LWKD logo

Last Week in Kubernetes Development

Stay up-to-date on Kubernetes development in 15 minutes a week.

Subscribe
Mastodon
BlueSky
RSS

View LWKD on GitHub

Week Ending April 19, 2026

Developer News

Kubernetes 1.36 has been released, with features including fine-grained kubelet API authorization reaching GA, MutatingAdmissionPolicy graduating to stable for declarative request mutation, and new Workload Aware Scheduling features enabling group-based (PodGroup) scheduling; more details are available in the official release blog.

Kernel Module Management (KMM) operator v2.6.0 has been released with support for image rebuild triggers, host kernel module mounts, glob patterns for file signing, and hardened container security contexts.

SIG etcd has nominated Josh Berkus (@jberkus) for a new leadership role as a co-chair; lazy consensus is open on the dev mailing list.

The Kubernetes project’s new GitHub Actions security policy is now enforced at the enterprise level, so workflows using mutable action refs like tags, branches, or latest will fail and maintainers need to pin actions to full 40-character commit SHAs.

Release Schedule

Kubernetes v1.36.0 has been released 🎉

Kubernetes Patches for v1.33.11, v1.34.7, and v1.35.4 have been built and pushed using Golang version 1.25.9.

KEP of the Week

KEP-5538: CSI driver opt-in for service account tokens via secrets field

This KEP proposes an opt-in mechanism for CSI drivers to receive service account tokens through the dedicated secrets field in NodePublishVolumeRequest instead of the volume_context field. Currently, when TokenRequests is enabled in the CSIDriver spec, kubelet generates service account tokens and passes them via volume_context, which is intended for non-sensitive metadata like pod name and namespace. This design has led to security issues, including CVE-2023-2878 and CVE-2024-3744, where tokens were exposed in logs because tools like protosanitizer do not treat volume_context as sensitive data. As a result, individual CSI drivers have had to implement inconsistent and error-prone workarounds for sanitization. This proposal addresses the issue by allowing drivers to explicitly opt into receiving tokens via the secrets field, which is designed for sensitive information and ensures proper handling and sanitization, while keeping the default behavior unchanged for backward compatibility.

In Kubernetes v1.35, the feature is in Beta with the CSIServiceAccountTokenSecrets feature gate enabled by default, introducing the opt-in field in CSIDriver and ensuring backward-compatible behavior.

Other Merges

Version Updates

Subprojects and Dependency Updates

Shoutouts

Last Week In Kubernetes Development (LWKD) is a product of multiple contributors participating in Kubernetes SIG Contributor Experience. All original content is licensed Creative Commons Share-Alike, although linked content and images may be differently licensed. LWKD does collect some information on readers, see our privacy notice for details.

You may contribute to LWKD by submitting pull requests or issues on the LWKD github repo.