Kubernetes 1.32 Reaches End of Life: Teams Urged to Upgrade to 1.34 or Later
Kubernetes 1.32 reaches end of life on February 28, 2026, ending all security patches and bug fixes — leaving organizations still running the version exposed to unpatched vulnerabilities and incompatible with newer ecosystem tooling.
Kubernetes 1.32 reached end of life on February 28, 2026, ending all security patches, bug fixes, and official support from the Kubernetes project. Organizations still running the version are now exposed to unpatched vulnerabilities and face growing incompatibility with newer ecosystem tooling.
What End of Life Means
Kubernetes follows a roughly four-month release cycle, with each version supported for approximately 14 months after release. Kubernetes 1.32 was released in December 2024 and has received regular patch updates since then. With end of life, no further CVE patches will be issued — meaning any security vulnerabilities discovered in 1.32 from this point forward will remain unpatched. Additionally, cloud providers typically drop support for end-of-life Kubernetes versions within their managed Kubernetes services within a few months of the upstream EOL date.
Upgrade Path
The recommended upgrade target is Kubernetes 1.34 or later. Kubernetes 1.33 and 1.34 are currently supported, with 1.35 "Timbernetes" as the latest stable release and 1.36 expected in April 2026. Organizations should review the release notes for each intermediate version to identify breaking changes: 1.33 removed several deprecated beta APIs, 1.34 changed default behavior for pod security admission, and 1.35 introduced in-place vertical scaling that may require updates to cluster autoscaler configurations.
Common Upgrade Blockers
The most common reason organizations delay Kubernetes upgrades is dependency on deprecated APIs that are removed in newer versions. Kubernetes 1.32 users who haven't already migrated from the deprecated Ingress API to the Gateway API, or from PodSecurityPolicy to Pod Security Admission, will need to complete those migrations as part of the upgrade process. Tools like Pluto and kubent can scan clusters for deprecated API usage and identify the specific workloads that need to be updated before an upgrade can proceed.
Related Articles
GitHub Expands Developer Platform with Actions Artifacts v5 and Copilot Extensions GA
GitHub has shipped Actions Artifacts v5 with immutable storage and artifact attestation for tamper-proof build outputs, alongside the general availability of Copilot Extensions that let third-party tools integrate directly into the Copilot chat experience. The platform also expanded GitHub Models with seven new providers.
Docker Engine 29.3 Ships with Native gRPC Support and BuildKit v0.28
Docker Engine 29.3.0 introduces native gRPC support on listening sockets, BuildKit v0.28.0, and a new bind-create-src option for flexible volume mounting. The release lowers the minimum API version to v1.40 for broader backward compatibility and fixes DNS configuration corruption during daemon reloads.
GitHub Adds Dependabot Pre-Commit Support and 28 New Secret Scanning Detectors
GitHub has shipped two major supply chain security features: Dependabot now parses .pre-commit-config.yaml files and opens PRs to update hook versions, while secret scanning gains 28 new detectors from 15 providers including Snowflake, Supabase, and Vercel. Push protection is now enabled by default for 39 secret types.