Updated on 2024-01-26 GMT+08:00

Release Notes for CCE Cluster Versions

Version 1.27

In CCE v1.27 and later versions, all nodes support only the containerd container engine.

Table 1 Release notes for the v1.27 patch

CCE Cluster Patch Version

Kubernetes Version

Feature Updates

Optimization

Vulnerability Fixing

v1.27.1-r0

v1.27.2

CCE clusters of v1.27 are released for the first time. For more information, see Kubernetes 1.27 Release Notes.

  • Both soft eviction and hard eviction are supported in node pool configuration.

None

None

Version 1.25

All nodes in the CCE clusters of version 1.25, except the ones running EulerOS 2.5, use containerd by default.

Table 2 Release notes for the v1.25 patch

CCE Cluster Patch Version

Kubernetes Version

Feature Updates

Optimization

Vulnerability Fixing

v1.25.1-r0

v1.25.5

CCE clusters of v1.25 are released for the first time. For more information, see Kubernetes 1.25 Release Notes.

None

None

Version 1.23

Table 3 Release notes for the v1.23 patch

CCE Cluster Patch Version

Kubernetes Version

Feature Updates

Optimization

Vulnerability Fixing

v1.23.8-r0

v1.23.11

None

  • Enhanced Docker reliability during upgrades.
  • Optimized node time synchronization.

Fixed some security issues.

v1.23.5-r0

v1.23.11

  • Fault detection and isolation are supported on GPU nodes.
  • Security groups can be customized by cluster.
  • containerd is supported.
  • The ETCD version of the master node has been upgraded to the Kubernetes version 3.5.6.
  • Scheduling is optimized so that pods are evenly distributed across AZs after pods are scaled in.
  • Optimized the memory usage of kube-apiserver when CRDs are frequently updated.

Fixed some security issues and the following CVE vulnerabilities:

v1.23.1-r0

v1.23.4

CCE clusters of v1.23 are released for the first time. For more information, see Kubernetes 1.23 Release Notes.

None

None

Version 1.21

Table 4 Release notes for the v1.21 patch

CCE Cluster Patch Version

Kubernetes Version

Feature Updates

Optimization

Vulnerability Fixing

v1.21.10-r0

v1.21.14

None

  • Enhanced Docker reliability during upgrades.
  • Optimized node time synchronization.
  • Enhanced the stability of the Docker runtime for pulling images after nodes are restarted.

Fixed some security issues.

v1.21.7-r0

v1.21.14

  • Fault detection and isolation are supported on GPU nodes.
  • Security groups can be customized by cluster.

Improved the stability of LoadBalancer Services/ingresses with a large number of connections.

Fixed some security issues and the following CVE vulnerabilities:

v1.21.1-r0

v1.21.7

CCE clusters of v1.21 are released for the first time. For more information, see Kubernetes 1.21 Release Notes.

None

None

Version 1.19

Table 5 Release notes of the v1.19 patch

CCE Cluster Patch Version

Kubernetes Version

Feature Updates

Optimization

Vulnerability Fixing

v1.19.16-r20

v1.19.16

None

  • Enhanced the stability of the Docker runtime for pulling images after nodes are restarted.

Fixed some security issues.

v1.19.16-r4

v1.19.16

  • Fault detection and isolation are supported on GPU nodes.
  • Security groups can be customized by cluster.
  • Scheduling is optimized on taint nodes.
  • Enhanced the long-term running stability of containerd when cores are bound.
  • Improved the stability of LoadBalancer Services/ingresses with a large number of connections.
  • Optimized the memory usage of kube-apiserver when CRDs are frequently updated.

Fixed some security issues and the following CVE vulnerabilities:

v1.19.16-r0

v1.19.16

None

Enhanced the stability in updating LoadBalancer Services when workloads are upgraded and nodes are scaled in or out.

Fixed some security issues and the following CVE vulnerabilities:

v1.19.10-r0

v1.19.10

CCE clusters of v1.19 are released for the first time. For more information, see Kubernetes 1.19 Release Notes.

None

None