v1.27.X
Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.
Version | Release date | Kubernetes | Etcd | Containerd | Runc | Metrics-server | CoreDNS | Ingress-Nginx | Helm-controller | Canal (Default) | Calico | Cilium | Multus |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
v1.27.6+rke2r1 | Sep 18 2023 | v1.27.6 | v3.5.9-k3s1 | v1.7.3-k3s1 | v1.1.8 | v0.6.3 | v1.10.1 | 4.6.1 | v0.15.4 | Flannel v0.22.1 Calico v3.26.1 | v3.26.1 | v1.14.1 | v4.0.2 |
v1.27.5+rke2r1 | Sep 06 2023 | v1.27.5 | v3.5.9-k3s1 | v1.7.3-k3s1 | v1.1.8 | v0.6.3 | v1.10.1 | 4.6.1 | v0.15.4 | Flannel v0.22.1 Calico v3.26.1 | v3.26.1 | v1.14.0 | v4.0.2 |
v1.27.4+rke2r1 | Jul 28 2023 | v1.27.4 | v3.5.7-k3s1 | v1.7.1-k3s1 | v1.1.7 | v0.6.3 | v1.10.1 | 4.6.1 | v0.15.2 | Flannel v0.22.0 Calico v3.25.1 | v3.26.1 | v1.13.2 | v4.0.2 |
v1.27.3+rke2r1 | Jun 27 2023 | v1.27.3 | v3.5.7-k3s1 | v1.7.1-k3s1 | v1.1.7 | v0.6.3 | v1.10.1 | 4.5.2 | v0.15.0 | Flannel v0.22.0 Calico v3.25.1 | v3.25.0 | v1.13.2 | v3.9.3 |
v1.27.2+rke2r1 | May 30 2023 | v1.27.2 | v3.5.7-k3s1 | v1.7.1-k3s1 | v1.1.7 | v0.6.3 | v1.10.1 | 4.5.2 | v0.14.0 | Flannel v0.21.3 Calico v3.25.1 | v3.25.0 | v1.13.2 | v3.9.3 |
v1.27.1+rke2r1 | Apr 27 2023 | v1.27.1 | v3.5.7-k3s1 | v1.6.19-k3s1 | v1.1.5 | v0.6.2 | v1.10.1 | 4.5.2 | v0.13.2 | Flannel v0.21.3 Calico v3.25.0 | v3.25.0 | v1.13.0 | v3.9.3 |
Release v1.27.6+rke2r1
This release updates Kubernetes to v1.27.5.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.5+rke2r1:
Release v1.27.5+rke2r1
This release updates Kubernetes to v1.27.5, and fixes a number of issues.
Important Notes
-
⚠️ This release includes support for remediating CVE-2023-32186, a potential Denial of Service attack vector on RKE2 servers. See https://github.com/rancher/rke2/security/advisories/GHSA-p45j-vfv5-wprq for more information, including mandatory steps necessary to harden clusters against this vulnerability.
-
If your server (control-plane) nodes were not started with the
--token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.4+rke2r1:
- Sync maintainers and PR template from K3s (#4474)
- Fix static pod UID generation and cleanup (#4508)
- Security bump to
docker/distribution
(#4509) - Fix incorrect documented default value for INSTALL_RKE2_CHANNEL (#4500)
- Uninstall handle cases when directories are mounts and cannot be removed (#4470)
- Remove install_airgap_tarball grep error output (#4501)
- Update canal with resource bounds config (#4482)
- Channel server update (#4518)
- Fix default server address for rotate-ca command (#4548)
- Sync Felix and calico-node datastore (#4570)
- Update Calico and Flannel on Canal (#4535)
- Update cilium to v1.14.0 (#4585)
- Remove terraform test package (#4589)
- Bump versions for etcd, containerd, runc (#4552)
- Updated the embedded containerd to v1.7.3+k3s1
- Updated the embedded runc to v1.1.8
- Updated the embedded etcd to v3.5.9+k3s1
- Updated the rke2-snapshot-validation-webhook chart to enable VolumeSnapshotClass validation
- Update certs list for certificates test (#4597)
- Update to whereabouts v0.6.2 (#4590)
- Updated the embedded whereabouts to v0.6.2
- Fix non-working URL in issue template (#4606)
- Fix wrongly formatted files (#4605)
- Fix calico-node.log problem (#4609)
- Add support for commit installation in Windows quickstart file (#4614)
- N/A
- Use 'go list -m' instead of grep to look up versions (#4600)
- Install BGP windows packages in Windows image for tests (#4639)
- Bump k3s version to recent 1.27 (#4630)
- Bump K3s version for v1.27 (#4646)
- The version of
helm
used by the bundled helm controller's job image has been updated to v3.12.3 - Bumped dynamiclistener to address an issue that could cause the supervisor listener on 9345 to stop serving requests on etcd-only nodes.
- The RKE2 supervisor listener on 9345 now sends a complete certificate chain in the TLS handshake.
- The version of
- Clean-up env variables and check OS env variables for felix and calico in Windows (#4640)
- Upgrade multus chart to v4.0.2-build2023081100 (#4661)
- Bug fix: Add VXLAN_VNI env var to Calico-node exec (#4670)
- Update to v1.27.5 (#4683)
- Bump K3s version for v1.27 (#4701)
- Added a new
--tls-san-security
option. This flag defaults to false, but can be set to true to disable automatically adding SANs to the server's TLS certificate to satisfy any hostname requested by a client.
- Added a new
- Add additional static pod cleanup during cluster reset (#4724)
Release v1.27.4+rke2r1
This release updates Kubernetes to v1.27.4, and fixes a number of issues.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.3+rke2r1:
- Update channel server (#4397)
- Bump ingress-nginx charts to v1.7.1 (#4402)
- Add opensuse leap testing to install tests (#4364)
- Add log files for felix and calico in rke2-windows (#4412)
- Update multus to version v4.0.2 (#4428)
- Update Calico to v3.26.1 (#4420)
- Fix failure to set default audit-log-path (#4413)
- Update K3s for 2023-07 releases (#4447)
- Improve clone step retries (#4408)
- Add support for cni none on windows and windows-bgp backend (#4164)
- Updated Calico crd on Canal (#4463)
- Update to 1.27.4 (#4494)
Release v1.27.3+rke2r1
This release updates Kubernetes to v1.27.3 and fixes a number of issues.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.2+rke2r1:
- Preserve mode when extracting runtime data (#4288)
- Add el9 (#4303)
- Update channels.yaml (#4306)
- Bump alpine from 3.17 to 3.18 (#4232)
- Ignore untracked branch pushes (#4265)
- DynamicListener version bump (v0.3.3 -> v0.3.5) (#4324)
- Update canal chart (#4339)
- Add issue template for OS validation (#4346)
- Refactoring of Restart Cluster Server and Add the Certificate Rotation (#4226)
- Bump harvester cloud provider 0.2.1 (#4337)
- Fix broken links (#4300)
- Bump rke2-coredns chart version (#4325)
- Add arm64 support (#4335)
- Bump K3s version for v1.27 (#4354)
- Update rke2 (#4369)
- Bump harvester cloud provider 0.2.2 (#4373)
- Fix windows pause (#4381)
- Use our own file copy logic instead of continuity (#4388)
Release v1.27.2+rke2r1
This release updates Kubernetes to v1.27.2, and fixes a number of issues.
Important Notes
- If your server (control-plane) nodes were not started with the
--token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
- Many systems have updated their packages with newer version of container-selinux (> v2.191.0) which is incompatible with our rke2-selinux policy and require a change in policy. We have updated our policy; you will notice the rke2-selinux package being upgraded from version v0.11.1 to newer version v0.12.0.
Changes since v1.27.1+rke2r1:
- V1.27.2+rke2r1 (#4261)
- Update stable channel to v1.25.9+rke2r1 (#4138)
- Updating dev doc (#3111)
- Add dependabot (#4133)
- Add updatecli (#4135)
- Fix hardcoded file mount handling for default audit log filename (#4139)
- Add ability to have write custom files during TF tests for specialized configurations (#4132)
- Bump ubuntu from 20.04 to 22.04 (#4154)
- Add reviewers to dependabot PRs (#4156)
- Introduce updatecli to repo and validate basic functionality (#4155)
- Add label to dependabot PRs (#4169)
- Create 'upgrade traditional with workloads' test automated for RKE2 (#4118)
- Update Cilium to v1.13.2 (#4170)
- Fix drone dispatch step (#4147)
- Enable --with-node-id flag (#4131)
- Chore: replace
github.com/ghodss/yaml
withsigs.k8s.io/yaml
(#4163) - Remove Trivy install from Dockerfile (#4187)
- Move Drone dispatch pipeline (#4202)
- Bump K3s/containerd/runc versions (#4210)
- The bundled containerd and runc versions have been bumped to v1.7.1-k3s1/v1.1.7
- Update Calico image on Canal (#4214)
- Upgrade docker/docker package (#4225)
- Add rke2-upgrade to image list (#4237)
- Bump metrics-server to v0.6.3 (#4244)
- Fix fapolicyd checks in install script (#4249)
- Bump vsphere csi/cpi and csi snapshot charts (#4271)
- Bump vsphere csi to remove duplicate CSI deployment. (#4295)
Release v1.27.1+rke2r1
This release is RKE2's first in the v1.27 line. This release updates Kubernetes to v1.27.1.
Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.26.4+rke2r1:
- Bump to kubernetes v1.27.1 (#4108)