-
Notifications
You must be signed in to change notification settings - Fork 15k
Publish Kubernetes v1.34 Sneak Peek Blog #51711
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Publish Kubernetes v1.34 Sneak Peek Blog #51711
Conversation
CC Comms Team @88abb @cloudmelon @dipesh-rawat @graz-dev |
✅ Pull request preview available for checkingBuilt without sensitive environment variables
To edit notification comments on pull requests, go to your Netlify project configuration. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
LGTM label has been added. Git tree hash: 300080c02e2c5478292878fe4af7cc5e099e837e
|
content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md
Outdated
Show resolved
Hide resolved
content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md
Outdated
Show resolved
Hide resolved
content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md
Outdated
Show resolved
Hide resolved
content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md
Outdated
Show resolved
Hide resolved
content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md
Outdated
Show resolved
Hide resolved
Co-authored-by: Mélony QIN <[email protected]>
Co-authored-by: Mélony QIN <[email protected]>
/label tide/merge-method-squash |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
5/7 in the milestone is good imho. I'm good with the current changes, just optional comments.
/lgtm
The [ServiceAccount](/docs/concepts/security/service-accounts/) token integration for `kubelet` credential providers is likely to reach beta and be enabled by default in Kubernetes v1.34. | ||
This allows the `kubelet` to use these tokens when pulling container images from registries that require authentication. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
is likely to reach beta
- This KEP still has docs PR pending so it is technically possible that if those are not in, we might yank the KEP. But the probability of that seems low, so should we be using this. @lmktfy wdyt?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I do think it's good to be cautious. Here's a position we don't want contributors to be in: reluctant to do a yank because we previously promised that something would be in the next release.
There's a related aspect, precedent. If we treat all enhancements as possibly missing the next release, it's easy. But if we only list some, then contributors behind the "some" might complain or feel like they're not trusted or …
The existing alpha integration allows the `kubelet` to use short-lived, automatically rotated ServiceAccount tokens (that follow OIDC-compliant semantics) to authenticate to a container image registry. | ||
Each token is scoped to one associated Pod; the overall mechanism replaces the need for long-lived image pull Secrets. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thinking more about this, we're talking about the existing alpha
integration. This feature is graduating to beta, in the sneak peek, shouldn't we be adding what's new in beta for this?
This feature makes Deployment behavior more predictable by letting you choose when new pods should be created during updates or scaling. It's beneficial when working in clusters with tight resource constraints or with workloads with long termination periods. | ||
This feature makes Deployment behavior more predictable by letting you choose when new pods should be created during updates or scaling. | ||
It's beneficial when working in clusters with tight resource constraints or with workloads with long termination periods. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah, this KEP was yanked out of this release :( (Should we remove it?)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
That's a good thing to bring up in the v1.34 retro, I think.
[KEP-4951](https://kep.k8s.io/4951) introduces a new feature that allows users to configure autoscaling tolerance on a per-HPA basis, overriding the default cluster-wide 10% tolerance setting that often proves too coarse-grained for diverse workloads. The enhancement adds an optional `tolerance` field to the HPA's `spec.behavior.scaleUp` and `spec.behavior.scaleDown` sections, enabling different tolerance values for scale-up and scale-down operations, which is particularly valuable since scale-up responsiveness is typically more critical than scale-down speed for handling traffic surges. | ||
[KEP-4951](https://kep.k8s.io/4951) introduces a new feature that allows users to configure autoscaling tolerance on a per-HPA basis, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Another one that missed this release (Should we remove it?)
LGTM label has been added. Git tree hash: aac8050d04d3795b8a40de614858a13add17ca20
|
/lgtm |
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: graz-dev The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
* Publish v1.34 sneak peek blog * add Markdown wrapping * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md Co-authored-by: Mélony QIN <[email protected]> * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md Co-authored-by: Mélony QIN <[email protected]> * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md --------- Co-authored-by: Mélony QIN <[email protected]>
* Publish v1.34 sneak peek blog * add Markdown wrapping * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md Co-authored-by: Mélony QIN <[email protected]> * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md Co-authored-by: Mélony QIN <[email protected]> * Update content/en/blog/_posts/2025-07-28-kubernetes-v1.34-sneak-peek.md --------- Co-authored-by: Mélony QIN <[email protected]>
Follow-up of PR: #51651