Skip to content

v4.1 Update 4 - SaaS

30 Apr, 2026

Bug Fixes

The following bug fix is included in the v4.1 Update 4 release:

Bug ID Description
RC-44798 Fixed an issue where override values could not be saved for YAML-type configuration; saving overrides for Helm-type configuration was unaffected.

v4.1 Update 3 - SaaS

Fleet Plan

GKE Support

Fleet Plans now support Google Kubernetes Engine as a cluster type. You can create a Fleet Plan with GKE clusters and perform bulk Day 2 operations such as blueprint updates, node pool changes, and Kubernetes version upgrades across multiple GKE clusters simultaneously. This extends the existing Fleet Plan support for Amazon EKS and Azure AKS clusters.

Benefit

Manage Day 2 operations across large fleets of GKE clusters from a single Fleet Plan, reducing operational overhead and ensuring consistent configuration at scale.

Fleet Plans are Cluster-Type Specific

Fleet Plans are currently scoped to a single cluster type. EKS, AKS, and GKE clusters cannot be combined into the same Fleet Plan — a separate Fleet Plan must be created for each cluster type. Support for cross-cluster-type Fleet Plans (for common operations such as blueprint updates) is planned for a future release.

For more information, see Fleet Plans.

Google GKE

Day 2 Operations

This release expands Day 2 operations support for Google Kubernetes Engine (GKE) clusters. The following cluster configuration options can now be updated post-provisioning:

Configuration Supported Operation
Cloud Logging Enable/disable and update logging components
Cloud Monitoring Enable/disable and update monitoring components
Managed Service for Prometheus Enable/disable
Application Manager Beta Addon Enable/disable
Backup for GKE Addon Enable/disable
GCP Filestore CSI Driver Addon Enable/disable
Image Streaming Enable/disable
disableHttpLoadBalancing true/false (default: false)
disableHorizontalPodAutoscaling true/false (default: false)
enableGcsFuseCsiDriver true/false
Legacy Authorization Enable/disable
Google Groups for RBAC Enable/disable and update security group
Workload Identity Enable/disable

Benefit

Update GKE cluster add-ons, networking, and security settings in-place without reprovisioning, giving platform teams greater flexibility to manage cluster configuration over time.

Azure AKS

Node Auto-Provisioning (NAP) with Proxy Support

AKS clusters configured with Node Auto-Provisioning (NAP) can now be provisioned with a proxy. A previously enforced validation block has been removed — this restriction existed due to an earlier Azure platform limitation that has since been resolved. You can now bring up AKS clusters with both NAP and proxy configured together without any additional workarounds.

Benefit

Unblocks AKS deployments in network-restricted environments that require a proxy, while still leveraging Node Auto-Provisioning for automated node management.

Bug Fixes

The following bug fix is included in the v4.1 Update 3 release:

Bug ID Description
RC-47085 Fixed an issue where GitOps pipelines were not triggered after an out-of-band Kubernetes version upgrade sync on GKE clusters.

v1.1.62 - Terraform Provider

An updated version of the Terraform provider is now available.

The following enhancement is included in this release:

Resource Enhancement
rafay_gke_cluster Added Day 2 operations support for GKE cluster configuration, including cloud logging, cloud monitoring, add-ons, networking, and security settings. See the GKE Day 2 operations for reference.

v4.1 Update 2 - SaaS

13 Apr, 2026

Integrations

Repositories

GitHub App Credentials

Repositories now support GitHub App Credentials (GitHubAPPCredential) as an authentication method. This allows you to authenticate to GitHub using a GitHub App instead of a personal access token or SSH key.GitHub App Credentials are supported across all interfaces — UI, Terraform, API, and CLI (RCTL).

The following fields are required:

Field Description
App ID The GitHub App ID, found on the app's General tab in GitHub.
Installation ID The installation ID, found in the URL after installing the app.
Private Key The private key associated with the GitHub App, in PEM format.

GitHub App Credential

Benefit

Authenticate to GitHub repositories using a GitHub App for improved security and fine-grained access control, without relying on personal access tokens or SSH keys.

For more information, see GitHub App Credential and the Terraform provider documentation.

Bug Fixes

The following bug fixes are included in the v4.1 Update 2 release:

Bug ID Description
RC-48317 Fixed an issue where values.yaml files were not being updated through pipelines for workload templates.
RC-48526 Fixed an issue where Helm override was referencing the existing value file instead of the newly updated one.

v1.1.61 - Terraform Provider

An updated version of the Terraform provider is now available.

The following enhancement is included in this release:

Resource Enhancement
rafay_repositories Added support for the new GitHubAPPCredential credentials type for repository integration. See the GitHub App credentials example for reference.

v4.1 Update 1 - SaaS

Amazon EKS

Kubernetes v1.35

New EKS clusters can now be provisioned based on Kubernetes v1.35. Existing clusters can also be upgraded in-place to Kubernetes v1.35.

EKS Kubernetes v1.35


Azure AKS

BYOCNI with Cilium Support

This release adds support for BYOCNI (Bring Your Own CNI) with Cilium on AKS clusters. To enable this, set networkPlugin to none in the AKS cluster configuration and apply a blueprint that includes the Cilium add-on. Ensure the pod CIDR is consistent between the network configuration and the Cilium add-on values so that the cluster initializes successfully.

Benefit

Ensures consistent Cilium networking across clusters, with the flexibility to customize the configuration through the blueprint workflow.

For more information, see BYOCNI with Cilium.

Bug Fixes

The following bug fixes are included in the v4.1 Update 1 release:

Bug ID Description
RC-47916 MKS: Fix Kubernetes version upgrade from 1.30 to 1.31