This page discusses how automatic and manual upgrades work on Google Kubernetes Engine (GKE) Standard clusters, including links to more information about related tasks and settings. You can use this information to keep your clusters updated for stability and security with minimal disruptions to your workloads.
For information on how cluster upgrades work for Autopilot, see Autopilot cluster upgrades.
How cluster and node pool upgrades work
This section discusses what happens in your cluster during automatic or manual upgrades. For auto-upgrades, Google initiates the auto-upgrade. Google observes automatic and manual upgrades across all GKE clusters, and intervenes if problems are observed.
A cluster is upgraded before its nodes.
Cluster upgrades
This section discusses what to expect when Google auto-upgrades your cluster or you initiate a manual upgrade.
Zonal clusters have only a single control plane. During the upgrade, your workloads continue to run, but you cannot deploy new workloads, modify existing workloads, or make other changes to the cluster's configuration until the upgrade is complete.
Regional clusters have multiple replicas of the control plane, and only one replica is upgraded at a time, in an undefined order. During the upgrade, the cluster remains highly available, and each control plane replica is unavailable only while it is being upgraded.
Cluster control planes are always upgraded on a regular basis, regardless of whether your cluster is enrolled in a release channel or not.
If you configure a maintenance window or exclusion, it is honored if possible.
Node pool upgrades
Your cluster and its node pools do not necessarily run the same version of GKE. This section discusses what to expect when Google auto-upgrades your node pool or you initiate a manual node-pool upgrade.
Node pools are upgraded one at a time. Within a node pool, nodes are upgraded one at a time, in an undefined order. You can change the number of nodes upgraded at a time.
This process might take several hours depending on the number of nodes and their workload configurations. Configurations that can slow the rate of node upgrades include:
- A high value of terminationGracePeriodSeconds in a Pod's configuration.
- A conservative Pod Disruption Budget.
- Node affinity interactions.
- Attached PersistentVolumes.
If you configure a maintenance window or exclusion, it is honored if possible.
When a node is upgraded, the following things happen:
- If Surge upgrades are enabled, GKE creates a new surge node with the upgraded version and waits for it to be registered with the control plane.
- GKE selects an existing node (which we will call the target node)
to upgrade. It cordons and starts draining the target node. At this point,
GKE can't schedule new Pods on the target node.
- PodDisruptionBudget is respected for 1 hour.
- GracefulTerminationPeriod is limited to 1 hour.
- Pods on the target node are rescheduled onto other nodes. If a Pod can't be
rescheduled, that Pod stays
PENDING
until it can be rescheduled. - If a surge node was created in step 1, the target node is deleted. If a surge node wasn't created, GKE upgrades the target node then it waits for the node to be registered.
- If a significant number of node auto-upgrades to a given version result in unhealthy nodes across the GKE fleet, upgrades to that version are halted while the problem is investigated.
Upgrading automatically
When you create a Standard cluster, by default, auto-upgrade is enabled on the cluster and its node pools.
Google is responsible for securing your cluster's control plane, and upgrades your clusters when a new GKE version is selected for auto-upgrade. Infrastructure security is high priority for GKE, and as such control planes are upgraded on a regular basis, and cannot be disabled. However, you can apply maintenance windows and exclusions to temporarily suspend upgrades for control planes and nodes.
Under the Shared Responsibility Model, you are responsible for securing your nodes, containers, and Pods. Node auto-upgrade is enabled by default. Although it is not recommended, you can disable node auto-upgrade. Opting out of node auto-upgrades does not block your cluster's control plane upgrade. If you opt out of node auto-upgrades you are responsible for ensuring that the cluster's nodes run a version compatible with the cluster's version, and that the version adheres to the Kubernetes version and version skew support policy.
For more control over when an auto-upgrade can occur (or must not occur), you can configure maintenance windows and exclusions.
A cluster's node pools can be no more than two minor versions behind the control plane version, to maintain compatibility with the cluster API. The node pool version also determines the versions of software packages installed on each node. It is recommended to keep node pools updated to the cluster version.
If you enroll your cluster in a release channel, nodes always run the same version of GKE as the cluster itself, except during a brief period (typically a few days, depending on the current release) between completing the cluster's control plane upgrade and beginning to upgrade a given node pool. Check the release notes for more information.
How versions are selected for auto-upgrade
New GKE versions are released regularly, but a version is not selected for auto-upgrade right away. When a GKE version has accumulated enough cluster usage to prove stability over time, Google selects it as an auto-upgrade target for clusters running a subset of older versions.
New auto-upgrade targets are announced in the release notes. Until an available version is selected for auto-upgrade, you can upgrade to it manually. Occasionally, a version is selected for cluster auto-upgrade and node auto-upgrade during different weeks.
Soon after a new minor version becomes generally available, the oldest available minor version typically becomes unsupported. Clusters running minor versions that become unsupported are automatically upgraded to the next minor version.
Within a minor version (such as v1.14.x), clusters can be automatically upgraded to a new patch release.
Release channels allow you to control your cluster and node pool version based on a version's stability rather than managing the version directly.
Configuring when auto-upgrades can occur
By default, auto-upgrades can occur at any time. Auto-upgrades are minimally disruptive, especially for regional clusters. However, some workloads may require finer-grained control. You can configure maintenance windows and exclusions to manage when auto-upgrades can and must not occur.
Upgrading manually
You can request to manually upgrade your cluster or its node pools to an available and compatible version at any time. Manual upgrades bypass any configured maintenance windows and maintenance exclusions.
When you manually upgrade a cluster, its availability depends on whether the cluster is regional or not:
For zonal clusters, the control plane is unavailable while it is being upgraded. For the most part, workloads run normally but cannot be modified during the upgrade.
For regional clusters, one replica of the control plane is unavailable at a time while it is upgraded, but the cluster remains highly available during the upgrade.
You can manually initiate a node upgrade to a version compatible with the control plane.
Surge upgrades
Surge upgrades let you control the number of nodes GKE can upgrade at a time and control how disruptive upgrades are to your workloads.
Changing upgrade settings to balance speed and disruption
You can change how many nodes GKE attempts to upgrade at once by changing the surge upgrade parameters on a node pool. Surge upgrades reduce disruption to your workloads during cluster maintenance and also allow you to control the number of nodes upgraded in parallel. Surge upgrades also work with the Cluster Autoscaler to prevent changes to nodes that are being upgraded.
Surge upgrade behavior is determined by two settings:
max-surge-upgrade
The number of additional nodes that can be added to the node pool during an upgrade. Increasing
max-surge-upgrade
raises the number of nodes that can be upgraded simultaneously. Default is1
. Can be set to0
or greater.max-unavailable-upgrade
The number of nodes that can be simultaneously unavailable during an upgrade. Default is
0
. Increasingmax-unavailable-upgrade
raises the number of nodes that can be upgraded in parallel.
The number of nodes upgraded simultaneously is the sum of max-surge-upgrade
and max-unavailable-upgrade
. The maximum number of nodes upgraded
simultaneously is limited to 20
.
For example, a 5-node pool is created with max-surge-upgrade
set to 2 and
max-unavailable-upgrade
set to 1. During a
node pool upgrade, GKE
creates two upgraded nodes. GKE brings down at most three
(the sum of max-surge-upgrade
and max-unavailable-upgrade
) existing
nodes after the upgraded nodes are ready. GKE will only
make a maximum of one node unavailable (max-unavailable-upgrade
) at a time.
During the upgrade process, the node pool will include between four and seven
nodes.
You can configure surge upgrade parameters for node pools that use auto-upgrades and manual upgrades. You can learn more and try out Surge Upgrade by completing the tutorial "Use surge upgrades to decrease disruptions from GKE node upgrades".
Determining your optimal surge configuration
The following table describes three different upgrade settings as a demonstration to help you understand different configurations:
Description | Configuration |
---|---|
Balanced (Default), slower but least disruptive | maxSurge=1 maxUnavailable=0 |
Fast, no surge resources, most disruptive | maxSurge=0 maxUnavailable=20 |
Fast, most surge resources and less disruptive | maxSurge=20 maxUnavailable=0 |
Balanced (Default)
The simplest way to take advantage of surge upgrade is to configure
maxSurge=1 maxUnavailable=0.
This means that only 1 surge node can be added to
the node pool during an upgrade so only 1 node will be upgraded at a time. This
setting is superior to the existing upgrade configuration
(maxSurge=0 maxUnavailable=1
) because it speeds up Pod restarts during
upgrades while progressing conservatively.
Fast and no surge resources
If your workload isn't sensitive to disruption, like most batch jobs, you can
emphasize speed by using maxSurge=0 maxUnavailable=20
. This configuration does
not bring up additional surge nodes and allows 20 nodes to be upgraded at the
same time.
Fast and less disruptive
If your workload is sensitive to disruption and you have already set up
PodDisruptionBudgets
(PDB) and you are not using externalTrafficPolicy: Local
, which
does not work with parallel node drains,
you can increase the speed of the upgrade by using
maxSurge=20 maxUnavailable=0
. This configuration upgrades 20 nodes in parallel
while the PDB limits the number of Pods that can be drained at a given time.
Although the configurations of PDBs may vary, if you create a PDB with
maxUnavailable: 1
for one or more workloads running on the node pool, then
only one Pod of those workloads can be evicted at a time, limiting the
parallelism of the entire upgrade.
Relationship with quota
While recreating nodes does not require additional Compute Engine resources, surge upgrading nodes does. Resource allocation is subjected to Compute Engine quota. Depending on your configuration, this quota can limit the number of parallel upgrades or even cause the upgrade to fail.
For more information about quotas, see Node upgrades and quota.
Receiving upgrade notifications
GKE publishes upgrade notifications to Pub/Sub, providing you with a channel to receive information from GKE about your clusters.
For more information, see Receiving cluster upgrade notifications.
What's next
- Learn more about the types of clusters.
- Learn more about upgrading a cluster or its nodes.
- Configure maintenance windows and exclusions.
- Best practices for upgrading clusters.