• EnglishEspañol日本語한국어Português
  • Log inStart now

Kubernetes integration release notesRSS

August 13, 2020
Kubernetes integration v1.26.0

Notes

Follow standard procedures to install or update the New Relic integration for Kubernetes.

Changelog

"network": {
"time": "2020-06-04T10:01:15Z",
"name": "eth0",
"rxBytes": 207909096,
"rxErrors": 0,
"txBytes": 8970981,
"txErrors": 0,
"interfaces": [
{
"name": "eth0",
"rxBytes": 207909096,
"rxErrors": 0,
"txBytes": 8970981,
"txErrors": 0
},
{
"name": "ip6tnl0",
"rxBytes": 0,
"rxErrors": 0,
"txBytes": 0,
"txErrors": 0
},
{
"name": "tunl0",
"rxBytes": 0,
"rxErrors": 0,
"txBytes": 0,
"txErrors": 0
}
]
}

This scenario only happens when the default interface is eth0. Kubernetes
source code has it hardcoded that eth0 is the default. In the following
example you can see that we only have network metrics inside the interfaces
list, in this case there is no eth0 on the and the default interface is ens5:

"network": {
"time": "2020-06-04T10:01:15Z",
"name": "",
"interfaces": [
{
"name": "ens5",
"rxBytes": 207909096,
"rxErrors": 42,
"txBytes": 8970981,
"txErrors": 24
},
{
"name": "ip6tnl0",
"rxBytes": 0,
"rxErrors": 0,
"txBytes": 0,
"txErrors": 0
},
{
"name": "tunl0",
"rxBytes": 0,
"rxErrors": 0,
"txBytes": 0,
"txErrors": 0
}
]

In cases like this, the integration will look for the default interface
inside the interfaces list and use those values. The default interface name
is retrieved from the network route file (default /proc/net/route).

When running the unprivileged version of the integration we don't have access
to the route file, the integration won't be able to get the default interface
name and won't send network metrics for the unless there's a network
interface called eth0.

For Pods, this issue is mainly present when using hostNetwok since they
shared the same network interfaces with the Node.

July 30, 2020
Kubernetes integration v1.25.0

Notes

Follow standard procedures to install or update the New Relic integration for Kubernetes.

Changelog

  • Added: Support for OpenShift 4.4 and Kubernetes versions 1.17.X
  • Changed: Upgraded Docker base image newrelic/infrastructure-bundle to v1.4.1.
    For more information on the release please see the New Relic Infrastructure Bundle release notes.
  • Changed: When retrieving control plane metrics from the API server to generate the K8sApiServerSample, the integration now uses by default the secure port localhost:443 with the service account's bearer authentication. If the query on the secure port fails, it will fallback automatically to the non-secure one localhost:8080, this should preserve the same behavior as previous versions. If your cluster uses a different secure port to expose its metrics you can use the configuration option API_SERVER_ENDPOINT_URL to specify it.

July 20, 2020
Kubernetes integration v1.24.0

Notes

Follow standard procedures to install or update the New Relic integration for Kubernetes.

Changelog

Kubernetes integration v1.3.0

Notes

Follow standard procedures to install the New Relic integration for Kubernetes events.

Changelog

July 10, 2020
Kubernetes integration v1.23.1

Notes

Follow standard procedures to install or update the New Relic integration for Kubernetes.

Changelog

  • Fixes a bug that was swapping the values for Node Allocatable Resources with the Node Capacity Resources in the K8sNodeSample.

June 12, 2020
Kubernetes integration v1.23.0

Notes

Follow standard procedures to install or update the New Relic integration for Kubernetes.

Changelog

  • Kubernetes 1.16 is now officially supported!
    • The minimum supported version of kube-state-metrics for this release is 1.9.5, according to the KSM compatibility matrix.
  • Added container throttling metrics to the K8sContainerSample:
    • containerCpuCfsPeriodsDelta: Delta change of elapsed enforcement period intervals.
    • containerCpuCfsThrottledPeriodsDelta: Delta change of throttled period intervals.
    • containerCpuCfsThrottledSecondsDelta: Delta change of duration the container has been throttled.
    • containerCpuCfsPeriodsTotal: Number of elapsed enforcement period intervals.
    • containerCpuCfsThrottledPeriodsTotal: Number of throttled period intervals.
    • containerCpuCfsThrottledSecondsTotal: Total time duration the container has been throttled.
  • Added container mmap byte usage metrics to the K8sContainerSample:
    • containerMemoryMappedFileBytes: Size of memory mapped files in bytes.

June 5, 2020
Kubernetes integration v1.2.0

Notes

Follow standard procedures to install the New Relic integration for Kubernetes events.

Changelog

  • Updated the version of the k8s-events-forwarder sidecar container from 1.11.24 to 1.11.45 of the infrastructure agent.

June 4, 2020
Kubernetes integration v1.22.0

Notes

Follow standard procedures to install or update the New Relic integration for Kubernetes.

Changelog

May 22, 2020
Kubernetes integration v1.21.0

The Kubernetes integration v1.21.0 brings several changes related to node allocatable resources.

Changes to the cluster explorer

We added support for allocatable resources to the Kubernetes cluster explorer:

  • The cluster explorer entity list now calculates CPU usage by summing the allocatableCpuCores from the K8sNodeSample instead of using processorCount from SystemSample. Similarly, memory usage is now calculated by summing allocatableMemoryBytes instead of memoryTotalBytes. Pods' columns now refer to running pods vs. allocatable pods.

  • In addition to resource consumption, the node's tooltip in the cluster explorer now shows the amount of allocatable pods used by the node.

  • The node card, which appears when clicking a node in cluster explorer, now shows resource consumption (CPU, memory, and storage) against the allocatable resources.

    • CPU usage aggregates cpuUsedCores, cpuRequestedCores, and cpuLimitCores from K8sContainerSample, and allocatableCpuCores from the K8sNodeSample.
    • Memory usage aggregates memoryWorkingSetBytes, memoryRequestedBytes, and memoryLimitBytes from K8sContainerSample, and allocatableMemoryBytes from K8sNodeSample.
    • Storage usage relies on fsUsedBytes and fsCapacityBytes fromK8sNodeSample.
  • A new pods widget has been added to the node card that shows the amount of pods used against the total allocatable pods of the node.

If you run the unprivileged version of the Kubernetes integration, you can now see the node metrics. Previously, this was only possible with the privileged version.

Changes to the cluster dashboard

The cluster explorer dashboard, which appears when clicking Kubernetes dashboard, has been updated to account for resource consumption against allocatable resources.

  • CPU widgets displays cpuUsedCores and allocatableCpuCores from K8sNodeSample. As for Memory usage, it now shows memoryWorkingSetBytes and allocatableMemoryBytes.
  • Disk widgets use fsUsedBytes and fsCapacityBytes from K8sNodeSample.
  • A new pods widget has been added that shows the amount of pods used against the total allocatable pods of the cluster.

Changes to Kubernetes metrics

  • Node allocatable resources and capacity are retrieved from the API server and added to the K8sNodeSample as capacity<ResourceName> and allocatable<ResourceName>.
  • The Kubernetes server version is now retrieved from the API server and cached with the APIServerCacheK8SVersionTTL config option. The version is added to K8sClusterSample as clusterK8sVersion, and to the inventory.
  • Add support for static pods status for Kubernetes server versions 1.15 or newer.
  • In older versions of Kubernetes, the kubeletes wouldn’t sync the status of the static pods with the API server and would always return a Pending status. This behavior was fixed in v1.15 of Kubernetes. Our integration now detects what version of Kubernetes the cluster is running and, if it’s 1.15 or newer, it adds the status of the static pods in K8sPodSample.

Other changes

May 15, 2020
Deprecation notice: Kubernetes

Effective Wednesday, 12 August 2020, Kubernetes integration v1.7 or lower will be deprecated. To avoid losing data, upgrade to the latest version. For more information, read this note or contact your account team.

Background

In order to provide the best possible experience for monitoring Kubernetes, we are merging the Kubernetes Cluster Explorer into New Relic, where you’ll enjoy all the latest features.

What is happening?

We will support Kubernetes integrations v1.7 or lower until Wednesday, 12 August 2020.

Starting on July 1st the Kubernetes Cluster Explorer will only be available at one.newrelic.com > All capabilities > Kubernetes Cluster Explorer. The Kubernetes Cluster Explorer will only be compatible with Kubernetes integrations v.1.8 and newer from Wednesday, August 12th.

Therefore in order to enjoy the latest features and to be fully compatible with the New Relic Kubernetes Cluster Explorer, you must upgrade your Kubernetes integration to the latest version.

What do you need to do?

Follow the instructions here to upgrade to the latest version of the Kubernetes integration.

What happens if you don’t make any changes to your account?

The Kubernetes integration will still send data to the New Relic platform, though the Kubernetes Cluster Explorer will not work for Clusters running Kubernetes integration versions v1.7 or older after Wednesday, 12 August. In other words, the integration will still send data, however you will be unable to view that data in the Cluster Explorer.

Copyright © 2024 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.