This SDK update includes a breaking change that reverts Kubernetes Engine cluster creation to Routes mode by default, now requiring the --enable-ip-alias flag for VPC-Native mode. Key new features enhance Cloud Bigtable with complex GC policies, Cloud Dataflow with KMS key support, and Cloud Pub/Sub with authenticated push subscriptions. Additionally, the gcloud iap command group is now in beta, and a new gcloud active-directory command group has been introduced.

Jump to: Annotated Release Notes | Stats 📊

Breaking Changes

  • Reverted Kubernetes Engine cluster creation default behavior such that new clusters now come up in Routes mode. VPC-Native mode now requires the --enable-ip-alias flag.

New Features by Service

Cloud Bigtable

  • Added support for specifying complex garbage collection policies using cbt setgcpolicy, such as maxage=30d || (maxage=3d && maxversions=100).

Cloud Dataflow

  • Added the --dataflow-kms-key flag to gcloud beta dataflow jobs run for specifying a customer-managed encryption key.
    • Flags: --dataflow-kms-key

Cloud Pub/Sub

  • Added optional flags --push-auth-service-account and --push-auth-token-audience for defining an authenticated push subscription in gcloud pubsub subscriptions create | update | modify-push-config.
    • Flags: --push-auth-service-account, --push-auth-token-audience

Managed Active Directory

  • Introduced the gcloud active-directory command group, enabling the provisioning and administering of managed Microsoft Active Directory domains.

Credential & Auth Changes

  • Fixed a bug in bq update --transfer_config --update_credentials related to updating transfer credentials.

API Changes

Cloud Identity-Aware Proxy

  • Promoted the gcloud iap command group to beta status.

Stats

  • Files changed: 119
  • Inserted lines: +10,258
  • Deleted lines: -4,163

Generated by Gemini - View full diff

Google, Google Cloud, and gcloud are trademarks of Google LLC. This analysis was automatically generated by an AI agent examining only public release artifacts, without access to internal or non-public information from Google Cloud.