PMK Release 5.8 Release Notes
PMK 5.8.0 Release Summary (Released 2023-05-15)
The Platform9 Managed Kubernetes (PMK) version 5.8 release is now generally available and continues to support Kubernetes v1.24. This release brings new features, enhancements and critical bug fixes to improve overall user experience and stability. This release also marks the Platform9 Managed KubeVirt as generally available.
Kubernetes v1.22 is marked as End of Life with this release of PMK. New clusters should be created on Kubernetes v1.24. All clusters must be upgraded to at least Kubernetes 1.22 before upgrading from PMK 5.7 to PMK 5.8
Kubernetes v1.23 is marked as deprecated. New clusters are to be created on Kubernetes v1.24.
Release Highlights
New Features
- Added the support for GP3 type EBS Volumes with IOPS & Throughput configuration on AWS Qbert Clusters.
- Added the option in UI for "kubernetes-internal-ip" as one of the Interface detection methods for Calico CNI.
Platform9 CLI
The 1.21 pf9ctl release is now available and can be installed by running the following command.
bash <(curl -sL https://pmkft-assets.s3-us-west-1.amazonaws.com/pf9ctl_setup)
Bug Fixes
Package Updates
The following packed components have been upgraded in latest v1.24 Kubernetes version:
Component | Version |
---|---|
CALICO | 3.24.2 |
CORE-DNS | 1.8.6 |
METRICS SERVER | 0.5.2 |
METAL LB | 0.12.1 |
KUBERNETES DASHBOARD | 2.4.0 |
CLUSTER AUTO-SCALER AWS | 1.24.0 |
CLUSTER AUTO-SCALER AZURE | 1.13.8 |
CLUSTER AUTO-SCALER CAPI | 1.24.0 |
FLANNEL | 0.14.0 |
ETCD | 3.5.5 |
CNI PLUGINS | 0.9.0 |
KUBEVIRT | 0.58.1 |
KUBEVIRT CDI | 1.54.0 |
ADVANCED NETWORKING OPERATOR (LUIGI) | 0.5.0 |
MONITORING | 0.57.1 |
PROFILE AGENT | 2.0.1 |
METAL3 | 1.1.1 |
Please refer to the Managed Kubernetes Support Matrix for v5.8 to view all currently deployed or supported upstream component versions.
Known Issues
If an AWS Cloud Provider is configured to import clusters without the correct identity being added to the target cluster, Platform9 will be unable to access the cluster.
It's important to note that if you have used a Cloud Provider to register an EKS, AKS, or GKE cluster that was created with IAM user credentials, which no longer have access to the EKS, AKS, or GKE K8s clusters, Platform9 will fail with an 401 unauthorized error until that IAM user is given access to the K8s cluster.
View the EKS documentation here to ensure the correct access has been provisioned at for each imported cluster. https://aws.amazon.com/premiumsupport/knowledge-center/amazon-eks-cluster-access/
CAPI AWS & EKS clusters
-
cannot be associated to the cluster. A known bug leads to only one part of the label being used when applying it to the cluster.
As a workaround, authenticate with the ID Token.
- Download and open the kubeconfig of a cluster.
- Copy the value of the id_token field.
- In the dashboard, select "token" authentication and paste the value in the form.
Note: refreshing is not supported by the dashboard, this means you lose access after the token expires (10-20 min)
To refresh the ID token, simply run a kubectl
command with it. kubectl
will replace the ID token in the kubeconfig with a valid one if it has expired. Then afterwards follow the steps above again.
Current workarounds:
- Machine Deployment type Node Group: Scale down the affected node group to 0 and then scale it back up to desired count.
- Machine Pool type Node Group: Delete the affected node group and add new node group to the cluster.
- Create an EKS cluster with MachinePool / MachineDeployment with replica count as 0. Once the cluster is healthy change the replica count to desired value.
KubeVirt
The Platform9 Managed KubeVirt is now Generally Available
The Platform9 Managed KubeVirt version 5.8 release is now generally available with support for Kubernetes v1.24 and Kubevirt v0.58.1, bringing new features, enhancements and bug fixes. Please refer Platform9 Managed KubeVirt 5.8 Release Notes for more information.