Kubernetes 1.22 deprecated APIs


This page explains how to prepare clusters for upgrades to GKE version 1.22. You can find API clients making calls to deprecated APIs removed in 1.22 and update those clients to use GA APIs. For more detailed information, see the Kubernetes deprecated API migration guide.

Removed APIs in 1.22

Most of the deprecated APIs in Kubernetes version 1.22 are former Beta APIs that have since graduated from Beta (v1beta1) to GA (v1). The GA APIs provide longer-term compatibility guarantees and should be used in place of the deprecated Beta APIs.

All existing objects can be interacted with by using the GA APIs.

Webhook resources

The Beta API version of MutatingWebhookConfiguration and ValidatingWebhookConfiguration is no longer served as of version 1.22.

  • Migrate manifests and API clients to use the admissionregistration.k8s.io/v1 API version.
  • Refer to the following table that describes the notable changes in the GA API version:

    Field Change
    webhooks[*].failurePolicy Default changed from Ignore to Fail.
    webhooks[*].matchPolicy Default changed from Exact to Equivalent.
    webhooks[*].timeoutSeconds Default changed from 30s to 10s.
    webhooks[*].sideEffects Default value is removed, and the field is now required. Only None and NoneOnDryRun are permitted.
    webhooks[*].admissionReviewVersions Default value is removed and the field is now required (supported versions for AdmissionReview are v1 and v1beta1).
    webhooks[*].name Must be unique in the list for objects created via admissionregistration.k8s.io/v1.

CustomResourceDefinition

The Beta API version of CustomResourceDefinition is no longer served as of version 1.22.

  • Migrate manifests and API clients to use the apiextensions.k8s.io/v1 API version.
  • Refer to the following table that describes the notable changes in the GA API version:

    Field Change
    spec.scope No longer defaulted to Namespaced. The value must be explicitly specified.
    spec.version Removed. Use spec.versions instead.
    spec.validation Removed. Use spec.versions[*].schema instead.
    spec.subresources Removed. Use spec.versions[*].subresources instead.
    spec.additionalPrinterColumns Removed. Use spec.versions[*].additionalPrinterColumns instead.
    spec.conversion.webhookClientConfig Moved to spec.conversion.webhook.clientConfig.
    spec.conversion.conversionReviewVersions Moved to spec.conversion.webhook.conversionReviewVersions.
    spec.versions[*].schema.openAPIV3Schema Now required when creating v1 CustomResourceDefinition objects, and must be a structural schema.
    spec.preserveUnknownFields Value true is disallowed when creating v1 CustomResourceDefinition objects. The value must be specified within schema definitions as x-kubernetes-preserve-unknown-fields: true.
    additionalPrinterColumns In additionalPrinterColumns items, the JSONPath field was renamed to jsonPath.

APIService

The Beta API version of APIService is no longer served as of version 1.22. Migrate manifests and API clients to use the apiregistration.k8s.io/v1 API version.

TokenReview

The Beta API version of TokenReview is no longer served as of version 1.22. Migrate manifests and API clients to use the authentication.k8s.io/v1 API version.

SubjectAccessReview resources

The Beta API version of LocalSubjectAccessReview, SelfSubjectAccessReview, and SubjectAccessReview is no longer served as of version 1.22.

  • Migrate manifests and API clients to use the authorization.k8s.io/v1 API version.
  • Refer to the following table that describes the notable changes in the GA API version:

    Field Change
    spec.group Renamed to spec.groups.

CertificateSigningRequest

The Beta API version of CertificateSigningRequest is no longer served as of version 1.22.

  • Migrate manifests and API clients to use the certificates.k8s.io/v1 API version.
  • Refer to the following table that describes the notable changes in the GA API version:

    Field Change
    spec.signerName For API clients requesting certificates, this field is required (see known Kubernetes signers), and requests for kubernetes.io/legacy-unknown are not allowed to be created via the certificates.k8s.io/v1 API.
    spec.usages For API clients requesting certificates, this field is required. This field cannot contain duplicate values, and must only contain known usages.
    status.conditions For API clients approving or signing certificates, this field cannot contain duplicate types.
    status.conditions[*].status For API clients approving or signing certificates, this field is now required.
    status.certificate For API clients approving or signing certificates, this field must be PEM-encoded, and contain only CERTIFICATE blocks.

Lease

The Beta API version of Lease is no longer served as of version 1.22. Migrate manifests and API clients to use the coordination.k8s.io/v1 API version.

Ingress (available until 1.23 for clusters created on 1.21 or earlier)

The Beta API versions (extensions/v1beta1 and networking.k8s.io/v1beta1) of Ingress are no longer served for GKE clusters running version 1.22 or later if the cluster was created on version 1.22 or later.

However, for clusters created on GKE version 1.21 or earlier and upgraded to 1.22 on the patch version 1.22.7-gke.300 or later, you can still use the Beta API versions until the cluster is upgraded to version 1.23. This is a one-time exception for older clusters to give you more time to migrate your clusters from using these API versions which are removed from the open-source Kubernetes in version 1.22.

Any clusters running GKE version 1.23 and later will no longer serve the deprecated Ingress beta APIs. Manifests using those API versions can no longer be applied. Previously persisted objects remain functional and can be viewed and updated using the new API versions, before and after upgrading to 1.23.

  • Migrate manifests and API clients to use the networking.k8s.io/v1 API version.
  • Refer to the following table that describes the notable changes in the GA API version:

    Field Change
    spec.backend Renamed to spec.defaultBackend.
    backend serviceName Renamed to service.name.
    servicePort Numeric backend servicePort fields are renamed to service.port.number. String backend servicePort fields are renamed to service.port.name.
    pathType Now required for each specified path. The value can be: Prefix, Exact, or ImplementationSpecific. To match the undefined v1beta1 behavior, use ImplementationSpecific.

The following manifests describe the same Ingress in v1 and v1beta1:

v1beta1 manifest

apiVersion: networking.k8s.io/v1beta1
kind: Ingress
metadata:
  name: example
spec:
  backend:
    serviceName: default-backend
    servicePort: 80
  rules:
  - http:
      paths:
      - path: /testpath
        backend:
          serviceName: test
          servicePort: 80

v1 manifest

apiVersion: networking.k8s.io/v1
kind: Ingress
metadata:
  name: example
spec:
  defaultBackend:
    service:
      name: default-backend
      port:
        number: 80
  rules:
  - http:
      paths:
      - path: /testpath
        pathType: ImplementationSpecific
        backend:
          service:
            name: test
            port:
              number: 80

You can use the following query for clusters with Google Cloud Observability enabled to identify clients that access the Ingress v1beta1 APIs:

resource.type="k8s_cluster"
resource.labels.cluster_name="$CLUSTER_NAME"
protoPayload.authenticationInfo.principalEmail:("system:serviceaccount" OR "@")
protoPayload.request.apiVersion=("extensions/v1beta1" OR "networking.k8s.io/v1beta1")
protoPayload.request.kind="Ingress"
NOT ("kube-system")

IngressClass

The Beta API version of IngressClass is no longer served as of version 1.22. Migrate manifests and API clients to use the networking.k8s.io/v1 API version.

RBAC resources

The Beta API version of ClusterRole, ClusterRoleBinding, Role, and RoleBinding is no longer served as of version 1.22. Migrate manifests and API clients to use the rbac.authorization.k8s.io/v1 API version.

PriorityClass

The Beta API version of PriorityClass is no longer served as of version 1.22. Migrate manifests and API clients to use the scheduling.k8s.io/v1 API version.

Storage resources

The Beta API version of CSIDriver, CSINode, StorageClass, and VolumeAttachment is no longer served as of version 1.22. Migrate manifests and API clients to use the storage.k8s.io/v1 API version.

Find clusters using deprecated APIs

You can find which clusters are using deprecated APIs from deprecation insights. Deprecation insights also provide information such as which API clients are calling the deprecated APIs in your cluster.

You can also use audit logs to find which clients are making calls to deprecated APIs.

Locate API clients making write calls to deprecated APIs

For clusters with Google Cloud Observability enabled, you can use the following Admin Activity audit log query to show the use of deprecated APIs by user agents that are not Google-managed:

resource.type="k8s_cluster"
labels."k8s.io/removed-release"="DEPRECATED_API_MINOR_VERSION"
protoPayload.authenticationInfo.principalEmail:("system:serviceaccount" OR "@")
protoPayload.authenticationInfo.principalEmail!~("system:serviceaccount:kube-system:")

Replace DEPRECATED_API_MINOR_VERSION with the minor version where the deprecated API is removed, for example 1.22.

Admin Activity audit logs are automatically enabled for GKE clusters. With this query, the logs show user agents making write calls to the deprecated APIs.

Locate API clients making read calls to deprecated APIs

By default, audit logs show only write calls to the deprecated APIs. To also show read calls to deprecated APIs, configure Data Access audit logs.

Follow the instructions to Configure Data Access audit logs with the Google Cloud console. In the Google Cloud console, select the Kubernetes Engine API. In the Log Types tab in the information panel, select Admin Read and Data Read.

With these logs enabled, you can now use the original query to see both read calls and write calls to the deprecated APIs.

Upgrading third-party components

Deprecation insights might display results for third-party agents that make calls to deprecated APIs in your cluster.

To resolve these insights, try the following steps:

  1. Check with your third-party software provider for an updated version.
  2. Upgrade the third-party software to the latest version. If you cannot upgrade the software, you should test whether upgrading GKE to the version with the removed deprecated APIs would break your service.

We recommend that you perform this upgrade and the GKE version upgrade on a staging cluster to monitor for disruptions before you upgrade your production clusters.

Preparing to upgrade to version 1.22

You do not need to delete and recreate any of your API objects. All existing persisted API objects can already be read and updated using the new API versions. However, we recommend that you migrate your clients and manifests before upgrading to Kubernetes 1.22. Learn more in the "What to do" section of the Kubernetes Deprecated API Migration Guide.

You can view deprecation insights and recommendations to determine if your cluster is using a Kubernetes feature or API that is deprecated. Deprecation insights are based on observed API calls to deprecated APIs by user agents, not the configuration of your Kubernetes objects.

Update clusters impacted by deprecations

To upgrade clusters impacted by deprecations, perform the following steps:

  1. Check which user agents use the deprecated APIs in the deprecation insight or logs.
  2. Update the user agents that use the deprecated APIs to use supported API versions.
  3. Update any third-party software that calls deprecated APIs to the latest versions.
  4. Upgrade a test cluster and test your application in a testing environment before upgrading your production cluster to reduce the risk of disruptions when deprecated APIs are no longer available.
  5. After you update all of the user agents, GKE waits until it has no longer observed use of deprecated APIs for 30 days, and then unblocks automatic upgrades. Automatic upgrades proceed according to the release schedule.
  6. If you can't update an affected user agent, upgrade a separate test cluster to check whether the upgrade causes disruptions. If the upgrade doesn't cause disruptions, you can upgrade your cluster manually.

Resources

More information is available in the OSS Kubernetes documentation: