Releases: kubermatic/kubeone
v1.4.11
Important Registry Change Information
For the next series of KubeOne and KKP patch releases, image references will move from k8s.gcr.io
to registry.k8s.io
. This will be done to keep up with the latest upstream changes. Please ensure that any mirrors you use are able to host registry.k8s.io
and/or that firewall rules are going to allow access to registry.k8s.io
to pull images before applying the next KubeOne patch releases. This is not included in this patch release but just a notification of future changes.
Important Security Information
Kubernetes releases prior to 1.25.4, 1.24.8, 1.23.14, and 1.22.16 are affected by two Medium CVEs in kube-apiserver: CVE-2022-3162 (Unauthorized read of Custom Resources) and CVE-2022-3294 (Node address isn't always verified when proxying). We strongly recommend upgrading to 1.25.4, 1.24.8, 1.23.14, or 1.22.16 as soon as possible.
Changelog since v1.4.10
Changes by Kind
Feature
- Update etcd to 3.5.5 for Kubernetes 1.22+ clusters or use the version provided by kubeadm if it's newer (#2444, @xmudrii)
Other (Cleanup or Flake)
- Expose machine-controller metrics port (8080/TCP), so Prometheus ServiceMonitor can be used for scraping (#2440, @kubermatic-bot)
Chore
- KubeOne is now built using Go 1.18.8 (#2465, @xmudrii)
- The
kubeone-e2e
image is moved from Docker Hub to Quay (quay.io/kubermatic/kubeone-e2e
) (#2465, @xmudrii)
Checksums
SHA256 checksums can be found in the kubeone_1.4.11_checksums.txt
file.
v1.5.2
Changes by Kind
Feature
- Add support for Ubuntu 22.04 (#2383, @ahmedwaleedmalik)
Updates
- Update containerd to 1.6. This change affects control plane nodes, static worker nodes, and nodes managed by machine-controller/OSM (#2388, @ahmedwaleedmalik)
- Update to machine-controller v1.54.1 (#2383, @ahmedwaleedmalik)
- Update Operating System Manager (OSM) to 1.1.1 (#2388, @ahmedwaleedmalik)
Checksums
SHA256 checksums can be found in the kubeone_1.5.2_checksums.txt
file.
v1.4.10
v1.5.1
Changes by Kind
Feature
- Add a new
NodeLocalDNS
field to the KubeOneCluster API used to control should the NodeLocalDNSCache component be deployed or not. Runkubeone config print --full
for details on how to use this field (#2377, @kron4eg) - Upgrade Cilium from v1.12.0 to v1.12.2 (#2376, @ahmedwaleedmalik)
Bug or Regression
- Automatically delete the CoreDNS PodDistruptionBudget if the feature is disabled (#2365, @xmudrii)
- Fix NPE when machine-controller deployment is disabled (#2357, @kron4eg)
- Fix NPE with Operating System Manager (OSM) when the KubeOneCluster v1beta1 API is used (#2357, @kron4eg)
- Explicitly disable Operating System Manager (OSM) when the KubeOneCluster v1beta1 is used (#2357, @kron4eg)
- Recreate SSH connection in the case of errors with session (#2357, @kron4eg)
- Update the
kubernetes-cni
package from 0.8.7 to 1.1.1 to support the latest Kubernetes patch releases (#2357, @kron4eg) - Use
vmware-system-csi
namespace when generating certs for the vSphere CSI webhooks (#2374, @xmudrii)
Checksums
SHA256 checksums can be found in the kubeone_1.5.1_checksums.txt
file.
v1.4.9
v1.5.0
KubeOne 1.5.0
We're happy to announce a new KubeOne minor release — KubeOne 1.5! Please consult the changelog, as well as, the upgrade guide and the Known Issues document before upgrading:
Checksums
SHA256 checksums can be found in the kubeone_1.5.0_checksums.txt
file.
v1.4.8
Urgent Upgrade Notes
(No, really, you MUST read this before you upgrade)
- Update machine-controller to v1.43.7. This update fixes several issues for RHEL clusters on Azure. If you have RHEL-based MachineDeployments on Azure, we strongly recommend upgrading to KubeOne 1.4.8 and rotating those MachineDeployments BEFORE upgrading to KubeOne 1.5. If not done, the Canal CNI update might break the cluster networking when upgrading to KubeOne 1.5. (#2333, @xmudrii)
Changes by Kind
Bug or Regression
- Mount
/etc/pki
to the OpenStack CCM container to fix CrashLoopBackoff on clusters running CentOS 7 (#2303, @xmudrii) - Explicitly create
/opt/bin
on Flatcar before trying to untar anything to that directory (#2305, @xmudrii) - Mount
/etc/pki
to the Azure CCM container to fix CrashLoopBackoff on clusters running CentOS 7 and Rocky Linux (#2310, @kubermatic-bot) - Mount
/usr/share/ca-certificates
to the Azure CCM container to fix CrashLoopBackoff on clusters running Flatcar (#2334, @xmudrii) - Set iptables backend (
FELIX_IPTABLESBACKEND
) toNFT
for Canal and Calico VXLAN on clusters running Flatcar Linux and RHEL. For non Flatcar/RHEL clusters, iptables backend is set to Auto, which is the default value and results in Calico determining the iptables backend automatically. The value can be overridden by setting theiptablesBackend
addon parameter (see the PR description for an example). (#2334, @xmudrii)
Checksums
SHA256 checksums can be found in the kubeone_1.4.8_checksums.txt
file.
v1.5.0-rc.0
Changelog
The complete changelog since the v1.5.0-beta.0 release is available in CHANGELOG/CHANGELOG-1.5.md.
Urgent Upgrade Notes
- The minimum Kubernetes version has been increased to v1.22.0. If you're still using Kubernetes v1.21 or v1.20, you have to upgrade the cluster to v1.22 or newer before upgrading to KubeOne 1.5. (#2236, @xmudrii)
- Remove defaulting for Flatcar provisioning utility in example Terraform configs for AWS (defaulted to Ignition by machine-controller). If you have Flatcar-based MachineDeployments that use the
cloud-init
provisioning utility, you must change the provisioning utility toignition
(or leave it empty) for Operating System Manager (OSM) to work properly (#2285, @xmudrii) - Remove the
hcloud-volumes
StorageClass deployed automatically by Hetzner CSI driver in favor ofhcloud-volumes
StorageClass deployed by thedefault-storage-class
addon. If you're usinghcloud-volumes
StorageClass, make sure that you have thedefault-storage-class
addon enabled before upgrading to KubeOne 1.5 (#2269, @xmudrii)
Deprecations
- We announced with the KubeOne 1.4.0 release that
kubeone install
andkubeone upgrade
commands are deprecated in favor ofkubeone apply
. This time we're marking those commands as hidden, so they'll not show in the help output. In the next release, we'll completely remove those commands, so we strongly recommend migrating tokubeone apply
as soon as possible. (#2258, @kron4eg)
Known Issues
- Calico VXLAN addon has an issue with broken network connectivity for pods running on the same node. If you're using Calico VXLAN, we recommend staying on KubeOne 1.4 until the issue is not fixed. Follow #2192 for updates.
Checksums
SHA256 checksums can be found in the kubeone_1.5.0-rc.0_checksums.txt
file.
v1.4.7
Changes by Kind
Bug or Regression
- Enable
nf_conntrack
(nf_conntrack_ipv4
) module by default on all operating systems. This fixes an issue with pods unable to reach services running on a host on operating systems that are using the NFT backend. (#2283, @xmudrii)
Terraform Integration
AWS
- Remove defaulting for the Flatcar provisioning utility in example Terraform configs for AWS (defaulted to cloud-init by machine-controller) (#2286, @xmudrii)
Checksums
SHA256 checksums can be found in the kubeone_1.4.7_checksums.txt
file.
v1.5.0-beta.0
Changelog
The complete changelog since the v1.4.0 release is available in CHANGELOG/CHANGELOG-1.5.md.
Urgent Upgrade Notes
- Automatically apply the
node-role.kubernetes.io/control-plane
taint to nodes running Kubernetes 1.24. The taint is also applied when upgrading nodes from Kubernetes 1.23 to 1.24. You might need to adjust your workloads to tolerate thenode-role.kubernetes.io/control-plane
taint (in addition to thenode-role.kubernetes.io/master
taint). Workloads deployed by KubeOne will be adjusted automatically. (#2019, @xmudrii) - Kubeadm is now applying the
node-role.kubernetes.io/control-plane
label for Kubernetes 1.24 nodes. The old label (node-role.kubernetes.io/master
) will be removed when upgrading the cluster to Kubernetes 1.24. All addons are updated to use thenode-role.kubernetes.io/control-plane
label selector instead. All addons now have toleration fornode-role.kubernetes.io/control-plane
taint in addition to toleration fornode-role.kubernetes.io/master
taint. If you are overriding addons, make sure to apply those changes before upgrading to Kubernetes 1.24. (#2017, @xmudrii) - Operating System Manager is enabled by default and is responsible for generating and managing user-data used for provisioning worker nodes
- Existing worker machines will not be migrated to use OSM automatically. The user needs to manually rollout all MachineDeployments to start using OSM. This can be done by following the steps described in Rolling Restart MachineDeploments document
- The user can opt-out from OSM by setting
.operatingSystemManager.deploy
tofalse
in their KubeOneCluster manifest. (#2157, @ahmedwaleedmalik)
workers_replicas
variable has been renamed toinitial_machinedeployment_replicas
in example Terraform configs for Hetzner (#2115, @adeniyistephen)- Change default instance size in example Terraform configs for Equinix Metal to
c3.small.x86
becauset1.small.x86
is not available any longer. If you're using the latest Terraform configs for Equinix Metal with an existing cluster, make sure to explicitly set the instance size (device_type
andlb_device_type
) interraform.tfvars
or otherwise your instances might get recreated (#2054, @xmudrii) - Update secret name for
backup-restic
addon tokubeone-backups-credentials
. Manual migration steps are needed for users running KKP on top of a KubeOne installation and using bothbackup-restic
addon from KubeOne ands3-exporter
from KKP. Ensure that thes3-credentials
Secret with keysACCESS_KEY_ID
andSECRET_ACCESS_KEY
exists inkube-system
namespace and doesn't have the labelkubeone.io/addon:
. Remove the label if it exists. Otherwise,s3-exporter
won't be functional. (#1880, @ahmedwaleedmalik)
Known Issues
- Calico VXLAN addon has an issue with broken network connectivity for pods running on the same node. If you're using Calico VXLAN, we recommend staying on KubeOne 1.4 until the issue is not fixed. Follow #2192 for updates.
Checksums
SHA256 checksums can be found in the kubeone_1.5.0-beta.0_checksums.txt
file.