Back to news
cloud Priority 4/5 4/26/2026, 11:05:46 AM

Kubernetes v1.36 Graduates Fine-Grained Kubelet API Authorization to General Availability

Kubernetes v1.36 Graduates Fine-Grained Kubelet API Authorization to General Availability

Kubernetes v1.36 marks the graduation of fine-grained kubelet API authorization to General Availability. This update addresses a long-standing security gap where the kubelet API served as a single point of broad access for various cluster components. By moving this feature out of the experimental phase, Kubernetes provides a stable mechanism to restrict access to specific kubelet functions and sub-resources. The enhancement introduces sub-resources for kubelet API endpoints such as logs, exec, and port-forward. Previously, authorization was often an all-or-nothing approach, making it difficult to limit what a specific user or service account could do on a node. With this release, administrators can define granular RBAC policies that target only the necessary operational tasks, adhering to the principle of least privilege. Implementation of these controls relies on the KubeletFineGrainedAuthz feature gate, which is now enabled by default. Organizations should review their existing cluster-wide roles to ensure they are not inadvertently granting excessive node-level permissions. Transitioning to these specific sub-resources improves the security posture by reducing the potential blast radius of compromised credentials within the cluster.

#kubernetes#devops#cloud#official

Comparison

AspectBefore / AlternativeAfter / This
Authorization ScopeBroad access to the entire node APIGranular access to specific sub-resources
Least PrivilegeDifficult to restrict specific actions like logsNative support for specific task permissions
RBAC PrecisionCoarse-grained controls with higher riskFine-grained controls reducing blast radius
Feature StatusAlpha or Beta (require manual activation)General Availability (enabled by default)

Action Checklist

  1. Identify existing ClusterRoles that use generic node proxy permissions Look for resources nodes/proxy in your RBAC configurations
  2. Create new RBAC rules targeting specific sub-resources like nodes/logs or nodes/exec This ensures users only have access to the specific tools they need
  3. Verify the KubeletFineGrainedAuthz feature gate is active It is enabled by default in v1.36 but should be confirmed in your control plane
  4. Update automation and monitoring agents to use specific sub-resource permissions Transitioning helps avoid breaking workflows when tightening security
  5. Validate authorization policies in a staging environment Ensure no legitimate services are blocked by the new granular restrictions

Source: Kubernetes Blog

This page summarizes the original source. Check the source for full details.

Related