Version 1.11. This version is no longer supported. For information about how to upgrade to version 1.12, see Upgrading Anthos on bare metal in the 1.12 documentation. For more information about supported and unsupported versions, see the Version history page in the latest documentation.
Google Distributed Cloud version 1.11 runs on Kubernetes 1.22. Kubernetes 1.22 has
deprecated certain APIs, and a list of these deprecated APIs can be found in
Kubernetes 1.22 deprecated APIs.
In version 1.11, of Google Distributed Cloud, all clusters have cluster audit
logging enabled and audit logs are streamed to
Google Cloud's operations suite. To determine if
Kubernetes Service Accounts (SA) you use make calls to any deprecated APIs, go
to Cloud Operation Log Explorer and run the query below. Output from this query
will show if any of your Kubernetes SAs make deprecated API calls:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-09-04 UTC."],[[["\u003cp\u003eGoogle Distributed Cloud version 1.11 uses Kubernetes 1.22, which has deprecated certain APIs, detailed in the Kubernetes documentation.\u003c/p\u003e\n"],["\u003cp\u003eAll clusters in Google Distributed Cloud version 1.11 have enabled cluster audit logging, with logs streamed to Google Cloud's operations suite.\u003c/p\u003e\n"],["\u003cp\u003eYou can identify Kubernetes Service Accounts making calls to deprecated APIs by running a specific query in Cloud Operation Log Explorer.\u003c/p\u003e\n"],["\u003cp\u003eThe provided query identifies calls to deprecated API methods by excluding calls from specified system service accounts, and checking against a list of specified methods.\u003c/p\u003e\n"]]],[],null,["# Deprecated Kubernetes 1.22 APIs\n\n\u003cbr /\u003e\n\nGoogle Distributed Cloud version 1.11 runs on Kubernetes 1.22. Kubernetes 1.22 has\ndeprecated certain APIs, and a list of these deprecated APIs can be found in\n[Kubernetes 1.22 deprecated APIs](/kubernetes-engine/docs/deprecations/apis-1-22).\n\nIn version 1.11, of Google Distributed Cloud, all clusters have cluster audit\nlogging enabled and audit logs are streamed to\n[Google Cloud's operations suite](/products/operations). To determine if\nKubernetes Service Accounts (SA) you use make calls to any deprecated APIs, go\nto Cloud Operation Log Explorer and run the query below. Output from this query\nwill show if any of your Kubernetes SAs make deprecated API calls: \n\n resource.labels.cluster_name = \"\u003ccluster_name\u003e\" AND\n logName = \"projects/\u003cproject\u003e/logs/externalaudit.googleapis.com%2Factivity\" AND\n protoPayload.authenticationInfo.principalEmail:(\"system:serviceaccount\" OR \"@\") AND\n protoPayload.authenticationInfo.principalEmail!~(\"system:serviceaccount:kube-system:\") AND\n protoPayload.authenticationInfo.principalEmail!~(\"system:serviceaccount:cert-manager:\") AND\n protoPayload.authenticationInfo.principalEmail!~(\"system:serviceaccount:capi-kubeadm-bootstrap-system:\") AND\n protoPayload.authenticationInfo.principalEmail!~(\"system:serviceaccount:capi-kubeadm-bootstrap-system-webhook:\") AND\n protoPayload.authenticationInfo.principalEmail!~(\"system:serviceaccount:capi-system:\") AND\n protoPayload.authenticationInfo.principalEmail!~(\"system:serviceaccount:capi-system-webhook:\") AND\n (protoPayload.methodName:\"io.k8s.apiextensions.v1beta1.CustomResourceDefinition\" OR\n protoPayload.methodName:\"io.k8s.admissionregistration.v1beta1.MutatingWebhookConfiguration\" OR\n protoPayload.methodName:\"io.k8s.admissionregistration.v1beta1.ValidatingWebhookConfiguration\" OR\n protoPayload.methodName:\"io.k8s.apiregistration.v1beta1.APIService\" OR\n protoPayload.methodName:\"io.k8s.authentication.v1beta1.TokenReview\" OR\n protoPayload.methodName:\"io.k8s.authentication.v1beta1.LocalSubjectAccessReview\" OR\n protoPayload.methodName:\"io.k8s.authentication.v1beta1.SelfSubjectAccessReview\" OR\n protoPayload.methodName:\"io.k8s.authentication.v1beta1.SubjectAccessReview\" OR\n protoPayload.methodName:\"io.k8s.certificates.v1beta1.CertificateSigningRequest\" OR\n protoPayload.methodName:\"io.k8s.coordination.v1beta1.Lease\" OR\n protoPayload.methodName:\"io.k8s.networking.v1beta1.Ingress\" OR\n protoPayload.methodName:\"io.k8s.networking.v1beta1.IngressClass\" OR\n protoPayload.methodName:\"io.k8s.authorization.rbac.v1beta1.ClusterRole\" OR\n protoPayload.methodName:\"io.k8s.authorization.rbac.v1beta1.ClusterRoleBinding\" OR\n protoPayload.methodName:\"io.k8s.authorization.rbac.v1beta1.Role\" OR\n protoPayload.methodName:\"io.k8s.authorization.rbac.v1beta1.RoleBinding\" OR\n protoPayload.methodName:\"io.k8s.scheduling.v1beta1.PriorityClass\" OR\n protoPayload.methodName:\"io.k8s.storage.v1beta1.CSIDriver\" OR\n protoPayload.methodName:\"io.k8s.storage.v1beta1.CSINode\" OR\n protoPayload.methodName:\"io.k8s.storage.v1beta1.StorageClass\" OR\n protoPayload.methodName:\"io.k8s.storage.v1beta1.VolumeAttachment\"\n )"]]