Files
nixpkgs/pkgs/applications/networking/cluster/rke2

RKE2 Version

RKE2, Kubernetes, and other clustered software has the property of not being able to update atomically. Most software in nixpkgs, like for example bash, can be updated as part of a nixos-rebuild switch without having to worry about the old and the new bash interacting in some way. RKE2/Kubernetes, on the other hand, is typically run across several machines, and each machine is updated independently. As such, different versions of the package and NixOS module must maintain compatibility with each other through temporary version skew during updates. The upstream Kubernetes project documents this in their version-skew policy.

Within nixpkgs, we strive to maintain a valid "upgrade path" that does not run afoul of the upstream version skew policy.

Note

Upgrade the server nodes first, one at a time. Once all servers have been upgraded, you may then upgrade agent nodes.

Release Channels

RKE2 has two named release channels, i.e. stable and latest. Additionally, there exists a release channel tied to each Kubernetes minor version, e.g. v1.32.

Nixpkgs follows active minor version release channels (typically 4 at a time) and sets aliases for rke2_stable and rke2_latest accordingly.

Patch releases should be backported to the latest stable release branch; however, new minor versions are not backported.

For further information visit the RKE2 release channels documentation.

EOL Versions

Approximately every 4 months a minor RKE2 version reaches EOL. EOL versions should be removed from nixpkgs-unstable, preferably by throwing with an explanatory message in pkgs/top-level/aliases.nix. With stable releases, however, it isn't expected that packages will be removed. Instead we set meta.knownVulnerabilities for stable EOL packages, like it is also done for EOL JDKs, browser engines, Node.js versions, etc.

For further information on the RKE2 lifecycle, see the SUSE Product Support Lifecycle page.