Update Kubernetes updates (patch)

This MR contains the following updates:

Package Update Change
kubernetes/kubernetes patch 1.27.13 -> 1.27.16
kubernetes/kubernetes patch 1.28.9 -> 1.28.12
rancher/rke2 patch 1.26.9 -> 1.26.15
rancher/rke2 patch 1.27.10 -> 1.27.16
rancher/rke2 patch 1.28.8 -> 1.28.12

Release Notes

kubernetes/kubernetes (kubernetes/kubernetes)

v1.27.16: Kubernetes v1.27.16

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.27.15: Kubernetes v1.27.15

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

v1.27.14: Kubernetes v1.27.14

Compare Source

See kubernetes-announce@. Additional binary downloads are linked in the CHANGELOG.

See the CHANGELOG for more details.

rancher/rke2 (rancher/rke2)

v1.26.15: v1.26.15+rke2r1

Compare Source

This release updates Kubernetes to v1.26.15.

Important Notes

Canal uses flannel 0.24.3 which includes a bug: every 5 seconds it tries to add ipv6 iptables rules and fails if the node does not have an ipv6 address. The consequence is the log "Failed to ensure iptables rules: error setting up rules: failed to apply partial iptables-restore unable to run iptables-restore (, ): exit status 4" appears every 5 seconds in the flannel container of the canal pod.

Flannel daemonset is not tolerating node taints: "node-role.kubernetes.io/etcd:NoExecute", "node-role.kubernetes.io/control-plane:NoSchedule" and "node.cloudprovider.kubernetes.io/uninitialized:NoSchedule" which can create problems when deploying with Rancher in certain cloud-providers (e.g. vShpere or DigitalOcean).

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.26.14+rke2r1:

  • Add a multus e2e test (#​5547)
  • Bump vsphere csi chart to 3.1.2-rancher101 and cpi to 1.7.001 (#​5556)
  • Bump coredns chart (#​5563)
  • Update Calico and Canal to v3.27.2 (#​5585)
  • Bump multus chart version (#​5596)
  • Bump K3s version for v1.26 (#​5590)
    • Fix: use correct wasm shims names
    • Bump spegel to v0.0.18-k3s3
    • Adds wildcard registry support
    • Fixes issue with excessive CPU utilization while waiting for containerd to start
    • Add env var to allow spegel mirroring of latest tag
    • Bump helm-controller/klipper-helm versions
    • Fix snapshot prune
    • Fix issue with etcd node name missing hostname
    • Fix additional corner cases in registries handling
    • RKE2 will now warn and suppress duplicate entries in the mirror endpoint list for a registry. Containerd does not support listing the same endpoint multiple times as a mirror for a single upstream registry.
  • Bump K3s version for v1.26 (#​5608)
  • Update to 1.26.15 (#​5616)

Charts Versions

Component Version
rke2-cilium 1.15.100
rke2-canal v3.27.2-build2024030800
rke2-calico v3.27.200
rke2-calico-crd v3.27.002
rke2-coredns 1.29.002
rke2-ingress-nginx 4.8.200
rke2-metrics-server 2.11.100-build2023051513
rancher-vsphere-csi 3.1.2-rancher101
rancher-vsphere-cpi 1.7.001
harvester-cloud-provider 0.2.200
harvester-csi-driver 0.1.1700
rke2-snapshot-controller 1.7.202
rke2-snapshot-controller-crd 1.7.202
rke2-snapshot-validation-webhook 1.7.302

Packaged Component Versions

Component Version
Kubernetes v1.26.15
Etcd v3.5.9-k3s1
Containerd v1.7.11-k3s2
Runc v1.1.
Metrics-server v0.6.3
CoreDNS v1.11.1
Ingress-Nginx nginx-1.9.3-hardened1
Helm-controller v0.15.9
Available CNIs
Component Version FIPS Compliant
Canal (Default) Flannel v0.24.3
Calico v3.27.2
Yes
Calico v3.27.2 No
Cilium v1.15.1 No
Multus v4.0.2 No

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.14: v1.26.14+rke2r1

Compare Source

This release updates Kubernetes to v1.26.14.

Important Note

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.26.13+rke2r1:

  • Fix validate-charts script (#​5375)
  • Windows (#​5370)
  • Avoid race condition when deleting HNS networks (#​5385)
  • Add CNI plugin flannel support for Windows (#​5396)
  • Bump coredns and multus/whereabouts versions (#​5402)
  • Fix: missing 'ip link delete cilium_wg0' in rke2-killall.sh (#​5408)
  • Update canal version (#​5418)
  • Improve calico in windows (#​5429)
  • Update Calico to v3.27.0 (#​5438)
  • Update Cilium to 1.15.0 (#​5453)
  • Backport agent containerd behavior 1.26 (#​5455)
  • Bump K3s version for v1.26 (#​5461)
  • Bump harvester-csi-driver to 0.1.7 (#​5445)
  • Update k8s and Go (#​5468)
  • Update Cilium to 1.15.1 (#​5479)
  • Bump rke2-coredns chart (#​5499)
  • Bump k3s for etcd-only fix (#​5508)
  • Add new network policy for ingress controller webhook (#​5512)
  • Backport bugfixes for 2024-02 rc (#​5533)
    • Bump wharfie to v0.6.6 to add support for bare hostname as endpoint, fix unnecessary namespace param inclusion
    • Refactor netpol creation and add two new netpols for metrics-server and snapshot-validation-webhook

Charts Versions

Component Version
rke2-cilium 1.15.100
rke2-canal v3.27.0-build2024020601
rke2-calico v3.27.002
rke2-calico-crd v3.27.002
rke2-coredns 1.29.001
rke2-ingress-nginx 4.8.200
rke2-metrics-server 2.11.100-build2023051513
rancher-vsphere-csi 3.0.1-rancher101
rancher-vsphere-cpi 1.5.100
harvester-cloud-provider 0.2.200
harvester-csi-driver 0.1.1700
rke2-snapshot-controller 1.7.202
rke2-snapshot-controller-crd 1.7.202
rke2-snapshot-validation-webhook 1.7.302

Packaged Component Versions

Component Version
Kubernetes v1.26.14
Etcd v3.5.9-k3s1
Containerd v1.7.11-k3s2
Runc v1.1.12
Metrics-server v0.6.3
CoreDNS v1.11.1
Ingress-Nginx nginx-1.9.3-hardened1
Helm-controller
Available CNIs
Component Version FIPS Compliant
Canal (Default) Flannel v0.24.2
Calico v3.27.0
Yes
Calico v3.27.0 No
Cilium v1.15.1 No
Multus v4.0.2 No

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.13: v1.26.13+rke2r1

Compare Source

This release updates Kubernetes to v1.26.13.

Important Notes

Addresses the runc CVE: CVE-2024-21626 by updating runc to v1.1.12.

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.26.12+rke2r1:

Charts Versions

Component Version
rke2-cilium 1.14.400
rke2-canal v3.26.3-build2023110900
rke2-calico v3.26.300
rke2-calico-crd v3.26.300
rke2-coredns 1.24.008
rke2-ingress-nginx 4.8.200
rke2-metrics-server 2.11.100-build2023051511
rancher-vsphere-csi 3.0.1-rancher101
rancher-vsphere-cpi 1.5.100
harvester-cloud-provider 0.2.200
harvester-csi-driver 0.1.1600
rke2-snapshot-controller 1.7.202
rke2-snapshot-controller-crd 1.7.202
rke2-snapshot-validation-webhook 1.7.302

Packaged Component Versions

Component Version
Kubernetes v1.26.13
Etcd v3.5.9-k3s1
Containerd v1.7.11-k3s2
Runc v1.1.12
Metrics-server v0.6.3
CoreDNS v1.10.1
Ingress-Nginx nginx-1.9.3-hardened1
Helm-controller v0.15.8
Available CNIs
Component Version FIPS Compliant
Canal (Default) Flannel v0.23.0
Calico v3.26.3
Yes
Calico v3.26.3 No
Cilium v1.14.4 No
Multus v4.0.2 No

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.12: v1.26.12+rke2r1

Compare Source

This release updates Kubernetes to v1.26.12.

Important Note

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.26.11+rke2r1:

  • Bump containerd and runc (#​5121)
    • Bumped containerd/runc to v1.7.10/v1.1.10
  • Bump containerd to v1.7.11 (#​5131)
  • Update to 1.26.12 for december 2023 (#​5149)

Charts Versions

Component Version
rke2-cilium 1.14.400
rke2-canal v3.26.3-build2023110900
rke2-calico v3.26.300
rke2-calico-crd v3.26.300
rke2-coredns 1.24.006
rke2-ingress-nginx 4.8.200
rke2-metrics-server 2.11.100-build2023051510
rancher-vsphere-csi 3.0.1-rancher101
rancher-vsphere-cpi 1.5.100
harvester-cloud-provider 0.2.200
harvester-csi-driver 0.1.1600
rke2-snapshot-controller 1.7.202
rke2-snapshot-controller-crd 1.7.202
rke2-snapshot-validation-webhook 1.7.302

Packaged Component Versions

Component Version
Kubernetes v1.26.12
Etcd v3.5.9-k3s1
Containerd v1.7.11-k3s2
Runc v1.1.10
Metrics-server v0.6.3
CoreDNS v1.10.1
Ingress-Nginx nginx-1.9.3-hardened1
Helm-controller v0.15.4
Available CNIs
Component Version FIPS Compliant
Canal (Default) Flannel v0.23.0
Calico v3.26.3
Yes
Calico v3.26.3 No
Cilium v1.14.4 No
Multus v4.0.2 No

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.11: v1.26.11+rke2r1

Compare Source

This release updates Kubernetes to v1.26.11.

Important Notes

This release includes a version of ingress-nginx affected by CVE-2023-5043 and CVE-2023-5044. Ingress administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields.

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.26.10+rke2r2:

  • Add chart validation tests (#​5003)
  • Update canal to v3.26.3 (#​5017)
  • Update calico to v3.26.3 (#​5027)
  • Bump cilium chart to 1.14.400 (#​5059)
  • Bump K3s version for v1.26 (#​5031)
    • Containerd may now be configured to use rdt or blockio configuration by defining rdt_config.yaml or blockio_config.yaml files.
    • Disable helm CRD installation for disable-helm-controller
    • Omit snapshot list configmap entries for snapshots without extra metadata
    • Add jitter to client config retry to avoid hammering servers when they are starting up
  • Bump K3s version for v1.26 (#​5074)
    • Don't apply S3 retention if S3 client failed to initialize
    • Don't request metadata when listing S3 snapshots
    • Print key instead of file path in snapshot metadata log message
  • Kubernetes patch release (#​5064)
  • Remove s390x steps temporarily since runners are disabled (#​5097)

Charts Versions

Component Version
rke2-cilium 1.14.400
rke2-canal v3.26.3-build2023110900
rke2-calico v3.26.300
rke2-calico-crd v3.26.300
rke2-coredns 1.24.006
rke2-ingress-nginx 4.8.200
rke2-metrics-server 2.11.100-build2023051510
rancher-vsphere-csi 3.0.1-rancher101
rancher-vsphere-cpi 1.5.100
harvester-cloud-provider 0.2.200
harvester-csi-driver 0.1.1600
rke2-snapshot-controller 1.7.202
rke2-snapshot-controller-crd 1.7.202
rke2-snapshot-validation-webhook 1.7.302

Packaged Component Versions

Component Version
Kubernetes v1.26.11
Etcd v3.5.9-k3s1
Containerd v1.7.7-k3s1
Runc v1.1.8
Metrics-server v0.6.3
CoreDNS v1.10.1
Ingress-Nginx nginx-1.9.3-hardened1
Helm-controller v0.15.4
Available CNIs
Component Version FIPS Compliant
Canal (Default) Flannel v0.23.0
Calico v3.26.3
Yes
Calico v3.26.3 No
Cilium v1.14.4 No
Multus v4.0.2 No

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.10: v1.26.10+rke2r1

Compare Source

This release updates Kubernetes to v1.26.10.

Important Notes

This release includes a version of ingress-nginx affected by CVE-2023-5043 and CVE-2023-5044. Ingress administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields.

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.26.9+rke2r1:

  • Add a time.Sleep in calico-win to avoid polluting the logs (#​4792)
  • Support generic "cis" profile (#​4798)
  • Update calico chart to accept felix config values (#​4815)
  • Remove unnecessary docker pull (#​4822)
  • Mirrored pause backport (#​4827)
  • Write pod-manifests as 0600 in cis mode (#​4839)
  • Bumping k3s (#​4863)
  • Filter release branches (#​4858)
  • Update charts to have ipFamilyPolicy: PreferDualStack as default (#​4846)
  • Bump K3s, Cilium, Token Rotation support (#​4870)
  • Bump containerd to v1.7.7+k3s1 (#​4881)
  • Bump K3s version for v1.26 (#​4885)
    • RKE2 now tracks snapshots using custom resource definitions. This resolves an issue where the configmap previously used to track snapshot metadata could grow excessively large and fail to update when new snapshots were taken.
    • Fixed an issue where static pod startup checks may return false positives in the case of pod restarts.
  • K3s Bump (#​4898)
  • Bump K3s version for v1.26 (#​4918)
    • Re-enable etcd endpoint auto-sync
    • Manually requeue configmap reconcile when no nodes have reconciled snapshots
  • Update Kubernetes to v1.26.10 (#​4921)
  • Remove pod-manifests dir in killall script (#​4927)
  • Revert mirrored pause backport (#​4936)
  • Bump ingress-nginx to v1.9.3 (#​4957)
  • Bump ingress-nginx to v1.9.3 (#​4959)
  • Bump ingress-nginx to v1.9.3 (#​4960)
  • Bump K3s version for v1.26 (#​4970)

Packaged Component Versions

Component Version
Kubernetes v1.26.10
Etcd v3.5.9-k3s1
Containerd v1.7.7-k3s1
Runc v1.1.8
Metrics-server v0.6.3
CoreDNS v1.10.1
Ingress-Nginx 4.8.2
Helm-controller v0.15.4
Available CNIs
Component Version FIPS Compliant
Canal (Default) Flannel v0.22.1
Calico v3.26.1
Yes
Calico v3.26.1 No
Cilium v1.14.2 No
Multus v4.0.2 No

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

v1.26.10: v1.26.10+rke2r1

Compare Source

This release updates Kubernetes to v1.26.10.

Important Notes

This release includes a version of ingress-nginx affected by CVE-2023-5043 and CVE-2023-5044. Ingress administrators should set the --enable-annotation-validation flag to enforce restrictions on the contents of ingress-nginx annotation fields.

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.26.9+rke2r1:

  • Add a time.Sleep in calico-win to avoid polluting the logs (#​4792)
  • Support generic "cis" profile (#​4798)
  • Update calico chart to accept felix config values (#​4815)
  • Remove unnecessary docker pull (#​4822)
  • Mirrored pause backport (#​4827)
  • Write pod-manifests as 0600 in cis mode (#​4839)
  • Bumping k3s (#​4863)
  • Filter release branches (#​4858)
  • Update charts to have ipFamilyPolicy: PreferDualStack as default (#​4846)
  • Bump K3s, Cilium, Token Rotation support (#​4870)
  • Bump containerd to v1.7.7+k3s1 (#​4881)
  • Bump K3s version for v1.26 (#​4885)
    • RKE2 now tracks snapshots using custom resource definitions. This resolves an issue where the configmap previously used to track snapshot metadata could grow excessively large and fail to update when new snapshots were taken.
    • Fixed an issue where static pod startup checks may return false positives in the case of pod restarts.
  • K3s Bump (#​4898)
  • Bump K3s version for v1.26 (#​4918)
    • Re-enable etcd endpoint auto-sync
    • Manually requeue configmap reconcile when no nodes have reconciled snapshots
  • Update Kubernetes to v1.26.10 (#​4921)
  • Remove pod-manifests dir in killall script (#​4927)
  • Revert mirrored pause backport (#​4936)
  • Bump ingress-nginx to v1.9.3 (#​4957)
  • Bump ingress-nginx to v1.9.3 (#​4959)
  • Bump ingress-nginx to v1.9.3 (#​4960)
  • Bump K3s version for v1.26 (#​4970)

Packaged Component Versions

Component Version
Kubernetes v1.26.10
Etcd v3.5.9-k3s1
Containerd v1.7.7-k3s1
Runc v1.1.8
Metrics-server v0.6.3
CoreDNS v1.10.1
Ingress-Nginx 4.8.2
Helm-controller v0.15.4
Available CNIs
Component Version FIPS Compliant
Canal (Default) Flannel v0.22.1
Calico v3.26.1
Yes
Calico v3.26.1 No
Cilium v1.14.2 No
Multus v4.0.2 No

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever MR becomes conflicted, or you tick the rebase/retry checkbox.

👻 Immortal: This MR will be recreated if closed unmerged. Get config help if that's undesired.


  • If you want to rebase/retry this MR, check this box

This MR has been generated by Renovate Bot.

Edited by Sylva Renovate bot

Merge request reports

Loading