- v1.3.0-alpha.5
- v1.3.0-alpha.4
- v1.2.4
- v1.3.0-alpha.3
- v1.2.3
- v1.3.0-alpha.2
- v1.2.2
- v1.2.1
- v1.3.0-alpha.1
- v1.2.0
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | 724bf5a4437ca9dc75d9297382f47a179e8dc5a6 |
2a8b4a5297df3007fce69f1e344fd87e |
- Add direct serializer (#26251, @caesarxuchao)
- Add a NodeCondition "NetworkUnavailable" to prevent scheduling onto a node until the routes have been created (#26415, @wojtek-t)
- Add garbage collector into kube-controller-manager (#26341, @caesarxuchao)
- Add orphaning finalizer logic to GC (#25599, @caesarxuchao)
- GCI-backed masters mount srv/kubernetes and srv/sshproxy in the right place (#26238, @ihmccreery)
- Updaing QoS policy to be at the pod level (#14943, @vishh)
- add CIDR allocator for NodeController (#19242, @mqliang)
- Adding garbage collector controller (#24509, @caesarxuchao)
- Fix a bug with pluralization of third party resources (#25374, @brendandburns)
- Run l7 controller on master (#26048, @bprashanth)
- AWS: ELB proxy protocol support via annotation service.beta.kubernetes.io/aws-load-balancer-proxy-protocol (#24569, @williamsandrew)
- kubectl run --restart=Never creates pods (#25253, @soltysh)
- Add LabelSelector to PersistentVolumeClaimSpec (#25917, @pmorie)
- Removed metrics api group (#26073, @piosz)
- Fixed check in kubectl autoscale. (#26162, @jszczepkowski)
- Add support for 3rd party objects to kubectl label (#24882, @brendandburns)
- Move shell completion generation into 'kubectl completion' command (#23801, @sttts)
- Setting TLS1.2 minimum because TLS1.0 and TLS1.1 are vulnerable (#26169, @victorgp)
- Kubelet: Periodically reporting image pulling progress in log (#26145, @Random-Liu)
- Federation service controller (#26034, @mfanjie)
- Stabilize map order in kubectl describe (#26046, @timoreimann)
- Google Cloud DNS dnsprovider - replacement for #25389 (#26020, @quinton-hoole)
- Fix system container detection in kubelet on systemd (#25982, @derekwaynecarr)
- Added pods-per-core to kubelet. #25762 (#25813, @rrati)
- promote sourceRange into service spec (#25826, @freehan)
- kube-controller-manager: Add configure-cloud-routes option (#25614, @justinsb)
- kubelet: reading cloudinfo from cadvisor (#21373, @enoodle)
- Disable cAdvisor event storage by default (#24771, @timstclair)
- Remove docker-multinode (#26031, @luxas)
- nodecontroller: Fix log message on successful update (#26207, @zmerlynn)
- remove deprecated generated typed clients (#26336, @caesarxuchao)
- Kubenet host-port support through iptables (#25604, @freehan)
- Add metrics support for a GCE PD, EC2 EBS & Azure File volumes (#25852, @vishh)
- Bump cAdvisor (and dependencies) godeps version (#25914, @timstclair)
- Add RBAC authorization API group and authorizer (#25634, @ericchiang)
- Add Seccomp to Annotations (#25324, @jfrazelle)
- AWS: Fix long-standing bug in stringSetToPointers (#26331, @therc)
- Add dnsmasq as a DNS cache in kube-dns pod (#26114, @ArtfulCoder)
- routecontroller: Add wait.NonSlidingUntil, use it (#26301, @zmerlynn)
- Attempt 2: Bump GCE containerVM to container-v1-3-v20160517 (Docker 1.11.1) again. (#26001, @dchen1107)
- Downward API implementation for resources limits and requests (#24179, @aveshagarwal)
- Replace containervm with GCI as default master image for GCE clusters (#26197, @wonderfly)
- Add a 'kubectl clusterinfo dump' option (#20672, @brendandburns)
- Fixing heapster memory requirements. (#26109, @Q-Lee)
- Handle federated service name lookups in kube-dns. (#25727, @madhusudancs)
- Support sort-by timestamp in kubectl get (#25600, @janetkuo)
- vSphere Volume Plugin Implementation (#24947, @abithap)
- ResourceQuota controller uses rate limiter to prevent hot-loops in error situations (#25748, @derekwaynecarr)
- Fix hyperkube flag parsing (#25512, @colhom)
- Add a kubectl create secret tls command (#24719, @bprashanth)
- Add node problem detector as an addon pod. (#25986, @Random-Liu)
- Handle cAdvisor partial failures (#25933, @timstclair)
- Use SkyDNS as a library for a more integrated kube DNS (#23930, @ArtfulCoder)
- Introduce node memory pressure condition to scheduler (#25531, @ingvagabund)
- Fix detection of docker cgroup on RHEL (#25907, @ncdc)
- Add support for limiting grace period during soft eviction (#25772, @derekwaynecarr)
- Use protobufs by default to communicate with apiserver (still store JSONs in etcd) (#25738, @wojtek-t)
- Add NetworkPolicy API Resource (#25638, @caseydavenport)
- Only expose top N images in
NodeStatus
(#25328, @resouer) - Extend secrets volumes with path control (#25285, @ingvagabund)
- Implement OIDC client AuthProvider (#25270, @bobbyrullo)
- Make addon-manager cross-platform and use it with hyperkube (#25631, @luxas)
- kubelet: Optionally, have kubelet exit if lock file contention is observed, using --exit-on-lock-contention flag (#25596, @derekparker)
- Bump up glbc version to 0.6.2 (#25446, @bprashanth)
- Add 'kubectl set image' (#25509, @janetkuo)
- NodeController doesn't evict Pods if no Nodes are Ready (#25571, @gmarek)
- Added enforcing of setting nodes numbers for cluster autoscaler. (#25734, @jszczepkowski)
- systemd node spec proposal (#17688, @derekwaynecarr)
- Bump GCE ContainerVM to container-v1-3-v20160517 (Docker 1.11.1) (#25843, @zmerlynn)
- AWS: Move enforcement of attached AWS device limit from kubelet to scheduler (#23254, @jsafrane)
- Refactor persistent volume controller (#24331, @jsafrane)
- Add support for running GCI on the GCE cloud provider (#25425, @andyzheng0831)
- Implement taints and tolerations (#24134, @kevin-wangzefeng)
- GCI: Ensure that the right version of kubelet is used (#25504, @andyzheng0831)
- Add init containers to pods (#23567, @smarterclayton)
- GCI: Fix the condition for using the default image (#25763, @andyzheng0831)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | 758e97e7e50153840379ecd9f8fda1869543539f |
4e18ae6a428c99fcc30e2137d7c41854 |
- validate third party resources (#25007, @liggitt)
- Automatically create the kube-system namespace (#25196, @luxas)
- Make ThirdPartyResource a root scoped object (#25006, @liggitt)
- mark container-port flag as deprecated (#25072, @AdoHe)
- Provide flags to use etcd3 backed storage (#24455, @hongchaodeng)
- Fix hyperkube's layer caching, and remove --make-symlinks at build time (#25693, @luxas)
- AWS: More support for ap-northeast-2 region (#24464, @matthewrudy)
- Make bigger master root disks in GCE for large clusters (#25670, @gmarek)
- AWS kube-down: don't fail if ELB not in VPC - #23784 (#23785, @ajohnstone)
- Build hyperkube in hack/local-up-cluster instead of separate binaries (#25627, @luxas)
- enable recursive processing in kubectl rollout (#25110, @metral)
- Support struct,array,slice types when sorting kubectl output (#25022, @zhouhaibing089)
- federated api servers: Adding a discovery summarizer server (#20358, @nikhiljindal)
- AWS: Allow cross-region image pulling with ECR (#24369, @therc)
- Automatically add node labels beta.kubernetes.io/{os,arch} (#23684, @luxas)
- kubectl suggest for get (list, ps), and delete(rm) (#25181, @janetkuo)
- Add IPv6 address support for pods - does NOT include services (#23090, @tgraf)
- Use local disk for ConfigMap volume instead of tmpfs (#25306, @pmorie)
- NVIDIA GPU support (#24836, @therc)
- AWS: SSL support for ELB listeners through annotations (#23495, @therc)
- Add
kubectl rollout status
(#19946, @janetkuo) - Webhook Token Authenticator (#24902, @cjcullen)
- PSP admission (#24600, @pweil-)
- Scheduledjob api (#24970, @soltysh)
- Kubectl support for validating nested objects with different ApiGroups (#25172, @pwittrock)
- Change default clusterCIDRs from /16 to /14 in GCE configs allowing 1000 Node clusters by default. (#25350, @gmarek)
- Add 'kubectl set' (#25444, @janetkuo)
- vSphere Cloud Provider Implementation (#24703, @dagnello)
- Added JobTemplate, a preliminary step for ScheduledJob and Workflow (#21675, @soltysh)
- Openstack provider (#21737, @zreigz)
- AWS kube-up: Allow VPC CIDR to be specified (experimental) (#23362, @miguelfrde)
- Return "410 Gone" errors via watch stream when using watch cache (#25369, @liggitt)
- GKE provider: Add cluster-ipv4-cidr and arbitrary flags (#25437, @zmerlynn)
- AWS kube-up: Increase timeout waiting for docker start (#25405, @justinsb)
- Sort resources in quota errors to avoid duplicate events (#25161, @derekwaynecarr)
- Display line number on JSON errors (#25038, @mfojtik)
- GCE: Allow node count to exceed GCE TargetPool maximums (#25178, @zmerlynn)
- Clarify supported version skew between masters, nodes, and clients (#25087, @ihmccreery)
- Move godeps to vendor/ (#24242, @thockin)
- Introduce events flag for describers (#24554, @ingvagabund)
- run kube-addon-manager in a static pod (#23600, @mikedanese)
- Reimplement 'pause' in C - smaller footprint all around (#23009, @uluyol)
- Add subPath to mount a child dir or file of a volumeMount (#22575, @MikaelCluseau)
- Handle image digests in node status and image GC (#25088, @ncdc)
- PLEG: reinspect pods that failed prior inspections (#25077, @ncdc)
- Upgrade installed packages when building hyperkube to improve the security profile (#25114, @aaronlevy)
- GCI/Trusty: Support ABAC authorization (#24950, @andyzheng0831)
- fix cinder volume dir umount issue #24717 (#24718, @chengyli)
- Inter pod topological affinity and anti-affinity implementation (#22985, @kevin-wangzefeng)
- start etcd compactor in background (#25010, @hongchaodeng)
- GCI: Add two GCI specific metadata pairs (#25105, @andyzheng0831)
- Ensure status is not changed during an update of PV, PVC, HPA objects (#24924, @mqliang)
- GCE: Prefer preconfigured node tags for firewalls, if available (#25148, @a-robinson)
- kubectl rolling-update support for same image (#24645, @jlowdermilk)
- Update salt config to allow Debian Jessie on GCE. (#25123, @jlewi)
- Mark kube-push.sh as broken (#25095, @ihmccreery)
- AWS: Add support for ap-northeast-2 region (Seoul) (#24457, @leokhoa)
- GCI: Update the command to get the image (#24987, @andyzheng0831)
- Port-forward: use out and error streams instead of glog (#17030, @csrwng)
- Promote Pod Hostname & Subdomain to fields (were annotations) (#24362, @ArtfulCoder)
- Validate deletion timestamp doesn't change on update (#24839, @liggitt)
- Add flag -t as shorthand for --tty (#24365, @janetkuo)
- Add support for running clusters on GCI (#24893, @andyzheng0831)
- Switch to ABAC authorization from AllowAll (#24210, @cjcullen)
- Fix DeletingLoadBalancer event generation. (#24833, @a-robinson)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | f3aea83f8f0e16b2b41998a2edc09eb42fd8d945 |
ab0aca3a20e8eba43c8ff9d672793618 |
- Ensure status is not changed during an update of PV, PVC, HPA objects (#24924, @mqliang)
- GCI: Add two GCI specific metadata pairs (#25105, @andyzheng0831)
- Update salt config to allow Debian Jessie on GCE. (#25123, @jlewi)
- Fix DeletingLoadBalancer event generation. (#24833, @a-robinson)
- GCE: Prefer preconfigured node tags for firewalls, if available (#25148, @a-robinson)
- Drain pods created from ReplicaSets in 'kubectl drain' (#23689, @maclof)
- GCI: Update the command to get the image (#24987, @andyzheng0831)
- Validate deletion timestamp doesn't change on update (#24839, @liggitt)
- Add support for running clusters on GCI (#24893, @andyzheng0831)
- Trusty: Add retry in curl commands (#24749, @andyzheng0831)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | 01e0dc68653173614dc99f44875173478f837b38 |
ae22c35f3a963743d21daa17683e0288 |
- Updating go-restful to generate "type":"object" instead of "type":"any" in swagger-spec (breaks kubectl 1.1) (#22897, @nikhiljindal)
- Make watch cache treat resourceVersion consistent with uncached watch (#24008, @liggitt)
- Trusty: Add retry in curl commands (#24749, @andyzheng0831)
- Collect and expose runtime's image storage usage via Kubelet's /stats/summary endpoint (#23595, @vishh)
- Adding loadBalancer services to quota system (#24247, @sdminonne)
- Enforce --max-pods in kubelet admission; previously was only enforced in scheduler (#24674, @gmarek)
- All clients under ClientSet share one RateLimiter. (#24166, @gmarek)
- Remove requirement that Endpoints IPs be IPv4 (#23317, @aanm)
- Fix unintended change of Service.spec.ports[].nodePort during kubectl apply (#24180, @AdoHe)
- Don't log private SSH key (#24506, @timstclair)
- Incremental improvements to kubelet e2e tests (#24426, @pwittrock)
- Bridge off-cluster traffic into services by masquerading. (#24429, @cjcullen)
- Flush conntrack state for removed/changed UDP Services (#22573, @freehan)
- Allow setting the Host header in a httpGet probe (#24292, @errm)
- Fix goroutine leak in ssh-tunnel healthcheck. (#24487, @cjcullen)
- Fix gce.getDiskByNameUnknownZone logic. (#24452, @a-robinson)
- Make etcd cache size configurable (#23914, @jsravn)
- Drain pods created from ReplicaSets (#23689, @maclof)
- Make kubectl edit not convert GV on edits (#23437, @DirectXMan12)
- don't ship kube-registry-proxy and pause images in tars. (#23605, @mikedanese)
- Do not throw creation errors for containers that fail immediately after being started (#23894, @vishh)
- Add a client flag to delete "--now" for grace period 0 (#23756, @smarterclayton)
- add act-as powers (#23549, @deads2k)
- Build Kubernetes, etcd and flannel for arm64 and ppc64le (#23931, @luxas)
- Honor starting resourceVersion in watch cache (#24208, @ncdc)
- Update the pause image to build for arm64 and ppc64le (#23697, @luxas)
- Return more useful error information when a persistent volume fails to mount (#23122, @screeley44)
- Trusty: Avoid unnecessary in-memory temp files (#24144, @andyzheng0831)
- e2e: fix error checking in kubelet stats (#24205, @yujuhong)
- Fixed mounting with containerized kubelet (#23435, @jsafrane)
- Adding nodeports services to quota (#22154, @sdminonne)
- e2e: adapt kubelet_perf.go to use the new summary metrics API (#24003, @yujuhong)
- kubelet: add RSS memory to the summary API (#24015, @yujuhong)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | b2ce4e0c72562d09ba06e3c0913f0bd78da0285e |
69e75650de30d5a52d144799e94a168d |
- Fix unintended change of Service.spec.ports[].nodePort during kubectl apply (#24180, @AdoHe)
- Flush conntrack state for removed/changed UDP Services (#22573, @freehan)
- Allow setting the Host header in a httpGet probe (#24292, @errm)
- Bridge off-cluster traffic into services by masquerading. (#24429, @cjcullen)
- Version-guard Kubectl client Guestbook application test against deployments (#24478, @ihmccreery)
- Fix goroutine leak in ssh-tunnel healthcheck. (#24487, @cjcullen)
- Fixed mounting with containerized kubelet (#23435, @jsafrane)
- Do not throw creation errors for containers that fail immediately after being started (#23894, @vishh)
- Honor starting resourceVersion in watch cache (#24208, @ncdc)
- Fix TerminationMessagePath (#23658, @Random-Liu)
- Fix gce.getDiskByNameUnknownZone logic. (#24452, @a-robinson)
- kubelet: add RSS memory to the summary API (#24015, @yujuhong)
- e2e: adapt kubelet_perf.go to use the new summary metrics API (#24003, @yujuhong)
- e2e: fix error checking in kubelet stats (#24205, @yujuhong)
- Trusty: Avoid unnecessary in-memory temp files (#24144, @andyzheng0831)
- Allowing type object in kubectl swagger validation (#24054, @nikhiljindal)
- Add ClusterUpgrade tests (#24150, @ihmccreery)
- Trusty: Do not create the docker-daemon cgroup (#23996, @andyzheng0831)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | 305c8c2af7e99d463dbbe4208ecfe2b50585e796 |
aadb8d729d855e69212008f8fda628c0 |
- Make kube2sky and skydns docker images cross-platform (#19376, @luxas)
- Allowing type object in kubectl swagger validation (#24054, @nikhiljindal)
- Trusty: Do not create the docker-daemon cgroup (#23996, @andyzheng0831)
- Make ConfigMap volume readable as non-root (#23793, @pmorie)
- only include running and pending pods in daemonset should place calculation (#23929, @mikedanese)
- Upgrade to golang 1.6 (#22149, @luxas)
- Cross-build hyperkube and debian-iptables for ARM. Also add a flannel image (#21617, @luxas)
- Add a timeout to the sshDialer to prevent indefinite hangs. (#23843, @cjcullen)
- Ensure object returned by volume getCloudProvider incorporates cloud config (#23769, @saad-ali)
- Update Dashboard UI addon to v1.0.1 (#23724, @maciaszczykm)
- Add zsh completion for kubectl (#23797, @sttts)
- AWS kube-up: tolerate a lack of ephemeral volumes (#23776, @justinsb)
- duplicate kube-apiserver to federated-apiserver (#23509, @jianhuiz)
- Kubelet: Start using the official docker engine-api (#23506, @Random-Liu)
- Fix so setup-files don't recreate/invalidate certificates that already exist (#23550, @luxas)
- A pod never terminated if a container image registry was unavailable (#23746, @derekwaynecarr)
- Fix jsonpath to handle maps with key of nonstring types (#23358, @aveshagarwal)
- Trusty: Regional release .tar.gz support (#23558, @andyzheng0831)
- Add support for 3rd party objects to kubectl (#18835, @brendandburns)
- Remove unnecessary override of /etc/init.d/docker on containervm image. (#23593, @dchen1107)
- make docker-checker more robust (#23662, @ArtfulCoder)
- Change kube-proxy & fluentd CPU request to 20m/80m. (#23646, @cjcullen)
- Create a new Deployment in kube-system for every version. (#23512, @Q-Lee)
- IngressTLS: allow secretName to be blank for SNI routing (#23500, @tam7t)
- don't sync deployment when pod selector is empty (#23467, @mikedanese)
- AWS: Fix problems with >2 security groups (#23340, @justinsb)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | 8dede5833a1986434adea80749624f81a0db7bb4 |
72a5389f22827fb5133fdc3b7bfb9b3a |
- Trusty: Update heapster manifest handling code (#23434, @andyzheng0831)
- Support addon Deployments, make heapster a deployment with a nanny. (#22893, @Q-Lee)
- Create a new Deployment in kube-system for every version. (#23512, @Q-Lee)
- Use SCP to dump logs and parallelize a bit. (#22835, @spxtr)
- Trusty: Regional release .tar.gz support (#23558, @andyzheng0831)
- Make ConfigMap volume readable as non-root (#23793, @pmorie)
- only include running and pending pods in daemonset should place calculation (#23929, @mikedanese)
- A pod never terminated if a container image registry was unavailable (#23746, @derekwaynecarr)
- Update Dashboard UI addon to v1.0.1 (#23724, @maciaszczykm)
- Ensure object returned by volume getCloudProvider incorporates cloud config (#23769, @saad-ali)
- Add a timeout to the sshDialer to prevent indefinite hangs. (#23843, @cjcullen)
- AWS kube-up: tolerate a lack of ephemeral volumes (#23776, @justinsb)
- Fix so setup-files don't recreate/invalidate certificates that already exist (#23550, @luxas)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | 1639807c5788e1c6b1ab51fd30b723fb5debd865 |
235a1da47972c96a560d718d3256ca4f |
- AWS: Fix problems with >2 security groups (#23340, @justinsb)
- IngressTLS: allow secretName to be blank for SNI routing (#23500, @tam7t)
- Heapster patch release to 1.0.2 (#23487, @piosz)
- Remove unnecessary override of /etc/init.d/docker on containervm image. (#23593, @dchen1107)
- Change kube-proxy & fluentd CPU request to 20m/80m. (#23646, @cjcullen)
- make docker-checker more robust (#23662, @ArtfulCoder)
- validate that daemonsets don't have empty selectors on creation (#23530, @mikedanese)
- don't sync deployment when pod selector is empty (#23467, @mikedanese)
- Support differentiation of OS distro in e2e tests (#23466, @andyzheng0831)
- don't sync daemonsets with selectors that match all pods (#23223, @mikedanese)
- Trusty: Avoid reaching GCE custom metadata size limit (#22818, @andyzheng0831)
- Update kubectl help for 1.2 resources (#23305, @janetkuo)
- Removing URL query param from swagger UI to fix the XSS issue (#23234, @nikhiljindal)
- Fix hairpin mode (#23325, @MurgaNikolay)
- Bump to container-vm-v20160321 (#23313, @zmerlynn)
- Remove the restart-kube-proxy and restart-apiserver functions (#23180, @roberthbailey)
- Copy annotations back from RS to Deployment on rollback (#23160, @janetkuo)
- Trusty: Support hybrid cluster with nodes on ContainerVM (#23079, @andyzheng0831)
- update expose command description to add deployment (#23246, @AdoHe)
- Add a rate limiter to the GCE cloudprovider (#23019, @alex-mohr)
- Add a Deployment example for kubectl expose. (#23222, @madhusudancs)
- Use versioned object when computing patch (#23145, @liggitt)
- kubelet: send all recevied pods in one update (#23141, @yujuhong)
- Add a SSHKey sync check to the master's healthz (when using SSHTunnels). (#23167, @cjcullen)
- Validate minimum CPU limits to be >= 10m (#23143, @vishh)
- kubernetes#23034 Fix controller-manager race condition issue which cause endpoints flush during restart (#23035, @xinxiaogang)
- MESOS: forward globally declared cadvisor housekeeping flags (#22974, @jdef)
- Trusty: support developer workflow on base image (#22960, @andyzheng0831)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | e0041b08e220a4704ea2ad90a6ec7c8f2120c2d3 |
7bb2df32aea94678f72a8d1f43a12098 |
- Disabling swagger ui by default on apiserver. Adding a flag that can enable it (#23025, @nikhiljindal)
- restore ability to run against secured etcd (#21535, @AdoHe)
- Trusty: Avoid reaching GCE custom metadata size limit (#22818, @andyzheng0831)
- Update kubectl help for 1.2 resources (#23305, @janetkuo)
- Removing URL query param from swagger UI to fix the XSS issue (#23234, @nikhiljindal)
- Fix hairpin mode (#23325, @MurgaNikolay)
- Bump to container-vm-v20160321 (#23313, @zmerlynn)
- Remove the restart-kube-proxy and restart-apiserver functions (#23180, @roberthbailey)
- Copy annotations back from RS to Deployment on rollback (#23160, @janetkuo)
- Trusty: Support hybrid cluster with nodes on ContainerVM (#23079, @andyzheng0831)
- update expose command description to add deployment (#23246, @AdoHe)
- Add a rate limiter to the GCE cloudprovider (#23019, @alex-mohr)
- Add a Deployment example for kubectl expose. (#23222, @madhusudancs)
- Use versioned object when computing patch (#23145, @liggitt)
- kubelet: send all recevied pods in one update (#23141, @yujuhong)
- Add a SSHKey sync check to the master's healthz (when using SSHTunnels). (#23167, @cjcullen)
- Validate minimum CPU limits to be >= 10m (#23143, @vishh)
- kubernetes#23034 Fix controller-manager race condition issue which cause endpoints flush during restart (#23035, @xinxiaogang)
- MESOS: forward globally declared cadvisor housekeeping flags (#22974, @jdef)
- Trusty: support developer workflow on base image (#22960, @andyzheng0831)
- Bumped Heapster to stable version 1.0.0 (#22993, @piosz)
- Deprecating --api-version flag (#22410, @nikhiljindal)
- allow resource.version.group in kubectl (#22853, @deads2k)
- Use SCP to dump logs and parallelize a bit. (#22835, @spxtr)
- update wide option output (#22772, @AdoHe)
- Change scheduler logic from random to round-robin (#22430, @gmarek)
binary | sha1 hash | md5 hash |
---|---|---|
kubernetes.tar.gz | 52dd998e1191f464f581a9b87017d70ce0b058d9 |
c0ce9e6150e9d7a19455db82f3318b4c |
- Significant scale improvements. Increased cluster scale by 400% to 1000 nodes with 30,000 pods per cluster. Kubelet supports 100 pods per node with 4x reduced system overhead.
- Simplified application deployment and management.
- Dynamic Configuration (ConfigMap API in the core API group) enables application configuration to be stored as a Kubernetes API object and pulled dynamically on container startup, as an alternative to baking in command-line flags when a container is built.
- Turnkey Deployments (Deployment API (Beta) in the Extensions API group) automate deployment and rolling updates of applications, specified declaratively. It handles versioning, multiple simultaneous rollouts, aggregating status across all pods, maintaining application availability, and rollback.
- Automated cluster management:
- Kubernetes clusters can now span zones within a cloud provider. Pods from a service will be automatically spread across zones, enabling applications to tolerate zone failure.
- Simplified way to run a container on every node (DaemonSet API (Beta) in the Extensions API group): Kubernetes can schedule a service (such as a logging agent) that runs one, and only one, pod per node.
- TLS and L7 support (Ingress API (Beta) in the Extensions API group): Kubernetes is now easier to integrate into custom networking environments by supporting TLS for secure communication and L7 http-based traffic routing.
- Graceful Node Shutdown (aka drain) - The new “kubectl drain” command gracefully evicts pods from nodes in preparation for disruptive operations like kernel upgrades or maintenance.
- Custom Metrics for Autoscaling (HorizontalPodAutoscaler API in the Autoscaling API group): The Horizontal Pod Autoscaling feature now supports custom metrics (Alpha), allowing you to specify application-level metrics and thresholds to trigger scaling up and down the number of pods in your application.
- New GUI (dashboard) allows you to get started quickly and enables the same functionality found in the CLI as a more approachable and discoverable way of interacting with the system. Note: the GUI is enabled by default in 1.2 clusters.
- Job was Beta in 1.1 and is GA in 1.2 .
apiVersion: batch/v1
is now available. You now do not need to specify the.spec.selector
field — a unique selector is automatically generated for you.- The previous version,
apiVersion: extensions/v1beta1
, is still supported. Even if you roll back to 1.1, the objects created using the new apiVersion will still be accessible, using the old version. You can continue to use your existing JSON and YAML files until you are ready to switch tobatch/v1
. We may remove support for Jobs withapiVersion: extensions/v1beta1
in 1.3 or 1.4.
- HorizontalPodAutoscaler was Beta in 1.1 and is GA in 1.2 .
apiVersion: autoscaling/v1
is now available. Changes in this version are:- Field CPUUtilization which was a nested structure CPUTargetUtilization in HorizontalPodAutoscalerSpec was replaced by TargetCPUUtilizationPercentage which is an integer.
- ScaleRef of type SubresourceReference in HorizontalPodAutoscalerSpec which referred to scale subresource of the resource being scaled was replaced by ScaleTargetRef which points just to the resource being scaled.
- In extensions/v1beta1 if CPUUtilization in HorizontalPodAutoscalerSpec was not specified it was set to 80 by default while in autoscaling/v1 HPA object without TargetCPUUtilizationPercentage specified is a valid object. Pod autoscaler controller will apply a default scaling policy in this case which is equivalent to the previous one but may change in the future.
- The previous version,
apiVersion: extensions/v1beta1
, is still supported. Even if you roll back to 1.1, the objects created using the new apiVersions will still be accessible, using the old version. You can continue to use your existing JSON and YAML files until you are ready to switch toautoscaling/v1
. We may remove support for HorizontalPodAutoscalers withapiVersion: extensions/v1beta1
in 1.3 or 1.4.
- Kube-Proxy now defaults to an iptables-based proxy. If the --proxy-mode flag is specified while starting kube-proxy (‘userspace’ or ‘iptables’), the flag value will be respected. If the flag value is not specified, the kube-proxy respects the Node object annotation: ‘net.beta.kubernetes.io/proxy-mode’. If the annotation is not specified, then ‘iptables’ mode is the default. If kube-proxy is unable to start in iptables mode because system requirements are not met (kernel or iptables versions are insufficient), the kube-proxy will fall-back to userspace mode. Kube-proxy is much more performant and less resource-intensive in ‘iptables’ mode.
- Node stability can be improved by reserving resources for the base operating system using --system-reserved and --kube-reserved Kubelet flags
- Liveness and readiness probes now support more configuration parameters: periodSeconds, successThreshold, failureThreshold
- The new ReplicaSet API (Beta) in the Extensions API group is similar to ReplicationController, but its selector is more general (supports set-based selector; whereas ReplicationController only supports equality-based selector).
- Scale subresource support is now expanded to ReplicaSets along with ReplicationControllers and Deployments. Scale now supports two different types of selectors to accommodate both equality-based selectors supported by ReplicationControllers and set-based selectors supported by Deployments and ReplicaSets.
- “kubectl run” now produces Deployments (instead of ReplicationControllers) and Jobs (instead of Pods) by default.
- Pods can now consume Secret data in environment variables and inject those environment variables into a container’s command-line args.
- Stable version of Heapster which scales up to 1000 nodes: more metrics, reduced latency, reduced cpu/memory consumption (~4mb per monitored node).
- Pods now have a security context which allows users to specify:
- attributes which apply to the whole pod:
- User ID
- Whether all containers should be non-root
- Supplemental Groups
- FSGroup - a special supplemental group
- SELinux options
- If a pod defines an FSGroup, that Pod’s system (emptyDir, secret, configMap, etc) volumes and block-device volumes will be owned by the FSGroup, and each container in the pod will run with the FSGroup as a supplemental group
- attributes which apply to the whole pod:
- Volumes that support SELinux labelling are now automatically relabeled with the Pod’s SELinux context, if specified
- A stable client library release_1_2 is added. The library is here, and detailed doc is here. We will keep the interface of this go client stable.
- New Azure File Service Volume Plugin enables mounting Microsoft Azure File Volumes (SMB 2.1 and 3.0) into a Pod. See example for details.
- Logs usage and root filesystem usage of a container, volumes usage of a pod and node disk usage are exposed through Kubelet new metrics API.
- Dynamic Provisioning of PersistentVolumes: Kubernetes previously required all volumes to be manually provisioned by a cluster administrator before use. With this feature, volume plugins that support it (GCE PD, AWS EBS, and Cinder) can automatically provision a PersistentVolume to bind to an unfulfilled PersistentVolumeClaim.
- Run multiple schedulers in parallel, e.g. one or more custom schedulers alongside the default Kubernetes scheduler, using pod annotations to select among the schedulers for each pod. Documentation is here, design doc is here.
- More expressive node affinity syntax, and support for “soft” node affinity.
Node selectors (to constrain pods to schedule on a subset of nodes) now support
the operators {
In, NotIn, Exists, DoesNotExist, Gt, Lt
} instead of just conjunction of exact match on node label values. In addition, we’ve introduced a new “soft” kind of node selector that is just a hint to the scheduler; the scheduler will try to satisfy these requests but it does not guarantee they will be satisfied. Both the “hard” and “soft” variants of node affinity use the new syntax. Documentation is here (see section “Alpha feature in Kubernetes v1.2: Node Affinity“). Design doc is here. - A pod can specify its own Hostname and Subdomain via annotations (
pod.beta.kubernetes.io/hostname, pod.beta.kubernetes.io/subdomain)
. If the Subdomain matches the name of a headless service in the same namespace, a DNS A record is also created for the pod’s FQDN. More details can be found in the DNS README. Changes were introduced in PR #20688. - New SchedulerExtender enables users to implement custom out-of-(the-scheduler)-process scheduling predicates and priority functions, for example to schedule pods based on resources that are not directly managed by Kubernetes. Changes were introduced in PR #13580. Example configuration and documentation is available here. This is an alpha feature and may not be supported in its current form at beta or GA.
- New Flex Volume Plugin enables users to use out-of-process volume plugins that are installed to “/usr/libexec/kubernetes/kubelet-plugins/volume/exec/” on every node, instead of being compiled into the Kubernetes binary. See example for details.
- vendor volumes into a pod. It expects vendor drivers are installed in the volume plugin path on each kubelet node. This is an alpha feature and may change in future.
- Kubelet exposes a new Alpha metrics API - /stats/summary in a user friendly format with reduced system overhead. The measurement is done in PR #22542.
- Docker v1.9.1 is officially recommended. Docker v1.8.3 and Docker v1.10 are supported. If you are using an older release of Docker, please upgrade. Known issues with Docker 1.9.1 can be found below.
- CPU hardcapping will be enabled by default for containers with CPU limit set, if supported by the kernel. You should either adjust your CPU limit, or set CPU request only, if you want to avoid hardcapping. If the kernel does not support CPU Quota, NodeStatus will contain a warning indicating that CPU Limits cannot be enforced.
- The following applies only if you use the Go language client (
/pkg/client/unversioned
) to create Job by defining Go variables of type "k8s.io/kubernetes/pkg/apis/extensions".Job
). We think this is not common, so if you are not sure what this means, you probably aren't doing this. If you do this, then, at the time you re-vendor the "k8s.io/kubernetes/"
code, you will need to setjob.Spec.ManualSelector = true
, or else setjob.Spec.Selector = nil.
Otherwise, the jobs you create may be rejected. See Specifying your own pod selector. - Deployment was Alpha in 1.1 (though it had apiVersion extensions/v1beta1) and
was disabled by default. Due to some non-backward-compatible API changes, any
Deployment objects you created in 1.1 won’t work with in the 1.2 release.
- Before upgrading to 1.2, delete all Deployment alpha-version resources, including the Replication Controllers and Pods the Deployment manages. Then create Deployment Beta resources after upgrading to 1.2. Not deleting the Deployment objects may cause the deployment controller to mistakenly match other pods and delete them, due to the selector API change.
- Client (kubectl) and server versions must match (both 1.1 or both 1.2) for any Deployment-related operations.
- Behavior change:
- Deployment creates ReplicaSets instead of ReplicationControllers.
- Scale subresource now has a new
targetSelector
field in its status. This field supports the new set-based selectors supported by Deployments, but in a serialized format.
- Spec change:
- Deployment’s selector is now more general (supports set-based selector; it only supported equality-based selector in 1.1).
- .spec.uniqueLabelKey is removed -- users can’t customize unique label key -- and its default value is changed from “deployment.kubernetes.io/podTemplateHash” to “pod-template-hash”.
- .spec.strategy.rollingUpdate.minReadySeconds is moved to .spec.minReadySeconds
- DaemonSet was Alpha in 1.1 (though it had apiVersion extensions/v1beta1) and
was disabled by default. Due to some non-backward-compatible API changes, any
DaemonSet objects you created in 1.1 won’t work with in the 1.2 release.
- Before upgrading to 1.2, delete all DaemonSet alpha-version resources. If you do not want to disrupt the pods, use kubectl delete daemonset --cascade=false. Then create DaemonSet Beta resources after upgrading to 1.2.
- Client (kubectl) and server versions must match (both 1.1 or both 1.2) for any DaemonSet-related operations.
- Behavior change:
- DaemonSet pods will be created on nodes with .spec.unschedulable=true and will not be evicted from nodes whose Ready condition is false.
- Updates to the pod template are now permitted. To perform a rolling update of a DaemonSet, update the pod template and then delete its pods one by one; they will be replaced using the updated template.
- Spec change:
- DaemonSet’s selector is now more general (supports set-based selector; it only supported equality-based selector in 1.1).
- Running against a secured etcd requires these flags to be passed to
kube-apiserver (instead of --etcd-config):
- --etcd-certfile, --etcd-keyfile (if using client cert auth)
- --etcd-cafile (if not using system roots)
- As part of preparation in 1.2 for adding support for protocol buffers (and the
direct YAML support in the API available today), the Content-Type and Accept
headers are now properly handled as per the HTTP spec. As a consequence, if
you had a client that was sending an invalid Content-Type or Accept header to
the API, in 1.2 you will either receive a 415 or 406 error.
The only client
this is known to affect is curl when you use -d with JSON but don't set a
content type, helpfully sends "application/x-www-urlencoded", which is not
correct.
Other client authors should double check that you are sending proper
accept and content type headers, or set no value (in which case JSON is the
default).
An example using curl:
curl -H "Content-Type: application/json" -XPOST -d '{"apiVersion":"v1","kind":"Namespace","metadata":{"name":"kube-system"}}' "http://127.0.0.1:8080/api/v1/namespaces"
- The version of InfluxDB is bumped from 0.8 to 0.9 which means storage schema change. More details here.
- We have renamed “minions” to “nodes”. If you were specifying NUM_MINIONS or MINION_SIZE to kube-up, you should now specify NUM_NODES or NODE_SIZE.
- Paused deployments can't be resized and don't clean up old ReplicaSets.
- Minimum memory limit is 4MB. This is a docker limitation
- Minimum CPU limits is 10m. This is a Linux Kernel limitation
- “kubectl rollout undo” (i.e. rollback) will hang on paused deployments, because paused deployments can’t be rolled back (this is expected), and the command waits for rollback events to return the result. Users should use “kubectl rollout resume” to resume a deployment before rolling back.
- “kubectl edit ” will open the editor multiple times, once for each resource in the list.
- If you create HPA object using autoscaling/v1 API without specifying targetCPUUtilizationPercentage and read it using kubectl it will print default value as specified in extensions/v1beta1 (see details in #23196).
- If a node or kubelet crashes with a volume attached, the volume will remain attached to that node. If that volume can only be attached to one node at a time (GCE PDs attached in RW mode, for example), then the volume must be manually detached before Kubernetes can attach it to other nodes.
- If a volume is already attached to a node any subsequent attempts to attach it again (due to kubelet restart, for example) will fail. The volume must either be manually detached first or the pods referencing it deleted (which would trigger automatic volume detach).
- In very large clusters it may happen that a few nodes won’t register in API server in a given timeframe for whatever reasons (networking issue, machine failure, etc.). Normally when kube-up script will encounter even one NotReady node it will fail, even though the cluster most likely will be working. We added an environmental variable to kube-up ALLOWED_NOTREADY_NODES that defines the number of nodes that if not Ready in time won’t cause kube-up failure.
- “kubectl rolling-update” only supports Replication Controllers (it doesn’t support Replica Sets). It’s recommended to use Deployment 1.2 with “kubectl rollout” commands instead, if you want to rolling update Replica Sets.
- When live upgrading Kubelet to 1.2 without draining the pods running on the node, the containers will be restarted by Kubelet (see details in #23104).
- Listing containers can be slow at times which will affect kubelet performance. More information here
- Docker daemon restarts can fail. Docker checkpoints have to deleted between restarts. More information here
- Pod IP allocation-related issues. Deleting the docker checkpoint prior to restarting the daemon alleviates this issue, but hasn’t been verified to completely eliminate the IP allocation issue. More information here
- Daemon becomes unresponsive (rarely) due to kernel deadlocks. More information here
Core changes:
- Support for load balancers with source ranges
Core changes:
- Support for ELBs with complex configurations: better subnet selection with multiple subnets, and internal ELBs
- Support for VPCs with private dns names
- Multiple fixes to EBS volume mounting code for robustness, and to support mounting the full number of AWS recommended volumes.
- Multiple fixes to avoid hitting AWS rate limits, and to throttle if we do
- Support for the EC2 Container Registry (currently in us-east-1 only)
With kube-up:
- Automatically install updates on boot & reboot
- Use optimized image based on Jessie by default
- Add support for Ubuntu Wily
- Master is configured with automatic restart-on-failure, via CloudWatch
- Bootstrap reworked to be more similar to GCE; better supports reboots/restarts
- Use an elastic IP for the master by default
- Experimental support for node spot instances (set NODE_SPOT_PRICE=0.05)
- Ubuntu Trusty support added
Please see the Releases Page for older releases.