Upgrading K8s clusters to v1.27

Update 2023-09-28: All clusters have been upgraded to v1.27.

We are rolling out AKS and EKS v1.27. This brings our supported AKS platforms to v1.27.3 and EKS to v1.27(.4). Please make sure to update to our recommended client versions matching this upgrade

Timeline:

  • Testing & rollout to non-production clusters
  • Publish of this changelog
  • If we have detected (possible) use of older apiVersion in your environments, we will post a GitHub issue in your repository with the details
  • Production rollouts are planned to start during the course of weeks of 25/09 & 2/10
  • Update this changelog when everything is finished

Important changes between K8s 1.26 and 1.27

For more detailed info on what’s new and changed, please make sure to check the Kubernetes 1.27 release announcement and the full Kubernetes 1.27.x changelog.

This release mostly focusses on graduating many features/apis to alpha, beta and stable status. Here’s a small list of the most relevant changes:

AKS specific changes

Azure AKS 1.27 GA release notes.

EKS specific changes

AWS EKS 1.27 announcement blog and release notes.

In the process of upgrading EKS the following components have also been upgraded:

  • KubeProxy to v1.27.4-eksbuild.2
  • CoreDNS to v1.10.1-eksbuild.4
  • VPC CNI to v1.14.1-eksbuild.1
  • EBS CSI Driver to v1.22.0-eksbuild.2
  • Cluster Autoscaler to v1.27.3

The new VPC CNI comes with new NetworkPolicies support! This means that customers can now implement both Pod networking and network policies to secure the traffic in their Kubernetes clusters, whitout the need of deploying any extra component.

Up until now, we’ve been supporting Calico as an optional feature for our managed Kubernetes platforms, not as a full-blown CNI, but only as a NetworkPolicies engine. Calico is quite resource-intensive, since it requires several components to function correctly, so thanks to this update we’ll be able to completely remove Calico and all its components and instead rely on the VPC CNI for NetworkPolicies support. In the coming weeks we’ll be enabling by default the NetworkPolicies support on the CNI for all clusters, and removing Calico from the clusters that had it enabled. This shouldn’t have any impact on customer workloads or service availability.

Actions to take

There are no actions to take for you this release.