Kubernetes v1.36 Graduates Fine-Grained Kubelet API Authorization to General Availability

Kubernetes v1.36 marks the graduation of fine-grained kubelet API authorization to General Availability. This update addresses a long-standing security gap where the kubelet API served as a single point of broad access for various cluster components. By moving this feature out of the experimental phase, Kubernetes provides a stable mechanism to restrict access to specific kubelet functions and sub-resources. The enhancement introduces sub-resources for kubelet API endpoints such as logs, exec, and port-forward. Previously, authorization was often an all-or-nothing approach, making it difficult to limit what a specific user or service account could do on a node. With this release, administrators can define granular RBAC policies that target only the necessary operational tasks, adhering to the principle of least privilege. Implementation of these controls relies on the KubeletFineGrainedAuthz feature gate, which is now enabled by default. Organizations should review their existing cluster-wide roles to ensure they are not inadvertently granting excessive node-level permissions. Transitioning to these specific sub-resources improves the security posture by reducing the potential blast radius of compromised credentials within the cluster.
Comparison
| Aspect | Before / Alternative | After / This |
|---|---|---|
| Authorization Scope | Broad access to the entire node API | Granular access to specific sub-resources |
| Least Privilege | Difficult to restrict specific actions like logs | Native support for specific task permissions |
| RBAC Precision | Coarse-grained controls with higher risk | Fine-grained controls reducing blast radius |
| Feature Status | Alpha or Beta (require manual activation) | General Availability (enabled by default) |
Action Checklist
- Identify existing ClusterRoles that use generic node proxy permissions Look for resources nodes/proxy in your RBAC configurations
- Create new RBAC rules targeting specific sub-resources like nodes/logs or nodes/exec This ensures users only have access to the specific tools they need
- Verify the KubeletFineGrainedAuthz feature gate is active It is enabled by default in v1.36 but should be confirmed in your control plane
- Update automation and monitoring agents to use specific sub-resource permissions Transitioning helps avoid breaking workflows when tightening security
- Validate authorization policies in a staging environment Ensure no legitimate services are blocked by the new granular restrictions
Source: Kubernetes Blog
This page summarizes the original source. Check the source for full details.

