AI & ML

Preview of Kubernetes v1.36 Features and Enhancements

Mar 30, 2026 5 min read views

Kubernetes v1.36, scheduled for release on April 22, 2026, promises to bring substantial enhancements alongside crucial removals and deprecations that highlight the project’s ongoing evolution. One of the standout features is the shift in how certain functions are managed, with a strong emphasis on security and efficiency improvements. This update reflects Kubernetes' methodical approach to development, ensuring that changes align with established deprecation policies while giving users sufficient time to adapt.

The Deprecation Policy: Ensuring Stability Amidst Change

At the heart of Kubernetes' development philosophy is a comprehensive deprecation policy that dictates how features transition from usage to obsolescence. This structured approach stipulates that stable APIs can only be deprecated when a newer, stable counterpart exists, and they must remain functional for at least a year after deprecation. This method not only maintains stability but also communicates clear migration paths for users reliant on deprecated features.

For instance, stable API versions cannot be removed within a major version of Kubernetes, whereas beta versions are supported for three releases post-deprecation. This means there’s a safety net for developers as they adapt to the changing landscape. The meticulousness of this process underscores the Kubernetes community's commitment to a stable end-user experience, even in a dynamic technological landscape.

Key Deprecations and Removals in v1.36

An important change in Kubernetes v1.36 is the deprecation of the .spec.externalIPs field in Service configurations. This field has long been flagged as a security risk, enabling potential man-in-the-middle attacks, as noted in a documented vulnerability (CVE-2020-8554). With the deprecation, users will receive warnings when incorporating this field, with full removal slated for v1.43. Entities relying on externalIPs should pivot to alternatives such as LoadBalancer services for cloud ingress, NodePort for basic exposure, or the more versatile Gateway API for external traffic management.

Similarly, the gitRepo volume driver will be completely removed in v1.36. Having been deprecated since v1.11, this longstanding feature has been a vector for various vulnerabilities. By eliminating it, Kubernetes enhances the overall security posture of its clusters. Users currently dependent on this driver will need to migrate workload configurations to more secure mechanisms like init containers or external git sync tools.

Noteworthy Enhancements in Kubernetes v1.36

Aside from removals, Kubernetes v1.36 is set to usher in several noteworthy enhancements. One of the highlights is the general availability of faster SELinux labeling for volumes. This improvement replaces time-consuming recursive relabeling with a more efficient method at mount time, which is expected to reduce startup delays for Pods on SELinux-enforcing systems. While this change is poised to enhance performance, it introduces a potential for breaking changes in future releases if settings are not handled correctly.

Another significant feature is the introduction of external signing for ServiceAccount tokens, expected to graduate to stable status in v1.36. This allows organizations to integrate external key management systems, enhancing security by reducing dependency on internal key management while enabling a more streamlined authentication process.

The Dynamic Resource Allocation (DRA) functionality is expanding as well, introducing support for both taints and tolerations, as well as partitionable devices. The former allows for fine-tuned scheduling control, ensuring that specialized hardware is only utilized by specific workloads, while the latter optimizes resource use by splitting expensive hardware resources like GPUs across multiple workloads.

Implications and Strategic Moves for Users

These updates signify a deliberate shift in how Kubernetes approaches both security and resource management. The deprecation of previously entrenched functionalities serves as a wake-up call to users: adaptation is not just necessary; it’s a responsibility. Those entrenched in legacy configurations need to act now, identifying and migrating from deprecated fields and drivers to maintain their operational integrity.

The instinct is to see these removals as an inconvenience, but that misses the broader narrative at play. Kubernetes is pushing for a secure ecosystem that requires active participation from users. As the project evolves, the need for user engagement in adapting to these changes will only grow, highlighting the dynamic nature of managing Kubernetes environments.

Engagement and Community Involvement

The Kubernetes community remains active in facilitating user adaptation to these changes. One way to stay informed is by monitoring the updates in the CHANGELOG for v1.36, which will comprehensively document all enhancements, deprecations, and removals. Engaging with the community through Special Interest Groups (SIGs) can also provide valuable insights and support.

For industry professionals working in Kubernetes infrastructure, the upcoming release signals a turning point. Understanding and anticipating these shifts is crucial for leveraging Kubernetes’ capabilities while maintaining security and operational efficiency. The next version embodies not just new features, but a redefining of what it means to be a Kubernetes user: proactive, informed, and engaged.