[[["易于理解","easyToUnderstand","thumb-up"],["解决了我的问题","solvedMyProblem","thumb-up"],["其他","otherUp","thumb-up"]],[["很难理解","hardToUnderstand","thumb-down"],["信息或示例代码不正确","incorrectInformationOrSampleCode","thumb-down"],["没有我需要的信息/示例","missingTheInformationSamplesINeed","thumb-down"],["翻译问题","translationIssue","thumb-down"],["其他","otherDown","thumb-down"]],["最后更新时间 (UTC):2025-09-03。"],[],[],null,["# Backup for GKE preview agent deprecation\n\nStandard\n\n*** ** * ** ***\n\n| **Note:** Starting on April 27th 2023, Backup for GKE will block the agent from being installed in clusters running a version of GKE earlier than 1.24. This change won't impact clusters already running the preview agent, but will block new installations.\n\nThe Backup for GKE [agent](/kubernetes-engine/docs/add-on/backup-for-gke/concepts/backup-for-gke#agent_overview)\nrequires full privileges to read and write every object in the cluster.\n\nThe version of the agent that runs in GKE cluster versions\nprior to 1.24 is a preview version released in February 2022 that runs as a\nworkload in the GKE user cluster. Users or workloads with root\naccess to the underlying node on which the Backup for GKE Pod is scheduled,\nsuch as through Pod hostpath mounts or SSH, can gain these root-in-cluster\nprivileges.\n\nThis node-to-cluster escalation vulnerability is addressed in the generally\navailable (GA) version of the agent, which was released in November 2022. The GA\nagent runs on an inaccessible host in the GKE control plane and\nis only available in clusters running GKE version 1.24 or later.\nTo avoid the potential for a node-to-cluster escalation, we highly recommend\nthat you run Backup for GKE **only for GKE clusters running\nversion 1.24 or later**.\n\nNew installations of the preview agent will be blocked starting on April 27th 2023."]]