github rancher/rke2 v1.29.3+rke2r1

latest releases: v1.27.14-rc2+rke2r1, v1.28.10-rc2+rke2r1, v1.29.5-rc2+rke2r1...
2 months ago

This release updates Kubernetes to v1.29.2.

Important Notes

Canal uses flannel 0.24.3 which includes a bug: every 5 seconds it tries to add ipv6 iptables rules and fails if the node does not have an ipv6 address. The consequence is the log "Failed to ensure iptables rules: error setting up rules: failed to apply partial iptables-restore unable to run iptables-restore (, ): exit status 4" appears every 5 seconds in the flannel container of the canal pod.

Flannel daemonset is not tolerating node taints: "node-role.kubernetes.io/etcd:NoExecute", "node-role.kubernetes.io/control-plane:NoSchedule" and "node.cloudprovider.kubernetes.io/uninitialized:NoSchedule" which can create problems when deploying with Rancher in certain cloud-providers (e.g. vShpere or DigitalOcean).

If your server (control-plane) nodes were not started with the --token CLI flag or config file key, a randomized token was generated during initial cluster startup. This key is used both for joining new nodes to the cluster, and for encrypting cluster bootstrap data within the datastore. Ensure that you retain a copy of this token, as is required when restoring from backup.

You may retrieve the token value from any server already joined to the cluster:

cat /var/lib/rancher/rke2/server/token

Changes since v1.29.1+rke2r1:

  • Fix validate-chart scripts (#5160)
  • Adding yml for new stale action (#5311)
  • Secrets Encryption test (#5234)
  • Bump actions/cache from 3 to 4 (#5312)
  • Update channels for January 2024 patch (#5357)
  • Only run flannel host-network CIS netpol controller when using canal CNI (#5318)
  • Create a common CNI interface and config struct (#5276)
  • Avoid race condition when deleting HNS networks (#5336)
  • Add flannel CNI plugin (#5322)
    • Flannel added as CNI plugin option
  • Bump coredns and multus/whereabouts versions (#5379)
    • Coredns, multus and whereabouts using minimal base images
  • Fix: missing 'ip link delete cilium_wg0' in rke2-killall.sh (#5274)
  • Add adr about rke2-flannel (#5145)
  • Update canal version (#5414)
  • Update Cilium to 1.15.0 (#5420)
  • Improve cni windows code (#5421)
  • Bump alpine from 3.18 to 3.19 (#5123)
  • Bump harvester-csi-driver to 0.1.17 (#5332)
  • Implement custom containerd behavior for Windows Agents, ensure supporting processes exit (#5419)
  • Update Calico to v3.27.0 (#5423)
  • Bump K3s version for v1.29 (#5458)
  • Update k8s and Go (#5470)
  • Update Cilium to v1.15.1 (#5473)
  • Bump rke2-coredns chart (#5493)
  • Bump K3s for etcd-only fix (#5501)
  • Add new network policy for ingress controller webhook (#5500)
  • Refactor netpol creation and add two new netpols for metrics-server and snapshot-validation-webhook (#5521)
  • Bump wharfie to v0.6.6 (#5517)
    • Bump wharfie to v0.6.6 to add support for bare hostname as endpoint, fix unnecessary namespace param inclusion

Charts Versions

Component Version
rke2-cilium 1.15.100
rke2-canal v3.27.0-build2024020601
rke2-calico v3.27.002
rke2-calico-crd v3.27.002
rke2-coredns 1.29.001
rke2-ingress-nginx 4.8.200
rke2-metrics-server 2.11.100-build2023051513
rancher-vsphere-csi 3.0.1-rancher101
rancher-vsphere-cpi 1.5.100
harvester-cloud-provider 0.2.200
harvester-csi-driver 0.1.1700
rke2-snapshot-controller 1.7.202
rke2-snapshot-controller-crd 1.7.202
rke2-snapshot-validation-webhook 1.7.302

Packaged Component Versions

Component Version
Kubernetes v1.29.2
Etcd v3.5.9-k3s1
Containerd v1.7.11-k3s2
Runc v1.1.
Metrics-server v0.6.3
CoreDNS v1.11.1
Ingress-Nginx nginx-1.9.3-hardened1
Helm-controller v0.15.8

Available CNIs

Component Version FIPS Compliant
Canal (Default) Flannel v0.24.3
Calico v3.27.0
Yes
Calico v3.27.0 No
Cilium v1.15.1 No
Multus v4.0.2 No
Flannel v0.24.2 Yes

Helpful Links

As always, we welcome and appreciate feedback from our community of users. Please feel free to:

Don't miss a new rke2 release

NewReleases is sending notifications on new releases.