Azure AKS

notes:
  • AKS Roadmap: https://aka.ms/aks/roadmap
  • AKS Blog: https://aka.ms/aks/blog
  • AKS Release Notes: https://aka.ms/aks/release-notes
  • AKS Community YouTube: https://www.youtube.com/@theakscommunity
  • AKS Public Community Channel: https://twitter.com/theakscommunity Updates about the service, including new features and new Azure regions: (AKS feed in Azure Updates)[https://azure.microsoft.com/updates/?product=kubernetes-service]
Release list
2026-04-28
RECENT
2026-04-02
Notes - 2026-03-05
2026-02-08
2026-01-04
2025-10-12
6m+
2025-09-21
6m+
2025-08-29
6m+
2025-08-08
6m+
2025-07-20
6m+
2025-06-17
6m+
2025-05-19
6m+
2025-04-27
1y+
2025-04-06
1y+
2025-03-16
1y+
2025-02-20
1y+
2025-01-30
1y+
2025-01-06
1y+
2024-10-25
1y+
2024-10-06
1y+
Release notes:

Release Notes - 2026-04-28

Monitor the release status by regions at AKS-Release-Tracker. Vulnerabilities addressed by AKS releases can be tracked at CVE API viewer.

Announcements

  • AKS-2026-0003: A Linux kernel algif_aead local privilege escalation vulnerability (CVE-2026-31431) lets a pod escalate to root on the underlying node — including non-root pods with no special capabilities. Affects AKS nodes running Ubuntu 20.04 FIPS, Ubuntu 22.04, Ubuntu 24.04, and Azure Linux 3.0. Azure Linux 2.0 (Mariner) and Windows nodes aren't affected. The mitigation is globally deployed in node image versions 202604.13.0 and 202604.24.0. New nodes and any node that goes through a node image upgrade are automatically protected. Existing nodes aren't patched in place — upgrade the node image, or, if your pool is already on 202604.24.0, apply the mitigation DaemonSet from the advisory immediately. See the AKS security bulletin for full details.
  • The Kubernetes SIG Network and the Security Response Committee announced the upcoming retirement of the Ingress NGINX project, with maintenance ending in March 2026. Application routing add-on users: Production workloads remain fully supported through November 2026. Migrate to the application routing Gateway API implementation for a Gateway API-based ingress traffic management experience.

Kubernetes Version

  • New Kubernetes patch versions are now available: 1.35.2, 1.35.3, 1.34.5, 1.34.6, 1.33.9, and 1.33.10.
  • AKS Kubernetes Long Term Support (LTS) version 1.29 is deprecated. Please upgrade your clusters to a supported version. Refer to AKS Support Calendar for more information.
  • AKS Kubernetes version 1.32 is now available only through Long Term Support. Use an LTS support plan for clusters that need to remain on 1.32, or upgrade to a supported standard-support Kubernetes version.

For deprecation, rollouts and patch timelines by region, please check the AKS-Release-Tracker.

Preview Features

  • Added preview support for AKS-managed NAT Gateway V2 outbound type in supported public Azure regions. Regions where StandardV2 NAT Gateway is not yet available remain excluded.
  • Customers can now preview customization of the default kube-reserved and hard eviction kubelet configuration through the existing custom node preview feature registration starting with the 2026-03-02-preview API.
  • Customers can now view the VM SKUs supported on AKS and available in their Azure subscription with the AKS List Available VM SKUs API, to create their clusters and/or add node pools.
  • AKS-managed GPU metrics are now supported by default in Azure Managed Prometheus and Dashboards with Grafana in Azure Monitor.

Features

  • Gateway API-based ingress for the application routing add-on is now generally available. The Kubernetes SIG Network and the Security Response Committee announced the upcoming retirement of the Ingress NGINX project, with maintenance ending in March 2026. Application routing add-on users: Production workloads remain fully supported through November 2026. Migrate to the application routing Gateway API implementation for a Gateway API-based ingress traffic management experience.
  • AKS Automatic clusters with managed system node pools can now migrate to AKS Standard clusters in additional regions after adding a system node pool.
  • Users can now configure spec.minReadySeconds in the Application Routing Gateway Parameters ConfigMap. This helps applications that need extra initialization time after passing their initial health check and can reduce disruption during rolling upgrades. See the related AKS GitHub issue.

Bug Fixes

  • Fixed an issue in the Istio-based service mesh add-on where the CRD installer could pull busybox from an unintended registry in AGC environments. This also removes non-Job Helm hooks from related resources to avoid a CRD installer race condition.
  • Fixed empty PUT reconcile failures with CustomRouteTableInvalidUpdateAttempt on clusters using bring-your-own route tables.
  • Added validation to prevent enabling Artifact Streaming with Pod Sandboxing, which is not supported.
  • Added AKS Automatic managed system node pool protection that blocks ClusterRoleBinding create or update requests when the roleRef targets configured privileged ClusterRoles, reducing the risk of privilege escalation through service account impersonation.

Behavioral Changes

Component Updates

Copyright © 2023 - All right reserved by Yadoc SAS