k3s - v1.22.8+k3s1


This release updates Kubernetes to v1.22.8, and fixes a number of issues.

For more details on what's new, see the Kubernetes release notes.

Changes since v1.22.7+k3s1:

  • Add ability to specify etcd snapshot list output format (#5132) (#5179)
  • Fixed a bug that prevented users from using k3s secrets-encryption rotation after upgrading from older K3s versions. (#5169)
  • Add --json flag for k3s secrets-encrypt status (#5198)
  • k3s secrets-encrypt prepare can now be used on control-plane only nodes (#5228)
  • Fix function arg call (#5234) (#5236)
  • Add net util funcs (#5245)
  • Release 1.22 fix 700 (#5246)
  • IPv6 only (#5260)
  • The embedded containerd has been bumped to v1.5.10-k3s1 (#5231)
  • Backport cleanups and bugfixes from master (#5251)
  • When using the unsupported --disable-agent flag, kube-scheduler will now be started when a node is available.
  • Server nodes with only etcd/control-plane/etcd+control-plane roles can now be added to the cluster in any order, as long as the first node has the etcd role.
  • Any alarms present on the embedded etcd datastore are now reported and cleared at startup. This should allow for graceful recovery after exceeding and subsequently raising the etcd quota size.
  • The embedded Helm controller can now cease management of existing HelmChart releases, supports setting a failure policy for install/update operations, and allows trusting custom CA certs for remote chart repositories. (#5280)
  • Secondary etcd-only nodes will now successfully bootstrap containerd and the kubelet before a control-plane node has joined the cluster. (#5302)
  • Update Kubernetes to v1.22.8-k3s1 (#5272)
  • The packaged coredns version has been bumped to v1.9.1 (#5309)
  • Defragment etcd datastore before clearing alarms; don't delete temp etcd db while reconciling
  • The embedded etcd database is now defragmented on startup.
  • Fixed an issue that could cause restart of managed etcd nodes to occasionally fail while reconciling bootstrap data. (#5340)
  • Wrap containerd.New (#5362)

Embedded Component Versions

| Component | Version |
|---|---|
| Kubernetes | v1.22.8 |
| Kine | v0.8.1 |
| SQLite | 3.36.0 |
| Etcd | v3.5.1-k3s1 |
| Containerd | v1.5.10-k3s1 |
| Runc | v1.0.3 |
| Flannel | v0.17.0 |
| Metrics-server | v0.5.2 |
| Traefik | v2.6.1 |
| CoreDNS | v1.9.1 |
| Helm-controller | v0.11.7 |
| Local-path-provisioner | v0.0.21 |

Known Issues

  • The etcd maintainers have recommended against the use of etcd 3.5.0-3.5.2 for new production workloads, due to a recently discovered bug that may cause data loss when etcd is killed under high load. Please see this link for more details.

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:
- Open issues here
- Join our Slack channel
- Check out our documentation for guidance on how to get started or to dive deep into K3s.
- Read how you can contribute here


Details

date
March 31, 2022, 1:59 a.m.
name
type
Patch
👇
Register or login to:
  • 🔍View and search all k3s releases.
  • 🛠️Create and share lists to track your tools.
  • 🚨Setup notifications for major, security, feature or patch updates.
  • 🚀Much more coming soon!
Continue with GitHub
Continue with Google
or