v1.27.X
Before upgrading from earlier releases, be sure to read the Kubernetes Urgent Upgrade Notes.
Release v1.27.12+rke2r1
This release updates Kubernetes to v1.27.12.
Canal uses flannel 0.24.3 which includes a bug: every 5 seconds it tries to add ipv6 iptables rules and fails if the node does not have an ipv6 address. The consequence is the log "Failed to ensure iptables rules: error setting up rules: failed to apply partial iptables-restore unable to run iptables-restore (, ): exit status 4" appears every 5 seconds in the flannel container of the canal pod.
Flannel daemonset is not tolerating node taints: "node-role.kubernetes.io/etcd:NoExecute", "node-role.kubernetes.io/control-plane:NoSchedule" and "node.cloudprovider.kubernetes.io/uninitialized:NoSchedule" which can create problems when deploying with Rancher in certain cloud-providers (e.g. vShpere or DigitalOcean).
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.11+rke2r1:
- Add a multus e2e test (#5546)
- Bump vsphere csi chart to 3.1.2-rancher101 and cpi to 1.7.001 (#5555)
- Bump coredns chart (#5562)
- Update 1.27 to r2 (#5565)
- Update Calico and Canal to v3.27.2 (#5584)
- Bump multus chart version (#5595)
- Bump K3s version for v1.27 (#5589)
- Fix: use correct wasm shims names
- Bump spegel to v0.0.18-k3s3
- Adds wildcard registry support
- Fixes issue with excessive CPU utilization while waiting for containerd to start
- Add env var to allow spegel mirroring of latest tag
- Bump helm-controller/klipper-helm versions
- Fix snapshot prune
- Fix issue with etcd node name missing hostname
- Fix additional corner cases in registries handling
- RKE2 will now warn and suppress duplicate entries in the mirror endpoint list for a registry. Containerd does not support listing the same endpoint multiple times as a mirror for a single upstream registry.
- Bump K3s version for v1.27 (#5607)
- Update k8s to 1.27.12 and Go (#5622)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.100 |
rke2-canal | v3.27.2-build2024030800 |
rke2-calico | v3.27.200 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.002 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051513 |
rancher-vsphere-csi | 3.1.2-rancher101 |
rancher-vsphere-cpi | 1.7.001 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.11+rke2r1
This release updates Kubernetes to v1.27.11.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.10+rke2r1:
- Fix validate-charts script (#5376)
- Windows (#5369)
- Avoid race condition when deleting HNS networks (#5384)
- Add CNI plugin flannel support for Windows (#5395)
- Bump coredns and multus/whereabouts versions (#5401)
- Fix: missing 'ip link delete cilium_wg0' in rke2-killall.sh (#5407)
- Update canal version (#5417)
- Improve calico in windows (#5428)
- Update Calico to v3.27.0 (#5437)
- Update Cilium to 1.15.0 (#5452)
- Backport agent containerd behavior 1.27 (#5456)
- Bump K3s version for v1.27 (#5460)
- Bump harvester-csi-driver to 0.1.7 (#5441)
- Update k8s and Go (#5466)
- Update Cilium to 1.15.1 (#5478)
- Bump rke2-coredns chart (#5498)
- Bump K3s for etcd-only fix (#5503)
- Add new network policy for ingress controller webhook (#5511)
- Backport bugfixes for 2024-02 rc (#5532)
- Bump wharfie to v0.6.6 to add support for bare hostname as endpoint, fix unnecessary namespace param inclusion
- Refactor netpol creation and add two new netpols for metrics-server and snapshot-validation-webhook
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.15.100 |
rke2-canal | v3.27.0-build2024020601 |
rke2-calico | v3.27.002 |
rke2-calico-crd | v3.27.002 |
rke2-coredns | 1.29.001 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051513 |
rancher-vsphere-csi | 3.0.1-rancher101 |
rancher-vsphere-cpi | 1.5.100 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1700 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.10+rke2r1
This release updates Kubernetes to v1.27.10.
Addresses the runc CVE: CVE-2024-21626 by updating runc to v1.1.12.
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.9+rke2r1:
- Use dl.k8s.io for getting kubectl (#5180)
- Ensure charts directory exists in Windows runtime image (#5186)
- Bump versions of different components (#5168)
- Update coredns chart to fix bug (#5201)
- Update multus chart to add optional dhcp daemonset (#5211)
- Add e2e test about dnscache (#5227)
- Update rke2-whereabouts to v0.6.3 and bump rke2-multus parent chart (#5245)
- Bump sriov image build versions (#5255)
- Enable arm64 based images for calico, multus and harvester (#5266)
- Improve kube-proxy and calico logging in Windows (#5285)
- Bump k3s for v1.27 (#5270)
- Update to 1.27.10 (#5294)
- Update base image (#5307)
- Bump K3s and runc versions for v1.27 (#5351)
Charts Versions
Component | Version |
---|---|
rke2-cilium | 1.14.400 |
rke2-canal | v3.26.3-build2023110900 |
rke2-calico | v3.26.300 |
rke2-calico-crd | v3.26.300 |
rke2-coredns | 1.24.008 |
rke2-ingress-nginx | 4.8.200 |
rke2-metrics-server | 2.11.100-build2023051511 |
rancher-vsphere-csi | 3.0.1-rancher101 |
rancher-vsphere-cpi | 1.5.100 |
harvester-cloud-provider | 0.2.200 |
harvester-csi-driver | 0.1.1600 |
rke2-snapshot-controller | 1.7.202 |
rke2-snapshot-controller-crd | 1.7.202 |
rke2-snapshot-validation-webhook | 1.7.302 |
Release v1.27.9+rke2r1
This release updates Kubernetes to v1.27.9.
Important Note
If your server (control-plane) nodes were not started with the --token
CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.
You may retrieve the token value from any server already joined to the cluster:
cat /var/lib/rancher/rke2/server/token
Changes since v1.27.8+rke2r1:
- Bump containerd and runc (#5120)
- Bumped containerd/runc to v1.7.10/v1.1.10
- Bump containerd to v1.7.11 (#5130)
- Update to 1.27.9 for december 2023 (#5151)