888f1f13a83bcb9d00b7cd4194b085684cc11657549

Node Binaries

filename sha256 hash
kubernetes-node-linux-amd64.tar.gz 22bf846c692545e7c2655e2ebe06ffc61313d7c76e4f75716be4cec457b548ed
kubernetes-node-linux-arm.tar.gz 351095bb0ec177ce1ba950d366516ed6154f6ce920eac39e2a26c48203a94e11
kubernetes-node-linux-arm64.tar.gz 947e6e9e362652db435903e9b40f14750a7ab3cc60622e78257797f6ed63b1ab
kubernetes-node-linux-ppc64le.tar.gz 1a0a1d0b96c3e01bc0737245eed76ed3db970c8d80c42450072193f23a0e186b
kubernetes-node-linux-s390x.tar.gz 6891b2e8f1f93b4f590981dccc6fd976a50a0aa5c425938fc5ca3a9c0742d16a
kubernetes-node-windows-amd64.tar.gz 70daea86c14fcafbd46f3d1bb252db50148fb9aab3371dffc4a039791caebac5

Changelog since v1.10.0

Action Required

  • NONE (#62643, @xiangpengzhao)
  • ACTION REQUIRED: Alpha annotation for PersistentVolume node affinity has been removed. Update your PersistentVolumes to use the beta PersistentVolume.nodeAffinity field before upgrading to this release (#61816, @wackxu)
  • ACTION REQUIRED: In-place node upgrades to this release from versions 1.7.14+, 1.8.9+, and 1.9.4+ are not supported if using subpath volumes with PVCs. Such pods should be drained from the node first. (#61373, @msau42)

Other notable changes

  • Make volume usage metrics available for Cinder (#62668, @zetaab)
  • kubectl stops rendering List as suffix kind name for CRD resources (#62512, @dixudx)
  • Removes --include-extended-apis which was deprecated back in https://github.com/kubernetes/kubernetes/pull/32894 (#62803, @deads2k)
  • Add write-config-to to scheduler (#62515, @resouer)
  • Kubelets will no longer set externalID in their node spec. (#61877, @mikedanese)
  • kubeadm preflight: check CRI socket path if defined, otherwise check for Docker (#62481, @taharah)
  • fix network setup in hack/local-up-cluster.sh (https://github.com/kubernetes/kubernetes/pull/60431) (#60633, @pohly)
    • better error diagnostics in hack/local-up-cluster.sh output
  • Add prometheus cluster monitoring addon to kube-up (#62195, @serathius)
  • Fix inter-pod anti-affinity check to consider a pod a match when all the anti-affinity terms match. (#62715, @bsalamat)
  • GCE: Bump GLBC version to 1.1.1 - fixing an issue of handling multiple certs with identical certificates (#62751, @nicksardo)
  • fixes configuration error when upgrading kubeadm from 1.9 to 1.10+ (#62568, @liztio)
    • enforces kubeadm upgrading kubernetes from the same major and minor versions as the kubeadm binary.
  • Allow user to scale l7 default backend deployment (#62685, @freehan)
  • Pod affinity nodeSelectorTerm.matchExpressions may now be empty, and works as previously documented: nil or empty matchExpressions matches no objects in scheduler. (#62448, @k82cn)
  • Add @andrewsykim as an approver for CCM related code. (#62749, @andrewsykim)
  • Fix an issue in inter-pod affinity predicate that cause affinity to self being processed incorrectly (#62591, @bsalamat)
  • fix WaitForAttach failure issue for azure disk (#62612, @andyzhangx)
  • Update kube-dns to Version 1.14.10. Major changes: (#62676, @MrHohn)
    • Fix a bug in DNS resolution for externalName services
    • and PTR records that need to query from upstream nameserver.
  • Update version of Istio addon from 0.5.1 to 0.6.0. (#61911, @ostromart)
  • Phase kubeadm alpha phase kubelet is added to support dynamic kubelet configuration in kubeadm. (#57224, @xiangpengzhao)
  • kubeadm alpha phase kubeconfig user supports groups (organizations) to be specified in client cert. (#62627, @xiangpengzhao)
  • Fix user visible files creation for windows (#62375, @feiskyer)
  • remove deprecated initresource admission plugin (#58784, @wackxu)
  • Fix machineID getting for vmss nodes when using instance metadata (#62611, @feiskyer)
  • Fixes issue where PersistentVolume.NodeAffinity.NodeSelectorTerms were ANDed instead of ORed. (#62556, @msau42)
  • Fix potential infinite loop that can occur when NFS PVs are recycled. (#62572, @joelsmith)
  • Fix Forward chain default reject policy for IPVS proxier (#62007, @m1093782566)
  • The kubeadm config option API.ControlPlaneEndpoint has been extended to take an optional port which may differ from the apiserver's bind port. (#62314, @rjosephwright)
  • cluster/kube-up.sh now provisions a Kubelet config file for GCE via the metadata server. This file is installed by the corresponding GCE init scripts. (#62183, @mtaufen)
  • Remove alpha functionality that allowed the controller manager to approve kubelet server certificates. (#62471, @mikedanese)
  • gitRepo volumes in pods no longer require git 1.8.5 or newer, older git versions are supported too now. (#62394, @jsafrane)
  • Default mount propagation has changed from "HostToContainer" ("rslave" in Linux terminology) to "None" ("private") to match the behavior in 1.9 and earlier releases. "HostToContainer" as a default caused regressions in some pods. (#62462, @jsafrane)
  • improve performance of affinity/anti-affinity predicate of default scheduler significantly. (#62211, @bsalamat)
  • fix nsenter GetFileType issue in containerized kubelet (#62467, @andyzhangx)
  • Ensure expected load balancer is selected for Azure (#62450, @feiskyer)
  • Resolves forbidden error when the daemon-set-controller cluster role access controllerrevisions resources. (#62146, @frodenas)
  • Adds --cluster-name to kubeadm init for specifying the cluster name in kubeconfig. (#60852, @karan)
  • Upgrade the default etcd server version to 3.2.18 (#61198, @jpbetz)
  • [fluentd-gcp addon] Increase CPU limit for fluentd to 1 core to achieve 100kb/s throughput. (#62430, @bmoyles0117)
  • GCE: Bump GLBC version to 1.1.0 - supporting multiple certificates and HTTP2 (#62427, @nicksardo)
  • Fixed #731 kubeadm upgrade ignores HighAvailability feature gate (#62455, @fabriziopandini)
  • Cluster Autoscaler 1.2.1 (release notes: https://github.com/kubernetes/autoscaler/releases/tag/cluster-autoscaler-1.2.1) (#62457, @mwielgus)
  • Add generators for apps/v1 deployments. (#61288, @ayushpateria)
  • kubeadm: surface external etcd preflight validation errors (#60585, @alexbrand)
  • kube-apiserver: oidc authentication now supports requiring specific claims with --oidc-required-claim=<claim>=<value> (#62136, @rithujohn191)
  • Implements verbosity logging feature for kubeadm commands (#57661, @vbmade2000)
  • Allow additionalProperties in CRD OpenAPI v3 specification for validation, mutually exclusive to properties. (#62333, @sttts)
  • cinder volume plugin : (#61082, @wenlxie)
    • When the cinder volume status is error, controller will not do attach and detach operation
  • fix incompatible file type checking on Windows (#62154, @dixudx)
  • fix local volume absolute path issue on Windows (#62018, @andyzhangx)
  • Remove ObjectMeta ListOptions DeleteOptions from core api group. Please use that in meta/v1 (#61809, @hzxuzhonghu)
  • fix the issue that default azure disk fsypte(ext4) does not work on Windows (#62250, @andyzhangx)
  • RBAC information is included in audit logs via audit.Event annotations: (#58807, @CaoShuFeng)
    • authorization.k8s.io/decision = {allow, forbid}
    • authorization.k8s.io/reason = human-readable reason for the decision
  • Update kube-dns to Version 1.14.9 in kubeadm. (#61918, @MrHohn)
  • Add support to ingest log entries to Stackdriver against new "k8s_container" and "k8s_node" resources. (#62076, @qingling128)
  • remove deprecated --mode flag in check-network-mode (#60102, @satyasm)
  • Schedule even if extender is not available when using extender (#61445, @resouer)
  • Fixed column alignment when kubectl get is used with custom columns from OpenAPI schema (#56629, @luksa)
  • Fixed bug in rbd-nbd utility when nbd is used. (#62168, @piontec)
  • Extend the Stackdriver Metadata Agent by adding a new Deployment for ingesting unscheduled pods, and services. (#62043, @supriyagarg)
  • Disabled CheckNodeMemoryPressure and CheckNodeDiskPressure predicates if TaintNodesByCondition enabled (#60398, @k82cn)
  • kubeadm config can now override the Node CIDR Mask Size passed to kube-controller-manager. (#61705, @jstangroome)
  • Add warnings that authors of aggregated API servers must not rely on authorization being done by the kube-apiserver. (#61349, @sttts)
  • Support custom test configuration for IPAM performance integration tests (#61959, @satyasm)
  • GCE: Updates GLBC version to 1.0.1 which includes a fix which prevents multi-cluster ingress objects from creating full load balancers. (#62075, @nicksardo)
  • OIDC authentication now allows tokens without an "email_verified" claim when using the "email" claim. If an "email_verified" claim is present when using the "email" claim, it must be true. (#61508, @rithujohn191)
  • fix local volume issue on Windows (#62012, @andyzhangx)
  • kubeadm: Introduce join timeout that can be controlled via the discoveryTimeout config option (set to 5 minutes by default). (#60983, @rosti)
  • Add e2e test for CRD Watch (#61025, @ayushpateria)
  • Fix panic create/update CRD when mutating/validating webhook configured. (#61404, @hzxuzhonghu)
  • Fix a bug that fluentd doesn't inject container logs for CRI container runtimes (containerd, cri-o etc.) into elasticsearch on GCE. (#61818, @Random-Liu)
  • Support for "alpha.kubernetes.io/nvidia-gpu" resource which was deprecated in 1.10 is removed. Please use the resource exposed by DevicePlugins instead ("nvidia.com/gpu"). (#61498, @mindprince)
  • Pods requesting resources prefixed with *kubernetes.io will remain unscheduled if there are no nodes exposing that resource. (#61860, @mindprince)
  • flexvolume: trigger plugin init only for the relevant plugin while probe (#58519, @linyouchong)
  • Update to use go1.10.1 (#60597, @cblecker)
  • Rev the Azure SDK for networking to 2017-06-01 (#61955, @brendandburns)
  • Return error if get NodeStageSecret and NodePublishSecret failed in CSI volume plugin (#61096, @mlmhl)
  • kubectl: improves compatibility with older servers when creating/updating API objects (#61949, @liggitt)
  • kubernetes-master charm now supports metrics server for horizontal pod autoscaler. (#60174, @hyperbolic2346)
  • fix scheduling policy on ConfigMap breaks without the --policy-configmap-namespace flag set (#61388, @zjj2wry)
  • kubectl: restore the ability to show resource kinds when displaying multiple objects (#61985, @liggitt)
  • kubectl certificate approve|deny will not modify an already approved or denied CSR unless the --force flag is provided. (#61971, @smarterclayton)
  • Kubelet now exposes a new endpoint /metrics/probes which exposes a Prometheus metric containing the liveness and/or readiness probe results for a container. (#61369, @rramkumar1)
  • Balanced resource allocation priority in scheduler to include volume count on node (#60525, @ravisantoshgudimetla)
  • new dhcp-domain parameter to be used for figuring out the hostname of a node (#61890, @dims)
  • Fixed a panic in kubectl run --attach ... when the api server failed to create the runtime object (due to name conflict, PSP restriction, etc.) (#61713, @mountkin)
  • Ensure reasons end up as comments in kubectl edit. (#60990, @bmcstdio)
  • kube-scheduler has been fixed to use --leader-elect option back to true (as it was in previous versions) (#59732, @dims)
  • Azure cloud provider now supports standard SKU load balancer and public IP. To use it, set cloud provider config with (#61884, @feiskyer)
    • {
    • "loadBalancerSku": "standard",
    • "excludeMasterFromStandardLB": true,
    • }
    • If excludeMasterFromStandardLB is not set, it will be default to true, which means master nodes are excluded to the backend of standard LB.
    • Also note standard load balancer doesn't work with annotation service.beta.kubernetes.io/azure-load-balancer-mode. This is because all nodes (except master) are added as the LB backends.
  • The node authorizer now automatically sets up rules for Node.Spec.ConfigSource when the DynamicKubeletConfig feature gate is enabled. (#60100, @mtaufen)
  • Update kube-dns to Version 1.14.9. Major changes: (#61908, @MrHohn)
    • Fix for kube-dns returns NXDOMAIN when not yet synced with apiserver.
    • Don't generate empty record for externalName service.
    • Add validation for upstreamNameserver port.
    • Update go version to 1.9.3.
  • CRI: define the mount behavior when host path does not exist: runtime should report error if the host path doesn't exist (#61460, @feiskyer)
  • Fixed ingress issue with CDK and pre-1.9 versions of kubernetes. (#61859, @hyperbolic2346)
  • Removed rknetes code, which was deprecated in 1.10. (#61432, @filbranden)
  • Disable ipamperf integration tests as part of every PR verification. (#61863, @satyasm)
  • Enable server-side print in kubectl by default, with the ability to turn it off with --server-print=false (#61477, @soltysh)
  • Add ipset and udevadm to the hyperkube base image. (#61357, @rphillips)
  • In a GCE cluster, the default HAIRPIN_MODE is now "hairpin-veth". (#60166, @rramkumar1)
  • Deployment will stop adding pod-template-hash labels/selector to ReplicaSets and Pods it adopts. Resources created by Deployments are not affected (will still have pod-template-hash labels/selector). (#61615, @janetkuo)
  • kubectl: fixes issue with -o yaml and -o json omitting kind and apiVersion when used with --dry-run (#61808, @liggitt)
  • Updated admission controller settings for Juju deployed Kubernetes clusters (#61427, @hyperbolic2346)
  • Performance test framework and basic tests for the IPAM controller, to simulate behavior (#61143, @satyasm)
    • of the four supported modes under lightly loaded and loaded conditions, where load is
    • defined as the number of operations to perform as against the configured kubernetes
    • API server QPS.
  • kubernetes-master charm now properly clears the client-ca-file setting on the apiserver snap (#61479, @hyperbolic2346)
  • Fix racy panics when using fake watches with ObjectTracker (#61195, @grantr)
  • [fluentd-gcp addon] Update event-exporter image to have the latest base image. (#61727, @crassirostris)
  • Use inline func to ensure unlock is executed (#61644, @resouer)
  • `kubectl apply view/edit-last-applied support completion. (#60499, @superbrothers)
  • Automatically add system critical priority classes at cluster boostrapping. (#60519, @bsalamat)
  • Ensure cloudprovider.InstanceNotFound is reported when the VM is not found on Azure (#61531, @feiskyer)
  • Azure cloud provider now supports specifying allowed service tags by annotation service.beta.kubernetes.io/azure-allowed-service-tags (#61467, @feiskyer)
  • Add all kinds of resource objects' statuses in HPA description. (#59609, @zhangxiaoyu-zidif)
  • Bound cloud allocator to 10 retries with 100 ms delay between retries. (#61375, @satyasm)
  • Removed always pull policy from the template for ingress on CDK. (#61598, @hyperbolic2346)
  • escape literal percent sign when formatting (#61523, @dixudx)
  • Cluster Autoscaler 1.2.0 - release notes available here: https://github.com/kubernetes/autoscaler/releases (#61561, @mwielgus)
  • Fix mounting of UNIX sockets(and other special files) in subpaths (#61480, @gnufied)
  • kubectl patch now supports --dry-run. (#60675, @timoreimann)
  • fix sorting taints in case the sorting keys are equal (#61255, @dixudx)
  • NetworkPolicies can now target specific pods in other namespaces by including both a namespaceSelector and a podSelector in the same peer element. (#60452, @danwinship)
  • include node internal ip as additional information for kubectl (#57623, @dixudx)
  • Add apiserver configuration option to choose audit output version. (#60056, @crassirostris)
  • make test-cmd now works on OSX. (#61393, @totherme)
  • Remove kube-apiserver --storage-version flag, use --storage-versions instead. (#61453, @hzxuzhonghu)
  • Bump Heapster to v1.5.2 (#61396, @kawych)
  • Conformance: ReplicaSet must be supported in the apps/v1 version. (#61367, @enisoc)
  • You can now use the base64decode function in kubectl go templates to decode base64-encoded data, for example kubectl get secret SECRET -o go-template='{{ .data.KEY | base64decode }}'. (#60755, @glb)
  • Remove 'system' prefix from Metadata Agent rbac configuration (#61394, @kawych)
  • Remove --tls-ca-file flag. (#61386, @hzxuzhonghu)
  • fix sorting tolerations in case the keys are equal (#61252, @dixudx)
  • respect fstype in Windows for azure disk (#61267, @andyzhangx)
  • --show-all (which only affected pods and only for human readable/non-API printers) is inert in v1.11, and will be removed in a future release. (#60793, @charrywanganthony)
  • Remove never used NewCronJobControllerFromClient method (#59471, @dmathieu)
  • Support new NODE_OS_DISTRIBUTION 'custom' on GCE (#61235, @yguo0905)
  • Fixed #61123 by triggering syncer.Update on all cases including when a syncer is created (#61124, @satyasm)
    • on a new add event.
  • Unready pods will no longer impact the number of desired replicas when using horizontal auto-scaling with external metrics or object metrics. (#60886, @mattjmcnaughton)
  • include file name in the error when visiting files (#60919, @dixudx)
  • Implement preemption for extender with a verb and new interface (#58717, @resouer)
  • kube-cloud-controller-manager flag --service-account-private-key-file is removed in v1.11 (#60875, @charrywanganthony)
  • kubeadm: Add the writable boolean option to kubeadm config. The option works on a per-volume basis for *ExtraVolumes config keys. (#60428, @rosti)
  • DaemonSet scheduling associated with the alpha ScheduleDaemonSetPods feature flag has been removed from the 1.10 release. See https://github.com/kubernetes/enhancements/issues/548 for feature status. (#61411, @liggitt)
  • Bugfix for erroneous upgrade needed messaging in kubernetes worker charm. (#60873, @wwwtyro)
  • Fix data race in node lifecycle controller (#60831, @resouer)
  • Nodes are not deleted from kubernetes anymore if node is shutdown in Openstack. (#59931, @zetaab)
  • "beginPort+offset" format support for port range which affects kube-proxy only (#58731, @yue9944882)
  • Added e2e test for watch (#60331, @jennybuckley)
  • kubelet's --cni-bin-dir option now accepts multiple comma-separated CNI binary directory paths, which are search for CNI plugins in the given order. (#58714, @dcbw)
Go
1
https://gitee.com/meoom/kubernetes.git
git@gitee.com:meoom/kubernetes.git
meoom
kubernetes
kubernetes
master

搜索帮助