To provide finer control over node lifecycle management, Container Service for Kubernetes (ACK) is updating the behavior of auto-upgrade, auto-repair, and auto-vulnerability-fixing features in managed node pools. Default settings for certain automated features will change from enabled to disabled, and legacy parameters will be replaced with new, more granular configuration options.
Change 1: Auto upgrade configuration of kubelet and container runtimes
Change details
New default value: Starting August 31, 2025, for new node pools with
management.enable=true, the default value ofmanagement.auto_upgrade(which controls automatic upgrades of kubelet and container runtimes) will change fromtruetofalse.Parameter removal: Starting January 31, 2026, the following parameters will be fully deprecated and removed from the relevant API operations:
management.auto_upgrademanagement.auto_upgrade_policy
Affected APIs:
Alternative solution
Configure the cluster auto upgrade feature to automatically upgrade managed node pools. This provides centralized lifecycle management with greater control.
Change 2: Decoupling of node auto repair and vulnerability fixing
Change details
Parameter deprecation:
The master control parameter
management.enablewill be deprecated starting August 5, 2025, and fully removed on January 31, 2026.Replacement parameters: Two independent parameters will replace the monolithic
management.enable:management.auto_repair: Enables or disables automatic node repair.management.auto_vul_fix: Enables or disables automatic vulnerability fixing.
New default values:
Starting August 31, 2025, the default values of
management.auto_vul_fixandmanagement.auto_repairwill change tofalsein the following API operations:Parameter
Previous default behavior
New default value
management.auto_vul_fixDefaults to the value of
management.enable.falsemanagement.auto_repairDefaults to the value of
management.enable.falseThis change allows you to independently configure auto repair and auto vulnerability fixing based on your operational needs.
Change 3: Update to auto-vulnerability fixing behavior
Change details
Parameter deprecation:
The parameter
management.auto_vul_fix_policy.restart_nodewill be deprecated starting August 5, 2025, and fully removed on January 31, 2026.New parameter:
A new parameter,
management.auto_vul_fix_policy.exclude_packages, will be introduced starting August 5, 2025. This allows you to specify a list of software packages to exclude from automatic vulnerability fixes.New default behavior: By default, the kernel package will be excluded from auto-vulnerability fixes. This is because fixing kernel CVEs typically requires a kernel version upgrade, which carries a higher risk of compatibility issues or system instability. Purpose: This default setting helps prevent unexpected disruptions during patching.