v1.27.X
Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.
Release v1.27.16+rke2r2
This release updates Kubernetes to v1.27.16.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.16+rke2r1:
- Bump nginx to hardened2 (#6479)
- Update for CNI flannel, Cilium and Canal (#6518)
- Bump k3s and containerd (#6527)
- Fixed hns clean only in case of reboot (#6541)
- Bump containerd/crictl/runc versions (#6555)
- Fix for kill all to not delete the data dir (#6566)
- Fix windows airgap image packaging (#6588)
- Fixed Flannel chart to rightly disable nft (#6610)
- Bump ingress-nginx to v1.10.4-hardened2 (#6614)
- Shell completion and etcd connection fix (#6615)
- Update Kubernetes v1.27.16 to build 20240819 (#6589)
- Bump harvester csi driver v0.1.18 (#6618)
- Bump Harvester-csi-driver v0.1.18
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.16.000 |
rke2-canal | v3.28.1-build2024080600 |
rke2-calico | v3.27.300 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.002 |
rke2-ingress-nginx | 4.10.401 |
rke2-metrics-server | 3.12.002 |
rancher-vsphere-csi | 3.3.0-rancher100 |
rancher-vsphere-cpi | 1.8.000 |
harvester-cloud-provider | 0.2.400 |
harvester-csi-driver | 0.1.1800 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.16+rke2r1
This release updates Kubernetes to v1.27.16.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.15+rke2r1:
- GHA Migration (#6295)
- Bump multus to v4.0.206 (#6347)
- Bump vsphere csi chart to 3.3.0-rancher100 and cpi to 1.8.000 (#6344)
- Version bumps and backports for 2024-07 release cycle (#6320)
- Fix secrets for commit id uploads (#6369)
- Update Kubernetes to v1.27.16 (#6361)
- Publish binaries in dapper (#6382)
- Add missing package windows step in release (#6391)
- Add manifest pipeline for rke2-runtime docker image (#6401)
- Fix dispatch script (#6409)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.500 |
rke2-canal | v3.28.0-build2024062503 |
rke2-calico | v3.27.300 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.002 |
rke2-ingress-nginx | 4.10.102 |
rke2-metrics-server | 3.12.002 |
rancher-vsphere-csi | 3.3.0-rancher100 |
rancher-vsphere-cpi | 1.8.000 |
harvester-cloud-provider | 0.2.400 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.15+rke2r1
This release updates Kubernetes to v1.27.15.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.14+rke2r1:
- Improve rke2-uninstall.ps1 script (#5962)
- Update flannel chart to fix vni error (#5953) (#5998)
- Update cloud-provider image which now uses scratch as base (#5933) (#5988)
- Add cilium no proxy e2e test (#5885) (#5968)
- Add extra log in e2e tests (#6021)
- Bump flannel to v0.25.201 and canal to v3.28.0-build2024052800 (#6049)
- Add a Kine fix when rke2 restart apiserver (#6006)
- Bump multus and whereabouts version (#6015) (#6037)
- Bump harvester-cloud-provider v0.2.4 (#5983)
- Version bumps and backports for 2024-06 release cycle (#6083)
- Add easy support for single node sqlite with kine (#6070)
- Bump nginx to 1.10.1 (#6057)
- Bump K3s version for v1.27 (#6114)
- Bump containerd to correctly built tag (#6129)
- Bump flannel version (#6124)
- Update to the latest SR-IOV image versions (#6149)
- Bump flannel image in rke2-canal (#6154)
- Use
rancher/permissions
dependency (#6141) - Bump K3s version for v1.27 (#6167)
- Improve rke2-uninstall.ps1 (#6134)
- June Testing Backports (#6157)
- Fix loadManifests function
- Slim down E2E artifacts
- Support MixedOS E2E local testing
- Add custom golang setup action for better caching
- Update flannel version to v0.25.4 (#6179)
- Update Kubernetes to v1.27.15 (#6188)
- Fix drone pipeline (#6196)
- Update drone build base image (#6203)
- Bump K3s version for v1.27 to fix regression in agent's supervisor port (#6207)
- Bump rke2-ingress-nginx chart to revert watchIngressWithoutClass default (#6219)
- Update hardened kubernetes (#6222)
- Bump K3s version for snapshot fix (#6233)
- Fix issue that allowed multiple simultaneous snapshots to be allowed
- Revert rke2-ingress-nginx bump back to v1.9.6 (#6242)
- Reinstate newest rke2-ingress-nginx (#6255)
- Update calico image to v3.28.0-build20240625 (#6260)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.500 |
rke2-canal | v3.28.0-build2024062503 |
rke2-calico | v3.27.300 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.002 |
rke2-ingress-nginx | 4.10.101 |
rke2-metrics-server | 3.12.002 |
rancher-vsphere-csi | 3.1.2-rancher400 |
rancher-vsphere-cpi | 1.7.001 |
harvester-cloud-provider | 0.2.400 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.14+rke2r1
This release updates Kubernetes to v1.27.14.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.13+rke2r1:
- Add mixedos BGP e2e test (#5874)
- Remove flannel-v6.4096 when rke2-killall.sh (#5878)
- Unit, Integration and Install Testing Overhaul (#5797)
- Remove cni parameter from agent config (#5894)
- Add script to validate flannel versions (#5897)
- Fix mixedosbgp e2e test (#5904)
- E2E test backports (#5906)
- Update k8s v1.27.14 (#5916)
- Windows changes (#5920)
- Cilium version bump to 1.15.5 (#5941)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.500 |
rke2-canal | v3.27.3-build2024042301 |
rke2-calico | v3.27.300 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.002 |
rke2-ingress-nginx | 4.9.100 |
rke2-metrics-server | 3.12.002 |
rancher-vsphere-csi | 3.1.2-rancher400 |
rancher-vsphere-cpi | 1.7.001 |
harvester-cloud-provider | 0.2.300 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.13+rke2r1
This release updates Kubernetes to v1.27.13.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.12+rke2r1:
- Bump flannel version (#5644)
- Add kine support (#5674)
- Add some small fixes in flannel-windows (#5667)
- Bump ingress-nginx to 1.9.6 (#5688)
- Bump K3s version for 2024-04 release cycle (#5716)
- Fix Windows path setting (#5729)
- Update flannel to v0.25.0 (#5732)
- Calico and canal update (#5739)
- Update to Cilium v1.15.3 (#5746)
- Check if the kube-proxy VIP was already reserved (#5741)
- Update flannel to v0.25.1 (#5749)
- Bump harvester-cloud-provider v0.2.3 (#5696)
- Backports for 2024-04 release cycle (#5753)
- Bump vsphere csi chart to 3.1.2-rancher300 and add snapshotter image (#5762)
- Update to Cilium v1.15.4 (#5774)
- Bump metrics-server version (#5759)
- Vsphere csi bump (#5803)
- Update Kubernetes to v1.27.13 (#5790)
- Bump K3s version for v1.27 to pull through etcd-snapshot save fixes (#5818)
- Bump K3s version for dbinfo fix (#5824)
- Updated Calico and Flannel to fix ARM64 build (#5829)
- Update rke2-canal to v3.27.3-build2024042301 (#5838)
- Use the newer Flannel chart (#5846)
- Bump metrics-server chart to restore legacy label (#5853)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.400 |
rke2-canal | v3.27.3-build2024042301 |
rke2-calico | v3.27.300 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.002 |
rke2-ingress-nginx | 4.9.100 |
rke2-metrics-server | 3.12.002 |
rancher-vsphere-csi | 3.1.2-rancher400 |
rancher-vsphere-cpi | 1.7.001 |
harvester-cloud-provider | 0.2.300 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.12+rke2r1
This release updates Kubernetes to v1.27.12.
Canal uses flannel 0.24.3 which includes a bug: every 5 seconds it tries to add ipv6 iptables rules and fails if the node does not have an ipv6 address. The consequence is the log "Failed to ensure iptables rules: error setting up rules: failed to apply partial iptables-restore unable to run iptables-restore (, ): exit status 4" appears every 5 seconds in the flannel container of the canal pod.
Flannel daemonset is not tolerating node taints: "node-role.kubernetes.io/etcd:NoExecute", "node-role.kubernetes.io/control-plane:NoSchedule" and "node.cloudprovider.kubernetes.io/uninitialized:NoSchedule" which can create problems when deploying with Rancher in certain cloud-providers (e.g. vShpere or DigitalOcean).
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.11+rke2r1:
- Add a multus e2e test (#5546)
- Bump vsphere csi chart to 3.1.2-rancher101 and cpi to 1.7.001 (#5555)
- Bump coredns chart (#5562)
- Update 1.27 to r2 (#5565)
- Update Calico and Canal to v3.27.2 (#5584)
- Bump multus chart version (#5595)
- Bump K3s version for v1.27 (#5589)
- Fix: use correct wasm shims names
- Bump spegel to v0.0.18-k3s3
- Adds wildcard registry support
- Fixes issue with excessive CPU utilization while waiting for containerd to start
- Add env var to allow spegel mirroring of latest tag
- Bump helm-controller/klipper-helm versions
- Fix snapshot prune
- Fix issue with etcd node name missing hostname
- Fix additional corner cases in registries handling
- RKE2 will now warn and suppress duplicate entries in the mirror endpoint list for a registry. Containerd does not support listing the same endpoint multiple times as a mirror for a single upstream registry.
- Bump K3s version for v1.27 (#5607)
- Update k8s to 1.27.12 and Go (#5622)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.100 |
rke2-canal | v3.27.2-build2024030800 |
rke2-calico | v3.27.200 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.002 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051513 |
rancher-vsphere-csi | 3.1.2-rancher101 |
rancher-vsphere-cpi | 1.7.001 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.11+rke2r1
This release updates Kubernetes to v1.27.11.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.10+rke2r1:
- Fix validate-charts script (#5376)
- Windows (#5369)
- Avoid race condition when deleting HNS networks (#5384)
- Add CNI plugin flannel support for Windows (#5395)
- Bump coredns and multus/whereabouts versions (#5401)
- Fix: missing 'ip link delete cilium_wg0' in rke2-killall.sh (#5407)
- Update canal version (#5417)
- Improve calico in windows (#5428)
- Update Calico to v3.27.0 (#5437)
- Update Cilium to 1.15.0 (#5452)
- Backport agent containerd behavior 1.27 (#5456)
- Bump K3s version for v1.27 (#5460)
- Bump harvester-csi-driver to 0.1.7 (#5441)
- Update k8s and Go (#5466)
- Update Cilium to 1.15.1 (#5478)
- Bump rke2-coredns chart (#5498)
- Bump K3s for etcd-only fix (#5503)
- Add new network policy for ingress controller webhook (#5511)
- Backport bugfixes for 2024-02 rc (#5532)
- Bump wharfie to v0.6.6 to add support for bare hostname as endpoint, fix unnecessary namespace param inclusion
- Refactor netpol creation and add two new netpols for metrics-server and snapshot-validation-webhook
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.100 |
rke2-canal | v3.27.0-build2024020601 |
rke2-calico | v3.27.002 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.001 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051513 |
rancher-vsphere-csi | 3.0.1-rancher101 |
rancher-vsphere-cpi | 1.5.100 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.10+rke2r1
This release updates Kubernetes to v1.27.10.
Addresses the runc CVE: CVE-2024-21626 by updating runc to v1.1.12.
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.9+rke2r1:
- Use dl.k8s.io for getting kubectl (#5180)
- Ensure charts directory exists in Windows runtime image (#5186)
- Bump versions of different components (#5168)
- Update coredns chart to fix bug (#5201)
- Update multus chart to add optional dhcp daemonset (#5211)
- Add e2e test about dnscache (#5227)
- Update rke2-whereabouts to v0.6.3 and bump rke2-multus parent chart (#5245)
- Bump sriov image build versions (#5255)
- Enable arm64 based images for calico, multus and harvester (#5266)
- Improve kube-proxy and calico logging in Windows (#5285)
- Bump k3s for v1.27 (#5270)
- Update to 1.27.10 (#5294)
- Update base image (#5307)
- Bump K3s and runc versions for v1.27 (#5351)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.14.400 |
rke2-canal | v3.26.3-build2023110900 |
rke2-calico | v3.26.300 |
rke2-calico-crd | v3.26.300 |
rke2-coredns | 1.24.008 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051511 |
rancher-vsphere-csi | 3.0.1-rancher101 |
rancher-vsphere-cpi | 1.5.100 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1600 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.9+rke2r1
This release updates Kubernetes to v1.27.9.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.8+rke2r1:
- Bump containerd and runc (#5120)
- Bumped containerd/runc to v1.7.10/v1.1.10
- Bump containerd to v1.7.11 (#5130)
- Update to 1.27.9 for december 2023 (#5151)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.14.400 |
rke2-canal | v3.26.3-build2023110900 |
rke2-calico | v3.26.300 |
rke2-calico-crd | v3.26.300 |
rke2-coredns | 1.24.006 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051510 |
rancher-vsphere-csi | 3.0.1-rancher101 |
rancher-vsphere-cpi | 1.5.100 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1600 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.8+rke2r1
This release updates Kubernetes to v1.27.8.
This release includes a version of ingress-nginx affected by CVE-2023-5043 and CVE-2023-5044. Ingress administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields.
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.7+rke2r2:
- Add chart validation tests (#5001)
- Update canal to v3.26.3 (#5016)
- Update calico to v3.26.3 (#5026)
- Bump cilium chart to 1.14.400 (#5060)
- Bump K3s version for v1.27 (#5030)
- Containerd may now be configured to use rdt or blockio configuration by defining
rdt_config.yaml
orblockio_config.yaml
files. - Disable helm CRD installation for disable-helm-controller
- Omit snapshot list configmap entries for snapshots without extra metadata
- Add jitter to client config retry to avoid hammering servers when they are starting up
- Containerd may now be configured to use rdt or blockio configuration by defining
- Bump K3s version for v1.27 (#5070)
- Don't apply S3 retention if S3 client failed to initialize
- Don't request metadata when listing S3 snapshots
- Print key instead of file path in snapshot metadata log message
- Kubernetes patch release (#5065)
- Remove s390x steps since the runners are disabled (#5096)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.14.400 |
rke2-canal | v3.26.3-build2023110900 |
rke2-calico | v3.26.300 |
rke2-calico-crd | v3.26.300 |
rke2-coredns | 1.24.006 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051510 |
rancher-vsphere-csi | 3.0.1-rancher101 |
rancher-vsphere-cpi | 1.5.100 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1600 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.7+rke2r2
This release fixes an issue with identifying additional container runtimes.
This release includes a version of ingress-nginx affected by CVE-2023-5043 and CVE-2023-5044. Ingress administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields.
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.7+rke2r1:
- Bump k3s, include container runtime fix (#4980)
- Fixed an issue with identifying additional container runtimes
- Update hardened kubernetes image (#4987)
Release v1.27.7+rke2r1
This release updates Kubernetes to v1.27.7.
This release includes a version of ingress-nginx affected by CVE-2023-5043 and CVE-2023-5044. Ingress administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields.
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.6+rke2r1:
- Add a time.Sleep in calico-win to avoid polluting the logs (#4791)
- Support generic "cis" profile (#4797)
- Update calico chart to accept felix config values (#4814)
- Remove unnecessary docker pull (#4823)
- Mirrored pause backport (#4828)
- Write pod-manifests as 0600 in cis mode (#4838)
- Filter release branches (#4857)
- Bump k3s version (#4851)
- Update charts to have ipFamilyPolicy: PreferDualStack as default (#4845)
- Bump K3s, Token Rotation support (#4869)
- Bump containerd to v1.7.7+k3s1 (#4880)
- Bump K3s version for v1.27 (#4884)
- RKE2 now tracks snapshots using custom resource definitions. This resolves an issue where the configmap previously used to track snapshot metadata could grow excessively large and fail to update when new snapshots were taken.
- Fixed an issue where static pod startup checks may return false positives in the case of pod restarts.
- K3s bump (#4897)
- Bump rke2-cloud-controller to v1.28.2-build20231016 (#4903)
- Bump K3s version for v1.27 (#4917)
- Re-enable etcd endpoint auto-sync
- Manually requeue configmap reconcile when no nodes have reconciled snapshots
- Update Kubernetes to v1.27.7 (#4922)
- Remove pod-manifests dir in killall script (#4926)
- Revert mirrored pause backport (#4935)
- Bump ingress-nginx to v1.9.3 (#4956)
- Bump K3s version for v1.27 (#4969)
Release v1.27.6+rke2r1
This release updates Kubernetes to v1.27.5.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.5+rke2r1:
Release v1.27.5+rke2r1
This release updates Kubernetes to v1.27.5, and fixes a number of issues.
-
⚠️ This release includes support for remediating CVE-2023-32186, a potential Denial of Service attack vector on RKE2 servers. See https://github.com/rancher/rke2/security/advisories/GHSA-p45j-vfv5-wprq for more information, including mandatory steps necessary to harden clusters against this vulnerability.
-
If your server (control-plane) nodes were not started with the
--token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.4+rke2r1:
- Sync maintainers and PR template from K3s (#4474)
- Fix static pod UID generation and cleanup (#4508)
- Security bump to
docker/distribution
(#4509) - Fix incorrect documented default value for INSTALL_RKE2_CHANNEL (#4500)
- Uninstall handle cases when directories are mounts and cannot be removed (#4470)
- Remove install_airgap_tarball grep error output (#4501)
- Update canal with resource bounds config (#4482)
- Channel server update (#4518)
- Fix default server address for rotate-ca command (#4548)
- Sync Felix and calico-node datastore (#4570)
- Update Calico and Flannel on Canal (#4535)
- Update cilium to v1.14.0 (#4585)
- Remove terraform test package (#4589)
- Bump versions for etcd, containerd, runc (#4552)
- Updated the embedded containerd to v1.7.3+k3s1
- Updated the embedded runc to v1.1.8
- Updated the embedded etcd to v3.5.9+k3s1
- Updated the rke2-snapshot-validation-webhook chart to enable VolumeSnapshotClass validation
- Update certs list for certificates test (#4597)
- Update to whereabouts v0.6.2 (#4590)
- Updated the embedded whereabouts to v0.6.2
- Fix non-working URL in issue template (#4606)
- Fix wrongly formatted files (#4605)
- Fix calico-node.log problem (#4609)
- Add support for commit installation in Windows quickstart file (#4614)
- N/A
- Use 'go list -m' instead of grep to look up versions (#4600)
- Install BGP windows packages in Windows image for tests (#4639)
- Bump k3s version to recent 1.27 (#4630)
- Bump K3s version for v1.27 (#4646)
- The version of
helm
used by the bundled helm controller's job image has been updated to v3.12.3 - Bumped dynamiclistener to address an issue that could cause the supervisor listener on 9345 to stop serving requests on etcd-only nodes.
- The RKE2 supervisor listener on 9345 now sends a complete certificate chain in the TLS handshake.
- The version of
- Clean-up env variables and check OS env variables for felix and calico in Windows (#4640)
- Upgrade multus chart to v4.0.2-build2023081100 (#4661)
- Bug fix: Add VXLAN_VNI env var to Calico-node exec (#4670)
- Update to v1.27.5 (#4683)
- Bump K3s version for v1.27 (#4701)
- Added a new
--tls-san-security
option. This flag defaults to false, but can be set to true to disable automatically adding SANs to the server's TLS certificate to satisfy any hostname requested by a client.
- Added a new
- Add additional static pod cleanup during cluster reset (#4724)
Release v1.27.4+rke2r1
This release updates Kubernetes to v1.27.4, and fixes a number of issues.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.3+rke2r1:
- Update channel server (#4397)
- Bump ingress-nginx charts to v1.7.1 (#4402)
- Add opensuse leap testing to install tests (#4364)
- Add log files for felix and calico in rke2-windows (#4412)
- Update multus to version v4.0.2 (#4428)
- Update Calico to v3.26.1 (#4420)
- Fix failure to set default audit-log-path (#4413)
- Update K3s for 2023-07 releases (#4447)
- Improve clone step retries (#4408)
- Add support for cni none on windows and windows-bgp backend (#4164)
- Updated Calico crd on Canal (#4463)
- Update to 1.27.4 (#4494)
Release v1.27.3+rke2r1
This release updates Kubernetes to v1.27.3 and fixes a number of issues.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.2+rke2r1:
- Preserve mode when extracting runtime data (#4288)
- Add el9 (#4303)
- Update channels.yaml (#4306)
- Bump alpine from 3.17 to 3.18 (#4232)
- Ignore untracked branch pushes (#4265)
- DynamicListener version bump (v0.3.3 -> v0.3.5) (#4324)
- Update canal chart (#4339)
- Add issue template for OS validation (#4346)
- Refactoring of Restart Cluster Server and Add the Certificate Rotation (#4226)
- Bump harvester cloud provider 0.2.1 (#4337)
- Fix broken links (#4300)
- Bump rke2-coredns chart version (#4325)
- Add arm64 support (#4335)
- Bump K3s version for v1.27 (#4354)
- Update rke2 (#4369)
- Bump harvester cloud provider 0.2.2 (#4373)
- Fix windows pause (#4381)
- Use our own file copy logic instead of continuity (#4388)
Release v1.27.2+rke2r1
This release updates Kubernetes to v1.27.2, and fixes a number of issues.
- If your server (control-plane) nodes were not started with the
--token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
- Many systems have updated their packages with newer version of container-selinux (> v2.191.0) which is incompatible with our rke2-selinux policy and require a change in policy. We have updated our policy; you will notice the rke2-selinux package being upgraded from version v0.11.1 to newer version v0.12.0.
Changes since v1.27.1+rke2r1:
- V1.27.2+rke2r1 (#4261)
- Update stable channel to v1.25.9+rke2r1 (#4138)
- Updating dev doc (#3111)
- Add dependabot (#4133)
- Add updatecli (#4135)
- Fix hardcoded file mount handling for default audit log filename (#4139)
- Add ability to have write custom files during TF tests for specialized configurations (#4132)
- Bump ubuntu from 20.04 to 22.04 (#4154)
- Add reviewers to dependabot PRs (#4156)
- Introduce updatecli to repo and validate basic functionality (#4155)
- Add label to dependabot PRs (#4169)
- Create 'upgrade traditional with workloads' test automated for RKE2 (#4118)
- Update Cilium to v1.13.2 (#4170)
- Fix drone dispatch step (#4147)
- Enable --with-node-id flag (#4131)
- Chore: replace
github.com/ghodss/yaml
withsigs.k8s.io/yaml
(#4163) - Remove Trivy install from Dockerfile (#4187)
- Move Drone dispatch pipeline (#4202)
- Bump K3s/containerd/runc versions (#4210)
- The bundled containerd and runc versions have been bumped to v1.7.1-k3s1/v1.1.7
- Update Calico image on Canal (#4214)
- Upgrade docker/docker package (#4225)
- Add rke2-upgrade to image list (#4237)
- Bump metrics-server to v0.6.3 (#4244)
- Fix fapolicyd checks in install script (#4249)
- Bump vsphere csi/cpi and csi snapshot charts (#4271)
- Bump vsphere csi to remove duplicate CSI deployment. (#4295)
Release v1.27.1+rke2r1
This release is RKE2's first in the v1.27 line. This release updates Kubernetes to v1.27.1.
Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.26.4+rke2r1:
- Bump to kubernetes v1.27.1 (#4108)