The Kubernetes ship wheel logo for a guide on the current Kubernetes version.

The Current Kubernetes Version: A 2026 Guide

Get the facts on the current Kubernetes version, support policy, upgrade best practices, and how to keep your clusters secure and compliant.

Michael Guarino
Michael Guarino

Deferring Kubernetes upgrades may reduce short-term disruption, but it introduces compounding technical debt. Each skipped release increases drift from upstream, aggregates deprecated or removed APIs, and expands the delta your team must reconcile later. What begins as a minor delay can escalate into a multi-version upgrade requiring extensive validation, refactoring, and rollback planning.

The operational risk scales non-linearly. Larger version jumps increase the likelihood of incompatible API removals, controller behavior changes, and dependency breakages across your workloads and tooling. This translates to longer maintenance windows, higher failure probability, and greater blast radius during upgrades.

Maintaining proximity to supported Kubernetes versions minimizes this risk. A consistent upgrade cadence keeps API surfaces current, reduces migration overhead, and ensures alignment with upstream security patches and ecosystem compatibility. This guide outlines how to operationalize that cadence with repeatable, low-risk processes, helping teams avoid costly upgrade bottlenecks while maintaining production stability with Plural.

Unified Cloud Orchestration for Kubernetes

Manage Kubernetes at scale through a single, enterprise-ready platform.

GitOps Deployment
Secure Dashboards
Infrastructure-as-Code
Book a demo

Key takeaways:

  • Maintain supported versions: Always operate within the official N-2 support window, which covers the three most recent minor versions, to receive critical security patches and ensure compatibility with the broader ecosystem.
  • Plan upgrades methodically: Treat upgrades as a predictable process by reviewing release notes for API deprecations, validating all changes in a staging environment, and creating reliable backups before touching production.
  • Use GitOps for repeatable upgrades: Manage cluster configurations in Git to make the upgrade process auditable, consistent, and easily reversible, turning a complex manual task into a standardized workflow for one or many clusters.

What’s the Latest Kubernetes Version?

The current stable release of Kubernetes is v1.35.2. The project supports the three most recent minor versions, which currently include 1.35, 1.34, and 1.33. Operating within this support window is essential for maintaining access to security patches, bug fixes, and ecosystem compatibility. Falling outside it increases exposure to unpatched vulnerabilities and API deprecations.

At scale, enforcing version consistency across clusters is non-trivial. You need automated upgrade pipelines, environment parity (dev → staging → prod), and policy enforcement to prevent drift. Plural helps standardize this by orchestrating upgrades and ensuring clusters remain within the supported version window. For authoritative release data, refer to the official Kubernetes releases page, which includes changelogs, deprecation notices, and upgrade guidance.

Versioning Model (Using v1.32 as Reference)

Kubernetes uses semantic versioning (x.y.z):

  • Major (x): Introduces breaking or architectural changes (rare in Kubernetes, still at 1.x).
  • Minor (y): Adds features, may deprecate APIs, and can introduce behavioral changes.
  • Patch (z): Backward-compatible fixes for bugs and security issues.

For example, in v1.32:

  • 1 → major version
  • 32 → feature release with potential deprecations
  • z → patch-level fixes within 1.32

This structure allows teams to quickly assess upgrade impact. Most operational risk is concentrated in minor version upgrades due to API lifecycle changes.

Release Cadence and Support Lifecycle

Kubernetes follows a predictable release cycle of ~4 months per minor version. Each minor version is maintained for ~12 months with patch releases. This creates a rolling support window of three active minor versions.

Implications for operators:

  • You effectively need to upgrade at least 2–3 times per year to stay supported.
  • Skipping multiple releases compounds upgrade complexity due to accumulated API removals.
  • Regular upgrades reduce test surface area and failure modes.

The next expected release is 1.36, continuing this cadence. The release schedule is managed by the Kubernetes SIG Release team and published in advance, enabling teams to align internal upgrade timelines.

A disciplined upgrade strategy (ideally automated and policy-driven with platforms like Plural) ensures clusters remain secure, compliant, and operationally predictable without large disruptive version jumps.

What’s New in the Latest Kubernetes Release?

Recent releases of Kubernetes emphasize three themes: dynamic resource management, stronger default security, and better support for high-performance workloads (especially GPU-bound AI/ML). These are not cosmetic updates; they change operational patterns. Platform teams can now reduce restart-driven workflows, enforce stricter identity validation, and schedule specialized workloads more deterministically.

At the same time, API evolution continues aggressively. Deprecated APIs are pruned on a predictable timeline, which directly impacts upgrade safety. Treat every release as both a feature unlock and a migration checkpoint. Plural helps operationalize this by standardizing rollouts, enforcing policy, and surfacing incompatibilities early in the delivery pipeline.

Stable Feature: In-Place Pod Resizing

In-place pod resizing eliminates the need to recreate pods when adjusting CPU or memory requests/limits. Previously, any resource mutation required a restart, introducing disruption, especially problematic for stateful or long-running workloads.

Now:

  • Resource requests and limits are mutable on running pods.
  • Many updates avoid container restarts entirely (depending on runtime support).
  • Autoscaling and manual tuning become significantly more responsive.

Operational impact:

  • Reduced churn in schedulers and controllers.
  • Better bin-packing and cluster utilization.
  • Lower disruption for latency-sensitive services.

This shifts resource tuning from a redeploy-driven workflow to a live adjustment model, which is especially valuable in bursty or unpredictable environments.

Stronger Security Controls and Validation

Recent releases tighten node-level authentication by validating certificate identity more strictly (e.g., ensuring certificate CN alignment with node identity). This reduces the attack surface for impersonation and misconfigured node credentials.

Key implications:

  • Misconfigured certificates will fail fast instead of being implicitly trusted.
  • Cluster bootstrap and node rotation workflows must be compliant with stricter validation.
  • Security posture improves without requiring additional third-party tooling.

At scale, enforcing these guarantees consistently is non-trivial. Plural centralizes policy enforcement (RBAC, admission controls, identity constraints), ensuring uniform security posture across clusters without manual drift.

AI-Optimized Scheduling

Kubernetes continues to evolve its scheduler for heterogeneous workloads, particularly GPU-intensive AI/ML jobs.

Enhancements include:

  • Improved resource-aware scheduling for GPUs and specialized hardware.
  • Better handling of node affinity, taints, and topology constraints.
  • Reduced scheduling latency for high-demand, resource-constrained workloads.

For platform teams:

  • More predictable placement of ML pipelines and training jobs.
  • Higher utilization of expensive GPU nodes.
  • Less need for custom schedulers or heavy tuning.

Plural complements this by simplifying deployment of data/ML tooling (e.g., orchestrators, pipelines) while aligning with native scheduling improvements.

API Deprecations and Removals

API lifecycle management remains one of the highest-risk aspects of upgrades. Each release:

  • Deprecates older API versions (with warnings).
  • Removes previously deprecated APIs (breaking change).

Failure mode:

  • Deprecated APIs → warnings (safe but time-limited).
  • Removed APIs → hard failures at deploy time.

Mitigation strategy:

  • Continuously scan manifests for deprecated usage.
  • Validate against target Kubernetes versions pre-upgrade.
  • Enforce GitOps workflows to catch issues during CI, not in production.

Plural’s GitOps-centric model helps shift this left—invalid API usage is detected during pull requests, preventing broken deployments from ever reaching the cluster.

Overall, treating releases as iterative migrations—not one-off upgrades—is the only scalable approach.

How Kubernetes Versioning and Releases Work

To operate Kubernetes reliably, you need to internalize its versioning model and release cadence. These two mechanisms define upgrade frequency, API lifecycle expectations, and support boundaries. Ignoring them leads directly to version drift, unsupported clusters, and brittle upgrade paths.

Kubernetes is intentionally predictable. That predictability is what enables platform teams to build repeatable upgrade pipelines instead of reactive, high-risk migrations. Plural builds on this by standardizing upgrade orchestration and enforcing version compliance across clusters.

Decoding Semantic Versioning

Kubernetes follows semantic versioning (x.y.z), which encodes the scope and risk profile of a release:

  • Major (x): Breaking or architectural changes. Kubernetes has remained at v1, so this is largely theoretical today.
  • Minor (y): Feature releases. This is where most operational impact occurs—new APIs, deprecations, and behavior changes.
  • Patch (z): Backward-compatible fixes for bugs and security issues.

In practice:

  • Minor upgrades = highest planning overhead (API changes, feature gates, deprecations).
  • Patch upgrades = low risk, should be automated and applied quickly.

This structure allows teams to triage upgrades:

  • Patch → fast-track rollout
  • Minor → staged rollout with validation
  • Major → (rare) deep migration planning

The Four-Month Release Cycle

Kubernetes ships a new minor version roughly every 3–4 months, with each version receiving patch support for ~12 months. This creates a rolling support window of three active minor versions.

Operational implications:

  • You need a continuous upgrade pipeline, not periodic large jumps.
  • Realistically, teams should plan 2–3 minor upgrades per year.
  • Skipping releases compounds:
    • API removals
    • behavioral drift
    • test surface area

A typical sustainable pattern:

  1. Track upstream release announcements.
  2. Validate in staging as soon as a release stabilizes.
  3. Promote incrementally to production.
  4. Keep all clusters within the supported window.

Plural helps enforce this cadence by integrating upgrades into your delivery workflows, reducing manual coordination and preventing clusters from falling out of support.

The key takeaway: Kubernetes releases are frequent by design. Stability comes not from avoiding upgrades, but from making them routine, incremental, and automated.

What Is the Kubernetes Support Policy?

The Kubernetes project enforces a rolling support window for the three most recent minor versions—commonly referred to as the N-2 policy. If the current release is 1.N, then 1.(N-1) and 1.(N-2) are also supported.

This policy is designed to balance rapid innovation with operational stability:

  • Limits version fragmentation across the ecosystem
  • Ensures consistent access to security patches and bug fixes
  • Forces a predictable upgrade discipline for platform teams

For operators, this is not optional. Running outside the supported window means:

  • No upstream security patches
  • Increased exposure to known vulnerabilities
  • Potential incompatibility with tooling, cloud providers, and APIs

Plural helps enforce adherence by continuously tracking cluster versions and aligning them with supported release windows across environments.

The One-Year Support Window

Each Kubernetes minor version is supported for approximately 12 months. During this period, it receives patch releases (z updates) that include:

  • Security fixes
  • Critical bug resolutions
  • Minor stability improvements

Key implications:

  • You have a fixed upgrade horizon (~1 year) per version
  • Patch updates should be automated and applied continuously
  • Minor upgrades should be planned, staged, and validated

This predictable lifecycle enables teams to convert upgrades into a routine process rather than a reactive emergency. With Plural, this cadence can be embedded into your deployment workflows, ensuring upgrades are incremental and low-risk.

What Happens at End-of-Life (EOL)?

A version reaches End-of-Life (EOL) once it falls outside the three supported minor versions. At that point:

  • No further patches (security or bug fixes) are released
  • CVEs affecting that version remain unaddressed
  • Upstream support effectively ends

Operational consequences:

  • Security risk: unpatched vulnerabilities accumulate
  • Ecosystem drift: tools and providers may drop compatibility
  • Compliance issues: many standards require supported software
  • Upgrade difficulty: larger version gaps increase migration complexity

Critically, upgrading from an EOL version often requires multi-version jumps, amplifying:

  • API removals
  • behavioral changes
  • validation scope

Best practice is to treat EOL as a hard deadline, not a soft target.

A sustainable approach:

  • Track release timelines continuously
  • Upgrade before entering the last supported window
  • Avoid skipping minor versions whenever possible

Plural operationalizes this by providing visibility into version lifecycles and enforcing upgrade policies, ensuring clusters never drift into unsupported states.

The Risks of Running Outdated Kubernetes Versions

Running outdated versions of Kubernetes is not a neutral decision—it introduces compounding operational, security, and compliance risks. As clusters drift away from the supported release window, you accumulate technical debt across APIs, dependencies, and infrastructure assumptions. In a multi-cluster fleet, this drift creates version skew, inconsistent behavior, and fragmented operational practices.

The net effect: upgrades become harder, failures become less predictable, and incident response becomes slower.

Plural mitigates this by enforcing version consistency and embedding upgrades into standard delivery workflows, reducing drift across environments.

Exposing Security Vulnerabilities

Unsupported (EOL) Kubernetes versions do not receive security patches. Any newly disclosed vulnerability affecting your version remains unpatched indefinitely.

Implications:

  • Known CVEs become exploitable attack vectors
  • No upstream remediation path
  • Increased blast radius in multi-tenant clusters

In practice, this shifts your security posture from proactive to reactive. Attackers often target known, unpatched vulnerabilities in outdated clusters because exploitation paths are well-documented.

Staying within the supported version window ensures continuous access to:

  • Security patches
  • vulnerability disclosures
  • hardened defaults

Facing Breaking API Changes

Kubernetes aggressively evolves its API surface. Each release:

  • Deprecates older APIs (grace period with warnings)
  • Removes previously deprecated APIs (hard break)

Failure mode:

  • Deprecated API → warning during apply
  • Removed API → deployment failure

If you delay upgrades:

  • Deprecated APIs accumulate across versions
  • Refactoring scope grows non-linearly
  • Upgrade becomes a high-risk migration event

This often results in:

  • Emergency YAML rewrites
  • failed rollouts
  • unexpected downtime

A better approach is continuous API hygiene:

  • Validate manifests against target versions
  • eliminate deprecated APIs incrementally
  • enforce checks in CI/CD

Plural’s GitOps model surfaces these issues during pull requests, preventing invalid configurations from reaching production.

Losing Vendor Support and Failing Compliance

Running unsupported Kubernetes versions creates ecosystem-level risks:

  • Managed services like Amazon Web Services (EKS), Google Cloud (GKE), and Microsoft Azure (AKS) enforce their own support windows
  • Third-party tools (operators, CNIs, observability stacks) drop compatibility with older versions

During incidents:

  • Vendor support may be limited or unavailable
  • Debugging becomes harder due to version-specific edge cases

Compliance impact:

  • Frameworks like SOC 2, PCI DSS, and ISO standards require supported, patched software
  • Running EOL versions can trigger audit failures

Operational takeaway:

  • Treat version support as a hard constraint, not a guideline
  • Align upgrade cadence with both upstream Kubernetes and vendor-specific lifecycles

Plural helps enforce these constraints by providing visibility into version status and automating upgrades, ensuring clusters remain compliant and supportable.

Common Kubernetes Upgrade Challenges

Upgrading Kubernetes is operationally necessary but non-trivial. The risk surface spans API compatibility, control plane sequencing, ecosystem dependencies, and runtime stability. Without a disciplined process, upgrades degrade into high-effort, failure-prone events—especially across multi-cluster fleets.

A sustainable approach requires automation, policy enforcement, and staged validation. Plural addresses this by standardizing upgrade workflows and reducing per-cluster operational variance.

Handling API Deprecations

API deprecations are the most common upgrade blocker. Kubernetes enforces a strict lifecycle:

  • APIs are deprecated (warnings)
  • then removed (hard failure)

Failure mode:

  • Manifests referencing removed APIs fail at deploy time
  • Helm charts and CRDs may break silently until applied

Challenges at scale:

  • Hundreds of YAML manifests across services
  • Third-party charts embedding deprecated APIs
  • Inconsistent API versions across environments

Mitigation:

  • Continuously scan manifests against target versions
  • Eliminate deprecated APIs incrementally (not during upgrade windows)
  • Enforce validation in CI/CD pipelines

Plural integrates these checks into GitOps workflows, surfacing incompatibilities before they reach the cluster.

Kubernetes upgrades are sequential by design. You typically must:

  • Upgrade one minor version at a time
  • Maintain version skew constraints (API server, controller manager, kubelet)

Risks include:

  • etcd schema or data migration issues
  • Control plane/node version incompatibility
  • Add-on breakage (CNI, CSI, DNS)

For clusters multiple versions behind:

  • Upgrade steps multiply
  • Rollback complexity increases
  • Maintenance windows expand

Best practice:

  • Keep clusters within the N-2 support window
  • Automate upgrade pipelines
  • Standardize cluster configurations to reduce variance

Plural reduces this burden by orchestrating upgrades consistently across fleets, avoiding ad hoc per-cluster procedures.

Meeting Testing and Validation Demands

Upgrades require full-stack validation, not just control plane success.

You must verify:

  • Application behavior (latency, errors, scaling)
  • Cluster add-ons (Ingress, service mesh, observability agents)
  • Infrastructure integrations (storage, networking, IAM)

Challenges:

  • Staging environments often diverge from production
  • Third-party dependencies introduce hidden incompatibilities
  • Validation cycles become slow and coordination-heavy

Mitigation:

  • Maintain production-like staging environments
  • Use canary clusters or phased rollouts
  • Automate conformance and regression testing

Plural supports this by enabling consistent environment replication and progressive rollout strategies.

Managing Downtime and Team Knowledge

While Kubernetes supports rolling updates, zero-downtime upgrades are not automatic. Misconfigurations or overlooked dependencies can still cause disruptions.

Risk factors:

  • Improper pod disruption budgets
  • Stateful workloads with strict availability constraints
  • Control plane upgrade sequencing errors

Additionally, every release introduces:

  • New behaviors
  • deprecated features
  • updated operational patterns

Without proper knowledge transfer:

  • Debugging becomes slower
  • MTTR increases
  • On-call burden rises

Best practices:

  • Document upgrade runbooks
  • Train teams on version-specific changes
  • Use progressive delivery (blue/green, canary clusters)

Plural centralizes operational knowledge and standardizes upgrade execution, reducing reliance on tribal knowledge and improving reliability across teams.

How to Manage Kubernetes Upgrades Effectively

Upgrading Kubernetes becomes tractable when treated as a continuous, policy-driven process rather than an ad hoc project. The core pattern is consistent: plan against upstream changes, validate in production-like environments, and execute via automation with built-in rollback.

At scale, the goal is not just successful upgrades—it’s predictable, low-variance upgrades across clusters. Plural enables this by standardizing workflows, enforcing policy, and embedding upgrades into your delivery pipeline.

Plan and Check Compatibility Before You Start

Every upgrade should begin with release diff analysis:

  • Review release notes for:
    • Deprecated and removed APIs
    • Feature gate changes
    • Behavioral changes in controllers and schedulers
  • Identify impact surface:
    • Application manifests (YAML)
    • Helm charts and dependencies
    • CRDs and operators
  • Use tooling (e.g., API scanners) to detect deprecated usage pre-upgrade.

Failure to do this results in:

  • Hard deployment failures (removed APIs)
  • Silent behavioral drift (changed defaults)

Best practice:

  • Continuously track deprecations, not just during upgrade windows
  • Maintain version-aware validation in CI

Plural surfaces these issues early by integrating compatibility checks into GitOps workflows.

Test in Staging and Create Backups

Validation must occur in an environment that faithfully mirrors production:

Test scope:

  • Application lifecycle (deploy → scale → failover)
  • Cluster add-ons (Ingress, DNS, observability, service mesh)
  • Infrastructure integrations (storage, networking, IAM)

Common pitfalls:

  • Staging environments diverging from production
  • Untested third-party dependencies
  • Performance regressions under load

Backup strategy is mandatory:

  • Snapshot etcd (for self-managed clusters)
  • Verify restore procedures—not just backup existence

This ensures:

  • A deterministic rollback path
  • Reduced recovery time in failure scenarios

Plural supports environment consistency and staged rollouts, reducing the risk of production-only failures.

Implement GitOps for Smooth Rollbacks

A GitOps model converts upgrades into declarative, version-controlled changes:

  • Cluster state is defined in Git
  • Upgrades are pull requests (e.g., version bumps)
  • Changes are automatically reconciled to clusters

Benefits:

  • Full audit trail of changes
  • Deterministic deployments
  • Instant rollback via commit revert

Failure recovery becomes trivial:

  • Revert commit → system reconciles back to last known good state

Without GitOps:

  • Rollbacks are manual and error-prone
  • State drift accumulates across clusters

Plural’s deployment engine operationalizes this:

  • Detects and applies version changes automatically
  • Enforces consistency across fleets
  • Reduces upgrade execution to a repeatable pipeline step

How to Manage Versions Across a Kubernetes Fleet

Managing versions for a single Kubernetes cluster is challenging enough. When you scale to a fleet of dozens or hundreds of clusters, the complexity multiplies. Manual updates become impossible, and inconsistencies can introduce security risks and operational failures. A successful fleet management strategy relies on consistency, automation, and centralized visibility.

Solving for Fleet-Wide Consistency

A Kubernetes cluster has many moving parts, from the scheduler and controllers to the agents on each node. Ensuring these components are at the correct version across every cluster is critical for stable operations. Inconsistent versions can lead to unpredictable application behavior and security vulnerabilities. The most effective way to enforce consistency is through a GitOps-based approach. By defining your entire cluster configuration, including component versions, in a central Git repository, you create a single source of truth. Plural CD uses an agent-based model to automatically sync these configurations to every cluster in your fleet, ensuring uniform versions and policies everywhere.

Automating Upgrade Workflows

Upgrading a Kubernetes cluster is a delicate process that involves careful planning and execution, especially when dealing with deprecated APIs. For a large fleet, manual upgrades are not a scalable solution. Automation is essential for creating a repeatable and reliable upgrade process. This involves scripting pre-flight checks, managing rolling updates to minimize downtime, and validating cluster health post-upgrade. Plural’s API-driven Infrastructure-as-Code management, called Stacks, allows you to automate the underlying infrastructure changes required for an upgrade using tools like Terraform. This turns a complex, manual task into a standardized, automated workflow you can apply across your entire fleet.

Centralize Monitoring with Plural

After an upgrade, you need immediate visibility into the health and performance of your clusters to catch any issues. Juggling different monitoring tools for each cluster is inefficient and makes it difficult to get a clear picture of your fleet's overall status. Centralized monitoring provides a single pane of glass for observability. Plural’s built-in multi-cluster dashboard gives you real-time visibility into resource conditions and cluster state across your entire environment. This allows your team to quickly identify and troubleshoot post-upgrade anomalies from one unified interface, without managing complex networking or multiple observability platforms.

Unified Cloud Orchestration for Kubernetes

Manage Kubernetes at scale through a single, enterprise-ready platform.

GitOps Deployment
Secure Dashboards
Infrastructure-as-Code
Book a demo

Frequently Asked Questions

How often should we be upgrading our Kubernetes clusters? A good practice is to upgrade at least once per release cycle, which is roughly every four months. This schedule keeps your clusters within the official support window of the three most recent minor versions. Sticking to this cadence ensures you receive critical security patches and avoid the technical debt that accumulates from falling multiple versions behind. Treating upgrades as a routine, planned event rather than an emergency response to an end-of-life notice is key to maintaining a stable and secure environment.

What's the most common reason a Kubernetes upgrade fails? The most frequent cause of failure is outdated API versions in workload manifests. As Kubernetes evolves, it deprecates and eventually removes older APIs. If your deployments, Helm charts, or other configurations reference an API that has been removed in the target version, they will fail to apply after the upgrade. This is why thoroughly checking release notes and scanning your manifests for deprecated APIs is a critical pre-flight check before starting any upgrade.

Can we skip minor versions when upgrading our clusters? It is strongly recommended to upgrade one minor version at a time. For example, you should upgrade from 1.33 to 1.34 before moving to 1.35. Skipping versions can cause compatibility issues between control plane components and complicate data migration for etcd. Following a sequential upgrade path ensures a more stable and predictable process, minimizing the risk of unexpected failures that are difficult to troubleshoot.

How can we check for breaking API changes before an upgrade? The best starting point is the official Kubernetes release notes, which detail all API deprecations and removals for a given version. For a more automated approach, you can use open-source tools like pluto to scan your infrastructure-as-code repositories and identify any manifests that use deprecated APIs. Integrating this check into your CI/CD pipeline or a GitOps workflow, like the one Plural provides, helps catch these issues early in the development cycle, long before they can impact a production upgrade.

How does Plural help manage upgrades across many clusters? Plural simplifies fleet-wide upgrades by enforcing consistency and automation through a GitOps-based workflow. You can define your desired Kubernetes versions in a central Git repository, and Plural’s continuous deployment engine ensures every cluster in your fleet is synced to that state. For the underlying infrastructure changes, Plural Stacks can automate Terraform runs to provision and update nodes. Finally, the built-in multi-cluster dashboard provides a single view to monitor the health of all your clusters during and after the upgrade, making it easier to spot and resolve any issues.

Guides