[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-09-01 UTC。"],[],[],null,["# Backup for GKE preview agent deprecation\n\nStandard\n\n*** ** * ** ***\n\n| **Note:** Starting on April 27th 2023, Backup for GKE will block the agent from being installed in clusters running a version of GKE earlier than 1.24. This change won't impact clusters already running the preview agent, but will block new installations.\n\nThe Backup for GKE [agent](/kubernetes-engine/docs/add-on/backup-for-gke/concepts/backup-for-gke#agent_overview)\nrequires full privileges to read and write every object in the cluster.\n\nThe version of the agent that runs in GKE cluster versions\nprior to 1.24 is a preview version released in February 2022 that runs as a\nworkload in the GKE user cluster. Users or workloads with root\naccess to the underlying node on which the Backup for GKE Pod is scheduled,\nsuch as through Pod hostpath mounts or SSH, can gain these root-in-cluster\nprivileges.\n\nThis node-to-cluster escalation vulnerability is addressed in the generally\navailable (GA) version of the agent, which was released in November 2022. The GA\nagent runs on an inaccessible host in the GKE control plane and\nis only available in clusters running GKE version 1.24 or later.\nTo avoid the potential for a node-to-cluster escalation, we highly recommend\nthat you run Backup for GKE **only for GKE clusters running\nversion 1.24 or later**.\n\nNew installations of the preview agent will be blocked starting on April 27th 2023."]]