- To get the logs from a pod running on a master node:
+ To get the logs from a pod running on a control plane node:
- 1. Get the nodes that are labelled as master:
+ 1. Get the nodes that are labelled as control plane:
```shell
- kubectl get nodes -l node-role.kubernetes.io/master=""
- ```
-
- Or,
-
- ```shell
- kubectl get nodes -l kubernetes.io/role="master"
+ kubectl get nodes -l node-role.kubernetes.io/control-plane=""
```
Look for output similar to this:
```shell
- NAME STATUS ROLES AGE VERSION
- ip-10-42-24-4.ec2.internal Ready master 42d v1.14.8
+ NAME STATUS ROLES AGE VERSION
+ ip-10-42-24-4.ec2.internal Ready control-plane 42d v1.14.8
```
2. Get the New Relic pods that are running on one of the nodes returned in the previous step:
diff --git a/src/content/docs/kubernetes-pixie/kubernetes-integration/advanced-configuration/link-apm-applications-kubernetes.mdx b/src/content/docs/kubernetes-pixie/kubernetes-integration/advanced-configuration/link-apm-applications-kubernetes.mdx
index 37f2d9d0f8e..3721579b277 100644
--- a/src/content/docs/kubernetes-pixie/kubernetes-integration/advanced-configuration/link-apm-applications-kubernetes.mdx
+++ b/src/content/docs/kubernetes-pixie/kubernetes-integration/advanced-configuration/link-apm-applications-kubernetes.mdx
@@ -52,7 +52,7 @@ If you see a different result, follow the Kubernetes documentation to [enable ad
### Network requirements [#network-req]
-For Kubernetes to talk to our `MutatingAdmissionWebhook`, the master node (or API server container, depending on how the cluster is set up) should allow egress for HTTPS traffic on port 443 to pods in all other nodes in the cluster.
+For Kubernetes to talk to our `MutatingAdmissionWebhook`, the control plane node (or API server container, depending on how the cluster is set up) should allow egress for HTTPS traffic on port 443 to pods in all other nodes in the cluster.
This may require specific configuration depending on how your infrastructure is set up (on-premises, AWS, Google Cloud, etc.).
diff --git a/src/content/docs/kubernetes-pixie/kubernetes-integration/get-started/kubernetes-integration-compatibility-requirements.mdx b/src/content/docs/kubernetes-pixie/kubernetes-integration/get-started/kubernetes-integration-compatibility-requirements.mdx
index 5483bf48aa4..e3f66485f49 100644
--- a/src/content/docs/kubernetes-pixie/kubernetes-integration/get-started/kubernetes-integration-compatibility-requirements.mdx
+++ b/src/content/docs/kubernetes-pixie/kubernetes-integration/get-started/kubernetes-integration-compatibility-requirements.mdx
@@ -71,7 +71,7 @@ Our integration is compatible and is continuously tested on the following Kubern
- 1.26 to 1.30
+ 1.27 to 1.31
|
diff --git a/src/content/docs/kubernetes-pixie/kubernetes-integration/installation/k8s-otel.mdx b/src/content/docs/kubernetes-pixie/kubernetes-integration/installation/k8s-otel.mdx
index 05a4eebd7b3..86ffdb051b1 100644
--- a/src/content/docs/kubernetes-pixie/kubernetes-integration/installation/k8s-otel.mdx
+++ b/src/content/docs/kubernetes-pixie/kubernetes-integration/installation/k8s-otel.mdx
@@ -25,7 +25,7 @@ The [`nr-k8s-otel-collector`](https://github.com/newrelic/helm-charts/tree/maste
* **Deamonset Collector**: Deployed on each worker node and responsible for gathering metrics from the underlying host in the node, the `cAdvisor`, the `Kubelet`, and collecting logs from the containers.
-* **Deployment collector**: Deployed on the master node and responsible for gathering metrics of Kube state metrics and Kubernetes cluster events.
+* **Deployment collector**: Deployed on the control plane node and responsible for gathering metrics of Kube state metrics and Kubernetes cluster events.
-l app.kubernetes.io/component=controlplane -o wide
diff --git a/src/content/docs/release-notes/infrastructure-release-notes/kubernetes-integration-release-notes/deprecation-notice-v1.26-and-lower.mdx b/src/content/docs/release-notes/infrastructure-release-notes/kubernetes-integration-release-notes/deprecation-notice-v1.26-and-lower.mdx
new file mode 100644
index 00000000000..08d254677ed
--- /dev/null
+++ b/src/content/docs/release-notes/infrastructure-release-notes/kubernetes-integration-release-notes/deprecation-notice-v1.26-and-lower.mdx
@@ -0,0 +1,25 @@
+---
+title: 'Deprecation notice: Kubernetes'
+subject: Kubernetes integration
+releaseDate: '2024-10-29'
+---
+
+Effective Tuesday, October 29, 2024, our Kubernetes integration drops support for Kubernetes v1.26 and lower. The Kubernetes integration v3.30.0 and higher will only be compatible with Kubernetes versions 1.27 and higher. For more information, read this note or contact your account team.
+
+## Background [#bg]
+
+Enabling compatibility with the latest Kubernetes versions and adding new features to our Kubernetes offering prevents us from offering first-class support to versions v1.26 and lower.
+
+## What's happening [#whats-happening]
+
+* Most major Kubernetes cloud providers have already deprecated v1.26 and lower.
+
+## What do you need to do [#what-to-do]
+
+It's easy: [Upgrade your Kubernetes clusters](/docs/integrations/kubernetes-integration/installation/kubernetes-installation-configuration#update) to a supported version.
+
+## What happens if you don't make any changes to your account [#account]
+
+The Kubernetes integration may continue to work with unsupported versions. However, we can't guarantee the quality of the solution as new releases may cause some incompatibilities.
+
+Please note that we won't accept support requests for these versions that have reached the end of life stage.