The following release notes cover the most recent changes over the last 60 days. For a comprehensive list of product-specific release notes, see the individual product release note pages.
You can also see and filter all release notes in the Google Cloud console or you can programmatically access release notes in BigQuery.
To get the latest product updates delivered to you, add the URL of this page to your feed reader, or add the feed URL directly.
September 02, 2025
BigQueryYou can now create a remote model based on an open embedding model from Vertex Model Garden or Hugging Face that is deployed to Vertex AI. Options include E5 Embedding and other leading open embedding generation models. You can then use the ML.GENERATE_EMBEDDING
function with this remote model to generate embeddings.
Try this feature with the Generate text embeddings by using an open model and the ML.GENERATE_EMBEDDING
function tutorial.
This feature is in Preview.
You can now create a remote model based on the Vertex AI gemini-embedding-001
model. You can then use the ML.GENERATE_EMBEDDING
function with this remote model to generate embeddings. This feature is in Preview.
You can now reference BigQuery ML and DataFrames in your prompts when you use the Data Science Agent in a BigQuery notebook. The Data Science Agent is in Preview.
You can now configure listings for multiple regions for shared datasets and linked dataset replicas in BigQuery sharing. For more information, see Create a listing. This feature is in preview.
You can now enable the automatic selection of a processing location in your pipeline configurations. For more information, see Create pipelines. This feature is generally available (GA).
Dark theme is now available for Cloud Build. To enable the dark theme, in the Google Cloud console, click Settings and utilities > Preferences. In the navigation menu, click Appearance, and then select your color theme and click Save.
You can now use custom constraints with Organization Policy to provide more granular control over specific fields for some Cloud Deploy resources. For more information, see Use custom organization policies.
1.26.4-asm.1 is now available for in-cluster Cloud Service Mesh.
This patch release contains a fix for a use-after-free (UAF) vulnerability in the DNS cache. For more information, see the security bulletin.
Only clusters running in-cluster Cloud Service Mesh version 1.26 are affected. If you are running an earlier in-cluster version or managed Cloud Service Mesh, you are not affected and do not need to take any action.
For details on upgrading Cloud Service Mesh, refer to Upgrade Cloud Service Mesh.
Dataform now automatically selects a processing location based on the datasets referenced in your SQL queries. This makes setting the default location optional in your workflow configurations. For more information, see About repository settings. This feature is generally available (GA).
Multi-tenant clusters are now available in Preview. Many data engineers and scientists can share a multi-tenant cluster to execute their workloads in isolation from each other.
Use Query insights to view query performance metrics for your database. This feature is now generally available (GA).
Use Query insights to view query performance metrics for your database. This feature is now generally available (GA).
Create and manage multiple chats in IntelliJ
You can create and manage multiple chats in IntelliJ Gemini Code Assist. Each chat contains its own context separate from other chats.
Mobile SDK 2.14 is released
Mobile SDK 2.14 includes the following updates:
Android SDK and iOS SDK:
Support for virtual agent to virtual agent chat transfers by queue.
Support for hiding the download transcript button in the options menu, the post-chat screen, or both. For the Android SDK, see SDK configuration. For the iOS SDK, see Show or hide the download transcript button.
Improved accessibility, including better navigation and screen reader support.
Android SDK:
Support for hiding the SDK using the
Ujet.hideSDK()
method. For more information, see Hide the SDK.New event types:
MessageLinkClicked
andQuickReplyClicked
.
To support the new virtual agent chat transfer capabilities of this release, we've added a new configuration setting in the Google Cloud CCaaS portal. You can use this setting to hide transfer system messages in chat sessions with virtual agent to virtual agent transfers.
Administrators: In the Settings > Chat > Web & Mobile Chat Settings pane, there's a new Transfers checkbox.
For more information, see Hide transfer messages in chat sessions.
Managed Service for Apache Kafka now supports HIPAA Compliance on Google Cloud.
Google Distributed Cloud (software only) for VMware 1.33.0-gke.799 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.33.0-gke.799 runs on Kubernetes v1.33.2-gke.700.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
- GA: Changed the cluster creation process so that all new clusters are advanced clusters. Additionally, all cluster upgrades to 1.33 are automatically converted to advanced clusters.
- Upgraded the
etcd
component to version 3.4.33.
- GA: Enabled the
vsphere-metrics-exporter
component for advanced clusters. This exporter provides greater visibility into the VMware vSphere environment by collecting key performance and health metrics. - GA: Added support for VM-Host affinity groups in advanced clusters. This feature allows for the creation of rules that constrain cluster nodes to run on specific, predefined groups of hosts.
- GA: Added support for automatic node resizing in advanced clusters. This feature optimizes resource use by automatically adjusting the CPU and memory allocated to control plane nodes in response to workload demands.
- Public Preview: Added support for Virtual Machine (VM) tracking using vSphere tags in advanced clusters. This feature simplifies resource management by automatically applying identifying tags to cluster VMs.
- GA: Introduced an Envoy proxy sidecar to the GKE Identity Service for clusters that use Controlplane V2. This change enhances the security, reliability, and performance of the authentication service.
The following issues were fixed in 1.33.0-gke.799:
- Fixed vulnerabilities listed in Vulnerability fixes.
Google Distributed Cloud for bare metal 1.33.0-gke.799 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.33.0-gke.799 runs on Kubernetes v1.33.2-gke.700.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following features were added in 1.33.0-gke.799:
GA: Introduced an Envoy sidecar into the GKE Identity Service to increase security, reliability, and performance.
GA: Added support for the Ubuntu 24.04 LTS operating system with the 6.8 kernel.
GA: Added the ability to override the cluster-level pod density setting for individual node pools.
Preview: Added Node Agent to give you the ability to transition from using Ansible over SSH for cluster operations to a more secure, agent-based model. Added
bmctl nodeagent
commands to provide a straightforward and reliable process of migrating existing clusters to use Node Agent.Preview: Added a bundled version of the NVIDIA GPU Operator (version 25.3.1). The bundled operator is an open-source solution for managing the NVIDIA software components needed to provision and manage GPU devices.
Preview: Added Dynamic Resource Allocation, a Kubernetes API that lets you request and share generic resources, such as GPUs, among pods and containers. When enabled, this capability helps you run AI workloads by dynamically and precisely allocating the GPU resources within your bare metal clusters, improving resource utilization and performance for demanding workloads.
Preview: Added vertical Pod autoscaling, which lets you analyze and set CPU and memory resources required by Pods. Instead of having to set up-to-date CPU requests and limits and memory requests and limits for the containers in your Pods, you can configure vertical Pod autoscaling to provide recommended values for CPU and memory requests and limits that you can use to manually update your Pods, or you can configure vertical Pod autoscaling to automatically update the values.
Preview: Added support for skip minor version cluster upgrades. You can directly upgrade your cluster control plane nodes (and entire cluster if worker node pools aren't pinned at a lower version) to two minor versions above the current version. Added the
bmctl upgrade intermediate-version
to print the intermediate version for a skip minor version upgrade.Surface failures from node pool status to the
RecentFailures
field in cluster status.Surface failures from failed preflight checks triggered by the cluster controller to the
RecentFailures
field in cluster status.
The following functional changes were made in 1.33.0-gke.799:
Changed logging behavior so that kubeadm logs show up in the journald of the node machine where kubeadm runs.
To help prevent stale ARP cache issues,
iptables-persistent
is installed in Debian nodes.Cluster manifests are deployed using a Kubernetes job, allowing the cluster operator to be more responsive to cluster events.
Updated the validation checks for cluster upgrades to enforce the cluster version skew rules for user clusters. If the upgrade version information for a user cluster doesn't comply with the version skew rules, the upgrade is halted.
Updated health checks and upgrade preflight checks to inspect for kubeadm certificate expiration.
Updated etcd version to 3.5.21.
Removed support for Red Hat Enterprise Linux 8.8 as it is beyond the Red Hat support window.
Removed support for Ubuntu 20.04 LTS as it has reached the end of standard security maintenance in May 2025.
Upgraded
ansible-core
to 2.16.4 to support Python 3.12.Increased the RSA key size for Cluster API certifications to 4096 bits for improved security.
The following issues were fixed in 1.33.0-gke.799:
Fixed an issue where restoring a cluster that has a node with a GPU causes instability of pods on the nodes.
Fixed an issue that caused the Ansible playbook for handling Cloud Audit Logging to fail and not complete.
Fixed an issue that caused nodes to get stuck in maintenance mode. Health checks have been updated so that the network check job skips connectivity checks for nodes that are in maintenance mode.
Fixed an issue where the CronJob for periodic health checks wasn't updating after configuration changes.
Fixed vulnerabilities listed in Vulnerability fixes.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
Features that were part of GKE Enterprise are now available as part of the standard GKE offering, or offered as standalone SKUs.
The following advanced multi-cluster management and networking features are included in the GKE offering at no additional cost:
- Fleet dashboard
- Multi-team Management
- Config Sync
- Config Controller
- Managed Policy Controller
- Connect Gateway
- Network Function Optimizer
- Fully Qualified Domain Name (FQDN) Network Policy
- Inter-node Transparent Encryption
The following GKE Enterprise features continue to be available using their current standalone SKUs. If you are using any of these features, your billing is automatically transitioned to the corresponding standalone SKU.
- Managed Cloud Service Mesh
- Multicluster Gateways; Multicluster Ingress
- Binary Authorization
- Advanced Vulnerability Scanning
- GKE Extended Support (LTS)
Vulnerability assessment for Google Cloud supports scanning disks configured with customer-managed encryption keys (CMEK) for projects that are outside of VPC Service Control perimeters. For more information about how to scan disks configured with CMEK, see Run Vulnerability Scans for CMEK disks.
September 01, 2025
Apigee API hubNew API versions view
API version information is now available as a separate tab in the API details page. You can view your API version details, copy API ID, create new API versions and more using the API versions tab.
For more information, see Manage versions.
A weekly digest of client library updates from across the Cloud SDK.
Go
Changes for bigquery/storage/apiv1beta1
1.70.0 (2025-08-28)
Features
- bigquery/reservation: Add Reservation.max_slots field to Reservation proto, indicating the total max number of slots this reservation can use up to (f1de706)
- bigquery/reservation: Add Reservation.scaling_mode field and its corresponding enum message ScalingMode. This field should be used together with Reservation.max_slots (f1de706)
- bigquery/storage/managedwriter: Allow overriding proto conversion mapping (#12579) (ce9d29b), refs #12578
- bigquery: Add load/extract job completion ratio (#12471) (3dab483)
- bigquery: Load job and external table opts for custom time format, null markers and source column match (#12470) (67b0320)
Java
Changes for google-cloud-bigquery
2.54.2 (2025-08-26)
Dependencies
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-bigtable
2.65.1 (2025-08-27)
Dependencies
You can now distribute live stream content to remote endpoints by using the Secure Reliable Transport (SRT) protocol or the Real-Time Messaging Protocol (RTMP).
You can now create AI-generated captions and translated captions for a live stream.
Added support for UHD (4K) inputs and outputs.
Added support for H.265 (HEVC) inputs and outputs, which allows for more efficient compression.
You can now generate Web Video Text Tracks format (WebVTT) subtitles from cea608 or cea708 embedded captions in the input stream.
You can now update the encryption key of your encrypted live stream contents while the channel is running.
You can now preview your input streams with ultra-low latency, which allows you to take corrective actions and maintain high-quality viewing experience for your viewers.
Automatic secret rotation with the Secret Manager add-on for Google Kubernetes Engine (GKE): You can configure the Secret Manager add-on to automatically rotate secrets so that secrets updated in Secret Manager after initial pod deployment are automatically and periodically pushed to the pod. This feature is now Generally available (GA).
For more information, see Configure automatic rotation of secrets.
August 31, 2025
Google SecOps SOARRelease 6.3.60 is being rolled out to the first phase of regions as listed here.
This release contains internal and customer bug fixes.
August 30, 2025
Google SecOps SOARRelease 6.3.59 is now available for all regions.
August 29, 2025
Anthos clusters on AzureThe following Kubernetes versions are retired and are no longer available for creating new clusters:
- 1.31.4-gke.500
- 1.30.8-gke.100
- 1.29.12-gke.100
To create a cluster, use another available Kubernetes version.
The Container Analysis API now supports the option of returning partial results during region-down failure conditions when listing notes, listing occurrences, or generating vulnerability summaries. For more information, view the returnPartialSuccess
parameter for the following requests:
- v1.projects.locations.notes.list
- v1.projects.locations.occurrences.getVulnerabilitySummary
- v1.projects.locations.occurrences.list
- v1.projects.notes.list
- v1.projects.occurrences.getVulnerabilitySummary
- v1.projects.occurrences.list
- v1beta1.projects.locations.notes.list
- v1beta1.projects.locations.occurrences.getVulnerabilitySummary
- v1beta1.projects.locations.occurrences.list
- v1beta1.projects.notes.list
- v1beta1.projects.occurrences.getVulnerabilitySummary
- v1beta1.projects.occurrences.list
Capacity Planner is available in Preview!
Reference documentation has been added for the REST Capacity Planner API. For more information, see Authenticate to Capacity Planner and the REST API reference overview.
Max degree of parallelism (MAXDOP)
is a Microsoft database flag available for use in Cloud SQL for SQL Server. This flag lets you limit the maximum number of threads used when running a single query in a parallel plan.
New Dataproc on Compute Engine subminor image versions:
- 2.0.147-debian10, 2.0.147-ubuntu18, 2.0.147-rocky8
- 2.1.96-debian11, 2.1.96-ubuntu20, 2.1.96-ubuntu20-arm, 2.1.96-rocky8
- 2.2.64-debian12, 2.2.64-ubuntu22, 2.2.64-ubuntu22-arm, 2.2.64-rocky9
- 2.3.10-debian12, 2.3.10-ubuntu22, 2.3.10-ubuntu22-arm, 2.3.10-ml-ubuntu22, 2.3.10-rocky9
Full Remote Codebase Awareness
Comprehensive understanding of your entire remote codebase directly within the chat interface. This new capability improves the quality of suggestions and answers to general questions about your project. To use it, ask an abstract question about your remote context, such as "What does this repository do?" and Gemini uses its deep knowledge of the codebase to provide a detailed and accurate response. For more information, see Code customization overview.
Get suggestions from your documentation stored in Markdown files
Gemini Code Assist code customization can now index and understand your organization's internal documentation, stored in Markdown files. This means that when you ask a question or request a code snippet, Gemini will use the context available in your team's documentation to provide more accurate and tailored responses, improving both the quality of the suggestions and the overall relevance of the information you receive. To take advantage of this, ask a question that is related to the context available in your remote Markdown files, and Gemini will use that knowledge to assist you. For more information, see Code customization overview.
Fixed an issue where the Android SDK wouldn't minimize when an end-user clicked a deep link.
A fix is available for an issue with Cloud Storage FUSE CSI driver that could cause Pod to be stuck during startup after a node restart event. Cloud Storage FUSE CSI driver now gracefully handles a node restart behavior.
The fix is available in the following GKE versions:
- 1.32.6-gke.1125000 and later
- 1.33.1-gke.1959000 and later
MITRE ATT&CK coverage dashboard is now available
This feature is currently in Preview.
The new MITRE ATT&CK coverage dashboard lets you measure your security posture against the MITRE ATT&CK framework, helping you:
- Assess threat coverage
- Identify gaps
- Prioritize security efforts
MITRE ATT&CK coverage dashboard is now available
This feature is currently in Preview.
The new MITRE ATT&CK coverage dashboard lets you measure your security posture against the MITRE ATT&CK framework, helping you:
- Assess threat coverage
- Identify gaps
- Prioritize security efforts
Release 1.5.1
This release is a critical update if you have an existing deployment of MDE version 1.5.0. This release resolves a bug regarding materialization of metadata instances created prior to MDE 1.5.0. This release also includes other minor improvements and bug fixes.
Release signature
b0fc163
1.5.1
ffb87d39d343c20abebd2f52df74a2d3
- Fix (417666631): Fixed an issue with metadata materialization for metadata instances that had been created prior to migrating to MDE 1.5.0.
- Fix (420921890): Fixed an error when attempting to update an instance tag metadata and saved it for instances that had been created prior to migrating to MDE 1.5.0.
- Fix (423535516): Fixed inconsistent API response codes when trying to delete non-existing entities.
- Fix (383519276): Fixed missing fields in MDE logging and added more details to make troubleshooting easier.
- Fix (424077359): Fixed instance bucket creation through API. It now adds default
createdTime
as the time when the API call was received. - Fix (422991109 and 424084607): Fixed
ghost
deletion of Types and Metadata Buckets after removing a configuration package. - Fix (423859259): Fixed removal of BigQuery views when a Type is manually deleted.
- Fix (406803212): Fixed wrong version materialization on MDE system tables.
- Fix (407015039): Fixed
Delete
button in MDE UI when the system is in PROD mode (Production mode). - Fix (435653743): Fixed missing Grafana Terraform module.
- Improvement (427447932): Brought Docker images to versions without vulnerabilities reported at the time of the release.
- Improvement (361290775): Modified Terraform deployment scripts to enforce TLS v1.2 for an external MDE UI Load Balancer.
- Improvement (407009198): Improved the error handling when
upload
andparsing
configuration packages. - Improvement (423531705): Improved MDE logging for BigQuery sink related operations.
- Improvement (423530033): Improved manifest validation on configuration package uploads.
- Improvement (423554635): Added
CreatedAt
column with default sorting on the MDE UI configuration packages page. - Improvement (430962108): Added more sorting options on the MDE UI Configurations and Metadata Instances pages.
- Improvement (423531714): Various improvements on Helm charts, including image tag management, and k8s secrets/configmaps.
- Improvement (407037164): More descriptive message added to MDE UI to confirm Type deletion.
You can now simulate maintenance events on your clusters in Memorystore for Redis Cluster. This feature helps you test how your application behaves during a maintenance event by triggering a simulation of the operations that occur during maintenance. This feature is available in Preview.
You can now simulate maintenance events on your Memorystore for Valkey instances. This feature helps you test how your application behaves during a maintenance event by triggering a simulation of the operations that occur during maintenance. This feature is available in Preview.
Static routes for Network Connectivity Center are available in GA.
You can use static routes to define the next hop along the path that network traffic takes to reach a given destination. For more information about using static routes with Network Connectivity Center, see the Static routes overview.
The August 25 release note announcing the release of the DOCUMENT_TYPE/FINANCE/INVOICE
and DOCUMENT_TYPE/MEDICAL/RECORD
infoType detectors was published in error. These infotypes are not available.
A monthly digest of client library updates from across the Cloud SDK.
Go
Changes for spanner/admin/database/apiv1
1.84.0 (2025-08-05)
Features
- spanner/adapter: Add last field in AdaptMessageResponse for internal optimization usage (c574e28)
- spanner/admin/database: Proto changes for an internal api (eeb4b1f)
- spanner: A new field
snapshot_timestamp
is added to message.google.spanner.v1.CommitResponse
(ac4970b) - spanner: Add Google Cloud standard otel attributes (#11652) (f59fcff)
Bug Fixes
- spanner: Context cancel in traces in case of skipping trailers (#12635) (509dc90)
- spanner: Enforce only one resource header (#12618) (4e04b7e)
- spanner: Fix blind retry for ResourceExhausted (#12523) (f9b6e88)
- spanner: Remove stream wrapper for direct path check (#12622) (88a36cd)
Documentation
- spanner: A comment for enum value
OPTIMISTIC
in enumReadLockMode
is changed (ac4970b) - spanner: A comment for enum value
PESSIMISTIC
in enumReadLockMode
is changed (ac4970b) - spanner: A comment for enum value
READ_LOCK_MODE_UNSPECIFIED
in enumReadLockMode
is changed (ac4970b) - spanner: A comment for field
commit_stats
in message.google.spanner.v1.CommitResponse
is changed (ac4970b) - spanner: A comment for field
exclude_txn_from_change_streams
in message.google.spanner.v1.TransactionOptions
is changed (ac4970b) - spanner: A comment for field
multiplexed_session_previous_transaction_id
in message.google.spanner.v1.TransactionOptions
is changed (ac4970b) - spanner: A comment for field
precommit_token
in message.google.spanner.v1.CommitResponse
is changed (ac4970b) - spanner: A comment for message
.google.spanner.v1.MultiplexedSessionPrecommitToken
is changed (ac4970b) - spanner: A comment for message
.google.spanner.v1.TransactionOptions
is changed (ac4970b)
1.84.1 (2025-08-06)
Features
Miscellaneous Chores
DO NOT USE This version is retracted due to https://github.com/googleapis/google-cloud-go/issues/12659, use version >=v1.84.1
Java
Changes for google-cloud-spanner
6.98.0 (2025-07-31)
Features
- Proto changes for an internal api (675e90b)
- spanner: A new field
snapshot_timestamp
is added to message.google.spanner.v1.CommitResponse
(675e90b) - Support Exemplar (#3997) (fcf0a01)
- Use multiplex sessions for RW and Partition Ops (#3996) (a882204)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.60.2 (675e90b)
Dependencies
6.98.1 (2025-08-11)
Bug Fixes
- Add missing span.end calls for AsyncTransactionManager (#4012) (1a4adb4)
- deps: Update the Java code generator (gapic-generator-java) to 2.61.0 (8156ef3)
Dependencies
Node.js
Changes for @google-cloud/spanner
8.1.0 (2025-07-28)
Features
- Add Custom OpenTelemetry Exporter in for Service Metrics (#2272) (610d1b9)
- Add methods from gax to cache proto root and process custom error details (#2330) (1b3931a)
- Add metrics tracers (#2319) (192bf2b)
- Add support for AFE latency metrics (#2348) (0666f05)
- Add throughput_mode to UpdateDatabaseDdlRequest to be used by Spanner Migration Tool. See https://github.com/GoogleCloudPlatform/spanner-migration-tool (#2304) (a29af56)
- Operation, Attempt, and GFE metrics (#2328) (646e6ea)
- Proto changes for an internal api (#2356) (380e770)
- spanner: A new field
snapshot_timestamp
is added to message.google.spanner.v1.CommitResponse
(#2350) (0875cd8) - spanner: Add new change_stream.proto (#2315) (57d67be)
- spanner: Add tpc support (#2333) (a381cab)
- Track precommit token in r/w apis(multiplexed session) (#2312) (3676bfa)
Bug Fixes
- Docs-test (#2297) (61c571c)
- Ensure context propagation works in Node.js 22 with async/await (#2326) (e8cdbed)
- Pass the Span correctly (#2332) (edaee77)
- System test against emulator (#2339) (2a6af4c)
- Unhandled exceptions from gax (#2338) (6428bcd)
Performance Improvements
Python
Changes for google-cloud-spanner
3.57.0 (2025-08-14)
Features
M132 release
The M132 release of Vertex AI Workbench instances includes the following:
The new scheduler Jupyter plugin (
scheduler-jupyter-plugin
) is now preinstalled in the Jupyterlab 4 environment, with support for both the Cloud Composer and Vertex AI notebook schedulers.Updated the Dataproc JupyterLab plugin (
dataproc-jupyter-plugin
) to version 0.1.90.Patched bugs related to the managed end user credentials feature (Preview), resolving an incompatibility with listing Dataproc remote kernels.
Patched a bug that caused instances with disabled proxy access to get stuck in provisioning.
Removed the archived Debian 11 backports repository, resolving an issue with running
apt update
within the instance.
August 28, 2025
BigQueryFor additional layers of security and control, you can now use query templates to predefine and limit the queries that can be run in data clean rooms. For more information, see Use query templates. This feature is in preview.
Bigtable tools are available in Agent Development Kit (ADK). With these tools, you can build AI agents that can interact with Bigtable data and metadata in the following ways:
- Obtain metadata about Bigtable tables and instances.
- Execute LLM-powered SQL queries.
Beginning October 31, 2025, if you set an object's age
condition to a value of 0
when setting Object Lifecycle Management rules, the condition is satisfied at midnight UTC after the object is created, which helps reduce unintended data loss. To learn more about the age
condition, see Lifecycle conditions.
Generally available: M4 memory-optimized hypermem VMs are now generally available. These smaller machine types expand the memory-optimized family to allow for greater flexibility in matching your specific application needs. Hypermem VMs have a GB/vCPU ratio of 15.5:1 and are offered in the following sizes:
- m4-hypermem-16
- m4-hypermem-32
- m4-hypermem-64
See the Regions and zones page to learn where you can create M4 VMs.
VMware Engine ve2
nodes are now available in the London, England, Europe region (europe-west2-a
).
Google Distributed Cloud (software only) for VMware 1.32.400-gke.68 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.31.800-gke.32 runs on Kubernetes v1.32.7-gke.200.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
The following issues were fixed in 1.32.400-gke.68:
- Fixed vulnerabilities listed in Vulnerability fixes.
Google Distributed Cloud for bare metal 1.32.400-gke.68 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.32.400-gke.68 runs on Kubernetes v1.32.7-gke.200.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following issues were fixed in 1.32.400-gke.68:
Fixed an issue that caused the Ansible playbook for handling Customer-Acquired Licenses (CAL) to fail and not complete.
Fixed vulnerabilities listed in Vulnerability fixes.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
You can now run GPU workloads on Confidential GKE Nodes with the A3 High machine type and NVIDIA H100 GPUs. This feature is available in GKE version 1.32.2-gke.1297000 and later for manual GPU driver installation, and in version 1.33.3-gke.1392000 and later for automatic driver installation. This enables stronger data protection and integrity for GPU-accelerated computations running within GKE clusters and nodes. This feature is in General Availability.
For more information, see Encrypt GPU workload data in use with Confidential GKE Nodes.
GKE version 1.33.0-gke.1276000 and later remediate a low severity vulnerability, in which an attacker with the ability to patch Node resources by using the Kubernetes API could change specific node labels in clusters that use Workload Identity Federation for GKE. This could result in the attacker gaining access to node metadata, such as the IAM service account. To remediate this vulnerability, a validation policy is enforced that prevents unauthorized modifications to the node labels that control metadata protection.
Composite detections for MITRE ATT&CK
The Curated Detections feature has been enhanced with new composite rules that define chains of MITRE ATT&CK tactics and techniques.
These powerful new rule packs are now in public preview for customers with a Google SecOps Enterprise or Enterprise Plus license.
To learn more, a companion blog post will be published on the Google Security Cloud Community on September 9, 2025.
Composite detections for MITRE ATT&CK
The Curated Detections feature has been enhanced with new composite rules that define chains of MITRE ATT&CK tactics and techniques.
These powerful new rule packs are now in public preview for customers with a Google SecOps Enterprise or Enterprise Plus license.
To learn more, a companion blog post will be published on the Google Security Cloud Community on September 9, 2025.
You can now increase the storage capacity of your Managed Lustre instances after they've been created.
Certain Organization Policy managed constraints that were released on August 21, 2025 were not functioning as intended. The Organization Policy Service evaluated these constraints as if the effectiveInstanceMetadata
field of the resources that they were enforced on was empty, causing them to always evaluate to either allow or deny access to the resource.
The following managed constraints were evaluated to always allow creation of resources where they were enforced:
constraints/compute.managed.disableGuestAttributesAccess
constraints/compute.managed.disableSerialPortAccess
constraints/compute.managed.disableSerialPortLogging
The following managed constraints were evaluated to always block creation of resources where they were enforced:
constraints/compute.managed.disallowGlobalDns
constraints/compute.managed.requireOsConfig
constraints/compute.managed.requireOsLogin
This issue has been corrected, and these constraints now properly evaluate the effectiveInstanceMetadata
field to determine whether resource creation should be allowed or blocked.
Certain Organization Policy managed constraints that were released on August 21, 2025 were not functioning as intended. The Organization Policy Service evaluated these constraints as if the effectiveInstanceMetadata
field of the resources that they were enforced on was empty, causing them to always evaluate to either allow or deny access to the resource.
The following managed constraints were evaluated to always allow creation of resources where they were enforced:
constraints/compute.managed.disableGuestAttributesAccess
constraints/compute.managed.disableSerialPortAccess
constraints/compute.managed.disableSerialPortLogging
The following managed constraints were evaluated to always block creation of resources where they were enforced:
constraints/compute.managed.disallowGlobalDns
constraints/compute.managed.requireOsConfig
constraints/compute.managed.requireOsLogin
This issue has been corrected, and these constraints now properly evaluate the effectiveInstanceMetadata
field to determine whether resource creation should be allowed or blocked.
August 27, 2025
Apigee XOn August 27, 2025, we released an updated version of Apigee (1-15-0-apigee-9).
Bug ID | Description |
---|---|
427752569 | Security fix for Apigee infrastructure. This addresses the following vulnerabilities: |
Bug ID | Description |
---|---|
420901514 | Enhanced WebSocket authentication. |
429245088 | Implemented option to override endpoints in the PublishMessage policy. |
405039175 | Resolved issue causing duplicate x-b3-* headers when Distributed Trace is enabled. |
378686709 | Resolved issue causing unexpected 404 errors when using wildcards in proxy basepaths. |
429245268 | Implemented option to override endpoints in the MessageLogging policy. |
N/A | Updates to security infrastructure and libraries. |
Audit Manager lets you download Google Cloud compliance documents. You can use these documents to better understand how Google addresses its responsibilities to meet the requirements of various regulatory frameworks.
Cloud Data Fusion version 6.11.1 is generally available (GA). This release includes the following features:
- Added support for HTTP access tokens (Bearer authentication) in Bitbucket Server for source control management (CDAP-21049).
- A new API is available to retrieve the application count for each namespace (CDAP-21161).
Changes in Cloud Data Fusion 6.11.1:
- The Java runtime environment is upgraded from Java 8 to Java 11 (CDAP-21184).
- To create ephemeral Dataproc clusters, Cloud Data Fusion uses the Dataproc 2.3 image by default (CDAP-21187).
- The pipeline JSON size limit for creating new pipelines and importing pipelines as JSON is increased to 5MB (previously 2MB) (CDAP-21194).
- On the Pipeline details page, the inbound triggers sidebar features a paginated list of pipelines where you can select the pipelines you want to add to the trigger. Additionally, a refresh button is added to update the existing list of triggers and pipelines (CDAP-21195).
Fixed in Cloud Data Fusion 6.11.1:
- To prevent storage issues on static Dataproc clusters, temporary pipeline data is automatically deleted after a successful run (CDAP-21076).
- Fixed an issue that prevented Expression Language (EL) from being used within user-defined directives (CDAP-21204).
- Fixed an issue where a pipeline would fail when reading an encrypted file from Cloud Storage using Tink (PLUGIN-1717).
Dataproc 2.0 is no longer supported in Cloud Data Fusion version 6.11.1 and later.
You can now create and manage the trace scope programmatically. This feature is in Public Preview. For more information, see the following documents:
Dataflow supports Cloud TPUs, Google's custom-designed AI accelerators that are optimized for large-scale AI/ML workloads. This feature lets you accelerate inference workloads on frameworks like PyTorch, JAX, and TensorFlow. This feature is generally available with an allowlist. For more information, see Dataflow support for TPUs.
Change in telemetry setting behavior for VS Code Gemini Code Assist
Gemini Code Assist telemetry log settings now override the VS Code telemetry setting. For example, if the Gemini Code Assist telemetry log setting is turned on but the VS Code telemetry setting is turned off, then telemetry data is still collected. For more information, see Configure Gemini for Google Cloud logs.
Portal version 3.39 pre-release notes
Here are the pre-release notes for portal version 3.39. When we release version 3.39, we expect the new capabilities to be as shown here.
Destination queue name and session history is available in the agent adapter
The agent adapter now displays the destination queue during transfers and deflections for IVR calls. The agent adapter also displays transfer history in the Call details and Chat details tabs.
User experience changes:
- The Call details and Chat details tabs in the agent adapter have a new Transfer History section.
- The chat pane in the chat adapter has a new Transfers button that opens the Tranfer History pane.
Adminstrators: There's a new checkbox at Settings > Operation Management > Transfer history for turning on transfer history in the agent adapter.
Improved controls over the ordering of key-value pairs in the agent adapter and CRM records
Google Cloud CCaaS has improved controls over the ordering of the key-value pairs that appear in the agent adapter and in CRM records. Here's how the ordering controls work:
Virtual agents: When you configure session variables, you can use the new
display_order_in_adapter
property to specify the order that the session variables appear in the agent adapter and in CRM records.Web SDK: Web SDK custom data is displayed in the agent adapter and CRM records in the order that the key-value pairs appear in the JSON custom data file.
Virtual agents for the SMS channel
Virtual agents are now available for the SMS channel. This lets you create virtual agents and assign them to SMS queues, offering virtual agent support to end-users in SMS chat sessions.
Search in the email channel
Agents can now search for emails in the agent adapter by keyword, session ID, or subject.
Cancel scheduled calls with the callback calls API
You can now use the callback calls API to cancel a single scheduled callback call or a list of calls.
The following issues were addressed in this release:
Fixed an issue where incoming chats took precedence over the in-progress chat.
User experience change: When a new chat appears in the agent adapter, it no longer takes focus away from the in-progress chat. The in-progress retains focus.
Fixed a web SDK issue where sensitive data sent by an end-user was redacted for both the end-user and the agent, instead of just for the agent.
Fixed an issue where the contact list in the agent adapter wouldn't load the full list of contacts.
Fixed an issue where an agent clicking an email in the agent adapter returned an Email Not Found error.
Fixed an issue where managers assigned to multiple teams were unable to view agent statistics for every team they were assigned to.
Fixed an issue for ServiceNow users where
call_duration
was using the earliestconnected_at
time instead of the latestconnected_at
time, causing call durations to appear longer than they actually were.Fixed an issue in the Settings > Developer Settings > External Storage pane where language checkboxes were associated with the Co-browse Recordings checkbox instead of the Session Data Feed checkbox.
Administrators: In the Settings > Developer Settings > External Storage pane, the languages checkboxes have moved from the Co-browse Recordings checkbox to the Session Data Feed checkbox.
Fixed an issue where agent-initiated outbound calls were using the default number for the selected queue instead of the number chosen by the agent.
Fixed an issue where the downloaded session chat data report contained an extra quotation mark.
Fixed an issue where users received an email telling them to create a password after Single Sign-On (SSO) was turned on.
Fixed an issue where SSO configuration settings in the user's instance were deleted after they turned off SSO.
Fixed an issue where an administrator couldn't configure agent status restrictions without exposing them to agents.
Fixed an issue where custom contact lists could only be replaced, and not removed, after they were assigned to a team.
Fixed an issue where the inheritance indicator and Reset to parent button was missing from the queue level Contact List Management pane.
Fixed an issue where the SMS and Web chat availability preferences in the agent adapter were the reverse of how they were configured.
Fixed an issue where queue transfer restrictions were not saved after being configured.
Fixed an issue that occured when a user attempted to name a new queue. The name field abruptly lost focus after the first character, forcing the user to enter the queue name again.
Fixed an issue where creating an instance would time out and fail.
Fixed an issue that prevented reports from being downloaded.
Fixed an issue where the chat history for blended SMS sessions failed to save.
Fixed an issue where the Transfer failed message didn't appear. This occurred when an agent failed to pick up a tranferred call before the transferred call expiration time expired.
Fixed an issue where IVR call recordings failed to save or were corrupted. This resulted in recordings that were only one second long, were saved in the wrong format, or weren't saved at all.
Fixed an issue where completed chat sessions appeared in the chats waiting area of agent desktop.
Fixed an issue for CRM users with voicemails that are attached directly to tickets. An incorrect "External Storage must be configured" warning appeared when configuring voicemail options for IVR queues.
Fixed an issue where transfer restrictions that were configured and saved for a web queue did not appear correctly the next time the Transfer Restrictions pane for that queue was viewed.
Fixed an issue where the unread message count in the chat pane was inconsistent when viewing it from multiple browser tabs.
Fixed an issue in virtual assistant reporting where the
finish_reason
property was incorrectly assigned to theundefined
value. Now thefinish_reason
property is assigned to descriptive values that describe the reason for the conclusion of the chat session.Fixed an issue where PDF transcripts of chat sessions contained malformed links.
Fixed an issue in historical reports where the fields in the Failed Reason Description column were blank.
Fixed an issue where CSAT scores were missing from some advanced reporting dashboards.
Fixed an issue for HubSpot users that caused long delays in case creation for inbound calls.
Fixed an issue where the photo and video files that the agent provided in pre-session Smart Actions didn't appear in the CRM.
Fixed an issue where agents in
Unavailable
status couldn't see waiting web chats.Fixed an issue where HTML was not rendering properly in virtual agent messages in the agent adapter
Fixed an issue where agents were not switching into
Wrap-up Exceeded
status after a breakthrough call.Fixed an agent deskop issue where administrators were unable to assign announcements to some teams or agents.
Fixed an agent desktop issue where agents couldn't copy text to the clipboard from an agent desktop custom panel.
Fixed an agent desktop issue where the term "Anonymous User" wasn't being translated into French.
Fixed an issue where the
UJET_ID
andANI
variables weren't passed correctly for SIP calls.Fixed an issue where the chat adapter froze when agents switched between chats.
Fixed an issue on the Agents page of the Google Cloud CCaaS portal where administrators couldn't switch between session types.
Fixed an issue where a newly added Agent Assist platform displayed as
Invalid
even though it was valid.Fixed an issue for Salesforce users where the call button didn't work when an agent attempted to call a number that was attached to a record for a previous call.
Fixed an issue where audio files with accented characters in their file names failed to play back when using a storage proxy.
Fixed an agent desktop issue where the
UJET_ID
variable in the custom URL for a custom panel wasn't being passed correctly.Fixed an issue where calls originating from a native campaign generated two CRM tickets for the same interaction.
Fixed latency issues with web SDK Telnyx calls.
Fixed an issue where outbound Bring Your Own Carrier (BYOC) calls used a number other than the one agents selected in the agent adapter.
Fixed a Telnyx chatbot worker failure issue where background jobs related to call processing and chatbot escalations were failing and consuming excessive system resources.
(2025-R36) Version updates
- Version 1.33.3-gke.1136000 is now the default version for cluster creation in the Extended channel.
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2507000
- 1.28.15-gke.2564000
- 1.29.15-gke.1686000
- 1.29.15-gke.1773000
- 1.30.12-gke.1414000
- 1.31.11-gke.1064000
- 1.32.6-gke.1125000
- 1.33.2-gke.1240000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2527000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2527000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1713000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
(2025-R36) Version updates
- Version 1.33.3-gke.1136000 is now the default version for cluster creation.
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.31.11-gke.1064000
- 1.31.11-gke.1135000
- 1.32.6-gke.1096000
- 1.32.8-gke.1005000
- 1.33.2-gke.1111000
- 1.33.3-gke.1392000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.14-gke.1011000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
(2025-R36) Version updates
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.14-gke.1011000
- 1.31.11-gke.1064000
- 1.31.11-gke.1135000
- 1.32.7-gke.1016000
- 1.32.8-gke.1005000
- 1.33.3-gke.1392000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.14-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1101000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.7-gke.1079000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.14-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1101000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.7-gke.1079000 with this release.
(2025-R36) Version updates
- Version 1.33.3-gke.1136000 is now the default version for cluster creation in the Regular channel.
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1414000
- 1.31.11-gke.1064000
- 1.32.6-gke.1125000
- 1.33.2-gke.1240000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.7-gke.1016000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
(2025-R36) Version updates
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
(2025-R36) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.14-gke.1011000
- 1.31.11-gke.1064000
- 1.31.11-gke.1135000
- 1.32.7-gke.1016000
- 1.32.8-gke.1005000
- 1.33.3-gke.1392000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.14-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1101000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.7-gke.1079000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.14-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1101000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.7-gke.1079000 with this release.
Regular channel
- Version 1.33.3-gke.1136000 is now the default version for cluster creation in the Regular channel.
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1414000
- 1.31.11-gke.1064000
- 1.32.6-gke.1125000
- 1.33.2-gke.1240000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.7-gke.1016000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
Stable channel
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
Extended channel
- Version 1.33.3-gke.1136000 is now the default version for cluster creation in the Extended channel.
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2507000
- 1.28.15-gke.2564000
- 1.29.15-gke.1686000
- 1.29.15-gke.1773000
- 1.30.12-gke.1414000
- 1.31.11-gke.1064000
- 1.32.6-gke.1125000
- 1.33.2-gke.1240000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2527000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2527000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1713000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
No channel
- Version 1.33.3-gke.1136000 is now the default version for cluster creation.
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.31.11-gke.1064000
- 1.31.11-gke.1135000
- 1.32.6-gke.1096000
- 1.32.8-gke.1005000
- 1.33.2-gke.1111000
- 1.33.3-gke.1392000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.14-gke.1011000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
Google SecOps has updated the list of supported default parsers. Parsers are updated gradually, so it might take one to four days before you see the changes reflected in your region.
The following supported default parsers have been updated. Each parser is listed by product name and log_type
value, where applicable. This list includes both released default parsers and pending parser updates.
- A10 Load Balancer (
A10_LOAD_BALANCER
) - AIX system (
AIX_SYSTEM
) - Apache (
APACHE
) - Arcsight CEF (
ARCSIGHT_CEF
) - Aruba Switch (
ARUBA_SWITCH
) - Aruba (
ARUBA_WIRELESS
) - Attivo Networks (
ATTIVO
) - Auth0 (
AUTH_ZERO
) - Amazon VPC Transit Gateway Flow Logs (
AWS_VPC_TRANSIT_GATEWAY
) - AWS WAF (
AWS_WAF
) - Azure AD (
AZURE_AD
) - Azure AD Organizational Context (
AZURE_AD_CONTEXT
) - Azure Firewall (
AZURE_FIREWALL
) - Azure Front Door (
AZURE_FRONT_DOOR
) - Carbon Black App Control (
CB_APP_CONTROL
) - None (
CHROME_MANAGEMENT
) - Cisco ASA (
CISCO_ASA_FIREWALL
) - Cisco DNA Center Platform (
CISCO_DNAC
) - Cisco Email Security (
CISCO_EMAIL_SECURITY
) - Cisco Firepower NGFW (
CISCO_FIREPOWER_FIREWALL
) - Cisco Internetwork Operating System (
CISCO_IOS
) - Cisco IronPort (
CISCO_IRONPORT
) - Cisco ISE (
CISCO_ISE
) - Cisco Router (
CISCO_ROUTER
) - Cisco vManage SD-WAN (
CISCO_SDWAN
) - Cisco Switch (
CISCO_SWITCH
) - Cisco Umbrella Audit (
CISCO_UMBRELLA_AUDIT
) - Cisco VCS Expressway (
CISCO_VCS
) - Cisco WSA (
CISCO_WSA
) - Citrix Netscaler (
CITRIX_NETSCALER
) - Claroty Xdome (
CLAROTY_XDOME
) - HP Aruba (ClearPass) (
CLEARPASS
) - Cloudflare (
CLOUDFLARE
) - Cloudflare WAF (
CLOUDFLARE_WAF
) - Corelight (
CORELIGHT
) - Palo Alto Cortex XDR Alerts (
CORTEX_XDR
) - CrowdStrike Alerts API (
CS_ALERTS
) - CrowdStrike Detection Monitoring (
CS_DETECTS
) - CrowdStrike Falcon (
CS_EDR
) - CrowdStrike Falcon Stream (
CS_STREAM
) - Cyberark Privilege Cloud (
CYBERARK_PRIVILEGE_CLOUD
) - Darktrace (
DARKTRACE
) - Datadog (
DATADOG
) - Elastic Defend (
ELASTIC_DEFEND
) - F5 ASM (
F5_ASM
) - F5 Distributed Cloud Services (
F5_DCS
) - F5 Silverline (
F5_SILVERLINE
) - Fidelis Network (
FIDELIS_NETWORK
) - FireEye (
FIREEYE_ALERT
) - FireEye NX (
FIREEYE_NX
) - Forcepoint DLP (
FORCEPOINT_DLP
) - ForgeRock Identity Cloud (
FORGEROCK_IDENTITY_CLOUD
) - FortiGate (
FORTINET_FIREWALL
) - Cloud SQL (
GCP_CLOUDSQL
) - Google Cloud DNS Threat Detector (
GCP_DNS_ATD
) - Cloud Load Balancing (
GCP_LOADBALANCING
) - None (
GCP_SECURITYCENTER_THREAT
) - VPC Flow Logs (
GCP_VPC_FLOW
) - AWS GuardDuty (
GUARDDUTY
) - IBM-i Operating System (
IBM_I
) - Imperva (
IMPERVA_WAF
) - Infoblox DHCP (
INFOBLOX_DHCP
) - Jamf Protect Telemetry V2 (
JAMF_TELEMETRY_V2
) - Kemp Load Balancer (
KEMP_LOADBALANCER
) - Kubernetes Node (
KUBERNETES_NODE
) - ManageEngine AD360 (
MANAGE_ENGINE_AD360
) - McAfee ePolicy Orchestrator (
MCAFEE_EPO
) - McAfee IPS (
MCAFEE_IPS
) - Medigate IoT (
MEDIGATE_IOT
) - Microsoft Defender for Endpoint (
MICROSOFT_DEFENDER_ENDPOINT
) - Microsoft Graph API Alerts (
MICROSOFT_GRAPH_ALERT
) - Microsoft Sentinel (
MICROSOFT_SENTINEL
) - Microsoft SQL Server (
MICROSOFT_SQL
) - Mikrotik Router (
MIKROTIK_ROUTER
) - Netskope V2 (
NETSKOPE_ALERT_V2
) - Netskope Web Proxy (
NETSKOPE_WEBPROXY
) - Unix system (
NIX_SYSTEM
) - Oracle Cloud Infrastructure VCN Flow Logs (
OCI_FLOW
) - Office 365 (
OFFICE_365
) - Office 365 Message Trace (
OFFICE_365_MESSAGETRACE
) - Okta (
OKTA
) - Okta Scaleft (
OKTA_SCALEFT
) - Oracle (
ORACLE_DB
) - Orca Cloud Security Platform (
ORCA
) - Proofpoint Threat Response (
PROOFPOINT_TRAP
) - Quest Active Directory (
QUEST_AD
) - Radware Web Application Firewall (
RADWARE_FIREWALL
) - Red Hat OpenShift (
REDHAT_OPENSHIFT
) - Symantec Endpoint Protection (
SEP
) - Silverfort Authentication Platform (
SILVERFORT
) - Squid Web Proxy (
SQUID_WEBPROXY
) - STIX Threat Intelligence (
STIX
) - Symantec DLP (
SYMANTEC_DLP
) - Sysdig (
SYSDIG
) - Tenable Security Center (
TENABLE_SC
) - Trend Micro (
TIPPING_POINT
) - Trellix HX Event Streamer (
TRELLIX_HX_ES
) - Trend Micro Apex one (
TRENDMICRO_APEX_ONE
) - Trend Micro Vision One Activity (
TRENDMICRO_VISION_ONE_ACTIVITY
) - Trend Micro Vision One (
TRENDMICRO_VISION_ONE
) - Trend Micro Vision One Workbench (
TRENDMICRO_VISION_ONE_WORKBENCH
) - Ubiquiti UniFi Switch (
UBIQUITI_SWITCH
) - Cisco Umbrella DNS (
UMBRELLA_DNS
) - Cisco Umbrella IP (
UMBRELLA_IP
) - Varonis (
VARONIS
) - Vectra XDR (
VECTRA_XDR
) - VMware vCenter (
VMWARE_VCENTER
) - VMware vRealize Suite (VMware Aria) (
VMWARE_VREALIZE
) - Windows Event (
WINEVTLOG
) - Windows Event (XML) (
WINEVTLOG_XML
) - Zscaler CASB (
ZSCALER_CASB
) - ZScaler Deception (
ZSCALER_DECEPTION
) - Zscaler DLP (
ZSCALER_DLP
) - ZScaler DNS (
ZSCALER_DNS
) - ZScaler NGFW (
ZSCALER_FIREWALL
) - Zscaler Internet Access Audit Logs (
ZSCALER_INTERNET_ACCESS
) - Zscaler Tunnel (
ZSCALER_TUNNEL
) - Zscaler (
ZSCALER_WEBPROXY
) - Zscaler Secure Private Access Audit Logs (
ZSCALER_ZPA_AUDIT
) - Zscaler Private Access (
ZSCALER_ZPA
)
The following log types were added without a default parser. Each parser is listed by product name and log_type
value, where applicable.
- Alicloud ApsaraDB (
ALICLOUD_APSARADB
) - AliCloud Firewall (
ALICLOUD_FIREWALL
) - AuthMind (
AUTHMIND
) - Microsoft Entra Recommendations (
MS_ENTRA_RECOMMENDATIONS
) - Palo Alto Networks Prisma Access (
PAN_PRISMA_ACCESS
) - Trellix Malware Analysis (
TRELLIX_AX
) - Everfox ULTRA (
ULTRA
) - ZScaler NSS VM (
ZSCALER_NSS_VM
)
Google Workspace: Version 20.0
The following new actions have been added:
Block Extension
Delete Extension
Get Extension Details
Get Host Browser Details
Search User Activity Events
Google Threat Intelligence: Version 3.0
- Integration: Updated authentication flow.
Google SecOps has updated the list of supported default parsers. Parsers are updated gradually, so it might take one to four days before you see the changes reflected in your region.
The following supported default parsers have been updated. Each parser is listed by product name and log_type
value, where applicable. This list includes both released default parsers and pending parser updates.
- A10 Load Balancer (
A10_LOAD_BALANCER
) - AIX system (
AIX_SYSTEM
) - Apache (
APACHE
) - Arcsight CEF (
ARCSIGHT_CEF
) - Aruba Switch (
ARUBA_SWITCH
) - Aruba (
ARUBA_WIRELESS
) - Attivo Networks (
ATTIVO
) - Auth0 (
AUTH_ZERO
) - Amazon VPC Transit Gateway Flow Logs (
AWS_VPC_TRANSIT_GATEWAY
) - AWS WAF (
AWS_WAF
) - Azure AD (
AZURE_AD
) - Azure AD Organizational Context (
AZURE_AD_CONTEXT
) - Azure Firewall (
AZURE_FIREWALL
) - Azure Front Door (
AZURE_FRONT_DOOR
) - Carbon Black App Control (
CB_APP_CONTROL
) - None (
CHROME_MANAGEMENT
) - Cisco ASA (
CISCO_ASA_FIREWALL
) - Cisco DNA Center Platform (
CISCO_DNAC
) - Cisco Email Security (
CISCO_EMAIL_SECURITY
) - Cisco Firepower NGFW (
CISCO_FIREPOWER_FIREWALL
) - Cisco Internetwork Operating System (
CISCO_IOS
) - Cisco IronPort (
CISCO_IRONPORT
) - Cisco ISE (
CISCO_ISE
) - Cisco Router (
CISCO_ROUTER
) - Cisco vManage SD-WAN (
CISCO_SDWAN
) - Cisco Switch (
CISCO_SWITCH
) - Cisco Umbrella Audit (
CISCO_UMBRELLA_AUDIT
) - Cisco VCS Expressway (
CISCO_VCS
) - Cisco WSA (
CISCO_WSA
) - Citrix Netscaler (
CITRIX_NETSCALER
) - Claroty Xdome (
CLAROTY_XDOME
) - HP Aruba (ClearPass) (
CLEARPASS
) - Cloudflare (
CLOUDFLARE
) - Cloudflare WAF (
CLOUDFLARE_WAF
) - Corelight (
CORELIGHT
) - Palo Alto Cortex XDR Alerts (
CORTEX_XDR
) - CrowdStrike Alerts API (
CS_ALERTS
) - CrowdStrike Detection Monitoring (
CS_DETECTS
) - CrowdStrike Falcon (
CS_EDR
) - CrowdStrike Falcon Stream (
CS_STREAM
) - Cyberark Privilege Cloud (
CYBERARK_PRIVILEGE_CLOUD
) - Darktrace (
DARKTRACE
) - Datadog (
DATADOG
) - Elastic Defend (
ELASTIC_DEFEND
) - F5 ASM (
F5_ASM
) - F5 Distributed Cloud Services (
F5_DCS
) - F5 Silverline (
F5_SILVERLINE
) - Fidelis Network (
FIDELIS_NETWORK
) - FireEye (
FIREEYE_ALERT
) - FireEye NX (
FIREEYE_NX
) - Forcepoint DLP (
FORCEPOINT_DLP
) - ForgeRock Identity Cloud (
FORGEROCK_IDENTITY_CLOUD
) - FortiGate (
FORTINET_FIREWALL
) - Cloud SQL (
GCP_CLOUDSQL
) - Google Cloud DNS Threat Detector (
GCP_DNS_ATD
) - Cloud Load Balancing (
GCP_LOADBALANCING
) - None (
GCP_SECURITYCENTER_THREAT
) - VPC Flow Logs (
GCP_VPC_FLOW
) - AWS GuardDuty (
GUARDDUTY
) - IBM-i Operating System (
IBM_I
) - Imperva (
IMPERVA_WAF
) - Infoblox DHCP (
INFOBLOX_DHCP
) - Jamf Protect Telemetry V2 (
JAMF_TELEMETRY_V2
) - Kemp Load Balancer (
KEMP_LOADBALANCER
) - Kubernetes Node (
KUBERNETES_NODE
) - ManageEngine AD360 (
MANAGE_ENGINE_AD360
) - McAfee ePolicy Orchestrator (
MCAFEE_EPO
) - McAfee IPS (
MCAFEE_IPS
) - Medigate IoT (
MEDIGATE_IOT
) - Microsoft Defender for Endpoint (
MICROSOFT_DEFENDER_ENDPOINT
) - Microsoft Graph API Alerts (
MICROSOFT_GRAPH_ALERT
) - Microsoft Sentinel (
MICROSOFT_SENTINEL
) - Microsoft SQL Server (
MICROSOFT_SQL
) - Mikrotik Router (
MIKROTIK_ROUTER
) - Netskope V2 (
NETSKOPE_ALERT_V2
) - Netskope Web Proxy (
NETSKOPE_WEBPROXY
) - Unix system (
NIX_SYSTEM
) - Oracle Cloud Infrastructure VCN Flow Logs (
OCI_FLOW
) - Office 365 (
OFFICE_365
) - Office 365 Message Trace (
OFFICE_365_MESSAGETRACE
) - Okta (
OKTA
) - Okta Scaleft (
OKTA_SCALEFT
) - Oracle (
ORACLE_DB
) - Orca Cloud Security Platform (
ORCA
) - Proofpoint Threat Response (
PROOFPOINT_TRAP
) - Quest Active Directory (
QUEST_AD
) - Radware Web Application Firewall (
RADWARE_FIREWALL
) - Red Hat OpenShift (
REDHAT_OPENSHIFT
) - Symantec Endpoint Protection (
SEP
) - Silverfort Authentication Platform (
SILVERFORT
) - Squid Web Proxy (
SQUID_WEBPROXY
) - STIX Threat Intelligence (
STIX
) - Symantec DLP (
SYMANTEC_DLP
) - Sysdig (
SYSDIG
) - Tenable Security Center (
TENABLE_SC
) - Trend Micro (
TIPPING_POINT
) - Trellix HX Event Streamer (
TRELLIX_HX_ES
) - Trend Micro Apex one (
TRENDMICRO_APEX_ONE
) - Trend Micro Vision One Activity (
TRENDMICRO_VISION_ONE_ACTIVITY
) - Trend Micro Vision One (
TRENDMICRO_VISION_ONE
) - Trend Micro Vision One Workbench (
TRENDMICRO_VISION_ONE_WORKBENCH
) - Ubiquiti UniFi Switch (
UBIQUITI_SWITCH
) - Cisco Umbrella DNS (
UMBRELLA_DNS
) - Cisco Umbrella IP (
UMBRELLA_IP
) - Varonis (
VARONIS
) - Vectra XDR (
VECTRA_XDR
) - VMware vCenter (
VMWARE_VCENTER
) - VMware vRealize Suite (VMware Aria) (
VMWARE_VREALIZE
) - Windows Event (
WINEVTLOG
) - Windows Event (XML) (
WINEVTLOG_XML
) - Zscaler CASB (
ZSCALER_CASB
) - ZScaler Deception (
ZSCALER_DECEPTION
) - Zscaler DLP (
ZSCALER_DLP
) - ZScaler DNS (
ZSCALER_DNS
) - ZScaler NGFW (
ZSCALER_FIREWALL
) - Zscaler Internet Access Audit Logs (
ZSCALER_INTERNET_ACCESS
) - Zscaler Tunnel (
ZSCALER_TUNNEL
) - Zscaler (
ZSCALER_WEBPROXY
) - Zscaler Secure Private Access Audit Logs (
ZSCALER_ZPA_AUDIT
) - Zscaler Private Access (
ZSCALER_ZPA
)
The following log types were added without a default parser. Each parser is listed by product name and log_type
value, where applicable.
- Alicloud ApsaraDB (
ALICLOUD_APSARADB
) - AliCloud Firewall (
ALICLOUD_FIREWALL
) - AuthMind (
AUTHMIND
) - Microsoft Entra Recommendations (
MS_ENTRA_RECOMMENDATIONS
) - Palo Alto Networks Prisma Access (
PAN_PRISMA_ACCESS
) - Trellix Malware Analysis (
TRELLIX_AX
) - Everfox ULTRA (
ULTRA
) - ZScaler NSS VM (
ZSCALER_NSS_VM
)
You can now use Memorystore for Valkey, along with Spring Boot and PostgreSQL, to create a session management system, scalable leaderboard system, and high-performance caching service. For more information, see Client library code samples. These code samples are Generally Available.
New SAP certifications: Additional M4 memory-optimized machine types
For use with SAP HANA scale-up (OLAP and OLTP) and SAP NetWeaver workloads, SAP has certified the m4-hypermem
Compute Engine memory-optimized machine types with 16, 32, and 64 vCPUs.
For more information, see:
Compliance Manager (available in Preview) now lets you remove resources from deployed frameworks.
Chirp 3: HD voices is available on the europe-west2
endpoint. For more information, see Chirp 3: HD voices.
Chirp 3: instant custom voice supports the Chirp 3: HD voice controls for pace control, pause control, and custom pronunciations. For more information, see the Chirp 3: instant custom voice page.
August 26, 2025
Apigee UIOn August 26, 2025, we released an updated version of the Apigee UI.
Debug view settings are now retained when switching between transactions
When switching between transactions in the debug view the following view settings are now retained:
- The state of the expand all toggle
- The zoom level of the graph
- The positioning of the viewport in the graph (best effort). This may be modified due to discrepancies in between the transactions
- The search filter. The active match will go into an indeterminate when switching transactions.
Added Display name column to Apps table
Added a column to the Apps table to show the App display name separate from the App name. The App name column will no longer show the display name if one is set. Instead the display name will appear in the new Display name column. You can also now filter by the App name and Display name independently.
You can deduplicate table data with Gemini assistance in your BigQuery data preparations. Deduplication is in Preview.
DNS64 is available in GA.
DNS64 provides synthesized IPv6 addresses for IPv4 destinations. For more information, see the following:
Preview: Cloud Healthcare API has launched DICOM Updates and Patches. This allows customers to update their DICOM data in-place. For more information, see Update and patch DICOM studies, series, and instances.
The internal and external passthrough Network Load Balancers now support load balancing to unmanaged instance groups comprised of IPv6-only VM instances.
Protocol forwarding also supports IPv6-only target instances.
For more details, see the following pages:
- Protocol forwarding overview
- Backend service-based external passthrough Network Load Balancer overview
- Internal passthrough Network Load Balancer overview
- Set up an internal passthrough Network Load Balancer with IPv6-only subnets and backends
This feature is available in General Availability.
Cloud NAT gateways for Public NAT support IPv6 to IPv4 network address translation in General Availability. For more information, see NAT64 in Public NAT.
Generally available: You can create instances that use only IPv6 IP addresses. For more information, see Create an IPv6-only instance.
Dataflow Runner v2 fixes an issue that could cause data discrepancies when using splittable DoFns, particularly when processing large datasets as side inputs. This fix ensures that all data is accurately processed and transmitted within the pipeline. This improvement is available in recent Dataflow service releases, and is automatically enabled when using Dataflow Runner v2.
Note: After this fix, pipelines that previously experienced data loss due to this issue might consume more resources (such as CPU, memory, and processing time) because more data is being processed. This increase in resource usage is expected and reflects the correct behavior of the pipeline.
Gemini 2.5 Flash Image Preview
Gemini 2.5 Flash Image (gemini-2.5-flash-image-preview
) is available in Preview. Gemini 2.5 Flash Image Preview supports additional image generation and editing features such as image generation from multiple reference images and improved multi-turn image editing.
Vertex AI model tuning and Gen AI evaluation service
Vertex AI model tuning now supports integration with the Gen AI evaluation service in Preview. You can automatically run evaluations on your tuned models and intermediate checkpoints. For more information, see Create a tuning job.
You can now use Cloud Logging to query and view maintenance logs for a Memorystore for Memcached instance. For more information, see View maintenance logs. This feature is Generally Available.
You can now use Cloud Logging to query and view maintenance logs for a Memorystore for Redis instance. For more information, see View maintenance logs. This feature is Generally Available.
You can now use Cloud Logging to query and view maintenance logs for a cluster in Memorystore for Redis Cluster. For more information, see View maintenance logs. This feature is Generally Available.
You can now use Cloud Logging to query and view maintenance logs for a Memorystore for Valkey instance. For more information, see View maintenance logs. This feature is Generally Available.
IPv6-only subnets and instances are available in General Availability. For more information, see the following:
- Add an IPv6-only subnet
- Create an IPv6-only instance
- Configure IPv6-only subnets and instances with DNS64 and NAT64
You can also use an IPv6-only NAT subnet to publish a service with Private Service Connect.
For information about which services support IPv6-only configurations, see IPv6 support in Google Cloud.
VPC Flow Logs supports logging for RDMA flows over Converged Ethernet, such as GPU-to-GPU flows from A3 Ultra, A4, and A4X VMs. This feature is available in General Availability. For more information, see About VPC Flow Logs records.
August 25, 2025
Apigee Advanced API SecurityOn August 25, 2025 we released an updated version of Advanced API Security
Note: Rollouts of this release to production instances will begin within two business days and may take four or more business days to complete across all Google Cloud zones. Your instances may not have the feature available until the rollout is complete.
Additional details and explanations for incidents and traffic identified as anomalous in Abuse Detection Advanced Anomaly Detection
Starting with this release, additional details are available for anomalies detected in incidents and detected traffic, including details on why traffic was flagged as anomalous, the days and times it triggered, time series charts showing anomalous traffic spikes, and direct links to the Google Cloud Logging for events.
See the Abuse detection "Details view" for more information.
On August 25, 2025 we released a new version of the Apigee integrated portal.
This release includes general improvements to performance and availability.
App Hub supports resources from the following sources in Preview:
- Vertex AI
- Pipeline job
- Custom job
- Hyperparameter tuning job
- Index
- Index endpoint
- NAS job
- Model deployment monitoring job
- Compute Engine
- Autoscaler
- Commitment
- Disk
- Regional disk
- Instance template
- Regional instance template
- License
- Node group
- Image
- Resource policy
- Reservation
- Node template
- Router
- Snapshot
- Route
- Subnetwork
- Global public delegated prefix
- Public delegated prefix
- Dataflow
- Job
- Datastream
- Stream
- Cloud DNS
- Managed zone
- Policy
You can use the ST_REGIONSTATS
geography function to combine raster data using Earth Engine with your vector data stored in BigQuery. For more information, see Work with raster data and try the tutorial that shows you how to use raster data to analyze global temperature. This feature is generally available.
You can now use data insights to have Gemini generate table and column descriptions from table metadata. This feature is generally available (GA).
A weekly digest of client library updates from across the Cloud SDK.
A weekly digest of client library updates from across the Cloud SDK.
Preview: You can use capacity requests to request a large number of resources for a future date and time, and across multiple regions or zones. When you use capacity requests, you get best-effort assurance for the capacity that Google Cloud provisions, and you only pay for resources when you use them. This approach helps ensure that your Google Cloud project has sufficient capacity to prevent resource availability errors during unexpected growth, without committing to pay for resources that you might not use.
For more information, see About capacity requests.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-logging
3.23.3 (2025-08-20)
Dependencies
Your Application Monitoring dashboards will display latency, error rates, and traffic level for workloads deployed on Google Kubernetes Engine, when you instrument your application with OpenTelemetry. To learn more, see Instrument an application for Application Monitoring.
A weekly digest of client library updates from across the Cloud SDK.
Node.js
Changes for @google-cloud/storage
7.17.0 (2025-08-18)
Features
Bug Fixes
Go
Changes for storage/internal/apiv2
1.56.1 (2025-08-19)
Bug Fixes
cos-beta-125-19216-0-24
Kernel | Docker | Containerd | GPU Drivers |
COS-6.12.41 | v27.5.1 | v2.1.3 | See List |
Added kernel support for bare-metal on the NVIDIA Grace platform.
Added TDX RTMR support.
Removed the cloud-final.service dependency on multi-user.target which could delay cloud-init user-data scripts indefinitely when long-running startup scripts are used.
Disabled DNSSEC by default for COS TPU VMs.
Added IPv6 support for machines using the IDPF driver.
Enabled the google-guest-agent's network management functionality.
Added ConnectX-8 RDMA support.
Installed app-misc/c_rehash.
Fixed an issue where cpusets cgroups did not work with cgroup v1 enabled.
Fixed KCTF-abad3d0 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811484 -> 811541
cos-121-18867-199-43
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v27.5.1 | v2.0.6 | See List |
Disabled DNSSEC by default for COS TPU VMs.
Added IPv6 support for machines using the IDPF driver.
Added support for the Lustre 2.14.0_p216 drivers.
Fixed KCTF-abad3d0 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811736 -> 811817
cos-117-18613-339-44
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v24.0.9 | v1.7.28 | See List |
Disabled DNSSEC by default for COS TPU VMs.
Added IPv6 support for machines using the IDPF driver.
Added support for the Lustre 2.14.0_p216 drivers.
Fixed KCTF-abad3d0 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811771 -> 811728
cos-dev-129-19251-0-0
Kernel | Docker | Containerd | GPU Drivers |
COS-6.12.42 | v27.5.1 | v2.1.3 | See List |
Added support for the Lustre 2.14.0_p216 drivers.
Fixed KCTF-abad3d0 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811494 -> 811419
cos-113-18244-448-33
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.144 | v24.0.9 | v1.7.27 | See List |
Disabled DNSSEC by default for COS TPU VMs.
Fixed KCTF-abad3d0 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 812040 -> 812035
cos-109-17800-570-37
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.143 | v24.0.9 | v1.7.27 | See List |
Disabled DNSSEC by default for COS TPU VMs.
Fixed KCTF-abad3d0 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 812258 -> 812214
A weekly digest of client library updates from across the Cloud SDK.
In GKE version 1.33 and later, the Horizontal Pod Autoscaler has been re-architected for improved performance and scalability. This update enables a consistent 15-second recalculation period and supports up to 5,000 HPA objects per cluster.
For more information see, Horizontal Pod autoscaling.
Google Cloud NetApp Volumes now supports the external replication feature in allow-listed General Availability (GA) for Standard, Premium, and Extreme service levels. This feature uses bi-directional SnapMirror to replicate data between ONTAP-based systems and NetApp Volumes. For more information, see About external replication.
IPv4 and IPv6 address range filtering for VPC spokes is available in GA.
This feature lets you change IPv4 and IPv6 address ranges for VPC spokes that are exported to a hub.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-pubsub
1.141.3 (2025-08-19)
Bug Fixes
- Use the system executor instead of a separate thread pool for EOD ack/modack callbacks (#2526) (ffeb017)
Dependencies
- Update actions/checkout action to v5 (#2520) (409398a)
- Update dependency com.google.cloud:google-cloud-bigquery to v2.54.1 (#2523) (0678a74)
- Update dependency com.google.cloud:google-cloud-core to v2.60.0 (#2527) (0166e21)
- Update dependency com.google.cloud:google-cloud-storage to v2.55.0 (#2517) (b67acf1)
- Update dependency com.google.cloud:sdk-platform-java-config to v3.52.0 (#2528) (e424d11)
- Update dependency com.google.protobuf:protobuf-java-util to v4.32.0 (#2524) (44ff087)
- Update dependency org.assertj:assertj-core to v3.27.4 (#2518) (67695bc)
The DOCUMENT_TYPE/FINANCE/INVOICE
and DOCUMENT_TYPE/MEDICAL/RECORD
infoType detectors are available in global
and the asia
, europe
, and us
multi-regions. For more information about all infoTypes, see InfoType detector reference.
You can now terminate multiple active queries in your Spanner instance. Active queries are long-running queries that might affect the performance of your instance. Monitoring these queries can help you identify causes of instance latency and high CPU usage. Terminating queries might help free up resources and reduce the load on your instance.
For more information, see Monitor active queries.
August 23, 2025
Google SecOps SOARRelease 6.3.59 is being rolled out to the first phase of regions as listed here.
This release contains internal and customer bug fixes.
August 22, 2025
Apigee API hubDeprovision API hub in the UI
You can now deprovision an API hub instance from the API hub > Settings > Actions page in the Google Cloud console.
For more information, see Deprovision Apigee API hub.
Create and delete custom plugins in the UI
You can now create and delete custom plugins from the API hub > Settings > Plugins page in the Google Cloud console.
For more information, see Create custom plugins and Manage custom plugins.
Multi-statement transactions are now available for BigLake Iceberg tables in BigQuery. This feature is in Preview.
New Dataproc Serverless for Spark runtime versions:
- 1.2.58
- 2.2.58
- 2.3.9
Release 6.3.58 is now available for all regions.
August 21, 2025
Agent AssistArticle suggestion and FAQ Assist are no longer in use and you can't create new conversation profiles for them. These two features will be permanently removed on March 1, 2026. Refer to Generative knowledge assist for an alternative.
Announcing experimental features: help shape the future of Config Sync features by providing direct feedback.
- Introducing PostSync, a feature that lets you run custom actions like cleanup scripts or notifications right after your configurations are synced. We're looking for your feedback to shape its future! Check out the Post Sync discussion to share your thoughts, suggestions, and bug reports before December 1, 2025.
Config Sync now supports syncing from Secure Source Manager git repositories. For more information, see Grant access to Git.
Addressed multiple Common Vulnerabilities and Exposures (CVEs) by updating dependencies.
Support for Go 1.25 runtime is in General Availability (GA).
Support for Go 1.25 runtime is in General Availability (GA).
Starting September 25, 2025, the BigQuery Data Transfer Service for third-party SAAS and database connectors will update to a consumption-based pricing model. With this new pricing model, you will be charged based on the compute resources consumed by your data transfers, measured in slot-hours. For more information, see Data Transfer Service pricing. This pricing update applies to the following third-party connectors when they are generally available (GA):
- Facebook Ads
- MySQL
- Oracle
- PostgreSQL
- Salesforce
- Salesforce Marketing Cloud
- ServiceNow
- Other third-party connectors planned for future releases
A new Cloud Composer release has started on August 21, 2025. Get ready for upcoming changes and features as we roll out the new release to all regions. This release is in progress at the moment. Listed changes and features might not be available in some regions yet.
Improved the startup times of Airflow workers for environments that have a large number of custom PyPI packages installed.
This feature was announced previously and has finished gradually rolling out to all regions supported by Cloud Composer.
Airflow UI now shows the correct value of the [core]dags_folder
Airflow
configuration option.
(Airflow 2.10.5) The apache-airflow-providers-google
package was upgraded to version 17.1.0 in Cloud Composer 2 images and Cloud Composer 3 builds.
For more information about changes, see the apache-airflow-providers-google changelog from version 15.1.0 to version 17.1.0.
(Airflow 2.10.5) The apache-airflow-providers-cncf-kubernetes
package was upgraded to version 10.7.0 from version 10.6.1. For changes in other packages, see the preinstalled packages changelog.
New Airflow builds are available in Cloud Composer 3:
New images are available in Cloud Composer 2:
The following Cloud Composer versions and builds have reached their end of support period: composer-2.9.0, composer-2.9.1, and composer-3-airflow-2.7.3 builds from build.5 to build.13.
The following infrastructure is now integrated with Application Monitoring, which is in public preview.
- AlloyDB for PostgreSQL clusters and services
- Bigtable clusters and services
- Dataproc Metastore services
- Cloud Deploy delivery pipelines
- Firestore databases
- Secret Manager secrets
To learn more, see Application Monitoring overview and Supported infrastructure.
Support for Go 1.25 runtime is in General Availability (GA).
Support for Go 1.25 runtime is in General Availability (GA).
You can save and manage SQL queries in Cloud SQL Studio. This feature is in Preview. For more information, see Saved queries overview.
You can save and manage SQL queries in Cloud SQL Studio. This feature is in Preview. For more information, see Saved queries overview.
You can save and manage SQL queries in Cloud SQL Studio. This feature is in Preview. For more information, see Saved queries overview.
A security vulnerability was discovered in the Dataform API. This vulnerability could potentially allow unauthorized access to customer code repositories and data. For more information, see GCP-2025-045 security bulletin.
Serverless for Apache Spark: Fixed a bug in Dataproc Batches that occasionally caused higher latency before an application was started.
Vertex AI Agent Engine
Agent Engine now supports the following enterprise security features:
You can now deploy your agents in a private VPC environment, configuring a Private Service Connect interface, to ensure data privacy and meet security and compliance requirements. For more information, see Configure Private Service Connect interface.
You can now use your own customer-managed encryption keys (CMEK) to protect data at rest.
You can now specify customized resource controls, such as the minimum and maximum number of application instances, resource limits for each container, and concurrency for each container.
As a part of Vertex AI Platform, Vertex AI Agent Engine now supports HIPAA workloads.
For more information, see Agent Engine overview.
(New guide) Oracle PeopleSoft on Compute Engine with Oracle Exadata: Shows how to build the infrastructure to run Oracle PeopleSoft applications with OCI Exadata databases in Google Cloud.
The M4 machine series is generally available in GKE Autopilot clusters with version 1.33.4-gke.1013000 or later. For more information, see M4 in Resource requests in Autopilot.
Starting with GKE version 1.33.2-gke.1240000 and later, you can
now specify the network service tier (Standard or Premium) for ephemeral IP
addresses used by the gke-l7-regional-external-managed
GatewayClass. This
GatewayClass configures Regional External Application Load Balancers for single
clusters.
For more information, see Configure network tier for Gateway IP addresses.
(2025-R35) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- Version 1.33.3-gke.1136000 is now the default version for cluster creation in the Rapid channel.
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1414000
- 1.31.11-gke.1036000
- 1.32.6-gke.1125000
- 1.33.2-gke.1240000
- 1.33.3-gke.1250000
- 1.33.3-gke.1266000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1064000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.33.3-gke.1136000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1064000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
Regular channel
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1390000
- 1.31.11-gke.1002000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1125000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1125000 with this release.
Stable channel
- Version 1.32.6-gke.1060000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
Extended channel
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2488000
- 1.28.15-gke.2547000
- 1.29.15-gke.1656000
- 1.29.15-gke.1756000
- 1.30.12-gke.1390000
- 1.31.11-gke.1002000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2507000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2507000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1686000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1125000 with this release.
No channel
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1013000
- 1.33.1-gke.1584000
- 1.33.3-gke.1250000
- 1.33.3-gke.1266000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
Starting in GKE 1.33.3-gke.1136000, the validation of the
HealthCheckPolicy CRD is now performed earlier by GKE Gateway.
Hence, certain invalid policies are now rejected by kubectl
. The resulting
error message will specify why the policy is invalid.
(2025-R35) Version updates
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2488000
- 1.28.15-gke.2547000
- 1.29.15-gke.1656000
- 1.29.15-gke.1756000
- 1.30.12-gke.1390000
- 1.31.11-gke.1002000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2507000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2507000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1686000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1125000 with this release.
(2025-R35) Version updates
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1013000
- 1.33.1-gke.1584000
- 1.33.3-gke.1250000
- 1.33.3-gke.1266000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
(2025-R35) Version updates
- Version 1.33.3-gke.1136000 is now the default version for cluster creation in the Rapid channel.
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1414000
- 1.31.11-gke.1036000
- 1.32.6-gke.1125000
- 1.33.2-gke.1240000
- 1.33.3-gke.1250000
- 1.33.3-gke.1266000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1064000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.33.3-gke.1136000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.14-gke.1011000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1064000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.7-gke.1016000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.33 to version 1.33.3-gke.1136000 with this release.
(2025-R35) Version updates
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1390000
- 1.31.11-gke.1002000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1125000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1125000 with this release.
(2025-R35) Version updates
- Version 1.32.6-gke.1060000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
Enhanced curated detections has been enhanced with composite detection content for Mandiant Hunt Cloud Classification, including AWS, GCP, and Azure. This rule pack is available for Mandiant Threat Defense (MTD) customers with a Google Security Operations Enterprise or Enterprise Plus license.
Enhanced curated detections has been enhanced with composite detection content for Mandiant Hunt Cloud Classification, including AWS, GCP, and Azure. This rule pack is available for Mandiant Threat Defense (MTD) customers with a Google Security Operations Enterprise or Enterprise Plus license.
Sort table charts by up to 10 fields
Report creators can now set up to sort 10 fields for table charts, including fields that are not selected in the chart.
Looker connector respects LookML value_format
property
When you're using the Looker connector, value formats that you apply using the value_format
LookML property will now be displayed in Looker Studio reports. You can
view and edit the value format as usual.
Note that the syntax for
conditional formatting using value_format
is not supported in Looker Studio.
Partner connection launch update
The following partner connectors have been added to the Looker Studio Connector Gallery:
- Shopify by Master Metrics
- Tienda Nube by Master Metrics
- Google Merchant Center by Dataslayer
- Google Keyword Planner by Dataslayer
- Mangools SERPWatcher by Mangools.com
- Pipedrive by Master Metrics
- Facebook ads by Middly
- Google Merchant Center by Windsor.ai
- FB Page Data with AI by Picometrics
- LinkedIn Ads with AI by Picometrics
- 快客-GA4串接 by 黑客數位
- seoClarity Keyword Tags by seoClarity
- GA4 with AI insights by Picometrics
- Tracktest Company Results by Tracktest s.r.o.
- 快客-GAds 串接 by 黑客數位
- Salesforce by Adzviser
You can now use a Google-managed certificate when you create a create a Private Service Connect Secure Source Manager instance.
Chirp 3: Instant custom voice supports new input audio encodings PCM
, MP3
, and M4A
, with any sample rate. For more information, see the Chirp 3: Instant custom voice page.
You can automatically generate subtitle from your input video. For more information, see Configure automatically generated subtitles.
You can process videos with significant number of missing frame by using the fill_content_gaps
field. For more information, see troubleshooting guide
Vertex AI Agent Engine
Agent Engine now supports the following enterprise security features:
You can now deploy your agents in a private VPC environment, configuring a Private Service Connect interface, to ensure data privacy and meet security and compliance requirements. For more information, see Configure Private Service Connect interface.
You can now use your own customer-managed encryption keys (CMEK) to protect data at rest.
You can now specify customized resource controls, such as the minimum and maximum number of application instances, resource limits for each container, and concurrency for each container.
As a part of Vertex AI Platform, Vertex AI Agent Engine now supports HIPAA workloads.
For more information, see Agent Engine overview.
August 20, 2025
AlloyDB for PostgreSQLYou can save and manage your SQL scripts in AlloyDB Studio. This feature is in Preview. For more information, see Saved queries overview.
On August 20, 2025, we released an updated version of the Apigee UI.
Added Name column to API Products table
Added a column to the API Products table to display the product name. You can now filter and sort by the product name. The link to the API product detail page is now in the Name column instead of the Display Name column.
You can use custom constraints with Organization Policy to provide more granular control over specific fields for some Backup for GKE resources. For more information, see Manage Backup for GKE resources using custom constraints. This feature is generally available (GA).
For Cloud Run source deployed services and functions with GPU enabled, Cloud Run defaults to using Cloud Build's e2-highcpu-8
machine type for the build process when you use the gcloud beta run
command (Preview). This change allows for higher CPU support and faster build times, and also leads to a moderate increase in the overall cost of your service.
You can use instant snapshots to back up Extreme Persistent Disk volumes. For more information, see About instant snapshots.
Version 3.37 is released
All release notes published on this date are part of version 3.37.
The timing of the update to your instance depends on the deployment schedule that you have chosen. For more information, see Deployment schedules.
Restrict email transfers
You can now configure your instance to prevent users with the agent role from transferring email sessions to other agents. Agents can still assign unassigned emails to themselves, and users with the manager role can still transfer email sessions from agent to agent.
Administrators: There's a new Transfer Restrictions pane at Settings > Queue > Email > Edit / View > [queue] > Transfer Restrictions > Configure.
For more information, see Prevent email reassignment.
Skip the connecting message playback
You can now configure your instance to skip playback of the connecting message when calls are connected to agents.
Administrators: The Settings > Call > Call Details pane contains a new Skip the Connecting Message playback checkbox.
For more information, see Configure global call settings.
Workforce Management terminology update
We've updated the terminology in the Workforce Management interface to align with Google Cloud CCaaS terminology. For example, we've changed "supervisor" to "manager", "employee" to "agent", and "Supervisor Portal" to "Manager Portal".
Generative knowledge assist is available in Agent Desktop
Generative knowledge assist is now available in Agent Desktop as a widget that you can drag into a desktop panel.
For more information, see Create desktop layouts.
Generative knowledge assist is available in the agent adapter
Generative knowledge assist is now available in the agent adapter.
Web SDK version 3.37
Starting with version 3.37, web SDK releases align with portal releases and share the same version number.
Web SDK version 3.37 includes the following update: we've improved the accessibily of the web SDK to be in compliance with the European Accessibility Act.
The following issues were addressed in this release:
- Fixed an issue where a blank error message box appeared in the agent adapter when a call connected.
- Fixed an issue where the notification icon for a new message or event in the chat adapter didn't clear after the agent viewed the message or event.
Fixed a Conversational Insights issue where conversation recordings were split into a file for the human agent segment and a file for the virtual agent segment. Now all call segments are aggregated into a single recording file, which is more useful for conversational analysis.- Fixed an issue where a single call was being reported as two separate calls after the following occurred: (1) A call was escalated from a virtual agent to a queue, (2) An agent clicked Answer in the agent adapter, and (3) The end-user hung up before the countdown was complete.
- Fixed an issue where agents were unsure whether their action of declining a call was taking effect. Now, after an agent declines a call, the Decline button changes to Declining..., the Answer button is deactivated, and a message displays indicating that the call was declined.
- Fixed the message that appeared in the agent adapter when an agent left a multi-party session. Instead of saying that the session will be tranferred to the remaining agents(s), the message now says that the session will be transferred to the remaining participant(s). This is because the remaining participants might not be agents.
- Fixed an issue where administators were unable to monitor or barge into calls.
- Fixed an issue where the Decline button didn't display or didn't work correctly in the agent adapter when the following occurred: (1) An agent was in an active call, and (2) The agent received a second call on their direct number.
- Fixed an issue where clearing the Play Call Recording Message checkbox in Settings > Call > Call Details pane didn't work if the queue was configured for human agents and virtual agents or virtual agents only.
- Fixed an issue where the Transfer failed error message failed to appear in the call adapter after the following occured: a transferred call wasn't answered before the unanswered call expiration time expired.
- Fixed an issue where an agent on a team that was assigned to a queue wasn't able to select their desired queue to make an outbound call. We also improved the text at Settings > Call > Call Details > Queue Selection for Outbound Call to better describe the call adapter behavior.
- Fixed an issue where the missed chat message didn't appear after the missed chat threshold expired.
- Fixed an issue where end-users were unable to download chat transcripts containing special characters, emoji, or redacted content.
- Fixed an issue with the web SDK where configuring custom system messages with empty quotes or NULL values didn't fully suppress the messages.
- Fixed an issue with the web SDK where some non-English characters in downloaded chat transcripts were appearing as question marks.
- Fixed an issue in Hubspot where recordings of transferred calls were failing to save.
- Fixed an issue in Salesforce where the Call button in the call adapter wasn't working for outbound calls to a phone number that was associated with a previous record.
- Fixed an issue where the data in reports didn't match the data in the dashboards.
- Fixed an issue where virtual agent calls using Dialogflow CX failed, ending unexpectedly.
- Fixed two cross-site scripting vulnerabilites in the agent adapter.
- Fixed an issue where deltacast selected the agent with the longest time in the Available status instead of the agent with the longest time since their last customer interaction.
- Fixed an issue where escalations from a virtual agent to a human agent failed, and audio from the last agent response before human agent escalation was truncated.
- Fixed an issue where transcriptions weren't being created for IVR calls.
- Fixed an issue where agents could become stuck in wrap-up status, particularly with concurrent calls or quick callbacks.
A fix is available for an issue where the device-fs-monitor
component in the
Node Problem Detector generated false ReadOnlyLocalSSDDetected
warnings on
nodes that did not have local SSDs. This could cause customer confusion and
distracting warnings.
The fix is available in the following GKE versions:
- 1.32.6-gke.1096000 and later
- 1.33.0-gke.1712000 and later
New rules added to rule pack
Curated Detections has been enhanced with additional Chrome Enterprise Premium Browser Threat detections. The following rules have been added to the rule pack:
Dangerous Download with Matching Hashes by multiple users in Chrome Management
GTI High Severity File Download Event in Chrome Management
GTI Medium Severity File Download Event in Chrome Management
GTI Low Severity File Download Event in Chrome Management
Safe-browsing High Severity File Download Event in Chrome Management
Multiple Dangerous Download Events by same user in Chrome Management
Url Event to Newly Created Domain in Chrome Management
Composite detections are now generally available
The composite detections feature is now in General Availability. Composite detections lets you link multiple YARA-L rules to detect complex, multistage threats. This capability enhances detection by correlating alerts that individual rules might not detect.
For more information, see Overview of composite detections.
CrowdStrike Falcon: Version 63.0
Updated processing of
On-Demand Scan
alerts in the following connector:- Crowdstrike Falcon - Alerts Connector
Google Chronicle: Version 64.0
Added support for aggregated searches in the following action:
- Execute UDM Query
Microsoft Graph Mail: Version 30.0
Improved handling of
Case Name Template
in the following connector:- Microsoft Graph Mail - Microsoft Graph Mail Connector
Microsoft Graph Mail Delegated: Version 6.0
Improved handling of
Case Name Template
in the following connector:- Microsoft Graph Mail Delegated - Microsoft Graph Mail Delegated Connector
New rules added to rule pack
Curated Detections has been enhanced with additional Chrome Enterprise Premium Browser Threat detections. The following rules have been added to the rule pack:
Dangerous Download with Matching Hashes by multiple users in Chrome Management
GTI High Severity File Download Event in Chrome Management
GTI Medium Severity File Download Event in Chrome Management
GTI Low Severity File Download Event in Chrome Management
Safe-browsing High Severity File Download Event in Chrome Management
Multiple Dangerous Download Events by same user in Chrome Management
Url Event to Newly Created Domain in Chrome Management
Composite detections are now generally available
The composite detections feature is now in General Availability. Composite detections lets you link multiple YARA-L rules to detect complex, multistage threats. This capability enhances detection by correlating alerts that individual rules might not detect.
For more information, see Overview of composite detections.
Issues, chokepoints (for Google Cloud), and predefined security graph rules have been released to General Availability.
August 19, 2025
DataprocNew Dataproc on Compute Engine subminor image versions:
- 2.0.146-debian10, 2.0.146-ubuntu18, 2.0.146-rocky8
- 2.1.95-debian11, 2.1.95-ubuntu20, 2.1.95-ubuntu20-arm, 2.1.95-rocky8
- 2.2.63-debian12, 2.2.63-ubuntu22, 2.2.63-ubuntu22-arm, 2.2.63-rocky9
- 2.3.9-debian12, 2.3.9-ubuntu22, 2.3.9-ubuntu22-arm, 2.3.9-ml-ubuntu22, 2.3.9-rocky9
Reference lists retiring
The reference list functionality is being phased out of the Google SecOps platform.
October 2025: You'll no longer be able to create new reference lists. Instead, use data tables to provide expanded functionality.
Migration period: All existing reference lists will be automatically migrated to data tables. During this migration period, you can continue to use your existing reference lists without changes.
September 2026: The legacy reference list functionality will be fully retired from the platform. After that date, all data will be available only through the data table interface.
Reference lists retiring
The reference list functionality is being phased out of the Google SecOps platform.
October 2025: You'll no longer be able to create new reference lists. Instead, use data tables to provide expanded functionality.
Migration period: All existing reference lists will be automatically migrated to data tables. During this migration period, you can continue to use your existing reference lists without changes.
September 2026: The legacy reference list functionality will be fully retired from the platform. After that date, all data will be available only through the data table interface.
Large capacity volumes now support a maximum capacity of 3 PiB. For more information, see Large capacity volumes.
For Exadata Database Service, Oracle Database@Google Cloud supports region northamerica-northeast1
(Montréal, Québec, Canada, North America).
For a full list of supported locations, see Regional availability
August 18, 2025
Access ApprovalAccess Approval supports Firebase Data Connect in the GA stage.
Access Transparency supports Firebase Data Connect in the GA stage.
Standard canvas view
The integration editor now features a single, standard canvas view. The legacy canvas is no longer available.
A weekly digest of client library updates from across the Cloud SDK.
In the BigQuery console, you can now use the Reference panel to do the following:
In the query editor, you can use the Reference panel to preview the schema details of tables, snapshots, views, and materialized views, or open these resources in a new tab. You can also use the panel to construct new queries or edit existing queries by inserting query snippets or field names.
In the notebook editor, you can use the Reference panel to preview the schema details of tables, snapshots, views, or materialized views, or open these resources in a new tab.
This feature is generally available (GA).
When you use the Data Science Agent in BigQuery, you can now use the table selector to choose one or more BigQuery tables to analyze. The Data Science Agent is in Preview.
A weekly digest of client library updates from across the Cloud SDK.
Node.js
Changes for @google-cloud/bigtable
6.3.0 (2025-08-11)
Features
- Add client side metrics for checkAndMutateRow calls (#1661) (c258ea1)
- Add client side metrics for readModifyWriteRow calls (#1656) (2129312)
- Client side metrics support for mutateRows (#1638) (7601e4d)
- Collect client side metrics for sampleRowKeys calls (#1660) (6ed98fa)
- For client side metrics, record metrics as MUTATE_ROW for single row mutates (#1650) (f190a8c)
- Record ReadRows application latencies for client side metrics (#1647) (8af801b)
Bug Fixes
Java
Changes for google-cloud-bigtable
2.65.0 (2025-08-12)
Features
Database Migration Service for homogeneous PostgreSQL migrations to AlloyDB for PostgreSQL now supports PostgreSQL version 17. For more information, see Supported source and destination databases.
A weekly digest of client library updates from across the Cloud SDK.
cos-beta-125-19216-0-12
Kernel | Docker | Containerd | GPU Drivers |
COS-6.12.41 | v27.5.1 | v2.1.3 | See List |
Updated containerd to v2.1.3.
Updated the NVIDIA GPU driver policy for New Feature Branch (NFB) drivers. The LATEST tag has been updated to point to the stable 570.133.20 Production Branch. The 575.57.08 NFB driver remains available for development and testing but must now be selected by its specific version number.Removed 575.57.08 NFB driver support for NVIDIA_GB200 machine.
Upgraded nvidia-container-toolkit to v1.17.8. This fixes CVE-2025-23266.
Updated cos-gpu-installer to v2.5.5.
Upgraded the Linux kernel to version 6.12.
Upgrade dpdk-kmods to 9b182be2ee4b.
Added support for 7th generation TPU devices.
Patched a null ptr exception bug in NVIDIA 570.124.06 OSS driver.
iptables-restore.service to start after ipset.service.
Fixed an issue that resulted in missing grub boot measurements in some machine configurations.
Updated Python to v3.11.
Upgraded app-containers/docker to v27.5.1, Upgraded app-containers/docker-test to v27.5.1, Upgraded app-containers/docker-cli to v27.5.1.
Updated the default tag of the GPU driver supporting the NVIDIA H200 GPU device to 570.86.15.
Upgrade cloud-init to v24.4.1.
Backported support for AMD SEV-SNP SVSM vTPM driver and configfs-tsm addition for extended attestation protocol.
Added ARM support for the Lustre v2.14.0 drivers.
Added NVIDIA 570.133.20 vGPU driver.
Added support for Nvidia driver version 575.57.08. Added support for NVIDIA_RTX_PRO_6000 devices.
Supported NVIDIA MFT Tools on COS.
Injected IMEX channel char device for GB200 GPUs.
Fixed an issue in containerd that potentially breaks metric collection.
Fixed an issue in containerd that prevented some v2 shims from shutting down properly.
Added support for NVIDIA GB200 GPU with 570.124.06 GPU driver. This driver version has been assigned the latest, default, and R570 tags for this GPU type.
Add support for iRDMA devices.
Updated cos-gpu-installer to v2.4.8: Add the -skip-nvidia-smi flag to disable the execution of nvidia-smi verification during gpu driver installation.
Applied Intel patches to add iRDMA support in the Linux kernel.
Removed an artifact registry ping that would delay multi-user.target indefinitely for machines with no external IP address.
Reverted a containerd change which reduced the default soft file descriptor limit for processes in containers to 1024.
Upgraded app-admin/google-guest-configs to v20250718.00.
Added support for the Lustre 2.14.0_p212 drivers.
Fixed docker MTU mismatch.
Increased kdump memory reservation.
Fixed issue where modinfo could not display module signatures.
Upgraded app-admin/google-guest-agent to v20250418.00.
Upgraded sys-apps/makedumpfile to v1.7.7.
Modified toolbox to use unified cgroup hierarchy mode instead of hybrid mode when possible.
Upgraded app-containers/docker-credential-helpers to v0.9.3.
Fixed EINTR error in app-container/cni-plugins.
Upgraded sys-auth/pambase to v20250228.
Disabled martian logging for ConnectX-7 network cards. These cards only communicate locally, but martian logging during communications with the host can lead to a race condition which causes GID table construction to sometimes fail.
Upgraded app-containers/runc to v1.2.5, Upgraded app-containers/runc-test to v1.2.5.
Upgraded app-admin/node-problem-detector to v0.8.20.
Upgraded app-admin/fluent-bit to v3.2.5.
Upgraded chromeos-base/google-breakpad to v2025.07.23.214511-r244.
Upgraded chromeos-base/minijail to v18-r168.
Upgraded dev-libs/openssl to 3.5.1.
Upgraded dev-lang/go to v1.23.11.
Upgraded chromeos-base/shill-client to v0.0.1-r4879.
Upgraded chromeos-base/chromeos-common-script to v0.0.1-r667.
Upgraded chromeos-base/session_manager-client to v0.0.1-r2830.
Upgraded chromeos-base/power_manager-client to v0.0.1-r2969.
Upgraded chromeos-base/debugd-client to v0.0.1-r2734.
Upgraded sys-apps/rootdev to v0.0.1-r51.
Upgraded sys-apps/dbus to v1.16.2-r197.
Upgraded app-benchmarks/microbenchmarks to v0.0.1-r20.
Upgraded chromeos-base/update_engine-client to v0.0.1-r2480.
Updated dev-python/requests to v2.32.4.
Upgraded net-misc/openssh to 10.0_p1.
Upgraded dev-db/sqlite to v3.50.3.
Upgraded virtual/logger to v0-r2.
Upgraded sys-apps/pv to v1.9.34.
Upgraded app-admin/sudo to v1.9.17_p2.
Upgraded sys-process/lsof to v4.99.5.
Updated app-misc/jq to v1.8.1.
Upgraded sys-apps/less to v679.
Upgraded sys-process/procps to v4.0.5-r2.
Upgraded sys-libs/libcap to v2.76.
Upgraded sys-apps/ethtool to version 6.11.
Upgraded app-arch/gzip to v1.14.
Upgraded net-dns/libidn2 to v2.3.8.
Upgraded sys-apps/grep to v3.12.
Upgraded sys-apps/diffutils to v3.11-r2.
Upgraded net-nds/rpcbind to v1.2.7.
Upgraded net-misc/rsync to v3.4.1.
Upgraded dev-libs/nss to v3.110.
Upgraded sys-libs/libseccomp to v2.6.0-r2.
Upgraded dev-libs/expat to v2.7.1.
Upgraded app-arch/unzip to v6.0_p29.
Upgraded sys-apps/acl to v2.3.2-r2.
Updated dev-python/s3transfer to v0.11.4.
Updated dev-python/botocore to v1.37.9.
Updated dev-python/python-dateutil to v2.9.0.
Upgraded sys-apps/which to v2.23.
Upgraded dev-libs/double-conversion to v3.3.1.
Upgraded net-misc/socat to v1.8.0.3.
Upgraded sys-apps/hwdata to v0.391.
Upgraded sysram to version 6.12-0.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to v1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2024-6174 and CVE-2024-11584 in cloud-init.
Fixed CVE-2025-47273 in dev-python/setuptools.
Updated systemd to v254.26. This resolves CVE-2025-4598.
Updated apparmor to v3.1.6. This fixes CVE-2016-1585.
Update NVIDIA GPU drivers to v535.247.01 for default/ R535 and v570.133.20 for latest/R570. This resolves CVE‑2025‑23244.
Fixed CVE-2025-8058 in glibc.
Upgraded dev-libs/glib to 2.82.5. This resolves CVE-2024-52533.
Patched openssl to fix CVE-2023-50782 affecting dev-python/crytography.
Updated dev-go/net in policy manager to v0.39.0. This fixes CVE-2025-22870.
Upgraded dev-go/crypto to v0.35.0. This fixes CVE-2025-22869.
Updated dev-go/oauth2 to v0.27.0. Fixes CVE-2025-22868.
Fixed CVE-2024-13176 in dev-libs/openssl.
Fixed CVE-2025-0395 in sys-libs/glibc.
Fixed CVE-2024-9287 in dev-lang/python.
Fixed CVE-2025-0840 in binutils.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Fixed CVE-2024-26130 in dev-python/cryptography.
Updated app-editors/nano to v8.5. This resolves CVE-2024-5742.
Upgraded vim, vim-core to version 9.1.1500. This fixes CVE-2025-26603, CVE-2025-27423, CVE-2025-29768, CVE-2025-1215, CVE-2025-24014, CVE-2025-22134.
Upgrade libarchive to v3.8.1. This fixes CVE-2025-5914.
Upgraded elfutils to v0.193. This fixes CVE-2025-1365, CVE-2025-1371, CVE-2025-1372, and CVE-2025-1377.
Fixed CVE-2024-23337 in app-misc/jq.
Upgraded net-misc/curl to v8.12.1. This fixes CVE-2025-0167.
Fixed CVE-2025-46836 in sys-apps/net-tools
Fixed CVE-20250-3198 in sys-libs/bintuils-libs.
Fix CVE-2025-32414, CVE-2025-32415 in dev-libs/libxml2.
Fixed CVE-2025-32728 in net-misc/openssh.
Fixed CVE-2024-53427 in app-misc/jq.
Fixed CVE-2025-31498 in net-dns/c-ares.
Fixed CVE-2024-48615 in app-arch/libarchive.
Upgraded net-misc/wget to v1.25.0. This fixes CVE-2024-10524.
Upgraded dev-libs/libxml2 to v1.12.10. Fixes CVE-2025-27113.
Runtime sysctl changes:
- Added: kernel.apparmor_restrict_unprivileged_unconfined: 0
- Added: kernel.core_file_note_size_limit: 4194304
- Added: kernel.core_sort_vma: 0
- Added: net.ipv4.fib_multipath_hash_seed: 0
- Added: net.ipv4.tcp_pingpong_thresh: 1
- Added: net.ipv6.conf.all.ra_honor_pio_life: 0
- Added: net.ipv6.conf.all.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.all.regen_min_advance: 2
- Added: net.ipv6.conf.default.ra_honor_pio_life: 0
- Added: net.ipv6.conf.default.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.default.regen_min_advance: 2
- Added: net.ipv6.conf.docker0.ra_honor_pio_life: 0
- Added: net.ipv6.conf.docker0.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.docker0.regen_min_advance: 2
- Added: net.ipv6.conf.eth0.ra_honor_pio_life: 0
- Added: net.ipv6.conf.eth0.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.eth0.regen_min_advance: 2
- Added: net.ipv6.conf.lo.ra_honor_pio_life: 0
- Added: net.ipv6.conf.lo.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.lo.regen_min_advance: 2
- Added: vm.enable_soft_offline: 1
- Changed: fs.epoll.max_user_watches: 1809007 -> 1808517
- Changed: fs.fanotify.max_user_marks: 67544 -> 68412
- Changed: fs.file-max: 811774 -> 811484
- Changed: fs.inotify.max_user_watches: 63425 -> 64189
- Changed: kernel.threads-max: 63487 -> 63178
- Changed: net.ipv4.tcp_mem: 94041 125391 188082 -> 94017 125357 188034
- Changed: net.ipv4.udp_mem: 188085 250783 376170 -> 188034 250715 376068
- Changed: user.max_cgroup_namespaces: 31743 -> 31589
- Changed: user.max_fanotify_marks: 67544 -> 68412
- Changed: user.max_inotify_watches: 63425 -> 64189
- Changed: user.max_ipc_namespaces: 31743 -> 31589
- Changed: user.max_mnt_namespaces: 31743 -> 31589
- Changed: user.max_net_namespaces: 31743 -> 31589
- Changed: user.max_pid_namespaces: 31743 -> 31589
- Changed: user.max_time_namespaces: 31743 -> 31589
- Changed: user.max_user_namespaces: 31743 -> 31589
- Changed: user.max_uts_namespaces: 31743 -> 31589
- Changed: vm.lowmem_reserve_ratio: 256 256 32 0 0 -> 256 256 32 0
- Deleted: kernel.sched_child_runs_first: 0
cos-dev-129-19246-0-0
Kernel | Docker | Containerd | GPU Drivers |
COS-6.12.41 | v27.5.1 | v2.1.3 | See List |
Backported support for AMD SEV-SNP SVSM vTPM driver and configfs-tsm addition for extended attestation protocol.
Enabled the google-guest-agent's network management functionality.
Added ConnectX-8 RDMA support.
Upgraded app-admin/google-guest-configs to v20250807.00.
Upgraded chromeos-base/chromeos-common-script to v0.0.1-r668.
Upgraded dev-lang/go to v1.23.12.
Upgraded dev-db/sqlite to v3.50.4.
Upgraded net-nds/rpcbind to v1.2.8.
Upgraded sys-apps/gentoo-functions to v1.7.4.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
cos-113-18244-448-29
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.144 | v24.0.9 | v1.7.27 | See List |
Added NVIDIA GPU driver's R580 branch. Updated the LATEST GPU driver label to version 580.65.06.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Fixed CVE-2025-38499 in the linux kernel.
Added NVIDIA GPU driver's R580 branch. Updated the LATEST GPU driver label to version 580.65.06.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Fixed CVE-2025-38499 in the linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 812031 -> 812040
cos-109-17800-570-33
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.143 | v24.0.9 | v1.7.27 | See List |
Added NVIDIA GPU driver's R580 branch. Updated the LATEST GPU driver label to version 580.65.06.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Fixed CVE-2025-38499 in the Linux kernel.
Added NVIDIA GPU driver's R580 branch. Updated the LATEST GPU driver label to version 580.65.06.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Fixed CVE-2025-38499 in the linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 812266 -> 812258
cos-121-18867-199-38
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v27.5.1 | v2.0.6 | See List |
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811774 -> 811736
cos-117-18613-339-39
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v24.0.9 | v1.7.28 | See List |
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Upgraded sys-libs/binutils-libs to version 2.45. This fixes CVE-2025-8224,CVE-2025-8225 and CVE-2025-1153.
Fixed KCTF-01d3c84 in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811830 -> 811771
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-datastore
2.31.2 (2025-08-08)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.61.0 (c7bd68d)
Dependencies
You can allow the exchange of privately used public IPv4 addresses with VPC spokes and producer VPC spokes.
You can use custom constraints with Organization Policy to provide more granular control over specific fields for some Backup for GKE resources. For more information, see Manage Backup for GKE resources using custom constraints. This feature is generally available.
You can now use organization policy conditions to match a tag key. This lets you enable or disable enforcement against all resources with that tag key, regardless of what tag value is attached. For more information, see Setting an organization policy with tags.
You can use custom constraints with Organization Policy to provide more granular control over specific fields for some Backup for GKE resources. For more information, see Manage Backup for GKE resources using custom constraints. This feature is generally available.
You can now use organization policy conditions to match a tag key. This lets you enable or disable enforcement against all resources with that tag key, regardless of what tag value is attached. For more information, see Setting an organization policy with tags.
General availability support for the following integration:
August 17, 2025
Google SecOps SOARRelease 6.3.58 is being rolled out to the first phase of regions as listed here.
This release contains internal and customer bug fixes.
August 16, 2025
Google SecOps SOARRelease 6.3.57 is now available for all regions.
August 15, 2025
Cloud BuildC3 and N2D machine families are now generally available in private pools. For a complete list of supported machines, see the machineType
entry in the private pool configuration file schema.
In addition, the Create private pool and Edit private pool pages now show a monthly estimate based on the pool's machine type configuration. For more information, see View private pool price estimates.
Now you can use Private Service Connect backends, as an alternative to Private Service Connect endpoints, to access Cloud SQL instances.
Now you can create an IPv6 endpoint for Private Service Connect (PSC) connections. For more information, see Connect to an instance using Private Service Connect.
You can no longer set a deny maintenance period for instances that are running a maintenance version older than 12 months. To update your instance, perform self-service maintenance or wait until the next maintenance window to update your instance automatically. For more information about maintenance, see Maintenance updates on Cloud SQL instances.
Now you can use Private Service Connect backends, as an alternative to Private Service Connect endpoints, to access Cloud SQL instances.
Now you can create an IPv6 endpoint for Private Service Connect (PSC) connections. For more information, see Connect to an instance using Private Service Connect.
You can no longer set a deny maintenance period for instances that are running a maintenance version older than 12 months. To update your instance, perform self-service maintenance or wait until the next maintenance window to update your instance automatically. For more information about maintenance, see Maintenance updates on Cloud SQL instances.
Now you can use Private Service Connect backends, as an alternative to Private Service Connect endpoints, to access Cloud SQL instances.
Now you can create an IPv6 endpoint for Private Service Connect (PSC) connections. For more information, see Connect to an instance using Private Service Connect.
You can no longer set a deny maintenance period for instances that are running a maintenance version older than 12 months. To update your instance, perform self-service maintenance or wait until the next maintenance window to update your instance automatically. For more information about maintenance, see Maintenance updates on Cloud SQL instances.
Quality AI offers the virtual agent platform to help with quality management for virtual agents. The virtual agent platform presents data for the following metrics, aggregated across all an agent's conversations:
- Rate of escalation to a human agent
- Latencies with respect to operations that an agent performs
- Customer sentiments
Conversational Insights offers conversation datasets in preview. Choose from your existing history or upload new conversations to curate customized datasets to test and evaluate the results of Agent Assist summarization.
Numerous IDE performance improvements
Numerous improvements to VS Code Gemini Code Assist performance, including reductions in CPU usage, memory usage, and extension slowdown.
Release channel name in VS Code chat banner
VS Code Gemini Code Assist shows the configured Release Channel when you're opted into an experimental channel and are using a Standard or Enterprise license.
Delete prompt and response pair in IntelliJ
You can delete your prompt and Gemini's response to that prompt in your chat with IntelliJ Gemini Code Assist. This works as an alternative to deleting your entire chat history, allowing you to remove a single prompt and response within a chat, while maintaining the rest of your chat history with Gemini Code Assist.
This is a minor release of Google Distributed Cloud connected (version 1.10.0).
The following new functionality has been introduced in this release of Google Distributed Cloud connected:
Pause and resume cluster software upgrades. Software upgrades for your Google Distributed Cloud connected clusters now automatically pause when a maintenance window ends and automatically resume when the next maintenance window starts. For more information, see Availability best practices.
VM management in Cloud Console for GDCc servers. You can now manage virtual machine workloads running on your Google Distributed Cloud connected servers deployments through the Cloud Console. For more information, see Manage virtual machines on Distributed Cloud connected servers.
Kernel memory accounting control. You can now configure the
NodeSystemConfigUpdate
Network Function operator resource to exclude kernel-space memory from Pod memory usage calculation. For more information, seeNodeSystemConfigUpdate
resource.Configurable per-node subnet mask size. The
Network
Network Function operator resource now allows you to configure the subnet mask size for each node. For more information, seeNetwork
resource.Raw workload log export. You can now access raw (unprocessed and untagged) workload logs for your Pods for export to your own log processor. For more information, see Collect raw workload logs for external processing.
The following changes to existing functionality have been introduced in this release of Google Distributed Cloud connected:
- Reduced minimum internet connection bandwidth requirement. The minimum internet connection bandwidth required by Google Distributed Cloud connected to function reliably has been reduced. For more information, see Internet connection bandwidth.
Security mitigations for the following vulnerabilities have been implemented in this release of Google Distributed Cloud connected:
OS layer security mitigations: CVE-2024-56664, CVE-2024-56658, CVE-2023-52664, CVE-2024-27010, CVE-2024-56647, CVE-2024-53091.
GDC software-only security mitigations: All mitigations listed in the GDC software-only release notes from version 1.30.500 up to version 1.31.400 (inclusive).
The following Google Distributed Cloud connected components have been updated:
EdgeOS kernel has been updated to version 5.15.177.
GDC software-only has been updated from version 1.30.500 to version 1.31.400. (This component was formerly known as GKE on Bare Metal and as Anthos Clusters on Bare Metal.)
Kubernetes has been updated from version 1.30 to version 1.31.
Symcloud Storage has been updated from version 5.4.14 to version 5.4.16.
The following issues have been resolved in this release of Google Distributed Cloud connected:
Storage is now freed immediately upon cluster deletion. After deleting a cluster, the storage used by that cluster is now freed up immediately. You no longer have to manually delete all persistent volumes in a cluster before deleting the cluster itself.
Virtual machine workloads no longer fail to restart or migrate if DHCP server address changes. If you are using DHCP to assign IP addresses to your virtual machine workloads and the IP address of your DHCP server changes, your virtual machine workloads now automatically restart and successfully complete migration.
This release of Google Distributed Cloud connected contains the following known issues:
Machines can experience intermittent connectivity loss. Google Distributed Cloud connected machines can experience intermittent connectivity loss due to a rare condition that can occur with fleet credential management. To remedy this issue, contact Google Support.
The
anthos-multinet
container might take up to two hours to fully start. You might intermittently experience a slower than normal startup for theanthos-multinet
container (up to two hours). To remedy this issue, contact Google Support.Virtual machine workloads cannot coexist on the same virtual network with Pods that use DHCP for IP address assignment. This is because virtual machine workloads need the
IPAMMode
parameter set toexternal
to use DHCP, while Pods need theIPAMMode
parameter set tointernal
to use DHCP. Pods with static IP address are not affected by this. This behavior is by design.
For clusters enrolled in the Extended channel, you can now use Gateway with GKE version 1.30 or later, or customized sysctl configuration options.
You can now receive a patch version in a release channel as soon as the version is available and before GKE sets the version as an auto-upgrade target in the channel by using accelerated patch auto-upgrades. Receiving patch versions earlier can help accelerate auto-upgrade timelines for patches, especially for use cases such as accelerating your compliance with security requirements.
For more information, see Accelerated patch auto-upgrades.
AI Protection helps you manage the security posture of your AI workloads by detecting threats and helping you to mitigate risks to your AI asset inventory. This product is available in Preview to the Security Command Center Enterprise tier.
The AUSTRIA_SOCIAL_SECURITY_NUMBER
infoType detector is available in all regions. For more information about all built-in infoTypes, see the InfoType detector reference.
During discovery operations, Sensitive Data Protection scans the contents of various archive files. For a list of supported file types, see Supported file clusters in discovery operations.
August 14, 2025
BigQueryYou can now visualize your geospatial query results on an interactive map in BigQuery studio. This feature is in preview.
You can use cross region federated queries to query Spanner tables from regions other than the source BigQuery region. These cross region queries incur additional Spanner network egress charges. This feature is generally available (GA).
The Python buildpack supports Cloud Run source deployments for modern web frameworks such as FastAPI, Gradio, and Streamlit.
For Python version 3.13 and later, the Python buildpack sets the default entrypoint for Cloud Run source deployments based on the web server or framework configuration in your requirements.txt
file. For more information, see Build a Python application.
For the July 2025 semi-annual methodology refresh (released in mid-August 2025), we implemented the following improvements and updated the carbon model to version 14:
Updating Scope 1 & 3 emissions from Google's corporate footprint:
- Updated Scope 1 & 3 allocation factors using latest Google company-wide data from 2025 Google Environmental Report. See the non-electricity emission sources section of methodology documentation on how we apply these Scope 1 & 3 emissions across Google products and services.
Updating inputs for Scope 2 market-based emissions calculation from Google's corporate footprint:
- Updated annual renewable electricity percentage from Google's clean energy procurement, in accordance with 2025 Google Environmental Report, as an input for Scope 2 market-based emissions.
- Updated annual emissions factors from latest government sources, in accordance with 2025 Google Environmental Report, as an input for Scope 2 market-based emissions. Note that Scope 2 location-based emissions are estimated using hourly greenhouse gas emissions factors. Read more about the difference in methodology between Scope 2 location-based and market-based emissions in the methodology document.
Improving data accuracy:
- A data issue impacting Cloud Run emissions calculations for March 2025 has been resolved. Incorrect carbon footprint data were generated for some Cloud Run SKUs due to a bug in our data processing logic, resulting in inflated carbon emission figures for affected users.
- To correct your historical data, please run a backfill for March 2025 in your carbon footprint export. Due to a half-month lag in our data release, you will need to backfill the data for April 15, 2025, which will then update the March 2025 data in your BigQuery table. Data for all other periods remains unaffected.
Updating service coverage:
- Integration Connectors and Application Integration were removed from covered services of Carbon Footprint, due to potential mis-attribution of carbon to these services. We are actively investigating and working on the improvements. Once internal data mapping improves for a service, we plan to add it back.
Deprecating carbon offsets fields from schema:
The
carbon_offsets_kgCO2e
andcarbon_footprint_total_kgCO2e.after_offsets
fields have been deprecated in the Carbon Footprint schema due to Google's strategic shift from traditional carbon offsets to a direct focus on carbon removal technologies and projects. If you have already set up an export, these two fields have been set to NULL and will not be updated.This change is in line with Google's evolving strategy for achieving its net-zero climate goals with more robust and impactful climate solutions such as carbon removal technologies. Read more about Google's progress to accelerate carbon removal solutions.
Database Migration Service now supports Private Service Connect interfaces for network connectivity in homogeneous Cloud SQL for MySQL, Cloud SQL for PostgreSQL, and AlloyDB for PostgreSQL migrations. For more information, see the following pages:
The Python buildpack supports Cloud Run source deployments for modern web frameworks such as FastAPI, Gradio, and Streamlit.
For Python version 3.13 and later, the Python buildpack sets the default entrypoint for Cloud Run source deployments based on the web server or framework configuration in your requirements.txt
file. For more information, see Build a Python application.
Public Preview: You can now access the Compute Engine alpha API at the project level through a self-service process. By enabling the alpha API, you can use the Google Cloud console, gcloud CLI, API, and Terraform to view and manage Preview features. For more information, see Use the Compute Engine alpha API.
Config Controller now uses the following versions of its included products:
- Config Connector v1.132.1, release notes
- Config Sync v1.21.3, release notes
cos-121-18867-199-34
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v27.5.1 | v2.0.6 | See List |
Fixed CVE-2025-38499 in the linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811817 -> 811774
cos-117-18613-339-36
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v24.0.9 | v1.7.28 | See List |
Fixed CVE-2025-38499 in the linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811765 -> 811830
New Dataproc Serverless for Spark runtime versions:
- 1.2.57
- 2.2.57
- 2.3.8
Imagen
Imagen 4 is Generally Available.
Imagen 4 introduces the following models:
For more information, see Generate images using text prompts and Image generation API.
Gemma 3 270M, Wan 2.2 and Wan 2.1 models are available through Model Garden.
VMware Engine v2
nodes are now available in the Santiago, Chile (southamerica-west1-b
) zone in the Santiago region (southamerica-west1
) region.
(2025-R34) Version updates
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2475000
- 1.28.15-gke.2527000
- 1.29.15-gke.1639000
- 1.29.15-gke.1713000
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1060000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2488000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2488000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1656000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1096000 with this release.
You can now configure GKE clusters to have a default compute class in GKE versions 1.33.1-gke.1744000 or later. For more details, see the default custom compute class documentation.
(2025-R34) Version updates
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.4-gke.1767000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
(2025-R34) Version updates
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1390000
- 1.31.11-gke.1002000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1125000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1125000 with this release.
(2025-R34) Version updates
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1060000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1096000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1096000 with this release.
(2025-R34) Version updates
- Version 1.32.6-gke.1025000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.6-gke.1013000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
(2025-R34) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1390000
- 1.31.11-gke.1002000
- 1.32.6-gke.1096000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1125000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1414000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1036000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1125000 with this release.
Regular channel
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1060000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1096000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1096000 with this release.
Stable channel
- Version 1.32.6-gke.1025000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.6-gke.1013000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
Extended channel
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2475000
- 1.28.15-gke.2527000
- 1.29.15-gke.1639000
- 1.29.15-gke.1713000
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1060000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2488000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2488000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1656000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1096000 with this release.
No channel
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.4-gke.1767000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
Background colors for bar and column chart labels
You can now set a data-label background color for any bar-label-position option for column and bar charts.
Learn more about data labels for bar charts and column charts.
Partner connection launch update
The following partner connectors have been added to the Looker Studio Connector Gallery:
- 快客-Thread 社群洞察 by 黑客數位
- Beeswax by Supermetrics
- PrestaShop by Supermetrics
- Moloco DSP by Supermetrics
- Google Merchant Center by Power My Analytics
- Shopee Commerce by Supermetrics
- Ad & Analytics Datastore by ReportDash
- WooCommerce AppiWorks by Jivrus Technologies
- 快客-Threads 社群洞察 by 黑客數位
- 快客-META 社群串接 by 黑客數位
- 快客-GSC 串接 by 黑客數位
- 快客-LINE Lap 串接 by 黑客數位
- Odoo Expense AppiWorks by Jivrus Technologies
- Facebook Ads by AlkhwarizmiMetrics
- Salesforce by Power My Analytics
- Google My Business by Master Metrics
- Azure Table by Windsor.ai
- 快客-META串接 by 黑客數
- Instagram Business Insights by AlkhwarizmiMetrics
- Deputy by smblytics LLC
- Onfleet by mblytics LLC
- Yoom by Yoom Inc.
- Shopify - Cratos.ai by Cratos.ai
- Snapchat Ads - Cratos.ai by Cratos.ai
- Linkedin Ads - Cratos.ai by Cratos.ai
- Google My Business - Free by Data Bloo
- STAT Rankings: Site by Moz, Inc.
- STAT Ranking Distrib: Site by Moz, Inc.
- STAT SoV: Site by Moz, Inc.
- STAT Rankings: Tag by Moz, Inc.
- STAT Ranking Distrib: Tag by Moz, Inc.
- STAT SoV: Tag by Moz, Inc.
- Zid Stores by AlkhwarizmiMetrics
- Tiktok Ads - Cratos.ai by Cratos.ai
- Plausible Analytics by Plausible Analytics
- Salla Stores by AlkhwarizmiMetrics
- LinkedIn Ads by AlkhwarizmiMetrics
- TikTok GMV by Catchr
- Xandr by Catchr
- Google DV 360 by Catchr
- Facebook Page Insights by AlkhwarizmiMetrics
- Kommo by Master Metrics
Oracle Database@Google Cloud introduces ODB Networks and ODB Subnets, which let you connect your Oracle Database@Google Cloud resources in the Oracle Cloud Infrastructure (OCI) child site with your Google Cloud VPC network. This feature is generally available (GA). For information about deployment options, see Set up Oracle Database@Google Cloud environment, and to learn how to create ODB Networks and Subnets, see Create ODB Networks and ODB Subnets.
Integrated data loss prevention (DLP) is now generally available
You can use customer-managed encryption keys (CMEKs) to protect data at rest in Security Command Center. This feature is available in General Availability. For more information, see Enable CMEK for Security Command Center.
You can now use cross region federated queries to query Spanner tables from regions other than the source BigQuery region. These cross region queries incur additional Spanner network egress charges. This feature is generally available (GA).
Gemma 3 270M, Wan 2.2 and Wan 2.1 models are available through Model Garden.
August 13, 2025
AI ApplicationsVertex AI Search: Custom ranking of search results (GA)
You can modify the ranking behavior of your search app using custom ranking. Custom ranking lets you provide a mathematical expression that relies on a set of model-computed signals (such as semantic relevance score and keyword similarity score) and document-based signals (such as a custom field like distance or document age). The resulting ranking of the search results is more considered and likely matches a user's needs better than a purely embedding-based ranking.
For more information, see Customize search results ranking.
You can aggregate table data with Gemini assistance in your BigQuery data preparations. Aggregations in data preparations are in Preview.
The following resource types are now publicly available through the ExportAssets, ListAssets, BatchGetAssetsHistory, QueryAssets, Feed, and Search (SearchAllResources, SearchAllIamPolicies) APIs.
- Cloud Speech-to-Text
speech.googleapis.com/Endpoint
speech.googleapis.com/Model
- Looker
looker.googleapis.com/Backup
Cross-Site Interconnect (Preview) support is available in the following colocation facilities:
- Global Switch Singapore, Singapore
For more information, see the Locations table and Global Locations.
You can set multiple environment variables using the .env
file (Preview). For more information, see Configure environment variables for services, jobs, and worker pools.
Cloud SQL now supports Private Service Connect (PSC) outbound connectivity. With PSC outbound connectivity, you can attach a PSC interface to your existing Cloud SQL PSC-enabled instances to allow your instances to make outbound connections to your network. This is required for homogeneous migrations using Database Migration Service. For more information, see PSC outbound connections.
Cloud SQL now supports Private Service Connect (PSC) outbound connectivity. With PSC outbound connectivity, you can attach a PSC interface to your existing Cloud SQL PSC-enabled instances to allow your instances to make outbound connections to your network. This is required for homogeneous migrations using Database Migration Service. For more information, see PSC outbound connections.
Cloud SQL now supports Private Service Connect (PSC) outbound connectivity. With PSC outbound connectivity, you can attach a PSC interface to your existing Cloud SQL PSC-enabled instances to allow your instances to make outbound connections to your network. For more information, see PSC outbound connections.
Generally available: License Manager is now generally available. License Manager lets you subscribe, manage, and track your third-party license usage on Google Cloud. As an administrator, you can use License Manager to offer per-user licensing products, like Microsoft Office, to your users with no long-term commitments and no overhead of managing compliance.
For more information, see About License Manager.
OpenAI's gpt-oss-120b and gpt-oss-20b are available as Model as a Service (MaaS) models in Model Garden.
Qwen3 Coder and Qwen3 235B are available as Model as a Service (MaaS) models in Model Garden.
Check the version number of your instance
You can now check the version number of your instance and compare it with the version numbers of the updates and patches that Google announces in these release notes. In this way you can know which capabilities are available in your instance. For more information, see Check the version number of your instance.
Google Distributed Cloud (software only) for VMware 1.31.800-gke.32 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.31.800-gke.32 runs on Kubernetes v1.31.10-gke.300.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
Google Distributed Cloud for bare metal 1.31.800-gke.32 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.31.800-gke.32 runs on Kubernetes v1.31.10-gke.300.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following issues were fixed in 1.31.800-gke.32:
Fixed an issue where the CronJob for periodic health checks wasn't updating after configuration changes.
Fixed an issue that caused the Ansible playbook for handling Customer-Acquired Licenses (CAL) to fail and not complete.
Fixed vulnerabilities listed in Vulnerability fixes.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
New parser documentation now available
New parser documentation is available to help you ingest and normalize logs from the following sources:
- Collect Anomali ThreatStream IOC logs
- Collect Cisco Application Control Engine (ACE)
- Collect Cisco Firepower NGFW logs
- Collect Cisco Firewall Service Module (FWSM)
- Collect Cisco IronPort logs
- Collect Cisco PIX logs
- Collect Cisco Prime logs
- Collect Cisco Wireless Intrusion Prevention System (WIPS) logs
- Collect Cisco Wireless LAN Controller (WLC) logs
- Collect Cisco Wireless Security Management (WiSM) logs
- Collect Cloudian HyperStore logs
- Collect CrushFTP logs
- Collect Delinea Distributed Engine logs
- Collect Duo User context logs
- Collect ExtraHop DNS logs
- Collect ExtraHop RevealX logs
- Collect Extreme Networks switch logs
- Collect Extreme Networks Wireless logs
- Collect MuleSoft Anypoint logs
- Collect Palo Alto Prisma SD-WAN logs
- Collect Recorded Future IOC logs
- Collect Veeam logs
- Collect Veridium ID logs
- Collect VMware Tanzu logs
- Collect VMware vCenter logs
- Collect VMware vRealize logs
- Collect VMware vSphere logs
- Collect VSFTPD logs
- Collect VyOS logs
- Collect Workday audit logs
- Collect Yamaha router logs
New CyberArk Credential Provider integration
Jira: Version 47.0
Updated timestamp processing logic in the following jobs:
Sync Comments
Sync Closure
Updated logic for processing closed tickets in the following job:
- Sync Closure
Microsoft Graph Mail: Version 29.0
- Integration: Updated dependencies.
New parser documentation now available
New parser documentation is available to help you ingest and normalize logs from the following sources:
- Collect Anomali ThreatStream IOC logs
- Collect Cisco Application Control Engine (ACE)
- Collect Cisco Firepower NGFW logs
- Collect Cisco Firewall Service Module (FWSM)
- Collect Cisco IronPort logs
- Collect Cisco PIX logs
- Collect Cisco Prime logs
- Collect Cisco Wireless Intrusion Prevention System (WIPS) logs
- Collect Cisco Wireless LAN Controller (WLC) logs
- Collect Cisco Wireless Security Management (WiSM) logs
- Collect Cloudian HyperStore logs
- Collect CrushFTP logs
- Collect Delinea Distributed Engine logs
- Collect Duo User context logs
- Collect ExtraHop DNS logs
- Collect ExtraHop RevealX logs
- Collect Extreme Networks switch logs
- Collect Extreme Networks Wireless logs
- Collect MuleSoft Anypoint logs
- Collect Palo Alto Prisma SD-WAN logs
- Collect Recorded Future IOC logs
- Collect Veeam logs
- Collect Veridium ID logs
- Collect VMware Tanzu logs
- Collect VMware vCenter logs
- Collect VMware vRealize logs
- Collect VMware vSphere logs
- Collect VSFTPD logs
- Collect VyOS logs
- Collect Workday audit logs
- Collect Yamaha router logs
Looker 25.14 is expected to include the following changes, features, and fixes:
Expected Looker (original) deployment start: Monday, August 18, 2025
Expected Looker (original) final deployment and download available: Thursday, August 28, 2025
Expected Looker (Google Cloud core) deployment start: Monday, August 18, 2025
Expected Looker (Google Cloud core) final deployment: Monday, September 1, 2025
For projects that are enabled for the New LookML Runtime, the synonyms
parameter is now supported. The synonyms
parameter lets LookML developers provide additional context about their data that will help Conversational Analytics and other features to answer questions more accurately.
The API Usage Hourly System Activity Explore is now available. This Explore provides a detailed, hourly summary of the volume and performance of API calls that are made to your Looker instance.
Denodo 9 databases are now supported.
The Maria JDBC Driver has been updated to version 3.5.3.
The Athena driver has been updated to version 2.2.1. Note: This change was made in Looker 25.10. This item was updated on August 18, 2025.
The Databricks JDBC driver has been upgraded to version 2.7.3. Note: This change was made in Looker 25.10. This item was updated on August 18, 2025.
A new JavaScript event, dashboard:tile:merge
, has been added.
Looker now displays a notice to instance admins if the instance license has been revoked. Admins will have 14 days to correct any problems before the instance will be shut down.
The following Looker events are now visible in the System Activity Events Explore:
create_project
delete_project
update_project
create_git_deploy_key
delete_repository_credential
update_repository_credential
A new Customer Engineer Advanced Editor default role has been added and can be used to grant support access to Google Cloud customer engineers.
The Query Concurrency System Activity Explore is now available. This Explore can help you identify periods of high load and investigate performance bottlenecks that are related to database connection limits. Note: This feature was included in the Looker 25.12 release notes but its launch was delayed.
New visualizations have been added to the Database Performance dashboard and the Instance Performance dashboard in System Activity.
The following updates have been made for Period-over-period (PoP) measures:
- The PoP measure feature is out of Preview and is now generally available. Note: This item was added on August 21, 2025.
- PoP measures are now supported for MySQL 8.0.12+ connections to Looker. Note: This item was added on August 18, 2025.
- You can now specify the following types of measures in the PoP measure's
based_on
parameter:list
,median
,median_distinct
,number
,percentile
,percentile_distinct
. Note: This item was added on August 21, 2025. - For queries with PoP measures and time-based filters, in order to calculate data for the PoP measure Looker now automatically retrieves an extra time period of the coarsest time granularity in the query. (Previously, the user was required to adjust the granularity of time-based filters in order to account for the PoP measure calculations.) Note: This item was added on August 21, 2025.
- For queries with PoP measures, if no time-based dimensions are included in the query from the Explore's field picker, Looker can now infer the time period from time-based dimensions in the Explore's filters. (Previously, for queries with PoP measures, the user was required to specify a time-based dimension from the Explore's field picker.) See Requirements for Explore queries with PoP measures for more information. Note: This item was added on August 21, 2025.
- PoP measures are now supported with Connected Sheets. Note: This item was added on August 21, 2025.
Looker 25.14 contains the following accessibility improvements:
- ARIA labels have been added to iframes that contain custom visualizations.
- ARIA labels have been added to legends on visualizations.
- ARIA labels have been added to modals.
- ARIA labels have been added to the Looker page header and logo.
- ARIA labels have been added to untitled dashboard tiles.
- Keyboard focus has been improved on modals.
- Text contrast has been increased on banners.
- Dashboard filters stay in focus while users are typing.
- Users can use the Explore from here link in a drill menu by using the keyboard.
- Users can interact with Single Value visualizations by using the keyboard.
- PDF rendering progress messages have been updated to better integrate with screen readers.
The LookML validation spinner now correctly stops if there is an error with the server's validation process.
An issue has been fixed where a route that wasn't intended for embedding was allowed to be embedded. This feature now performs as expected.
An issue has been fixed where "Create view from table" would fail if it was initiated from a LookML subfolder. This feature now performs as expected.
An issue has been fixed where color palettes with Japanese labels could not be added or removed. This feature now performs as expected.
An issue has been fixed where getting LookML for dashboards wouldn't preserve all query filters even if they overlapped with dashboard-level filters. This feature now performs as expected.
An issue has been fixed where include
statements for empty folders that used single-slash syntax returned an unrecognized project reference error. This feature now performs as expected.
An issue has been fixed where multiple tooltips could be displayed at once. This feature now performs as expected.
An issue has been fixed where project names weren't fully sanitized. This feature now performs as expected.
An issue has been fixed where projects that have not been deployed to production wouldn't appear in a user's list of available projects. This feature now performs as expected.
An issue has been fixed where removing fields from embedded dashboard tiles could become impossible. This feature now performs as expected.
An issue has been fixed where resetting a project's git connection and attempting to use a bare repo would fail. This feature now performs as expected.
An issue has been fixed where sorting a pivoted column in the drill modal could sort all pivoted columns instead of just the selected one. This feature now performs as expected.
An issue has been fixed where special characters such as slashes, ampersands, and question marks were allowed in BigQuery and Spanner connection names. This feature now performs as expected.
An issue has been fixed where the HTTP error codes for moving and copying dashboards and Looks could return 422 when they should return 404. This feature now performs as expected.
An issue has been fixed where the last accessed time for Looks that were saved to a dashboard as Looks wasn't updated when the dashboard was accessed. This feature now performs as expected.
An issue has been fixed where the MoreVert button would not be disabled when no options were available in the menu. This feature now performs as expected.
An issue has been fixed where the new dashboard name wasn't preserved when a LookML dashboard was copied to a folder. This feature now performs as expected.
An issue has been fixed where unfavoriting a dashboard or Look on a board would not persist. This feature now performs as expected.
Note: This item was removed on August 27, 2025.
Site-to-site data transfer locations in the following countries have been added to Network Connectivity Center:
- Qatar
- Switzerland
You can configure Sensitive Data Protection to save the findings from an inspection job to a Cloud Storage bucket or folder. For more information, see Save findings to Cloud Storage.
Spanner offers a predefined library of over 80 MySQL functions that you can install in a database. These functions let you perform operations that are common in the MySQL environments directly with Spanner. They can help reduce the changes required when migrating workloads from MySQL to Spanner.
These functions are packaged as user-defined functions that can be installed from an open-source DDL script hosted on GitHub. For more information, see Install MySQL functions in Spanner.
OpenAI's gpt-oss-120b and gpt-oss-20b are available as Model as a Service (MaaS) models in Model Garden.
Qwen3 Coder and Qwen3 235B are available as Model as a Service (MaaS) models in Model Garden.
August 12, 2025
Apigee API hubAPI observations in API hub (Preview)
API observations in API hub helps you tackle the challenges of undocumented and unmanaged APIs in your API infrastructure. It leverages Apigee shadow API discovery and uses automated discovery processes to bring all your APIs, across Google Cloud projects, into a unified, managed view.
For more information, see API observations in API hub.
On August 12, 2025, we released an updated version of the Apigee UI.
Added path column to Debug transaction table
A new column has been added to the transactions table in the Debug view that specifies the path that was used by the transaction to call the proxy.
Bug ID | Description |
---|---|
421974963 | Adjusted tooltip positions in Debug sequence view The tooltips for response items in the Debug sequence view now appear at the bottom of the element, so as not to block the elements above. |
421975987 | You can no longer pan away from the graph in the Debug canvas The Debug canvas is now restricted and will no longer allow you to pan away from the graph. The scroll wheel on the mouse can now also be used to zoom in and out of the graph. |
421975987 | Debug canvas no longer automatically centers when event elements are clicked When clicking an element in the Debug canvas the canvas will no longer automatically center on the selected item. |
Announcing the General Availability (GA) of Backup Vault support for independent Persistent Disks and Hyperdisks!
This new capability empowers you to protect application data, databases, and file shares stored on individual disks (where a full VM backup is not required) — all within a secure, immutable, logically air-gapped vault designed to withstand malicious deletion and advanced threats like ransomware.
You can now save query results to Cloud Storage. This feature is generally available (GA).
The following images are now rolling out for managed Cloud Service Mesh:
- 1.21.5-asm.55 is rolling out to the rapid release channel.
- 1.20.8-asm.48 is rolling out to the regular release channel.
- 1.19.10-asm.48 is rolling out to the stable release channel.
You can now use Anywhere Cache in the asia-south1-b
and asia-south1-c
zones. For more information, see Anywhere Cache supported locations.
cos-121-18867-199-28
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v27.5.1 | v2.0.6 | See List |
Added NVIDIA GPU driver's R580 branch. Updated the LATEST GPU driver label to version 580.65.06.
Removed the cloud-final.service dependency on multi-user.target which could delay cloud-init user-data scripts indefinitely when long-running startup scripts are used.
Updated app-admin/node-problem-detector to 0.8.21.
Updated app-containers/cni-plugins to 1.7.1.
Updated containerd to v2.0.6.
Removed an artifact registry ping that would delay multi-user.target indefinitely for machines with no external IP address.
Reverted a containerd change which reduced the default soft file descriptor limit for processes in containers to 1024.
LTS Refresh from main-R121 to release-R121
kubernetes 1.32.4-gke.200
Upgraded app-admin/google-guest-configs to v20250516.00.
Upgraded app-containers/docker-credential-helpers to v0.9.3.
LTS Refresh from main-R121 to release-R121
Upgraded dev-lang/go to v1.23.9.
Upgraded sys-apps/pv to v1.9.34.
Updated dev-python/requests to v2.32.4.
Upgraded virtual/logger to v0-r2.
LTS Refresh from main-R121 to release-R121
Upgraded sys-libs/libcap to v2.76.
Upgraded sys-process/procps to v4.0.5-r2.
Upgraded dev-db/sqlite to v3.50.1.
Upgraded sys-libs/libseccomp to v2.6.0-r2.
Upgraded app-arch/unzip to v6.0_p29.
Upgraded dev-libs/expat to v2.7.1.
Upgraded net-nds/rpcbind to v1.2.7.
Upgraded app-arch/gzip to v1.14.
Fixed an issue where the cpuidle driver selected for some machine types would cause inflated reports of high CPU usage.
LTS Refresh from main-R121-cos-6.6 to release-R121-cos-6.6
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2025-8058 in glibc.
Upgraded dev-libs/glib to 2.82.5. This resolves CVE-2024-52533.
Upgraded urllib3 to version 1.26.18. This fixes CVE-2021-33503, CVE-2023-43804, and CVE-2023-45803.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Upgraded sqlite to v3.50.2. This resolves CVE-2025-6965.
Fixed KCTF-bfebdb8 in the kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811826 -> 811817
cos-dev-129-19226-0-0
Kernel | Docker | Containerd | GPU Drivers |
COS-6.12.41 | v27.5.1 | v2.1.3 | See List |
Updated containerd to v2.1.3.
Added NVIDIA GPU driver's R580 branch. Updated the LATEST GPU driver label to version 580.65.06.
Removed the cloud-final.service dependency on multi-user.target which could delay cloud-init user-data scripts indefinitely when long-running startup scripts are used.
Enabled hardware optimized SHA256 algorithms for x86 machines with SSSE3 and AVX/AVX2 instructions and ARM64 machines with SHA-NI and ARMv8 Crypto Extensions.
Updated app-admin/node-problem-detector to 0.8.21.
Updated app-containers/cni-plugins to 1.7.1.
Removed an artifact registry ping that would delay multi-user.target indefinitely for machines with no external IP address.
Reverted a containerd change which reduced the default soft file descriptor limit for processes in containers to 1024.
Upgraded app-admin/google-guest-configs to v20250718.00.
Upgraded chromeos-base/google-breakpad to v2025.07.23.214511-r244.
Upgraded chromeos-base/minijail to v18-r168.
Upgraded dev-libs/openssl to 3.5.1.
Upgraded dev-lang/go to v1.23.11.
Upgraded chromeos-base/shill-client to v0.0.1-r4879.
Updated dev-python/requests to v2.32.4.
Upgraded net-misc/openssh to 10.0_p1.
Upgraded dev-db/sqlite to v3.50.3.
Upgraded virtual/logger to v0-r2.
Upgraded sys-apps/pv to v1.9.34.
Upgraded app-admin/sudo to v1.9.17_p2.
Upgraded sys-process/lsof to v4.99.5.
Reverted a containerd change which reduced the default soft file descriptor limit for processes in containers to 1024.
Fixed an issue where the cpuidle driver selected for some machine types would cause inflated reports of high CPU usage.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2025-8058 in glibc.
Upgraded dev-libs/glib to 2.82.5. This resolves CVE-2024-52533.
Upgraded urllib3 to version 1.26.18. This fixes CVE-2021-33503, CVE-2023-43804, and CVE-2023-45803.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Runtime sysctl changes:
- Changed: fs.file-max: 811510 -> 811531
cos-117-18613-339-32
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v24.0.9 | v1.7.28 | See List |
Added NVIDIA GPU driver's R580 branch. Updated the LATEST GPU driver label to version 580.65.06.
Updated app-admin/node-problem-detector to 0.8.21.
Updated containerd to v1.7.28.
Updated dev-python/requests to v2.32.4.
Upgraded virtual/logger to v0-r2.
Fixed an issue where the cpuidle driver selected for some machine types would cause inflated reports of high CPU usage.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2024-11584 in cloud-init.
Fixed CVE-2024-6174 in cloud-init.
Fixed CVE-2025-8058 in glibc.
Patched openssl to fix CVE-2023-50782 affecting dev-python/crytography.
Upgraded dev-libs/glib to 2.82.5. This resolves CVE-2024-52533.
Upgraded urllib3 to version 1.26.18. This fixes CVE-2021-33503, CVE-2023-43804, and CVE-2023-45803.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Fixed KCTF-bfebdb8 in the kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811775 -> 811765
cos-109-17800-570-26
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.143 | v24.0.9 | v1.7.27 | See List |
Upgraded virtual/logger to v0-r2.
Updated dev-python/requests to v2.32.4.
Upgraded sys-process/lsof to v4.99.5.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2024-11584 in cloud-init.
Fixed CVE-2024-6174 in cloud-init.
Fixed CVE-2024-52533 in dev-libs/glib.
Patched openssl to fix CVE-2023-50782 affecting dev-python/crytography.
Fixed CVE-2025-8058 in glibc.
Upgraded urllib3 to version 1.26.18. This fixes CVE-2021-33503, CVE-2023-43804, and CVE-2023-45803.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Fixed KCTF-bfebdb8 in the kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 812262 -> 812266
cos-113-18244-448-22
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.144 | v24.0.9 | v1.7.27 | See List |
Updated dev-python/requests to v2.32.4.
Upgraded virtual/logger to v0-r2.
Upgraded sys-process/lsof to v4.99.5.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2024-11584 in cloud-init.
Fixed CVE-2024-6174 in cloud-init.
Fixed CVE-2024-52533 in dev-libs/glib.
Fixed CVE-2025-8058 in glibc.
Upgraded urllib3 to version 1.26.18. This fixes CVE-2021-33503, CVE-2023-43804, and CVE-2023-45803.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Fixed KCTF-bfebdb8 in the kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 812027 -> 812031
New Dataproc on Compute Engine subminor image versions:
- 2.0.145-debian10, 2.0.145-ubuntu18, 2.0.145-rocky8
- 2.1.94-debian11, 2.1.94-ubuntu20, 2.1.94-ubuntu20-arm, 2.1.94-rocky8
- 2.2.62-debian12, 2.2.62-ubuntu22, 2.2.62-ubuntu22-arm, 2.2.62-rocky9
- 2.3.8-debian12, 2.3.8-ubuntu22, 2.3.8-ubuntu22-arm, 2.3.8-ml-ubuntu22, 2.3.8-rocky9
New Dataproc Serverless for Spark runtime versions:
- 1.2.56
- 2.2.56
- 2.3.7
Dataproc on Compute Engine: Image versions 2.2
and 2.3
: The Iceberg optional component supports the BigLake Iceberg REST catalog.
Dataproc on Compute Engine: Sharing checkpoint diagnostic data: Setting the dataproc:diagnostic.capture.access=GOOGLE_DATAPROC_DIAGNOSE
property during cluster creation shares all of the temp bucket contents with Google Cloud support if uniform bucket-level access is enabled on temp bucket. If object-level access control is in effect on the temp bucket, only the checkpoint diagnostic data folder corresponding to the cluster in Cloud Storage is shared.
Configure Gemini Code Assist code customization in the Google Cloud Console
You can now set up and manage code customization within the Google Cloud Console, including creating a code repository index, adding repositories to be indexed, and managing repository groups for granular access control. For more information, see Configure Gemini Code Assist code customization.
Google Distributed Cloud (software only) for VMware 1.30.1200-gke.63 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.30.1200-gke.63 runs on Kubernetes v1.30.12-gke.1200. This is the final patch for the 1.30 minor release.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
The following issues were fixed in 1.30.1200-gke.63:
- Fixed vulnerabilities listed in Vulnerability fixes.
Google Distributed Cloud for bare metal 1.30.1200-gke.63 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.30.1200-gke.63 runs on Kubernetes v1.30.12-gke.1200. This is the final patch for the 1.30 minor release.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following functional change was made in 1.30.1200-gke.63:
- Updated the validation checks for cluster upgrades to enforce the cluster version skew rules for user clusters. If the upgrade version information for a user cluster doesn't comply with the version skew rules, the upgrade is halted.
The following issues were fixed in 1.30.1200-gke.63:
Fixed an issue where the CronJob for periodic health checks wasn't updating after configuration changes.
Fixed vulnerabilities listed in Vulnerability fixes.
Starting with GKE version 1.33.1-gke.1231000, you can view KubeRay Operator addon logs. These logs are available by default in Cloud Logging when the Ray operator addon is enabled in GKE. This integration helps you to monitor and debug the Ray Operator. Previously, accessing these logs required more complex steps. To view the logs, navigate to Cloud Logging Logs Explorer in the Google Cloud console and run a query to filter for the Ray Operator logs for your specific cluster.
For more information, see View Ray Operator logs on GKE.
Starting on August 1, 2025, the Performance HorizontalPodAutoscaler profile is enabled by default for GKE Standard clusters that run GKE version 1.33.2-gke.4605000 and later and meet all of the Performance profile requirements. The Performance profile improves the reaction time, speed, and scalability of the Horizontal Pod Autoscaler. You can optionally disable the Performance profile.
Data RBAC self-service enablement
Data RBAC now includes a self-service option for direct enablement. This makes the initial onboarding process faster and simpler. For details, see Configure data RBAC for users.
Data RBAC self-service enablement
Data RBAC now includes a self-service option for direct enablement. This makes the initial onboarding process faster and simpler. For details, see Configure data RBAC for users.
You can now use the System insights dashboard to view cluster-level and node-level monitoring metrics for your clusters. By viewing the metrics that are available for your clusters or nodes, you can detect and analyze system performance problems. For more information, see Monitor clusters. This feature is Generally Available.
You can now use the Google Cloud console to work with cross-region replication. This feature is Generally Available.
Data Security Posture Management (DSPM) lets you define, deploy, monitor, and audit data security postures for your Google Cloud environment. This product is available in Preview to the Security Command Center Enterprise tier.
August 11, 2025
Apigee Advanced API SecurityOn August 11, 2025 we released an updated version of Advanced API Security Abuse Detection
Improved performance when viewing IP address-specific details for abuse detection incidents
With this release, the IP address detail information for abuse incidents displays more quickly for IP addresses with high traffic volumes, potentially reducing load times from minutes to seconds.
For usage information, see the Abuse Detection incident detail documentation.
BigQuery resource utilization charts are generally available (GA).
You can now use WITH
expressions in your GoogleSQL queries to create temporary variables. This feature is generally available (GA).
You can now use chained function call syntax in GoogleSQL to make deeply nested function calls easier to read. This feature is generally available (GA).
BigQuery data preparations are now represented in the SQLX format and in the pipe query syntax to simplify the CI/CD code review process. For more information, see Manage data preparations.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-bigtable
2.64.0 (2025-08-08)
Features
- Add tags field to Instance proto (stable branch) (089d527)
Dependencies
Python
Changes for google-cloud-bigtable
2.32.0 (2025-08-01)
Features
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-logging
3.23.2 (2025-08-05)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.61.0 (0a21b83)
Dependencies
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-storage
2.55.0 (2025-08-05)
Features
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.61.0 (f98b686)
- Enable ALTS bound token (for DirectPath) in the grpc channel provider (#2919) (38d248d)
Dependencies
You can now use Anywhere Cache in the asia-south1-a
zone. For more information, see Anywhere Cache supported locations.
Preview: The G4 accelerator-optimized machine series is designed for graphics-intensive workloads such as NVIDIA Omniverse simulations, video transcoding, and virtual desktops. The G4 machine series also provides a cost-effective solution for single-host inference and model tuning.
Powered by the 5th Generation AMD EPYC Turin CPU platform and featuring NVIDIA RTX PRO 6000 Blackwell Server Edition GPUs, the G4 machine series offer significant performance improvements over the previous G2 machine series. For available G4 regions and zones, see GPU regions and zones.
To get started with G4 machine types, contact your Google account team.
You can attach up to 128 instances to the same Hyperdisk ML volume whose size is between 2 TiB and 16 TiB. The previous limit was 30. For more information, see Share a disk between instances.
Dataflow now automatically detects performance bottlenecks in streaming jobs. You can see the cause of the bottleneck in the Step Info panel to help with troubleshooting.
For more information, see Troubleshoot bottlenecks.
New Dataproc on Compute Engine subminor image versions:
- 2.1.93-debian11, 2.1.93-rocky8, 2.1.93-ubuntu20, 2.1.93-ubuntu20-arm
- 2.2.61-debian12, 2.2.61-rocky9, 2.2.61-ubuntu22, 2.2.61-ubuntu22-arm
Availability in three additional regions
Google Cloud CCaaS is now available in the following three additional regions:
- northamerica-northeast2 (Toronto)
- us-east4 (Virginia)
- me-west1 (Tel Aviv)
In each of these regions, Workforce Management is available and advanced reporting isn't available. For more information, see Google Cloud regions.
You can now use the /node/server/healthy
metric to determine whether a cluster node is available and functioning correctly. This metric is available in Preview.
You can now use the /node/server/healthy
metric to determine whether an instance node is available and functioning correctly. This metric is available in Preview.
A weekly digest of client library updates from across the Cloud SDK.
Node.js
Changes for @google-cloud/pubsub
5.2.0 (2025-08-07)
Features
Java
Changes for google-cloud-pubsub
1.141.2 (2025-08-05)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.61.0 (42eb599)
- Use a separate cached thread pool for handling ack and modack response callback for EOD-enabled subscriptions (#2505) (224c269)
Dependencies
- Update dependency com.google.cloud:google-cloud-bigquery to v2.54.0 (#2506) (6bf8e62)
- Update dependency com.google.cloud:google-cloud-core to v2.59.0 (#2507) (070cf07)
- Update dependency com.google.cloud:google-cloud-storage to v2.54.0 (#2510) (0fd589e)
- Update dependency com.google.cloud:sdk-platform-java-config to v3.51.0 (#2508) (a7be2a7)
- Update googleapis/sdk-platform-java action to v2.61.0 (#2509) (32df6b6)
August 10, 2025
Google SecOpsNew permissions for Content Hub
To access all modules in the Content Hub, you must set the correct IAM role permissions.
For full details, see Google SecOps Content Hub overview.
Updated permissions for accessing product-centric feeds
If you have assigned Custom IAM Roles, you can now grant access to the product-centric feeds by adding the following permissions to the role:
chronicle.feedPacks.get
chronicle.feedPacks.list
To learn more about how to configure feeds using the product-centric feeds UI, see Configure feeds by product.
Expression Builder enhancements
The Expression Builder has been enhanced with a new set of pre-built filters to help streamline query creation.
We've improved the information within the platform for all filters, both new and existing. The supporting documentation provides clearer descriptions and practical examples for each transformer, making it easier to understand their purpose and syntax.
For details, see Use the Expression Builder.
Remote agent notifications
Agent notifications will alert you to new remote agent version releases and agent downtime based on your permissions and associated environments. Agent notifications are now enabled by default. You can opt out of these notifications at any time from your user preferences.
For details, see Agent notifications.
Updated permissions for accessing product-centric feeds
If you have assigned Custom IAM Roles, you can now grant access to the product-centric feeds by adding the following permissions to the role:
chronicle.feedPacks.get
chronicle.feedPacks.list
To learn more about how to configure feeds using the product-centric feeds UI, see Configure feeds by product.
Release 6.3.57 is being rolled out to the first phase of regions, as outlined in our Google SecOps release plan.
This release contains the following features:
Expression Builder enhancements
The Expression Builder has been enhanced with a new set of pre-built filters to help streamline query creation.
We've improved the information within the platform for all filters, both new and existing. The supporting documentation provides clearer descriptions and practical examples for each transformer, making it easier to understand their purpose and syntax.
For details, see Use the Expression Builder.
Remote agent notifications
Agent notifications will alert you to new remote agent version releases and agent downtime based on your permissions and associated environments. Agent notifications are now enabled by default. You can opt out of these notifications at any time from your user preferences.
For details, see Agent notifications.
August 09, 2025
Google SecOps SOARRelease 6.3.56 is now available for all regions.
August 08, 2025
Cloud BillingPersonalized saved reports are available in cost Reports.
For customers who have enabled Gemini Cloud Assist in Cloud Billing, your custom saved reports that you open frequently now appear in the reports carousel, for quick access. Previously, the reports carousel only provided access to Google-created preset reports.
For more information, see the following topics in the Reports dcoumentation:
Cross-Site Interconnect (Preview) support is available in the following colocation facilities:
- Equinix Dallas (DA1), Dallas
- Equinix Miami (MI1), Miami
For more information, see the Locations table and Global Locations.
Quick Preview of chat code suggestions across multiple files
VS Code Gemini Code Assist 2.44.0
Gemini Code Assist chat provides a quick preview of the collective code suggestions across multiple files in the chat. Selecting a particular file opens the corresponding file in the editor with the first suggestion selected by default.
Gemini 2.5 Flash-Lite and Gemini 2.5 Pro now support supervised fine-tuning. For more information, see About supervised fine-tuning for Gemini models.
(New guide) Best practices for continuous access to Google Cloud: Describes best practices for using emergency access and IdP failover to ensure continuous access to Google Cloud.
Cloud Armor supports Autonomous System Numbers (ASNs) in globally scoped edge security policies for Media CDN edge cache services in Preview.
VMware Engine ve2
nodes are now available in the Dammam, KSA (me-central2
) region.
The following issues were fixed in 1.32.300-gke.85:
- Fixed vulnerabilities listed in Vulnerability fixes.
Google Distributed Cloud (software only) for VMware 1.32.300-gke.85 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.32.300-gke.85 runs on Kubernetes v1.32.6-gke.200.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
Google Distributed Cloud for bare metal 1.32.300-gke.85 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.32.300-gke.85 runs on Kubernetes v1.32.4-gke.1000.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following functional change was made in 1.32.300-gke.85:
- Updated the validation checks for cluster upgrades to enforce the cluster version skew rules for user clusters. If the upgrade version information for a user cluster doesn't comply with the version skew rules, the upgrade is halted.
The following issues were fixed in 1.32.300-gke.85:
Fixed a known issue where Keepalived failover is blocked when the corresponding HAProxy instance is unreachable. This issue prevented the control plane VIP from being made available on a new, healthy node.
Fixed an issue where the CronJob for periodic health checks wasn't updating after configuration changes.
Fixed vulnerabilities listed in Vulnerability fixes.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
The C4 machine series now has General Availability machine types that support Local SSD storage options. These machine types are available in all GKE versions for Standard mode, and in GKE version 1.33.1-gke.1545000 and later for Autopilot mode. For more information about these machine types, see the "C4 standard with Local SSD" and "C4 highmem with Local SSD" tabs in C4 machine types.
You can now customize a node system configuration with the following new Kubelet, Sysctl, and Linux config options:
kubeletConfig flags:
- topologyManager (on GKE versions 1.32.3-gke.1785000 and later)
- memoryManager (on GKE versions 1.32.3-gke.1785000 and later)
- maxParallelImagePulls (on GKE versions 1.33.1-gke.1918000 and later)
- singleProcessOomKill (on GKE versions 1.32.4-gke.1132000, 1.33.0-gke.1748000 and later)
- evictionSoft
- evictionSoftGracePeriod
- evictionMinimumReclaim
- evictionMaxPodGracePeriodSeconds
sysctl flags:
- vm.overcommit_memory
- vm.overcommit_ratio
- vm.vfs_cache_pressure
- vm.dirty_ratio
- vm.dirty_background_ratio
- vm.dirty_expire_centisecs
- vm.dirty_writeback_centisecs
- vm.watermark_scale_factor
- vm.min_free_kbytes
- vm.swappiness
- fs.nr_open
- fs.file-max
- fs.inotify.max_user_watches
- fs.inotify.max_user_instances
- fs.aio-max-nr
- net.ipv4.tcp_max_orphans
linuxConfig flags:
- transparentHugepageEnabled (on GKE versions 1.33.2-gke.4655000 and later)
- transparentHugepageDefrag (on GKE versions 1.33.2-gke.4655000 and later)
Google SecOps has updated the list of supported default parsers. Parsers are updated gradually, so it might take one to four days before you see the changes reflected in your region.
The following supported default parsers have been updated. Each parser is listed by product name and log_type
value, where applicable. This list includes both released default parsers and pending parser updates.
- 1Password (
ONEPASSWORD
) - A10 Load Balancer (
A10_LOAD_BALANCER
) - AIX system (
AIX_SYSTEM
) - Akamai Enterprise Application Access (
AKAMAI_EAA
) - Akamai WAF (
AKAMAI_WAF
) - Apache (
APACHE
) - Aqua Security (
AQUA_SECURITY
) - Aruba (
ARUBA_WIRELESS
) - Attivo Networks (
ATTIVO
) - Auth0 (
AUTH_ZERO
) - AWS Config (
AWS_CONFIG
) - AWS GuardDuty (
GUARDDUTY
) - AWS Lambda Function (
AWS_LAMBDA_FUNCTION
) - AWS RDS (
AWS_RDS
) - AWS VPC Flow (
AWS_VPC_FLOW
) - Azure AD (
AZURE_AD
) - Azure AD Directory Audit (
AZURE_AD_AUDIT
) - Azure AD Sign-In (
AZURE_AD_SIGNIN
) - Azure Key Vault logging (
AZURE_KEYVAULT_AUDIT
) - Azure VNET Flow (
AZURE_VNET_FLOW
) - Barracuda Email (
BARRACUDA_EMAIL
) - Barracuda WAF (
BARRACUDA_WAF
) - BeyondTrust BeyondInsight (
BEYONDTRUST_BEYONDINSIGHT
) - Bitdefender (
BITDEFENDER
) - Blue Coat Proxy (
BLUECOAT_WEBPROXY
) - Check Point (
CHECKPOINT_FIREWALL
) - Check Point Sandblast (
CHECKPOINT_EDR
) - Chrome Management (
N/A
) - Cisco Email Security (
CISCO_EMAIL_SECURITY
) - Cisco Firepower NGFW (
CISCO_FIREPOWER_FIREWALL
) - Cisco Internetwork Operating System (
CISCO_IOS
) - Cisco IronPort (
CISCO_IRONPORT
) - Cisco ISE (
CISCO_ISE
) - Cisco Meraki (
CISCO_MERAKI
) - Cisco NX-OS (
CISCO_NX_OS
) - Cisco Router (
CISCO_ROUTER
) - Cisco Stealthwatch (
CISCO_STEALTHWATCH
) - Cisco Umbrella SWG DLP (
CISCO_UMBRELLA_SWG_DLP
) - Cisco vManage SD-WAN (
CISCO_SDWAN
) - Cisco WLC/WCS (
CISCO_WIRELESS
) - Cisco WSA (
CISCO_WSA
) - Citrix Netscaler (
CITRIX_NETSCALER
) - Cloud Audit Logs (
N/A
) - Cloud DNS (
N/A
) - Cloud Load Balancing (
GCP_LOADBALANCING
) - Cloudflare (
CLOUDFLARE
) - Corelight (
CORELIGHT
) - CrowdStrike Alerts API (
CS_ALERTS
) - CrowdStrike Detection Monitoring (
CS_DETECTS
) - CrowdStrike Falcon (
CS_EDR
) - CrowdStrike Falcon Stream (
CS_STREAM
) - CSV Custom IOC (
CSV_CUSTOM_IOC
) - CyberArk (
CYBERARK
) - Cybereason EDR (
CYBEREASON_EDR
) - Darktrace (
DARKTRACE
) - EfficientIP DDI (
EFFICIENTIP_DDI
) - Elastic Defend (
ELASTIC_DEFEND
) - EPIC Systems (
EPIC
) - ExtraHop RevealX (
EXTRAHOP
) - F5 Advanced Firewall Management (
F5_AFM
) - F5 ASM (
F5_ASM
) - F5 BIGIP Access Policy Manager (
F5_BIGIP_APM
) - F5 BIGIP LTM (
F5_BIGIP_LTM
) - F5 DNS (
F5_DNS
) - F5 Silverline (
F5_SILVERLINE
) - Fidelis Network (
FIDELIS_NETWORK
) - FireEye ETP (
FIREEYE_ETP
) - ForgeRock Identity Cloud (
FORGEROCK_IDENTITY_CLOUD
) - FortiGate (
FORTINET_FIREWALL
) - Fortinet FortiAnalyzer (
FORTINET_FORTIANALYZER
) - Fortinet Proxy (
FORTINET_WEBPROXY
) - Fortinet Web Application Firewall (
FORTINET_FORTIWEB
) - GitHub (
GITHUB
) - Halcyon Anti Ransomware (
HALCYON
) - HAProxy (
HAPROXY
) - HP Aruba (ClearPass) (
CLEARPASS
) - IBM DataPower Gateway (
IBM_DATAPOWER
) - Imperva (
IMPERVA_WAF
) - Imperva SecureSphere Management (
IMPERVA_SECURESPHERE
) - Infoblox DHCP (
INFOBLOX_DHCP
) - Jamf pro context (
JAMF_PRO_CONTEXT
) - Kubernetes Node (
KUBERNETES_NODE
) - Lacework Cloud Security (
LACEWORK
) - Linux Auditing System (AuditD) (
AUDITD
) - Linux Sysmon (
LINUX_SYSMON
) - McAfee IPS (
MCAFEE_IPS
) - Menlo Security (
MENLO_SECURITY
) - Microsoft AD (
WINDOWS_AD
) - Microsoft Azure Activity (
AZURE_ACTIVITY
) - Microsoft Defender for Identity (
MICROSOFT_DEFENDER_IDENTITY
) - Microsoft IIS (
IIS
) - Mimecast (
MIMECAST_MAIL
) - Mimecast Mail V2 (
MIMECAST_MAIL_V2
) - MISP Threat Intelligence (
MISP_IOC
) - NetApp ONTAP (
NETAPP_ONTAP
) - Netskope V2 (
NETSKOPE_ALERT_V2
) - Netskope Web Proxy (
NETSKOPE_WEBPROXY
) - NGINX (
NGINX
) - One Identity Identity Manager (
ONE_IDENTITY_IDENTITY_MANAGER
) - Opnsense (
OPNSENSE
) - Orca Cloud Security Platform (
ORCA
) - Palo Alto Cortex XDR Events (
PAN_CORTEX_XDR_EVENTS
) - Palo Alto Networks Firewall (
PAN_FIREWALL
) - Palo Alto Panorama (
PAN_PANORAMA
) - Palo Alto Prisma Access (
PAN_CASB
) - pfSense (
PFSENSE
) - Ping Federate (
PING_FEDERATE
) - Proofpoint Observeit (
OBSERVEIT
) - Proofpoint On Demand (
PROOFPOINT_ON_DEMAND
) - Proofpoint Tap Alerts (
PROOFPOINT_MAIL
) - Qualys VM (
QUALYS_VM
) - Remediant SecureONE (
REMEDIANT_SECUREONE
) - SAP SM20 (
SAP_SM20
) - SecureAuth (
SECUREAUTH_SSO
) - SentinelOne EDR (
SENTINEL_EDR
) - Silverfort Authentication Platform (
SILVERFORT
) - Sophos Central (
SOPHOS_CENTRAL
) - Sophos UTM (
SOPHOS_UTM
) - Squid Web Proxy (
SQUID_WEBPROXY
) - Symantec DLP (
SYMANTEC_DLP
) - Symantec Web Security Service (
SYMANTEC_WSS
) - Tenable Active Directory Security (
TENABLE_ADS
) - Tenable Security Center (
TENABLE_SC
) - Thinkst Canary (
THINKST_CANARY
) - Trellix HX Event Streamer (
TRELLIX_HX_ES
) - Trend Micro Apex one (
TRENDMICRO_APEX_ONE
) - Trend Micro Cloud one (
TRENDMICRO_CLOUDONE
) - Trend Micro Vision One Activity (
TRENDMICRO_VISION_ONE_ACTIVITY
) - Trend Micro Vision One Observerd Attack Techniques (
TRENDMICRO_VISION_ONE_OBSERVERD_ATTACK_TECHNIQUES
) - Trend Micro Vision One Workbench (
TRENDMICRO_VISION_ONE_WORKBENCH
) - Tripwire (
TRIPWIRE_FIM
) - Unix system (
NIX_SYSTEM
) - VMware Horizon (
VMWARE_HORIZON
) - VMware vCenter (
VMWARE_VCENTER
) - VMware vRealize Suite (VMware Aria) (
VMWARE_VREALIZE
) - WatchGuard (
WATCHGUARD
) - Windows Event (
WINEVTLOG
) - Windows Event (XML) (
WINEVTLOG_XML
) - Workday Audit Logs (
WORKDAY_AUDIT
) - Workspace Activities (
WORKSPACE_ACTIVITY
) - Workspace Users (
WORKSPACE_USERS
) - ZScaler Deception (
ZSCALER_DECEPTION
)
The following log types were added without a default parser. Each parser is listed by product name and log_type
value, where applicable.
- Akamai MFA (
AKAMAI_MFA
) - Azure Org Context (
AZURE_ORG_CONTEXT
) - Cisco Remote Access VPN (
CISCO_RAVPN
) - CoreView Audit-log SIEM integration (
COREVIEW
) - Fortinet Network Detection and Response (
FORTINET_FORTINDR
) - GCP Security Command Center Chokepoint (
GCP_SECURITYCENTER_CHOKEPOINT
) - Imperva Cloud WAF (
IMPERVA_CLOUD_WAF
) - Lumu Universal SIEM (
LUMU
) - Microsoft Azure Databricks (
MICROSOFT_DATABRICKS_WORKSPACES
) - Microsoft Insights/Components (
MICROSOFT_INSIGHTS_COMPONENTS
) - Microsoft ServiceBus/Namespaces (
MICROSOFT_SERVICEBUS_NAMESPACES
) - Microsoft Azure SQL Managed Instances (
MICROSOFT_SQL_MANAGED_INSTANCES
) - Moveworks (
MOVEWORKS
) - Network Box Unified Threat Management+ (
NETWORKBOX_UTM
) - Oracle Cloud Infrastructure Identity Cloud Service (
OCI_IDENTITY_CLOUD_SERVICE
) - SAP Commerce Cloud (
SAP_HAC
) - Sonatype Lifecycle (
SONATYPE_LIFECYCLE
) - TeamViewer Tensor (
TEAMVIEWER_TENSOR
) - Torq Audit Logs (
TORQ_AUDIT_LOGS
) - Velociraptor - digital forensic & incident response tool (
VELOCIRAPTOR
) - Zoom Activity Logs (
ZOOM_ACTIVITY
)
For a list of supported log types and details about default parser changes, see Supported log types and default parsers.
Google SecOps has updated the list of supported default parsers. Parsers are updated gradually, so it might take one to four days before you see the changes reflected in your region.
The following supported default parsers have been updated. Each parser is listed by product name and log_type
value, where applicable. This list includes both released default parsers and pending parser updates.
- 1Password (
ONEPASSWORD
) - A10 Load Balancer (
A10_LOAD_BALANCER
) - AIX system (
AIX_SYSTEM
) - Akamai Enterprise Application Access (
AKAMAI_EAA
) - Akamai WAF (
AKAMAI_WAF
) - Apache (
APACHE
) - Aqua Security (
AQUA_SECURITY
) - Aruba (
ARUBA_WIRELESS
) - Attivo Networks (
ATTIVO
) - Auth0 (
AUTH_ZERO
) - AWS Config (
AWS_CONFIG
) - AWS GuardDuty (
GUARDDUTY
) - AWS Lambda Function (
AWS_LAMBDA_FUNCTION
) - AWS RDS (
AWS_RDS
) - AWS VPC Flow (
AWS_VPC_FLOW
) - Azure AD (
AZURE_AD
) - Azure AD Directory Audit (
AZURE_AD_AUDIT
) - Azure AD Sign-In (
AZURE_AD_SIGNIN
) - Azure Key Vault logging (
AZURE_KEYVAULT_AUDIT
) - Azure VNET Flow (
AZURE_VNET_FLOW
) - Barracuda Email (
BARRACUDA_EMAIL
) - Barracuda WAF (
BARRACUDA_WAF
) - BeyondTrust BeyondInsight (
BEYONDTRUST_BEYONDINSIGHT
) - Bitdefender (
BITDEFENDER
) - Blue Coat Proxy (
BLUECOAT_WEBPROXY
) - Check Point (
CHECKPOINT_FIREWALL
) - Check Point Sandblast (
CHECKPOINT_EDR
) - Chrome Management (
N/A
) - Cisco Email Security (
CISCO_EMAIL_SECURITY
) - Cisco Firepower NGFW (
CISCO_FIREPOWER_FIREWALL
) - Cisco Internetwork Operating System (
CISCO_IOS
) - Cisco IronPort (
CISCO_IRONPORT
) - Cisco ISE (
CISCO_ISE
) - Cisco Meraki (
CISCO_MERAKI
) - Cisco NX-OS (
CISCO_NX_OS
) - Cisco Router (
CISCO_ROUTER
) - Cisco Stealthwatch (
CISCO_STEALTHWATCH
) - Cisco Umbrella SWG DLP (
CISCO_UMBRELLA_SWG_DLP
) - Cisco vManage SD-WAN (
CISCO_SDWAN
) - Cisco WLC/WCS (
CISCO_WIRELESS
) - Cisco WSA (
CISCO_WSA
) - Citrix Netscaler (
CITRIX_NETSCALER
) - Cloud Audit Logs (
N/A
) - Cloud DNS (
N/A
) - Cloud Load Balancing (
GCP_LOADBALANCING
) - Cloudflare (
CLOUDFLARE
) - Corelight (
CORELIGHT
) - CrowdStrike Alerts API (
CS_ALERTS
) - CrowdStrike Detection Monitoring (
CS_DETECTS
) - CrowdStrike Falcon (
CS_EDR
) - CrowdStrike Falcon Stream (
CS_STREAM
) - CSV Custom IOC (
CSV_CUSTOM_IOC
) - CyberArk (
CYBERARK
) - Cybereason EDR (
CYBEREASON_EDR
) - Darktrace (
DARKTRACE
) - EfficientIP DDI (
EFFICIENTIP_DDI
) - Elastic Defend (
ELASTIC_DEFEND
) - EPIC Systems (
EPIC
) - ExtraHop RevealX (
EXTRAHOP
) - F5 Advanced Firewall Management (
F5_AFM
) - F5 ASM (
F5_ASM
) - F5 BIGIP Access Policy Manager (
F5_BIGIP_APM
) - F5 BIGIP LTM (
F5_BIGIP_LTM
) - F5 DNS (
F5_DNS
) - F5 Silverline (
F5_SILVERLINE
) - Fidelis Network (
FIDELIS_NETWORK
) - FireEye ETP (
FIREEYE_ETP
) - ForgeRock Identity Cloud (
FORGEROCK_IDENTITY_CLOUD
) - FortiGate (
FORTINET_FIREWALL
) - Fortinet FortiAnalyzer (
FORTINET_FORTIANALYZER
) - Fortinet Proxy (
FORTINET_WEBPROXY
) - Fortinet Web Application Firewall (
FORTINET_FORTIWEB
) - GitHub (
GITHUB
) - Halcyon Anti Ransomware (
HALCYON
) - HAProxy (
HAPROXY
) - HP Aruba (ClearPass) (
CLEARPASS
) - IBM DataPower Gateway (
IBM_DATAPOWER
) - Imperva (
IMPERVA_WAF
) - Imperva SecureSphere Management (
IMPERVA_SECURESPHERE
) - Infoblox DHCP (
INFOBLOX_DHCP
) - Jamf pro context (
JAMF_PRO_CONTEXT
) - Kubernetes Node (
KUBERNETES_NODE
) - Lacework Cloud Security (
LACEWORK
) - Linux Auditing System (AuditD) (
AUDITD
) - Linux Sysmon (
LINUX_SYSMON
) - McAfee IPS (
MCAFEE_IPS
) - Menlo Security (
MENLO_SECURITY
) - Microsoft AD (
WINDOWS_AD
) - Microsoft Azure Activity (
AZURE_ACTIVITY
) - Microsoft Defender for Identity (
MICROSOFT_DEFENDER_IDENTITY
) - Microsoft IIS (
IIS
) - Mimecast (
MIMECAST_MAIL
) - Mimecast Mail V2 (
MIMECAST_MAIL_V2
) - MISP Threat Intelligence (
MISP_IOC
) - NetApp ONTAP (
NETAPP_ONTAP
) - Netskope V2 (
NETSKOPE_ALERT_V2
) - Netskope Web Proxy (
NETSKOPE_WEBPROXY
) - NGINX (
NGINX
) - One Identity Identity Manager (
ONE_IDENTITY_IDENTITY_MANAGER
) - Opnsense (
OPNSENSE
) - Orca Cloud Security Platform (
ORCA
) - Palo Alto Cortex XDR Events (
PAN_CORTEX_XDR_EVENTS
) - Palo Alto Networks Firewall (
PAN_FIREWALL
) - Palo Alto Panorama (
PAN_PANORAMA
) - Palo Alto Prisma Access (
PAN_CASB
) - pfSense (
PFSENSE
) - Ping Federate (
PING_FEDERATE
) - Proofpoint Observeit (
OBSERVEIT
) - Proofpoint On Demand (
PROOFPOINT_ON_DEMAND
) - Proofpoint Tap Alerts (
PROOFPOINT_MAIL
) - Qualys VM (
QUALYS_VM
) - Remediant SecureONE (
REMEDIANT_SECUREONE
) - SAP SM20 (
SAP_SM20
) - SecureAuth (
SECUREAUTH_SSO
) - SentinelOne EDR (
SENTINEL_EDR
) - Silverfort Authentication Platform (
SILVERFORT
) - Sophos Central (
SOPHOS_CENTRAL
) - Sophos UTM (
SOPHOS_UTM
) - Squid Web Proxy (
SQUID_WEBPROXY
) - Symantec DLP (
SYMANTEC_DLP
) - Symantec Web Security Service (
SYMANTEC_WSS
) - Tenable Active Directory Security (
TENABLE_ADS
) - Tenable Security Center (
TENABLE_SC
) - Thinkst Canary (
THINKST_CANARY
) - Trellix HX Event Streamer (
TRELLIX_HX_ES
) - Trend Micro Apex one (
TRENDMICRO_APEX_ONE
) - Trend Micro Cloud one (
TRENDMICRO_CLOUDONE
) - Trend Micro Vision One Activity (
TRENDMICRO_VISION_ONE_ACTIVITY
) - Trend Micro Vision One Observerd Attack Techniques (
TRENDMICRO_VISION_ONE_OBSERVERD_ATTACK_TECHNIQUES
) - Trend Micro Vision One Workbench (
TRENDMICRO_VISION_ONE_WORKBENCH
) - Tripwire (
TRIPWIRE_FIM
) - Unix system (
NIX_SYSTEM
) - VMware Horizon (
VMWARE_HORIZON
) - VMware vCenter (
VMWARE_VCENTER
) - VMware vRealize Suite (VMware Aria) (
VMWARE_VREALIZE
) - WatchGuard (
WATCHGUARD
) - Windows Event (
WINEVTLOG
) - Windows Event (XML) (
WINEVTLOG_XML
) - Workday Audit Logs (
WORKDAY_AUDIT
) - Workspace Activities (
WORKSPACE_ACTIVITY
) - Workspace Users (
WORKSPACE_USERS
) - ZScaler Deception (
ZSCALER_DECEPTION
)
The following log types were added without a default parser. Each parser is listed by product name and log_type
value, where applicable.
- Akamai MFA (
AKAMAI_MFA
) - Azure Org Context (
AZURE_ORG_CONTEXT
) - Cisco Remote Access VPN (
CISCO_RAVPN
) - CoreView Audit-log SIEM integration (
COREVIEW
) - Fortinet Network Detection and Response (
FORTINET_FORTINDR
) - GCP Security Command Center Chokepoint (
GCP_SECURITYCENTER_CHOKEPOINT
) - Imperva Cloud WAF (
IMPERVA_CLOUD_WAF
) - Lumu Universal SIEM (
LUMU
) - Microsoft Azure Databricks (
MICROSOFT_DATABRICKS_WORKSPACES
) - Microsoft Insights/Components (
MICROSOFT_INSIGHTS_COMPONENTS
) - Microsoft ServiceBus/Namespaces (
MICROSOFT_SERVICEBUS_NAMESPACES
) - Microsoft Azure SQL Managed Instances (
MICROSOFT_SQL_MANAGED_INSTANCES
) - Moveworks (
MOVEWORKS
) - Network Box Unified Threat Management+ (
NETWORKBOX_UTM
) - Oracle Cloud Infrastructure Identity Cloud Service (
OCI_IDENTITY_CLOUD_SERVICE
) - SAP Commerce Cloud (
SAP_HAC
) - Sonatype Lifecycle (
SONATYPE_LIFECYCLE
) - TeamViewer Tensor (
TEAMVIEWER_TENSOR
) - Torq Audit Logs (
TORQ_AUDIT_LOGS
) - Velociraptor - digital forensic & incident response tool (
VELOCIRAPTOR
) - Zoom Activity Logs (
ZOOM_ACTIVITY
)
For a list of supported log types and details about default parser changes, see Supported log types and default parsers.
You can use Autonomous System Numbers (ASN) based rules from Cloud Armor for Media CDN. ASN-based rules allow you to create security policies that specifically permit or deny traffic based on the ASN of the client requesting your content. This feature is in Preview.
For more information, see Google Cloud Armor support.
VPC Flow Logs includes metadata annotations for Google services such as Google APIs and VPC-hosted services. The following annotations are available in General Availability:
service_name
connectivity
private_domain
These annotations are supported for flows between VMs in VPC networks and Google services and for flows between on-premises endpoints and Google services (through Cloud Interconnect and Cloud VPN). For more information, see GoogleServiceDetails field format.
August 07, 2025
Access ApprovalAccess Approval supports Security Command Center Premium tier in the GA stage.
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine flexible environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine standard environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine standard environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine standard environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine standard environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine standard environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
To increase security, starting in March 2025, support for Transport Layer Security (TLS) version 1.1 and earlier is deprecated. Update your application settings in the App Engine standard environment to use TLS version 1.2 and later, along with a corresponding secure set of cipher suites (Preview).
Cloud SQL for Enterprise Plus edition supports quality enhancements for AI-assisted troubleshooting. With AI-assisted troubleshooting, you can resolve complex database performance issues like slow queries and high load for your instances in a guided manner. To use AI-assisted troubleshooting, you need Gemini Cloud Assist and query insights for Enterprise Plus edition.
Cloud SQL for Enterprise Plus edition supports quality enhancements for AI-assisted troubleshooting. With AI-assisted troubleshooting, you can resolve complex database performance issues like slow queries and high load for your instances in a guided manner. To use AI-assisted troubleshooting, you need Gemini Cloud Assist and query insights for Enterprise Plus edition.
Cloud SQL now offers planned maintenance and machine tier upgrades for your Cloud SQL Enterprise plus instances with near-zero downtime for eligible instances.
For more information, see Maintenance updates on Cloud SQL instances.
Dialogflow CX and Vertex AI: The gemini-1.0-pro
, gemini-1.5-pro
and gemini-1.5-flash
models will be deprecated on September 1, 2025 and automatically upgraded to the gemini-2.0-flash-001
model. This change applies to Vertex AI agents and the following Conversational Agents generative features:
- Playbooks
- Data stores
- Generators
- Generative Fallback
After the upgrade on September 1, 2024, gemini-2.0-flash-001
will be automatically selected in the console. We recommend that you upgrade to the new model early to allow enough time for testing and to ensure that your solution works as intended.
Vertex AI prompt optimizer
The Vertex AI prompt optimizer is now generally available. For more information, see Optimize prompts.
We now offer a zero-shot prompt optimizer.
Vertex AI Agent Engine
You can use your own custom service account for agent identity to manage permissions and access according to your organization's security policies.
Model tuning
You can now perform supervised fine-tuning on open models such as Llama 3.1. For more information, see Tune an open model.
AI and ML perspective: Reliability: Major update to expand the reliability principles and recommendations in the AI and ML perspective.
Looker connector enhancements
Looker connector support for selected calculated field functions is now generally available.
Conditional formatting in query result chips
You can now apply conditional formatting to change the background color and text color of query result chips.
Data label improvements for waterfall charts
Report creators can now specify the position of data labels for waterfall charts along with the level of data label text contrast.
Custom columns and custom dimensions in New Search Ads 360 Connector
The New Search Ads 360 connector now supports custom columns and custom dimensions. You can add any of your saved Search Ads 360 custom columns and custom dimensions to Looker Studio reports and join them with other fields in tables and charts.
For the Flex service level, the storage pool and volume now support a maximum capacity of 300 TiB. For more information, see Service levels.
Risk reports generated and downloaded from Security Command Center include a system attack exposure page that shows the organization's exposure risk over time and lists the projects and resources that have the highest risk.
The following Container Threat Detection detectors have been released to General Availability:
Execution: Possible Arbitrary Command Execution through CUPS (CVE-2024-47177)
Execution: Socat Reverse Shell Detected
Privilege Escalation: Abuse of Sudo For Privilege Escalation (CVE-2019-14287)
Privilege Escalation: Polkit Local Privilege Escalation Vulnerability (CVE-2021-4034)
Privilege Escalation: Sudo Potential Privilege Escalation (CVE-2021-3156)
August 06, 2025
AI ApplicationsVertex AI Search: Advanced autocomplete (GA)
Use advanced autocomplete to enable autocomplete on blended search apps.
For more information, see Configure advanced autocomplete. This feature is in generally available (GA).
On August 6, 2025 we released an updated version of Advanced API Security
Note: Rollouts of this release to production instances will begin within two business days and may take four or more business days to complete across all Google Cloud zones. Your instances may not have the feature available until the rollout is complete.
Availability of Shadow API Discovery for APIs in any Google Cloud project
Using Shadow API Discovery, you can find undocumented/shadow APIs in your existing cloud infrastructure. Shadow APIs pose a security risk to your system, since they might be unsecured, unmonitored, and unmaintained.
With this release, you can configure and run API observation jobs in any Google Cloud project, without needing to provision Apigee in that project. You can also centrally view the results of API observation jobs and compare discovered API endpoints and operations to APIs cataloged in API hub to identify shadow APIs.
See the Shadow API Discovery overview for information on Shadow API Discovery and how to add it to projects.
Enabling the advanced runtime now includes short query optimizations. This feature is in preview.
cos-121-18867-199-19
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v27.5.1 | v2.0.4 | See List |
This is an LTS Refresh release.
Removed an artifact registry ping that would delay multi-user.target indefinitely for machines with no external IP address.
Reverted a containerd change which reduced the default soft file descriptor limit for processes in containers to 1024.
Upgraded kubernetes to v1.32.4-gke.200.
Upgraded app-admin/google-guest-configs to v20250516.00.
Upgraded app-containers/docker-credential-helpers to v0.9.3.
Upgraded dev-lang/go to v1.23.9.
Updated dev-python/requests to v2.32.4.
Upgraded virtual/logger to v0-r2.
Upgraded sys-libs/libcap to v2.76.
Upgraded sys-process/procps to v4.0.5-r2.
Upgraded dev-db/sqlite to v3.50.1.
Upgraded sys-libs/libseccomp to v2.6.0-r2.
Upgraded app-arch/unzip to v6.0_p29.
Upgraded dev-libs/expat to v2.7.1.
Upgraded net-nds/rpcbind to v1.2.7.
Upgraded app-arch/gzip to v1.14.
Fixed an issue where the cpuidle driver selected for some machine types would cause inflated reports of high CPU usage.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Upgraded dev-libs/glib to 2.82.5. This resolves CVE-2024-52533.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Upgraded sqlite to v3.50.2. This resolves CVE-2025-6965.
Runtime sysctl changes:
- Changed: fs.file-max: 811826 -> 811817
cos-117-18613-339-26
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v24.0.9 | v1.7.27 | See List |
Fixed an issue where the cpuidle driver selected for some machine types would cause inflated reports of high CPU usage.
Updated dev-python/requests to v2.32.4.
Upgraded virtual/logger to v0-r2.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2024-11584 in cloud-init.
Fixed CVE-2024-6174 in cloud-init.
Patched openssl to fix CVE-2023-50782 affecting dev-python/cryptography.
Upgraded dev-libs/glib to 2.82.5. This resolves CVE-2024-52533.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Runtime sysctl changes:
- Changed: fs.file-max: 811775 -> 811788
cos-113-18244-448-20
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.144 | v24.0.9 | v1.7.27 | See List |
Updated dev-python/requests to v2.32.4.
Upgraded virtual/logger to v0-r2.
Upgraded sys-process/lsof to v4.99.5.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2024-11584 in cloud-init.
Fixed CVE-2024-6174 in cloud-init.
Fixed CVE-2024-52533 in dev-libs/glib.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Runtime sysctl changes:
- Changed: fs.file-max: 812027 -> 812046
cos-109-17800-570-23
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.143 | v24.0.9 | v1.7.27 | See List |
Updated dev-python/requests to v2.32.4.
Upgraded sys-process/lsof to v4.99.5.
Added support for Nvidia driver version 535.261.03. This fixes CVE-2025-23286 and CVE-2025-23279.
Added support for Nvidia driver version 570.172.08. This fixes CVE-2025-23279.
Upgraded net-misc/netplan to 1.1.2. This fixes CVE-2022-4968.
Fixed CVE-2024-11584 in cloud-init.
Fixed CVE-2024-6174 in cloud-init.
Patched openssl to fix CVE-2023-50782 affecting dev-python/cryptography.
Upgraded dev-vcs/git to version 2.49.1. This fixes CVE-2025-48385, CVE-2025-27613, CVE-2025-27614, CVE-2025-48384, CVE-2025-46835.
Runtime sysctl changes:
- Changed: fs.file-max: 812262 -> 812283
OpenAI's gpt-oss models are available through Model Garden.
Imagen
Virtual try-on lets you generate virtual try-on images from an image of a person and product photos that you provide, and is available in Preview. For more information, see Generate Virtual Try-On Images and Virtual Try-On API.
(2025-R33) Version updates
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2461000
- 1.28.15-gke.2507000
- 1.29.15-gke.1614000
- 1.29.15-gke.1686000
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2475000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2475000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1639000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
(2025-R33) Version updates
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1320000
- 1.31.9-gke.1287000
- 1.32.4-gke.1698000
- 1.33.2-gke.4780000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.6-gke.1013000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
(2025-R33) Version updates
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1060000
- 1.33.2-gke.4780000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1096000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1096000 with this release.
(2025-R33) Version updates
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
(2025-R33) Version updates
- Version 1.32.6-gke.1013000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1320000
- 1.31.9-gke.1287000
- 1.32.4-gke.1767000
- 1.33.2-gke.1111000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.6-gke.1013000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
(2025-R33) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1372000
- 1.31.10-gke.1067000
- 1.32.6-gke.1060000
- 1.33.2-gke.4780000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1096000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1390000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.11-gke.1002000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1096000 with this release.
Regular channel
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
Stable channel
- Version 1.32.6-gke.1013000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1320000
- 1.31.9-gke.1287000
- 1.32.4-gke.1767000
- 1.33.2-gke.1111000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.6-gke.1013000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
Extended channel
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2461000
- 1.28.15-gke.2507000
- 1.29.15-gke.1614000
- 1.29.15-gke.1686000
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2475000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2475000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1639000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
No channel
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1320000
- 1.31.9-gke.1287000
- 1.32.4-gke.1698000
- 1.33.2-gke.4780000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.6-gke.1013000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
General availability support for the following integration:
OpenAI's gpt-oss models are available through Model Garden.
August 05, 2025
Cloud ComposerNew Airflow builds are available in Cloud Composer 3:
New images are available in Cloud Composer 2:
Cloud Composer versions 2.8.7 and 2.8.8 have reached their end of support period.
(Cloud Composer 2) Moved the update_fab_perms
option from [webserver]
to
[fab]
in the Airflow configuration. The corresponding deprecation warning is
no longer generated in Airflow web server logs.
Added task-level resource consumption Airflow metrics to Cloud Composer.
composer.googleapis.com/workflow/task/cpu_usage
: percentage of CPU used by a task.composer.googleapis.com/workflow/task/cpu_usage
: percentage of memory used by a task.
Cross-region internal Application Load Balancers can now route requests for static content to Cloud Storage buckets.
For more information, see Set up a cross-region internal Application Load Balancer with Cloud Storage buckets.
This capability is now in General Availability.
You can now use the time_series_billed_for_queries_count
metric to estimate charges based on the number of time series that have been
queried. For more information, see View the number of time series billed
for queries.
Billing by time series queried isn't enforced until October 2, 2025. For more information, see Cloud Monitoring pricing summary.
Support for manually scaling your Cloud Run service is now at General Availability (GA).
Generally available: You can consume reservations with Colab Enterprise runtimes. Reservations of Compute Engine zonal resources help you gain a high level of assurance that your runtimes have the necessary resources to run. For more information, see Use reservations with Colab Enterprise.
For Hyperdisk Throughput, the maximum IOPS for a single volume has increased from 600 MiB/s to 2,400 MiB/s. The maximum IOPS for a single volume has increased from 2,400 IOPS to 9,600 IOPS. Hyperdisk Throughput volumes are designed for cost-sensitive workloads, analytics workloads, and workloads that have sequential I/O and large block sizes. For more information, see About Hyperdisk Throughput.
Generally Available: The storage-optimized Z3 machine series offers a bare metal (z3-highmem-192-highlssd-metal
) machine type with 192 vCPUs, 1,536 GB of memory, and 72 TiB of Local SSD storage.
Bare metal instances let you create an instance with direct access to the machine's CPU and memory, without a virtualization layer in the middle. Z3 uses Titanium to deliver more compute and memory resources for your workloads by offloading network and I/O processing from the host hardware. To learn more, see Z3 machine series. For information about bare metal instances, including regional availability, see Bare metal instances on Compute Engine.
The Compute Engine feature that deploys containers on VMs during VM creation is deprecated. For more information about the alternative solutions for running containers on VMs and MIGs, see Compute Engine container startup agent deprecation.
Database Center offers monitoring support for databases running on Google Compute Engine virtual machines. This feature is in Preview. To request access to this feature, visit the access request page. For more information, see Monitor databases on Compute Engine virtual machines.
Database Center supports the analyze system performance feature in the High Resource Utilization recommendation for AlloyDB for PostgreSQL. For more information, see Performance insights and recommendations.
You can monitor the number of new Google Cloud database resources that were added to your fleet over the past 1, 7, or 30 days. For more information, see View recently added database resources.
You can enable Gemini chat at the folder level to help you learn about Google Cloud database products. To learn how to enable Gemini chat at the folder level, see Before you begin using Gemini chat.
The M4 machine series is generally available in GKE Standard clusters.
A fix is available for an issue in which the Compute Engine Persistent Disk CSI
driver failed with an invalid cpuString
error on GKE nodes that used custom
machine types. This issue prevented successful attachment and mounting of
Persistent Disk volumes on affected nodes. The fix is available in the following
GKE versions:
- 1.31.10-gke.1034000 and later
- 1.32.4-gke.1698000 and later
- 1.33.1-gke.1386000 and later
New YARA-L features
The following capabilities have been added to YARA-L 2.0 to enhance search precision, data analysis, and investigative workflows:
Conditions in UDM search and dashboards
You can now filter aggregates defined in the
outcome
section using the newcondition
clause. This gives you more precise control over your results and supports more targeted investigations.New functionality includes support for
OR
andn
of[a, b, c.. z]
expressions.General availability for search and dashboards.
Deduplicate events in searches and dashboards
The new
dedup
section lets you remove duplicate events after thematch
clause in both standard UDM searches and YARA-L 2.0 queries.General availability for search and dashboards.
Use metrics functions in UDM searches
You can now apply
metrics
functions in theoutcome
section of your search to access aggregated historical data directly in your search queries.- Uses the same syntax as
metrics
in rules. - General availability for search.
- Uses the same syntax as
Increased limits for array and array_distinct
The element limit for
array
andarray_distinct
aggregation functions in YARA-L has increased from 25 to 1,000.- General availability for search and dashboards.
- Private preview for rules.
Restrict search results using limit
The
limit
keyword now lets you restrict the number of results returned by a search. Use this to quickly preview data, optimize performance, or focus on a subset of results.General availability for search and dashboards.
earliest
andlatest
timestampsNew
earliest
andlatest
timestamps let you extract the time range of your data (within microseconds) during aggregation.General availability for search.
Layer aggregations and analytics across multi-stage queries
Recent updates to multi-stage queries let you:
Layer aggregations and data statistical functions. Calculate baselines, deviations, and trends across multiple stages of data processing.
Conduct joins both within and across stages.
Private preview for search and dashboards. Contact your Google SecOps representative to enroll.
Join events, the entity graph, and data tables
You can now perform Inner joins between events, the entity graph, and data tables. These queries require a
match
clause for these joins and return results as statistics.Private preview for search and dashboards. Contact your Google SecOps representative to enroll.
New YARA-L features
The following capabilities have been added to YARA-L 2.0 to enhance search precision, data analysis, and investigative workflows:
Conditions in UDM search and dashboards
You can now filter aggregates defined in the
outcome
section using the newcondition
clause. This gives you more precise control over your results and supports more targeted investigations.New functionality includes support for
OR
andn
of[a, b, c.. z]
expressions.General availability for search and dashboards.
Deduplicate events in searches and dashboards
The new
dedup
section lets you remove duplicate events after thematch
clause in both standard UDM searches and YARA-L 2.0 queries.General availability for search and dashboards.
Use metrics functions in UDM searches
You can now apply
metrics
functions in theoutcome
section of your search to access aggregated historical data directly in your search queries.- Uses the same syntax as
metrics
in rules. - General availability for search.
- Uses the same syntax as
Increased limits for array and array_distinct
The element limit for
array
andarray_distinct
aggregation functions in YARA-L has increased from 25 to 1,000.- General availability for search and dashboards.
- Private preview for rules.
Restrict search results using limit
The
limit
keyword now lets you restrict the number of results returned by a search. Use this to quickly preview data, optimize performance, or focus on a subset of results.General availability for search and dashboards.
earliest
andlatest
timestampsNew
earliest
andlatest
timestamps let you extract the time range of your data (within microseconds) during aggregation.General availability for search.
Layer aggregations and analytics across multi-stage queries
Recent updates to multi-stage queries let you:
Layer aggregations and data statistical functions. Calculate baselines, deviations, and trends across multiple stages of data processing.
Conduct joins both within and across stages.
Private preview for search and dashboards. Contact your Google SecOps representative to enroll.
Join events, the entity graph, and data tables
You can now perform Inner joins between events, the entity graph, and data tables. These queries require a
match
clause for these joins and return results as statistics.Private preview for search and dashboards. Contact your Google SecOps representative to enroll.
Columnar engine for Spanner is now in Preview. Columnar engine is a storage technique used with analytics queries to speed up scans. Spanner columnar engine accelerates analytical query performance on live operational data by up to 200 times without affecting transaction workloads. This eliminates the need for ETL into separate data warehouses while maintaining strong consistency. For more information, see the Columnar engine for Spanner overview.
Generally available: You can consume reservations with Vertex AI Workbench instances. Reservations of Compute Engine zonal resources help you gain a high level of assurance that your jobs have the necessary resources to run. For more information, see Use reservations with Vertex AI Workbench instances.
August 04, 2025
AI ApplicationsVertex AI Search: gemini-2.5-flash/answer_gen/v1 model is the default model
Model version gemini-2.5-flash/answer_gen/v1 is the default model for generating answers in Vertex AI Search.
For more information, see Answer generation model versions and lifecycle.
Access Approval supports Firebase Data Connect in the Preview stage.
Access Transparency supports Firebase Data Connect in the Preview stage.
On August 4, 2025 we announced new functionality in Advanced API Security Abuse Detection.
Terraform support for configuring Advanced API Security
We have expanded our Terraform support for Advanced API Security, enabling you to automate the management of your security posture. You can now use Terraform to manage add-on enablement for Subscription and PAYG environments, create Risk Assessment security profiles and monitoring conditions, configure IP address resolution, and create security actions.
For information, see Configure Advanced API Security using Terraform.
On August 4, 2025, we released an updated version of Apigee (1-15-0-apigee-8).
Server-sent events and EventFlows are Generally Available (GA)
Apigee supports continuous response streaming from server-sent event (SSE) endpoints to clients in real time. The Apigee SSE feature is useful for handling large language model (LLM) APIs that operate most effectively by streaming their responses back to the client. SSE streaming reduces latency, and clients can receive response data as soon as it is generated by an LLM. This feature supports the use of AI agents that operate in real time environments, such as customer service bots or workflow orchestrators. For more information, see Streaming server-sent events.
Streaming from SSE endpoints is available in Apigee and in Apigee hybrid v1.15.0 and newer.
Bug ID | Description |
---|---|
435620966 | Fixed a regression that occurred when upgrading from ASM 1.22 to 1.23 that resulted in 503 errors. |
422195061 | Enhanced cache lookup performance. |
269573358 | Resolved issue with OASValidation policy schema references for parameters without body validation The OASValidation policy correctly resolves and validates schemas passed by reference ( |
421141062 | Increased OAS validation limit to 20MB in JSON payloads to prevent validation failures. |
417200603 | Improved API connection stability to prevent premature timeouts for long-running requests. |
423597917 | POST operations for AppGroupApp keys updated
|
390234048 | Resolved issue resulting in missing fields in API responses for Monetization rate plans The |
422757662 | Reverted problematic commit regarding X-b3 trace headers send when using distributed tracing. |
409048431 | Fixed a SAML signature verification bypass vulnerability. |
N/A | Updates to security infrastructure and libraries. |
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-bigquery
2.54.0 (2025-07-31)
Features
- bigquery: Add OpenTelemetry Samples (#3899) (e3d9ed9)
- bigquery: Add otel metrics to request headers (#3900) (4071e4c)
Dependencies
- update dependency com.google.cloud:google-cloud-bigquerystorage-bom to v3.16.1 (#3912) (https://github.com/googleapis/java-bigquery/commit/bb6f6dcb90b1ddf72e630c4dc64737cf2c2ebd2e)
- Update dependency com.google.api.grpc:proto-google-cloud-bigqueryconnection-v1 to v2.70.0 (#3890) (84207e2)
- Update dependency com.google.apis:google-api-services-bigquery to v2-rev20250706-2.0.0 (#3910) (ae5c971)
- Update dependency com.google.cloud:sdk-platform-java-config to v3.50.2 (#3901) (8205623)
- Update dependency io.opentelemetry:opentelemetry-api to v1.52.0 (#3902) (772407b)
- Update dependency io.opentelemetry:opentelemetry-bom to v1.52.0 (#3903) (509a6fc)
- Update dependency io.opentelemetry:opentelemetry-context to v1.52.0 (#3904) (96c1bae)
- Update dependency io.opentelemetry:opentelemetry-exporter-logging to v1.52.0 (#3905) (28ee4c9)
You can now use the new Data Science Agent (DSA) for Colab Enterprise and BigQuery to automate exploratory data analysis, perform machine learning tasks, and deliver insights all within a Colab Enterprise notebook. This feature is in preview.
You can add the Cassandra to Bigtable client for Java library to your Java project from the Maven Central repository.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-bigtable
2.63.0 (2025-07-30)
Features
- Add Idempotency to Cloud Bigtable MutateRowsRequest API (bc58b4f)
- Add port as a parameter for the Bigtable emulator (#2645) (5acd3dc)
- Add type support for Proto and Enum (bc58b4f)
- Publish Proto and Enum types to CBT data API (ace12d5)
- Selective GAPIC autogeneration for Python Bigtable Admin (e219c38)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.60.2 (e219c38)
- Update routing_parameters.path_template (e219c38)
Dependencies
Documentation
- Sync generated comments from the API Protos (bc58b4f)
The following resource types are now publicly available through the ExportAssets, ListAssets, BatchGetAssetsHistory, QueryAssets, Feed, and Search (SearchAllResources, SearchAllIamPolicies) APIs.
- Contact Center AI Insights API
contactcenterinsights.googleapis.com/EncryptionSpec
- Network Security API
networksecurity.googleapis.com/MirroringDeployment
networksecurity.googleapis.com/MirroringDeploymentGroup
networksecurity.googleapis.com/MirroringEndpointGroup
networksecurity.googleapis.com/MirroringEndpointGroupAssociation
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-logging
3.23.1 (2025-07-28)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.60.2 (6a268f8)
Dependencies
You can now build queries without manually writing SQL in the Log Analytics page by using the query builder. This feature is in Public Preview. For more information, see Build and run a SQL query.
You can create a secure tag at the organization level and bind its value to all virtual machine (VM) instances across that organization. For more information, see Secure tags for firewalls. This feature is available in General Availability.
Cloud SQL for MySQL now supports model endpoint management to help you build your generative AI applications. With model endpoint management, you can register and call remote AI model providers or access the Vertex AI integration. This feature is in Preview and available in Cloud SQL for MySQL version 8.0.36 and later, which includes Cloud SQL for MySQL version 8.4.
To use model endpoint management, update your instance to [MySQL version].R20250531.01_14
or later, and make sure that you've enabled the integration with Vertex AI on your instance. You can perform self-service maintenance or wait until the next maintenance window to update the maintenance version of your instance automatically.
PostgreSQL has identified a bug in PostgreSQL's May 8, 2025 release that is causing logical replication to halt. Cloud SQL for PostgreSQL released [PostgreSQL version].R20250302.00_19
on May 22, 2025, which is impacted by this bug.
If you use logical replication with your Cloud SQL for PostgreSQL instances, then we recommend that you don't update your instances to this version or any self-service maintenance version released after May 22, 2025, due to this PostgreSQL bug. We also recommend not performing a major version upgrade on your instances, since it adopts the latest self-service maintenance version.
We expect a fix for this issue in the next automatically-scheduled maintenance. For more information about this bug, see Logical replication 'invalid memory alloc request size 1585837200' after upgrading to 17.5.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-storage
2.54.0 (2025-07-24)
Features
- Add BucketInfo.IpFilter (#3177) (14a91ec)
- Add default end-to-end checksumming for JournalingBlobWriteSessionConfig #3180 (fa0f6a0)
- Add default end-to-end crc32c checksumming for several upload methods via grpc transport #3176 (fa0f6a0)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.60.2 (bd1f199)
- Give user provided checksum precondition priority for Storage#create methods that accept byte[] #3182 (fa0f6a0)
- Move crc32c computation before writing to disk for BufferToDiskThenUpload BlobWriteSession config #3187 (fa0f6a0)
Dependencies
You can now use the new Data Science Agent to automate exploratory data analysis, perform machine learning tasks, and deliver insights from within a Colab Enterprise notebook. To get started, see Use the Data Science Agent. This feature is in Preview.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-datastore
2.31.1 (2025-07-28)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.60.2 (06372cd)
Dependencies
New rules added to rule pack
Curated detections has been enhanced with additional Chrome Enterprise Premium Browser Threat detections. The following rules have been added to the rule pack:
Malware Transfer Event in Chrome Management
Password Breach Event By Admin User
Phishing Navigation Event Containing Suspicious Parameters In Chrome Management
Chrome Password Event on Newly Observed Domain in Environment
Auto Extraction supports XML formatted logs in addition to JSON formatted logs. This enhancement will be available starting this week.
Google Chronicle: Version 63.0
The following new actions have been added:
- Ask Gemini
- Enrich Entities
Case Federation: Version 4.0
- Integration: Refactored the code.
Gmail: Version 5.0
- Integration: Improved error handling.
Google Chronicle: Version 63.0
The following actions have been deprecated:
- Enrich Domain
- Enrich IP
QRadar: Version 60.0
Updated offense processing logic in the following connector:
- Qradar - Baseline Offenses Connector
SentinelOneV2: Version 40.0
Added ability to fetch agent information in the following actions:
- Disconnect Agent From Network
- Enrich Endpoint
- Get Agent Status
- Get Application List For Endpoint
- Get Events For Endpoint Hours Back
- Initiate Full Scan
- Move Agents
- Reconnect Agent To The Network
New rules added to rule pack
Curated detections has been enhanced with additional Chrome Enterprise Premium Browser Threat detections. The following rules have been added to the rule pack:
Malware Transfer Event in Chrome Management
Password Breach Event By Admin User
Phishing Navigation Event Containing Suspicious Parameters In Chrome Management
Chrome Password Event on Newly Observed Domain in Environment
Auto Extraction supports XML formatted logs in addition to JSON formatted logs. This enhancement will be available starting this week.
Model Armor supports the asia-southeast1
location. For information about supported locations, see Locations for the Model Armor API.
For Exadata Database Service, Oracle Database@Google Cloud supports region us-central1
(Iowa, North America).
For a full list of supported locations, see Regional availability
A weekly digest of client library updates from across the Cloud SDK.
Go
Changes for pubsub/apiv1
1.50.0 (2025-07-28)
Features
Bug Fixes
- pubsub: Update google.golang.org/api to 0.229.0 (3319672)
Documentation
Java
Changes for google-cloud-pubsub
1.141.1 (2025-07-28)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.60.2 (7afae21)
- Remove element_count_limit and request_byte_limit from pubsub_gapic.yaml (7afae21)
Dependencies
- Update dependency com.google.cloud:google-cloud-bigquery to v2.53.0 (#2489) (5a454b9)
- Update dependency com.google.cloud:google-cloud-core to v2.58.2 (#2493) (9a1c17e)
- Update dependency com.google.cloud:google-cloud-storage to v2.53.3 (#2486) (9416cc9)
- Update dependency com.google.cloud:sdk-platform-java-config to v3.50.2 (#2494) (9f73ef0)
- Update dependency org.xerial.snappy:snappy-java to v1.1.10.8 (#2492) (a55e214)
Python
Changes for google-cloud-pubsub
2.31.1 (2025-07-28)
Bug Fixes
New SAP certifications: Additional C4 machine tpes
SAP has certified the following Compute Engine C4 machine types with the Intel Granite Rapids CPU platform:
- For use with SAP HANA scale-up (OLTP and OLAP):
c4-highmem-144
,c4-highmem-288
, andc4-highmem-288-metal
- For use with SAP NetWeaver:
c4-standard-144
,c4-standard-288
,c4-standard-288-metal
,c4-highmem-144
,c4-highmem-288
, andc4-highmem-288-metal
For more information, see the following:
Secure Source Manager is now generally available for all customers.
Model Armor supports the asia-southeast1
location. For information about supported locations, see Locations for the Model Armor API.
Sensitive Data Protection provides recommendations to optimize your infoType selections. In the Google Cloud console, if you select a specific infoType that is covered by a general infoType, Sensitive Data Protection recommends general infoTypes that you can use instead.
For information about the benefits of using general infoTypes, see General and specific infoType detectors.
General availability support for the following integration:
When you reserve an internal range with an automatically allocated IPv4 CIDR block, you can specify the allocation strategy that is used to select a free block. This feature is available in General Availability.
August 03, 2025
Google SecOpsAutomated retries for failed playbook actions
This feature is in Preview.
Playbook functionality now supports automatic retries for individual actions that encounter temporary issues, such as network outages, API rate limits, or service unavailability. You can define the number of retry attempts and the intervals between retries directly at the step level within playbooks.
For more information on configuring and using action retries, see Configure action retries in playbooks.
Custom Fields Form widget is now supported in Playbook View
The Custom Fields Form widget is now supported in Playbook View.
Release 6.3.56 is rolling out to the first phase of regions, as outlined in our Google SecOps release plan.
This release includes the following features:
Automated retries for failed playbook actions
This feature is in Preview.
Playbook functionality now supports automatic retries for individual actions that encounter temporary issues, such as network outages, API rate limits, or service unavailability. You can define the number of retry attempts and the intervals between retries directly at the step level within playbooks.
For more information on configuring and using action retries, see Configure action retries in playbooks.
Custom Fields Form widget is now supported in Playbook View
The Custom Fields Form widget is now supported in Playbook View.
August 02, 2025
Google SecOps SOARRelease 6.3.55 is now available for all regions.
August 01, 2025
Cloud VPNClassic VPN full deprecation update
As of August 1, 2025, dynamic routing or Border Gateway Protocol (BGP) for Classic VPN tunnels is deprecated. If your workloads require BGP for VPN connectivity, you must use HA VPN.
Existing Classic VPN tunnels that use BGP will continue to function. However, they will no longer be supported and will operate without an availability SLA.
For more information, refer to Classic VPN dynamic routing deprecation.
Eventarc Advanced is generally available (GA).
Eventarc Advanced is available in the asia-south1
(Mumbai, India), europe-north1
(Hamina, Finland), and us-east4
(Ashburn, Virginia, North America) regions.
There is a limit of one MessageBus
resource per project per region, and a limit of one GoogleApiSource
resource per project per region. For more information, see Quotas and limits.
You can clone an existing database at a selected timestamp into a new database. This feature is available in Preview.
You can clone an existing database at a selected timestamp into a new database. This feature is available in Preview.
Multi-part chat code suggestions
IntelliJ Gemini Code Assist 1.23.3
IntelliJ Gemini Code Assist now supports streamlined multi-part chat code suggestions. You have the option to accept a single code change or all suggested changes.
Clickable filenames in chat output
IntelliJ Gemini Code Assist 1.23.3
IntelliJ Gemini Code Assist provides clickable filenames when it references a file in your workspace as part of its chat response. Clicking the filename opens the file in your workspace.
Chat banner shows release channel information
IntelliJ Gemini Code Assist 1.23.3
The IntelliJ Gemini Code Assist chat banner shows the release channel that you're currently working in.
View code diff in IntelliJ chat
IntelliJ Gemini Code Assist 1.23.3
With the code diff view in IntelliJ Gemini Code Assist, you can view suggested code changes directly in your chat with Gemini Code Assist. This feature boosts productivity by offering immediate visibility on modifications, streamlining reviews, and enabling precise control over integrating new code, all within the Gemini Code Assist chat interface.
(2025-R32) Version updates
- Version 1.33.2-gke.1240000 is now the default version for cluster creation in the Extended channel.
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2456000
- 1.28.15-gke.2488000
- 1.29.15-gke.1607000
- 1.29.15-gke.1656000
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.6-gke.1013000
- 1.33.2-gke.1111000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2461000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2461000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1614000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
(2025-R32) Version updates
- Version 1.33.2-gke.1240000 is now the default version for cluster creation.
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1279000
- 1.31.9-gke.1218000
- 1.32.2-gke.1297002
- 1.32.4-gke.1415000
- 1.33.2-gke.4655000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.4-gke.1767000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.4-gke.1767000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
(2025-R32) Version updates
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- 1.33.2-gke.4655000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
(2025-R32) Version updates
- Version 1.33.2-gke.1240000 is now the default version for cluster creation in the Regular channel.
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.6-gke.1013000
- 1.33.2-gke.1111000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
(2025-R32) Version updates
- Version 1.32.4-gke.1767000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1279000
- 1.31.9-gke.1218000
- 1.32.4-gke.1698000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1320000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.9-gke.1287000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.4-gke.1767000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1320000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.9-gke.1287000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.4-gke.1767000 with this release.
(2025-R32) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1340000
- 1.31.10-gke.1034000
- 1.32.6-gke.1025000
- 1.33.2-gke.4655000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1060000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1372000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.10-gke.1067000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1060000 with this release.
Regular channel
- Version 1.33.2-gke.1240000 is now the default version for cluster creation in the Regular channel.
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.6-gke.1013000
- 1.33.2-gke.1111000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
Stable channel
- Version 1.32.4-gke.1767000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1279000
- 1.31.9-gke.1218000
- 1.32.4-gke.1698000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1320000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.9-gke.1287000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.4-gke.1767000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1320000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.9-gke.1287000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.4-gke.1767000 with this release.
Extended channel
- Version 1.33.2-gke.1240000 is now the default version for cluster creation in the Extended channel.
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2456000
- 1.28.15-gke.2488000
- 1.29.15-gke.1607000
- 1.29.15-gke.1656000
- 1.30.12-gke.1333000
- 1.31.10-gke.1021000
- 1.32.6-gke.1013000
- 1.33.2-gke.1111000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2461000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2461000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1614000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
No channel
- Version 1.33.2-gke.1240000 is now the default version for cluster creation.
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1279000
- 1.31.9-gke.1218000
- 1.32.2-gke.1297002
- 1.32.4-gke.1415000
- 1.33.2-gke.4655000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.4-gke.1767000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.4-gke.1767000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
Compliance Manager helps ensure that your Google Cloud infrastructure, workloads, and data meet the security and regulatory requirements of your organization. This product is available in Preview to the Security Command Center Enterprise tier.
The following infoType detectors are available in all regions. For more information about all built-in infoTypes, see InfoType detector reference.
DOCUMENT_TYPE/R&D/SOURCE_CODE/C
DOCUMENT_TYPE/R&D/SOURCE_CODE/CPP
DOCUMENT_TYPE/R&D/SOURCE_CODE/CS
DOCUMENT_TYPE/R&D/SOURCE_CODE/GO
DOCUMENT_TYPE/R&D/SOURCE_CODE/HTML
DOCUMENT_TYPE/R&D/SOURCE_CODE/JAVA
DOCUMENT_TYPE/R&D/SOURCE_CODE/JAVASCRIPT
DOCUMENT_TYPE/R&D/SOURCE_CODE/JSON
DOCUMENT_TYPE/R&D/SOURCE_CODE/PHP
DOCUMENT_TYPE/R&D/SOURCE_CODE/POWERSHELL
DOCUMENT_TYPE/R&D/SOURCE_CODE/PYTHON
DOCUMENT_TYPE/R&D/SOURCE_CODE/RUST
DOCUMENT_TYPE/R&D/SOURCE_CODE/SHELL
DOCUMENT_TYPE/R&D/SOURCE_CODE/SQL
DOCUMENT_TYPE/R&D/SOURCE_CODE/TYPESCRIPT
When you create the free trial instance using the Google Cloud console, Spanner creates and preloads it with a sample database for an ecommerce store. You can use the free trial instance to explore the dataset and learn about Spanner capabilities with pre-loaded queries.
For more information, see Spanner free trial instances.
General availability support for the following integration:
July 31, 2025
Apigee API hubNew data source support for plugins
API hub now supports importing API metadata through new dedicated plugins for the following data sources:
For more information, see Plugins overview.
Push-based plugin ingestion
API hub now supports push-based plugin ingestion. This method allows for more real-time synchronization of API metadata. All new Apigee, Apigee hybrid, Apigee Edge Public Cloud, and Apigee Edge Private Cloud (OPDK) plugins are created with push-based ingestion by default.
For more information, see Plugin data ingestion methods.
Create custom plugins [API only]
You can now use the Create Plugin
API to create custom plugins in API hub. Custom plugins are created manually to connect API hub to a specific API data source.
For more information, see Create custom plugins.
Default Apigee plugin instance not auto-created during runtime attachment
Issue: When provisioning API hub as part of Apigee provisioning, the default Apigee X and hybrid
plugin instance is not automatically created. This prevents API proxies from being auto-registered.
Workaround: You can manually attach an Apigee runtime instance and import the Apigee assets. See Attach a runtime project.
Delete plugin instance changes
API hub no longer retains any ingested metadata from a plugin after its deletion. Deleting a plugin instance also permanently deletes all the associated API data from API hub.
For more information, see Delete a plugin instance.
Provisioning changes and Apigee API proxy registration
API hub changed how it registers API proxies from Apigee and how it creates default plugin instances during provisioning.
API hub now automatically creates a default Apigee X and hybrid
plugin instance and auto-registers API proxies only when you provision it as part of Apigee provisioning.
If you provision API hub directly from the API hub UI, API hub does not automatically create a default plugin instance, nor does it auto-register proxies.
For more information, see Project attachments and plugins.
New tutorial: Enrich API data in API hub
A new tutorial is available for enriching API data in Apigee API hub.
It shows you how to use API hub's custom curation features to automatically fetch OpenAPI specifications from a Cloud Storage bucket and associate them with their corresponding Apigee API proxies. The custom curation logic is defined using an integration in Application Integration.
For more information, see Enrich API data with custom curation in API hub.
Deprecation of pull-based ingestion for Apigee plugins
Pull-based ingestion is no longer supported for Apigee and Apigee hybrid
plugins as of July 31, 2025. For existing projects that have pull-based Apigee X and hybrid plugins configured, these plugins will continue to function and will be automatically migrated to the push-based type starting August 2025.
Deprecation of Apigee proxy deployment attributes
As of July 31st, 2025, the Apigee X and Hybrid Environment
and Apigee X and Hybrid Organization
attributes will no longer be added to new Apigee proxy deployments. This change specifically applies when you import deployments into API hub by attaching a runtime project.
If your existing projects use these attributes in filtered search queries, we recommend updating them. To ensure your searches continue to work, use the Source project
and Source environment
fields as alternatives.
Announcing the Public Preview launch of Cloud SQL enhanced backups with Backup and DR. This enables advanced data protection capabilities offered by Backup and DR including backup vault support, granular scheduling through backup plans, and centralized management.
You can manage data profile scans and data quality scans across your project by using the Metadata curation page in the Google Cloud console. For more information, see Profile your data and Scan for data quality issues. This feature is generally available (GA).
BigQuery ML has improved throughput by more than 100x for the following generative AI functions:
Actual performance varies based on the number of input and output tokens in the request, but a typical 6-hour job can now process millions of rows. For more information, see Generative AI functions.
BigQuery ML now can automatically detect model quota increases in Vertex AI, and automatically adjusts the quota for any BigQuery ML functions that use those models. You no longer need to email the BigQuery ML team to increase model quota.
You can now use continuous queries to export BigQuery data to Spanner in real time. This feature is in Preview.
Logical views for Bigtable are now generally available (GA). Logical views let you save a SQL query as a specific, shareable view of your data—even with a flexible schema—and then control who has permission to see the results.
Cloud SQL now offers two options of backup services to manage your instance's backups:
Enhanced backups (Preview): backups are managed and stored in a centralized backup management project that leverages the Backup and DR service, and provides enforced retention, granular scheduling, and longer retention.
Standard backups (existing option): backups are created, managed, and stored in the same project as your Cloud SQL instances.
You can choose between these options based on your instance's requirements and needs. Although instances can't use both backup options at the same time, Cloud SQL gives you the ability to switch between these backup options as necessary.
For more information about the available options and their limitations, see Backup options.
Cloud SQL now offers two options of backup services to manage your instance's backups:
Enhanced backups (Preview): backups are managed and stored in a centralized backup management project that leverages the Backup and DR service, and provides enforced retention, granular scheduling, and longer retention.
Standard backups (existing option): backups are created, managed, and stored in the same project as your Cloud SQL instances.
You can choose between these options based on your instance's requirements and needs. Although instances can't use both backup options at the same time, Cloud SQL gives you the ability to switch between these backup options as necessary.
For more information about the available options and their limitations, see Backup options.
Cloud SQL now offers two options of backup services to manage your instance's backups:
Enhanced backups (Preview): backups are managed and stored in a centralized backup management project that leverages the Backup and DR service, and provides enforced retention, granular scheduling, and longer retention.
Standard backups (existing option): backups are created, managed, and stored in the same project as your Cloud SQL instances.
You can choose between these options based on your instance's requirements and needs. Although instances can't use both backup options at the same time, Cloud SQL gives you the ability to switch between these backup options as necessary.
For more information about the available options and their limitations, see Backup options.
Support for accelerator-optimized a3-highgpu-1g machine type for securely running AI and ML workloads is now generally available, with the following specifications:
- 4th Generation Intel Xeon Scalable processor (Sapphire Rapids)
- Intel TDX
- 1 NVIDIA H100 GPU
New Dataproc Serverless for Spark runtime versions:
- 1.1.111
- 1.2.55
- 2.2.55
- 2.3.6
Dataproc Serverless for Spark: Subminor version 1.1.111
is the last release of runtime version 1.1
, which will no longer be supported and will not receive new releases.
Conversational Agents: Routine playbooks are now generally available.
Conversational Agents: Parameter passing is now available and documented between routine playbooks, task playbooks, and flows.
Use Gemini Code Assist agent mode in IntelliJ (Preview)
Stay in control with interactive reviews and approvals
You can use Gemini Code Assist chat in agent mode to complete complex, multi-step tasks and goals with complete control over every change. Before making any modifications, the agent will present a plan for your review. You can edit, ask for changes, approve, or deny any suggested changes. This collaborative approach combines the power of AI with your expertise, resulting in better code and a more efficient workflow.
To get started with agent mode, restart your IDE and follow the instructions in Use agentic chat as a pair programmer.
Auto Approve mode lets the agent act on your behalf (Preview)
Enable auto approve mode to let the agent act on your behalf. Once the agent is done you can review and roll back changes as you see fit.
Use agent mode in Gemini Code Assist for VS Code (Preview)
Tackle complex tasks with Gemini Code Assist agent mode for VS Code
Gemini Code Assist agent mode is available for all users. Describe your goal, and Gemini will create a plan for you to review and approve before any code is changed. This update removes the insiders channel requirement, and includes persistent agent mode or interactive chat state between IDE restarts, real-time shell command output, and faster UI performance. This collaborative approach combines AI power with your expertise, enabling you to complete multi-step tasks with complete control and efficiency.
To get started with agent mode, see Use agentic chat as a pair programmer.
Effectively collaborate with your agent with the improved diff view functionality (Preview)
We've enhanced Gemini Code Assist agent mode with powerful new editing capabilities. You can edit code changes directly in the integrated Diff view for precise, on-the-fly adjustments. To improve clarity, we've also added inline diffs directly in the chat, making it easier to see proposed changes at a glance. These features give you unparalleled control and a more efficient way to refine AI-suggested code.
Google Cloud NetApp Volumes now supports organization policy for Customer Managed Encryption Keys (CMEK). For more information, see CMEK organization policy.
General availability: The Ruby Pub/Sub client library has a new major version. For more information on how to migrate from v2 to v3, see the Migration guide.
You can use continuous queries to export BigQuery data into Spanner in real time. This feature is in preview.
A monthly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-spanner
6.96.1 (2025-06-30)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.59.0 (2836042)
Dependencies
6.97.0 (2025-07-10)
Features
Bug Fixes
- Drop max message size (#3987) (3eee899)
- Return non-empty metadata for DataBoost queries (#3936) (79c0684)
6.97.1 (2025-07-15)
Dependencies
Python
Changes for google-cloud-spanner
3.56.0 (2025-07-24)
Features
- Add support for multiplexed sessions - read/write (#1389) (ce3f230)
- Add support for multiplexed sessions (#1383) (21f5028)
- Default enable multiplex session for all operations unless explicitly set to false (#1394) (651ca9c)
- spanner: Add new change_stream.proto (#1382) (ca6255e)
Performance Improvements
VPC Service Controls feature: The VPC Service Controls violation dashboard is generally available. This dashboard provides an aggregated view of all access denials by service perimeters in your organization.
- The following charts are added to the dashboard:
- Violation count
- Top violations by access policy
- While creating a new log bucket during the dashboard setup, you can now select the region and retention period.
For more information, see Set up and view the violation dashboard.
reCAPTCHA policy-based challenge keys are now available in Preview. With policy-based challenge keys, you can configure reCAPTCHA to deterministically trigger CAPTCHA challenges based on a score threshold and challenge difficulty. For more information about the policy-based challenge keys, see reCAPTCHA keys overview.
reCAPTCHA Mobile SDK v18.8.0-beta02 is available for Android.
This version contains the following changes:
- Reliability improvements and bug fixes.
- The minimum supported version of Android is 23.
July 30, 2025
Apigee UIOn July 30, 2025 we began redirecting the following Apigee Classic UI navigation items to Apigee UI in the Google Cloud console:
- Develop > API Proxies
- Develop > Shared Flows
- Develop > Offline Debug
See Apigee UI in Cloud console navigation for a mapping of each Classic Apigee UI feature page to its location in the Apigee UI in Cloud console.
See Apigee Classic UI shutdown for details on shutdown dates.
If you require more time to transition to the Google Cloud console, submit the exception request form by Aug 15, 2025.
On July 30, 2025 we began redirecting the following Apigee Classic UI navigation items to Apigee UI in the Google Cloud console:
- Develop > API Proxies
- Develop > Shared Flows
- Develop > Offline Debug
See Apigee UI in Cloud console navigation for a mapping of each Classic Apigee UI feature page to its location in the Apigee UI in Cloud console.
See Apigee Classic UI shutdown for details on shutdown dates.
If you require more time to transition to the Google Cloud console, submit the exception request form by Aug 15, 2025.
Support for Go 1.24 runtime is in General Availability (GA).
Support for Go 1.25 runtime is in Preview. This runtime is available for early testers using existing release candidates.
Support for Node.js 24 runtime is in Preview. Node.js 24 is in the Current release state and enters long-term support (LTS) in October 2025. For more information, see Node.js v24.0.0 (Current) in the Node.js website.
Support for Go 1.24 runtime is in General Availability (GA).
Support for Go 1.25 runtime is in Preview. This runtime is available for early testers using existing release candidates.
Support for Node.js 24 runtime is in Preview. Node.js 24 is in the Current release state and enters long-term support (LTS) in October 2025. For more information, see Node.js v24.0.0 (Current) in the Node.js website.
The following Vertex AI supported resources are now generally available (GA):
- Dataset items
- Featurestore containers
- MetadataStore instances
- Model resources
The Gemini for Google Cloud API (cloudaicompanion.googleapis.com) is now enabled by default for most BigQuery projects. Exceptions include projects where customers have opted out, and those linked to accounts based in EMEA regions including BigQuery Europe, Middle East, and Africa regions.
Starting October 15, 2025, the global and classic external Application Load Balancers are improving HTTP header handling for headers with obs-fold values to comply with the RFC 9112 standard
Previously, these load balancers would forward HTTP headers with obs-fold values (those split across multiple lines, with subsequent lines starting with a space or a tab) without any changes. Starting October 15, 2025, each obs-fold will be replaced with one or more space characters (SP octets) before forwarding the message upstream. This ensures that the header is correctly interpreted as a single line, as required by the HTTP specification.
What you need to do
Review your current client applications and backend services before October 15, 2025 and ensure that they generate HTTP headers with obs-fold values in a single-line format when communicating with these load balancers.
Because the obs-fold header fields have been deprecated in RFC 9112, compliant clients and servers should already avoid using this format. However, there is a possibility that services that specifically rely on the old, non-compliant multi-line format of headers with obs-fold values might experience unexpected behavior. You should proactively check your backend service logs for any errors originating from your services due to the modified obs-fold headers.
For more information on the HTTP specification regarding headers with obs-fold values, review RFC 9112, Section 5.2: Obsolete Line Folding.
Support for Go 1.24 runtime is in General Availability (GA).
Support for Go 1.25 runtime is in Preview. This runtime is available for early testers using existing release candidates.
Support for Node.js 24 runtime is in Preview. Node.js 24 is in the Current release state and enters long-term support (LTS) in October 2025. For more information, see Node.js v24.0.0 (Current) in the Node.js website.
Support for Go 1.24 runtime is in General Availability (GA).
Support for Go 1.25 runtime is in Preview. This runtime is available for early testers using existing release candidates.
Support for Node.js 24 runtime is in Preview. Node.js 24 is in the Current release state and enters long-term support (LTS) in October 2025. For more information, see Node.js v24.0.0 (Current) in the Node.js website.
Generally available: The general purpose C4 machine series now supports the following machine types on Intel's Xeon 6 processor (Granite Rapids):
- C4 VMs with Titanium Local SSD attached using new machine types:
c4-standard-*-lssd
c4-highmem-*-lssd
- New bare metal machine types:
c4-standard-288-metal
c4-highmem-288-metal
- C4
standard
,highmem
, andhighcpu
VMs with 144 and 288 vCPUs
To learn more, see the C4 machine series.
For more information, about the attached Local SSD disks, see Machine types that automatically attach Local SSD disks.
Config Connector version 1.133.0 is now available.
New Beta Resources (Direct Reconciler):
StorageAnywhereCache
New Alpha Resources (Direct Reconciler):
BigtableLogicalView
Reconciliation Improvements
Added support for direct reconciliation to more resources, with opt-in behaviour. The API is backward compatible. The following resources now have direct reconciliation support
BigQueryTable
- Use the
alpha.cnrm.cloud.google.com/reconciler: direct
annotation on theBigQueryTable
CR object to opt-in the direct controller. - The direct controller also supports adding BigQueryDataPolicies directly to BigQueryTable columns within
spec.schema
.
- Use the
- PR#4808
filtered out Kubernetes labels that are invalid for Google Cloud in the
ComputeForwardingRule
direct controller, ensuring backward compatibility after migrating to the direct controller.
cos-dev-125-19175-0-0
Kernel | Docker | Containerd | GPU Drivers |
COS-6.12.37 | v27.5.1 | v2.0.4 | See List |
Updated app-misc/jq to v1.8.1.
The NFS access cache is no longer cleared on login by default. To use the old behavior, load the NFS module with the nfs_fasc=1
module parameter.
Patched openssl to fix CVE-2023-50782 affecting dev-python/crytography.
Upgraded sqlite to v3.50.2. This resolves CVE-2025-6965.
Fixed CVE-2024-26130 in dev-python/cryptography.
Fixed KCTF-5e28d5a in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811539 -> 811510
Google Cloud's Agent for SAP version 3.9
Version 3.9 of Google Cloud's Agent for SAP is generally available (GA). This version introduces monitoring and supportability enhancements.
For more information, see What's new with Google Cloud's Agent for SAP.
July 29, 2025
AlloyDB for PostgreSQLDatabase server compatibility with PostgreSQL version 17 is now available in Preview. You can create AlloyDB clusters with PostgreSQL 17 compatibility.
On July 29, 2025 we removed the Switch to Classic option from the following Apigee UI in the Google Cloud console pages:
- API Proxy
- Shared Flow
- Offline Debug detail
This is part of the Apigee Classic UI shutdown plan.
See Apigee UI in Cloud console navigation for a mapping of each Classic Apigee UI feature page to its location in the Apigee UI in Cloud console.
See Apigee Classic UI shutdown for details on shutdown dates.
If you require more time to transition to the Google Cloud console, submit the exception request form by Aug 15, 2025.
Custom IP address ranges are available for Cloud Interconnect in Preview. For more information, see Custom IP address ranges.
Veo video generation Veo 3 and Veo 3 Fast are now generally available. For more information, see Generate videos using text prompts.
You can use Terraform to manage Model Armor floor settings and templates. This helps reduce manual overhead with Model Armor deployments. For more information, see Terraform resources for Security Command Center.
Google Cloud NetApp Volumes is now integrated with NetApp BlueXP Connector. For more information, see NetApp Volumes integration with BlueXP.
Model Armor and Vertex AI integration
Model Armor integrates with Vertex AI, providing a default security configuration for all new prediction endpoints. This feature is in Preview. For more information, see Integration with Vertex AI.
You can send a bulk export of Security Command Center findings to a BigQuery dataset. This feature is available in Preview. For more information, see Bulk export findings to BigQuery.
You can use Terraform to manage Model Armor floor settings and templates. This helps reduce manual overhead with Model Armor deployments. For more information, see Terraform resources for Security Command Center.
July 28, 2025
Agent AssistAgent Assist offers the Twilio UI module V3. This version provides an upgraded integration.
On July 28, 2025, we released an updated version of Apigee (1-15-0-apigee-7).
Server-sent events and EventFlows are Generally Available (GA)
Apigee supports continuous response streaming from server-sent event (SSE) endpoints to clients in real time. The Apigee SSE feature is useful for handling large language model (LLM) APIs that operate most effectively by streaming their responses back to the client. SSE streaming reduces latency, and clients can receive response data as soon as it is generated by an LLM. This feature supports the use of AI agents that operate in real time environments, such as customer service bots or workflow orchestrators. For more information, see Streaming server-sent events.
Streaming from SSE endpoints is available in Apigee and in Apigee hybrid v1.15.0 and newer.
Bug ID | Description |
---|---|
422195061 | Enhanced cache lookup performance. |
269573358 | Resolved issue with OASValidation policy schema references for parameters without body validation The OASValidation policy correctly resolves and validates schemas passed by reference ( |
421141062 | Increased OAS validation limit to 20MB in JSON payloads to prevent validation failures. |
417200603 | Improved API connection stability to prevent premature timeouts for long-running requests. |
423597917 | POST operations for AppGroupApp keys updated
|
390234048 | Resolved issue resulting in missing fields in API responses for Monetization rate plans The |
422757662 | Reverted problematic commit regarding X-b3 trace headers send when using distributed tracing. |
409048431 | Fixed a SAML signature verification bypass vulnerability. |
N/A | Updates to security infrastructure and libraries. |
A weekly digest of client library updates from across the Cloud SDK.
Node.js
Changes for @google-cloud/bigquery
8.1.1 (2025-07-23)
Bug Fixes
Python
Changes for google-cloud-bigquery
3.35.1 (2025-07-21)
Documentation
You can now associate data policies directly on columns. This feature enables direct database administration for controlling access and applying masking and transformation rules at the column level. This feature is in Preview.
A weekly digest of client library updates from across the Cloud SDK.
Node.js
Changes for @google-cloud/bigtable
6.2.0 (2025-07-23)
Features
- Add client-side metrics collection to readRows calls (#1571) (71f4d78)
- Add plumbing to support unary calls for client side metric collection (#1631) (c267ede)
- Add support for Execute Query (#1613) (e3894ed)
- Initial timed stream implementation for application latencies (#1639) (ca490e8)
Bug Fixes
Fixed an issue that caused unexpected restarts of Airflow component workloads in the environment's cluster.
(Cloud Composer 3) The DAGS_FOLDER
reserved environment variable now
correctly points to the local directory where DAG files are stored.
New Airflow builds are available in Cloud Composer 3:
New images are available in Cloud Composer 2:
Cloud Composer version 2.8.6 has reached its end of support period.
Global external Application Load Balancers now support the JA4 fingerprint. The JA4 fingerprint can be added to a custom request header using the tls_ja4_fingerprint
variable.
This capability is now in General Availability.
A weekly digest of client library updates from across the Cloud SDK.
Go
Changes for storage/internal/apiv2
1.56.0 (2025-07-24)
Features
- storage/control: Update BUILD configs to support rest transportation for all client (116a33a)
Bug Fixes
- storage: Avoid integration test segfaults. (#12419) (a9dec07)
- storage: Current object generation takeover. (#12383) (9ca8e01)
- storage: Fix MultiRangeDownloader deadlock (#12548) (2eb23bb)
- storage: Remove object length limit for unfinalized reads (#12489) (5566d7d)
Performance Improvements
Documentation
cos-117-18613-339-11
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.97 | v24.0.9 | v1.7.27 | See List |
This is an LTS Refresh release.
Upgraded app-admin/google-guest-configs to v20250516.00.
Upgraded app-containers/cni-plugins to v1.7.1.
Upgraded dev-lang/go to v1.23.9.
Upgraded sys-process/lsof to v4.99.5.
Updated app-misc/jq to v1.8.1.
Upgraded dev-db/sqlite to v3.50.1.
Upgraded sys-libs/libcap to v2.76.
Upgraded net-fs/cifs-utils to v7.4.
Upgraded sys-process/procps to v4.0.5-r2.
Upgraded app-arch/gzip to v1.14.
Fixed a kernel bug which caused some NVME disk IO errors to be ignored, potentially resulting in dropped writes.
The NFS access cache is no longer cleared on login by default. To use the old behavior, load the NFS module with the nfs_fasc=1
module parameter.
Fixed CVE-2024-26130 in dev-python/cryptography.
Upgraded sqlite to v3.50.2. This resolves CVE-2025-6965.
Upgraded sys-libs/talloc to v2.4.3.
Fixed KCTF-5e28d5a in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811820 -> 811775
cos-113-18244-448-6
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.144 | v24.0.9 | v1.7.27 | See List |
This is an LTS Refresh release.
Upgraded app-admin/google-guest-configs to v20250501.00.
Upgraded app-containers/docker-credential-helpers to v0.9.3.
Updated app-misc/jq to v1.8.1.
Upgraded sys-libs/libcap to v2.76.
Upgraded net-fs/cifs-utils to v7.4.
Upgraded sys-process/procps to v4.0.5-r2.
Upgraded dev-db/sqlite to v3.50.1.
Upgraded app-arch/gzip to v1.14.
Fixed KCTF-5e28d5a in the Linux kernel.
Patched openssl to fix CVE-2023-50782 affecting dev-python/crytography.
Upgraded sqlite to v3.50.2. This resolves CVE-2025-6965.
Fixed CVE-2024-26130 in dev-python/cryptography.
Upgraded sys-libs/talloc to v2.4.3.
Runtime sysctl changes:
- Changed: fs.file-max: 811983 -> 812027
cos-121-18867-90-106
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.93 | v27.5.1 | v2.0.4 | See List |
Upgraded sys-process/lsof to v4.99.5.
Updated app-misc/jq to v1.8.1.
Fixed a kernel bug which caused some NVME disk IO errors to be ignored, potentially resulting in dropped writes.
The NFS access cache is no longer cleared on login by default. To use the old behavior, load the NFS module with the nfs_fasc=1
module parameter.
Patched openssl to fix CVE-2023-50782 affecting dev-python/crytography.
Fixed CVE-2024-26130 in dev-python/cryptography.
Fixed KCTF-5e28d5a in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811784 -> 811826
cos-109-17800-570-8
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.143 | v24.0.9 | v1.7.27 | See List |
Fixed KCTF-5e28d5a in the Linux kernel.
Upgraded sqlite to v3.50.2. This resolves CVE-2025-6965.
Runtime sysctl changes:
- Changed: fs.file-max: 812234 -> 812262
Inline diff (Preview)
VS Code Gemini Code Assist 2.42.0
Inline diff
is available for VS Code Gemini Code Assist 2.42.0
in
Preview. With the inline diff
view, you can visually highlight code changes directly in your editor—green for
additions, red for deletions. This feature boosts productivity by offering
immediate visibility on modifications, streamlining reviews, and enabling
precise control over integrating new code, all without leaving your current
view.
If preferred, you can change the diff view settings to have a side-by-side diff window instead of the inline diff.
(New guide) Well-Architected Framework: Financial services industry (FSI) perspective: Principles and recommendations that are specific to FSI, aligned to each pillar of the Architecture Framework.
In GKE version 1.33.2-gke.1335000 and later, the GKE Gateway controller supports Gateway API v1.3 CRDs.
In GKE version 1.33.1-gke.1788000 and later, you can target specific reservation
sub-blocks in a reservation block by using the
reservationSubBlock
field in compute classes.
In GKE version 1.32.2-gke.1359000 and later, you can now configure collection scheduling for single-host and multi-host TPU node pools by using compute classes. Collection scheduling lets you set a Service Level Objective (SLO) for your TPU workloads.
Control plane datastore maintenance
Starting in May, 2025, Google is performing maintenance on the internal control plane datastore for all GKE clusters to improve scalability and reliability. We expect to complete these improvements across GKE by October, 2025.
This maintenance is happening gradually across all GKE clusters, and will occur in your clusters only during configured maintenance windows. The maintenance process is expected to take approximately 15 minutes to complete during your cluster's maintenance window.
Expected impact
During the internal control plane datastore maintenance, the Kubernetes API server will be unavailable for 15 minutes, regardless of whether you use a regional cluster or a zonal cluster. During this 15-minute period, you won't be able to interact with the Kubernetes API server for your cluster.
Consider the following potential disruptions to your normal workflows during the maintenance window for your cluster:
- Kubernetes API unavailability: you can't use the
kubectl
tool or any other Kubernetes API client to issue commands to the control plane, regardless of whether the cluster is regional or zonal. Attempts to deploy, modify, or query resources by using the Kubernetes API will fail during this period. - Halted deployments: automated deployment pipelines (CI/CD) that interact with the Kubernetes API will fail to complete tasks such as deploying or updating applications in the cluster.
- Google Cloud console limitations: operations for the cluster in the Google Cloud console that communicate with the Kubernetes API might fail during the maintenance period.
- Delayed control plane automation: features that are managed by the control plane, such as the cluster autoscaler, Horizontal or Vertical Pod Autoscaling adjustments, or some node auto-repair operations might be paused until the API server is online.
The following resources have no expected impact during the maintenance period:
- Running applications: any running applications and services on your nodes should continue to function without interruptions.
- Node pool operations: existing nodes should remain connected and operational.
- Network traffic: traffic in the data plane, such as traffic to and from your running workloads, shouldn't be affected.
What you need to do
No action is required from you for the maintenance to occur. To plan for this maintenance, we recommend that you do the following:
- Review maintenance windows: review your cluster's maintenance window and exclusions settings and schedule maintenance windows during periods that minimize disruptions to your normal workflows.
- Plan for Kubernetes API unavailability: if you run critical operations in your cluster that require access to the Kubernetes API, avoid scheduling these operations during maintenance windows.
A fix is available for an issue in which the Compute Engine Persistent Disk CSI
driver failed with an invalid cpuString
error on GKE nodes that used custom
machine types. This issue prevented successful attachment and mounting of
Persistent Disk volumes on affected nodes. The fix is available in the following
GKE versions:
- 1.31.10-gke.1021000 and later
- 1.32.4-gke.1698000 and later
- 1.33.1-gke.1386000 and later
New SAP NetWeaver certification: C4D bare metal machine types
For use with SAP NetWeaver, SAP has certified the following Compute Engine bare metal machine types: c4d-standard-384-metal
and c4d-highmem-384-metal
.
For more information, see the following:
Model Armor filter updates
- The prompt injection and jailbreak detection filter now supports 10,000 tokens.
- For the Sensitive Data Protection filter,
SKIP_DETECTION
is returned if the prompt or response exceeds the token limit. - For all other filters, if the prompt or response exceeds the token limit,
MATCH_FOUND
is returned if malicious content is found, andSKIP_DETECTION
is returned if no malicious content is found.
July 27, 2025
Google SecOpsAutomate tasks with Playbook Loops
This feature is in Preview.
Playbook functionality has been enhanced to include Playbook Loops. This feature update lets playbooks iterate over lists or entities, performing one or more actions for each item. It streamlines automation by eliminating the need for duplicated steps or custom actions when processing multiple items. You can configure Playbook Loops directly within a playbook or inside a playbook block.
For setup instructions and use case examples , see Automate tasks with Playbook Loops.
Playbook Simulator enhancements for loops
The Playbook Simulator now supports visualization and debugging of playbooks that contain loops. This lets you clearly see and navigate through each loop iteration within the simulator viewer.
Additionally, the step display order has been updated to show actions from top to bottom (oldest at the top, newest at the bottom), with automatic scrolling to the most recent activity.
For more details, see Loops in the Playbook Simulator.
Release 6.3.55 is being rolled out to the first phase of regions, as outlined in our Google SecOps release plan.
This release contains the following features:
Automate tasks with Playbook Loops
This feature is in Preview.
Playbook functionality has been enhanced to include Playbook Loops. This feature update lets playbooks iterate over lists or entities, performing one or more actions for each item. It streamlines automation by eliminating the need for duplicated steps or custom actions when processing multiple items. You can configure Playbook Loops directly within a playbook or inside a playbook block.
For setup instructions and use case examples , see Automate tasks with Playbook Loops.
Playbook Simulator enhancements for loops
The Playbook Simulator now supports visualization and debugging of playbooks that contain loops. This lets you clearly see and navigate through each loop iteration within the simulator viewer.
Additionally, the step display order has been updated to show actions from top to bottom (oldest at the top, newest at the bottom), with automatic scrolling to the most recent activity.
For more details, see Loops in the Playbook Simulator.
July 26, 2025
Google SecOps SOARRelease 6.3.54 is now available for all regions.
July 25, 2025
Cloud Data FusionYou can now attach tags to Cloud Data Fusion instances during instance creation. This ensures immediate metadata for better organization, cost tracking, and policy automation. For more information, see Attach tags during instance creation.
You can create a Remote Direct Memory Access (RDMA) over converged ethernet (RoCE) Virtual Private Cloud (VPC) network and configure firewall rules that apply to the network. For more information, see Cloud NGFW for RoCE VPC networks. This feature is available in Preview.
Advanced load balancing for managed Cloud Service Mesh (TD) now generally available (GA).
Hyperdisk Extreme is available in all regions and zones. For more information, see About Hyperdisk Extreme.
You can now resize Hyperdisk Balanced volumes twice within a 4-hour window. For more information, see Capacity changes.
New Dataproc on Compute Engine subminor image versions:
2.3.7-debian12
, 2.3.7-ubuntu22
, 2.3.7-ubuntu22-arm
, 2.3.7-ml-ubuntu22
, and 2.3.7-rocky9
The 2.3.7-ml-ubuntu22
image extends the 2.3 base image with ML-specific libraries.
(2025-R31) Version updates
- Version 1.33.2-gke.1111000 is now the default version for cluster creation in the Extended channel.
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2303000
- 1.28.15-gke.2380000
- 1.28.15-gke.2428000
- 1.28.15-gke.2445000
- 1.28.15-gke.2475000
- 1.29.15-gke.1415000
- 1.29.15-gke.1493000
- 1.29.15-gke.1549000
- 1.29.15-gke.1594000
- 1.29.15-gke.1639000
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.30.12-gke.1279000
- 1.30.12-gke.1320000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.31.9-gke.1218000
- 1.31.9-gke.1287000
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- 1.32.4-gke.1698000
- 1.32.4-gke.1767000
- 1.33.1-gke.1107000
- 1.33.1-gke.1386000
- 1.33.1-gke.1584000
- 1.33.1-gke.1744000
- 1.33.2-gke.1043000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2456000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2456000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1607000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.33 to version 1.33.2-gke.1111000 with this release.
(2025-R31) Version updates
- Version 1.33.2-gke.1111000 is now the default version for cluster creation.
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1086000
- 1.30.12-gke.1151000
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.31.8-gke.1113000
- 1.31.9-gke.1005000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.32.2-gke.1182003
- 1.32.4-gke.1353003
- 1.32.4-gke.1603000
- 1.33.1-gke.1107000
- 1.33.1-gke.1386000
- 1.33.1-gke.1744000
- 1.33.1-gke.1959000
- 1.33.2-gke.1384000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.4-gke.1698000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.4-gke.1698000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.33 to version 1.33.2-gke.1111000 with this release.
(2025-R31) Version updates
- Version 1.33.2-gke.1240000 is now the default version for cluster creation in the Rapid channel.
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.30.12-gke.1279000
- 1.30.12-gke.1320000
- 1.30.12-gke.1333000
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.31.9-gke.1218000
- 1.31.9-gke.1287000
- 1.31.10-gke.1021000
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- 1.32.4-gke.1698000
- 1.32.4-gke.1767000
- 1.32.6-gke.1013000
- 1.33.1-gke.1584000
- 1.33.1-gke.1744000
- 1.33.1-gke.1959000
- 1.33.2-gke.1043000
- 1.33.2-gke.1111000
- 1.33.2-gke.1384000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.33.2-gke.1240000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
(2025-R31) Version updates
- Version 1.33.2-gke.1111000 is now the default version for cluster creation in the Regular channel.
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.30.12-gke.1279000
- 1.30.12-gke.1320000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.31.9-gke.1218000
- 1.31.9-gke.1287000
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- 1.32.4-gke.1698000
- 1.32.4-gke.1767000
- 1.33.1-gke.1107000
- 1.33.1-gke.1386000
- 1.33.1-gke.1584000
- 1.33.1-gke.1744000
- 1.33.2-gke.1043000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1013000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.33 to version 1.33.2-gke.1111000 with this release.
(2025-R31) Version updates
- Version 1.32.4-gke.1698000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1086000
- 1.30.12-gke.1151000
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.31.8-gke.1113000
- 1.31.9-gke.1005000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.32.2-gke.1297002
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1279000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.9-gke.1218000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.4-gke.1698000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1279000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.9-gke.1218000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.4-gke.1698000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.33 to version 1.33.2-gke.1043000 with this release.
(2025-R31) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- Version 1.33.2-gke.1240000 is now the default version for cluster creation in the Rapid channel.
- The following versions are now available in the Rapid channel:
- The following versions are no longer available in the Rapid channel:
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.30.12-gke.1279000
- 1.30.12-gke.1320000
- 1.30.12-gke.1333000
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.31.9-gke.1218000
- 1.31.9-gke.1287000
- 1.31.10-gke.1021000
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- 1.32.4-gke.1698000
- 1.32.4-gke.1767000
- 1.32.6-gke.1013000
- 1.33.1-gke.1584000
- 1.33.1-gke.1744000
- 1.33.1-gke.1959000
- 1.33.2-gke.1043000
- 1.33.2-gke.1111000
- 1.33.2-gke.1384000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.29 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.33.2-gke.1240000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.30 to version 1.30.12-gke.1340000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.31 to version 1.31.10-gke.1034000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.32 to version 1.32.6-gke.1025000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Rapid channel will be upgraded from version 1.33 to version 1.33.2-gke.1240000 with this release.
Regular channel
- Version 1.33.2-gke.1111000 is now the default version for cluster creation in the Regular channel.
- The following versions are now available in the Regular channel:
- The following versions are no longer available in the Regular channel:
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.30.12-gke.1279000
- 1.30.12-gke.1320000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.31.9-gke.1218000
- 1.31.9-gke.1287000
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- 1.32.4-gke.1698000
- 1.32.4-gke.1767000
- 1.33.1-gke.1107000
- 1.33.1-gke.1386000
- 1.33.1-gke.1584000
- 1.33.1-gke.1744000
- 1.33.2-gke.1043000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.29 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.32.6-gke.1013000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Regular channel will be upgraded from version 1.33 to version 1.33.2-gke.1111000 with this release.
Stable channel
- Version 1.32.4-gke.1698000 is now the default version for cluster creation in the Stable channel.
- The following versions are now available in the Stable channel:
- The following versions are no longer available in the Stable channel:
- 1.30.12-gke.1086000
- 1.30.12-gke.1151000
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.31.8-gke.1113000
- 1.31.9-gke.1005000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.32.2-gke.1297002
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.29 to version 1.30.12-gke.1279000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.31.9-gke.1218000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.32.4-gke.1698000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.30 to version 1.30.12-gke.1279000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.31 to version 1.31.9-gke.1218000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.32 to version 1.32.4-gke.1698000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Stable channel will be upgraded from version 1.33 to version 1.33.2-gke.1043000 with this release.
Extended channel
- Version 1.33.2-gke.1111000 is now the default version for cluster creation in the Extended channel.
- The following versions are now available in the Extended channel:
- The following versions are no longer available in the Extended channel:
- 1.28.15-gke.2303000
- 1.28.15-gke.2380000
- 1.28.15-gke.2428000
- 1.28.15-gke.2445000
- 1.28.15-gke.2475000
- 1.29.15-gke.1415000
- 1.29.15-gke.1493000
- 1.29.15-gke.1549000
- 1.29.15-gke.1594000
- 1.29.15-gke.1639000
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.30.12-gke.1279000
- 1.30.12-gke.1320000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.31.9-gke.1218000
- 1.31.9-gke.1287000
- 1.32.4-gke.1415000
- 1.32.4-gke.1603000
- 1.32.4-gke.1698000
- 1.32.4-gke.1767000
- 1.33.1-gke.1107000
- 1.33.1-gke.1386000
- 1.33.1-gke.1584000
- 1.33.1-gke.1744000
- 1.33.2-gke.1043000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.27 to version 1.28.15-gke.2456000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.28 to version 1.28.15-gke.2456000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.29 to version 1.29.15-gke.1607000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.32 to version 1.32.6-gke.1013000 with this release.
- Control planes and nodes with auto-upgrade enabled in the Extended channel will be upgraded from version 1.33 to version 1.33.2-gke.1111000 with this release.
No channel
- Version 1.33.2-gke.1111000 is now the default version for cluster creation.
- The following versions are now available:
- The following node versions are now available:
- The following versions are no longer available:
- 1.30.12-gke.1086000
- 1.30.12-gke.1151000
- 1.30.12-gke.1168000
- 1.30.12-gke.1208000
- 1.30.12-gke.1246000
- 1.31.8-gke.1113000
- 1.31.9-gke.1005000
- 1.31.9-gke.1044001
- 1.31.9-gke.1119000
- 1.31.9-gke.1176000
- 1.32.2-gke.1182003
- 1.32.4-gke.1353003
- 1.32.4-gke.1603000
- 1.33.1-gke.1107000
- 1.33.1-gke.1386000
- 1.33.1-gke.1744000
- 1.33.1-gke.1959000
- 1.33.2-gke.1384000
- Auto-upgrade targets are now available for the following minor versions:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.29 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.32.4-gke.1698000 with this release.
- The following patch-only version auto-upgrade targets are now available for clusters with maintenance exclusions or other factors preventing minor version upgrades:
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.30 to version 1.30.12-gke.1333000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.31 to version 1.31.10-gke.1021000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.32 to version 1.32.4-gke.1698000 with this release.
- Control planes and nodes with auto-upgrade enabled will be upgraded from version 1.33 to version 1.33.2-gke.1111000 with this release.
The Code Interpreter in Conversational Analytics is available in Preview for Looker (original) and Looker (Google Cloud core) instances. The Code Interpreter translates your natural language questions into Python code and executes that code to provide advanced analysis and visualizations. The Code Interpreter is disabled by default.
Looker (original) instances must be on Looker 25.8 or later. Looker admins can manage enablement for the Code Interpreter on the Gemini in Looker admin page of the Looker (original) instance.
Looker (Google Cloud core) instances must be on Looker 25.10 or later. Looker admins can manage enablement for the Code Interpreter on the Gemini in Looker admin page of the Looker (Google Cloud core) instance.
Pro feature: The Code Interpreter is now available in Preview
The Code Interpreter in Conversational Analytics is available in Preview for Looker Studio Pro subscriptions. The Code Interpreter translates your natural language questions into Python code and executes that code to provide advanced analysis and visualizations. The Code Interpreter is disabled by default.
Google Cloud NetApp Volumes now supports cross-project cross-region replication for Standard, Premium, and Extreme service levels. This feature is generally available for allow-listed users. For more information, see About volume replication.
Google Cloud NetApp Volumes now supports volume backups for large capacity volumes. This feature is now generally available. For more information, see About backups.
Organization policies in dry-run mode are reporting inconsistent results for the following managed constraints:
constraints/compute.managed.restrictProtocolForwardingCreationForTypes
constraints/iam.managed.allowedPolicyMembers
constraints/essentialcontacts.managed.allowedContactDomains
constraints/compute.managed.blockPreviewFeatures
If a resource inherited an organization policy in dry-run mode that uses any of these managed constraints, that dry-run policy was evaluated without using the parameters specified in the live policy. Normally, an organization policy in dry-run mode that's inherited on a resource is overridden by the live organization policy set directly on that same resource. Not evaluating the live organization policy parameters in the inherited organization policy in dry-run mode led to inconsistent results.
Our engineering team is working to resolve this issue.
Organization policies in dry-run mode are reporting inconsistent results for the following managed constraints:
constraints/compute.managed.restrictProtocolForwardingCreationForTypes
constraints/iam.managed.allowedPolicyMembers
constraints/essentialcontacts.managed.allowedContactDomains
constraints/compute.managed.blockPreviewFeatures
If a resource inherited an organization policy in dry-run mode that uses any of these managed constraints, that dry-run policy was evaluated without using the parameters specified in the live policy. Normally, an organization policy in dry-run mode that's inherited on a resource is overridden by the live organization policy set directly on that same resource. Not evaluating the live organization policy parameters in the inherited organization policy in dry-run mode led to inconsistent results.
Our engineering team is working to resolve this issue.
Cloud Infrastructure Entitlement Management (CIEM) has launched support for log ingestion from Microsoft Azure management groups. This capability lets users set up log ingestion and then consume findings at an Azure management group level, rather than at the subscription level. For more information, see Configure Microsoft Azure log ingestion for management groups. This capability is available in Preview.
A new risk scoring algorithm is launched. As a result, you might see slight changes in attack exposure scores for resources and findings. The new algorithm better reflects attacker behavior and gives a fairer representation of the relative risk level of your organization. We will monitor the results of this change and might perform further adjustments, if necessary.
July 24, 2025
Anthos Config ManagementAddressed multiple Common Vulnerabilities and Exposures (CVEs) by updating dependencies.
Updated the git-sync image from v4.3.0 to v4.4.2, which fixes an issue that could cause the git-sync container to crash loop. For more information see git-sync releases.
Fixed a regression introduced in 1.21.0 that occasionally caused Config Sync to become stuck when applying mutation ignored objects.
Fixed an issue where Config Sync waited longer than intended between retry attempts after failing to sync from Helm and OCI sources.
On July 24, 2025 we began redirecting the following Apigee Classic UI navigation items to Apigee UI in the Google Cloud console:
- Publish > Portals
See Apigee UI in Cloud console navigation for a mapping of each Classic Apigee UI feature page to its location in the Apigee UI in Cloud console.
See Apigee Classic UI shutdown for details on shutdown dates.
If you require more time to transition to the Google Cloud console, submit the exception request form by Aug 15, 2025.
On July 24, 2025 we began redirecting the following Apigee Classic UI navigation items to Apigee UI in the Google Cloud console:
- Publish > Portals
See Apigee UI in Cloud console navigation for a mapping of each Classic Apigee UI feature page to its location in the Apigee UI in Cloud console.
See Apigee Classic UI shutdown for details on shutdown dates.
If you require more time to transition to the Google Cloud console, submit the exception request form by Aug 15, 2025.
On July 24, 2025 we began redirecting the following Apigee Classic UI navigation items to Apigee UI in the Google Cloud console:
- Publish > Portals
See Apigee UI in Cloud console navigation for a mapping of each Classic Apigee UI feature page to its location in the Apigee UI in Cloud console.
See Apigee Classic UI shutdown for details on shutdown dates.
If you require more time to transition to the Google Cloud console, submit the exception request form by Aug 15, 2025.
Pub/Sub might not send notifications for all intermediate states when a job or task changes very quickly. You can mitigate this issue by viewing state history through status events. For more information, see Known issues.
Web server restarting is is now generally available (GA) in Cloud Composer 2 and Cloud Composer 3.
You can now monitor and understand the costs and utilization of resources in your Google Cloud project or App Hub application by using the Cost Explorer. This feature is in Public Preview. For more information, see Optimize costs with the Cost Explorer.
Generally available: The general-purpose C4 machine series now supports Hyperdisk Balanced High Availability. For more information, see Supported disk types for C4.
cos-dev-125-19165-0-0
Kernel | Docker | Containerd | GPU Drivers |
COS-6.12.37 | v27.5.1 | v2.0.4 | See List |
Updated the NVIDIA GPU driver policy for New Feature Branch (NFB) drivers. The LATEST tag has been updated to point to the stable 570.133.20 Production Branch. The 575.57.08 NFB driver remains available for development and testing but must now be selected by its specific version number.Removed 575.57.08 NFB driver support for NVIDIA_GB200 machine.
Upgraded nvidia-container-toolkit to v1.17.8. This fixes CVE-2025-23266.
Updated cos-gpu-installer to v2.5.5.
Updated the Linux kernel to v6.12.37.
Added ARM support for the Lustre 2.14.0 drivers.
Remove support for the v2.14.0_p184 and v2.14.0_p198 Lustre client drivers.
Upgraded app-admin/google-guest-configs to v20250627.00.
Upgraded chromeos-base/shill-client to v0.0.1-r4875.
Upgraded chromeos-base/google-breakpad to v2025.07.01.161305-r243.
Upgraded uhaul to version 6.12-0.
Upgraded sysram to version 6.12-0.
Fixed an issue where some workloads could cause a full system hang when running close to their memory limit.
Fixed CVE-2024-6174 and CVE-2024-11584 in cloud-init.
Updated app-editors/nano to v8.5. This resolves CVE-2024-5742.
Upgraded vim, vim-core to version 9.1.1500. This fixes CVE-2025-26603, CVE-2025-27423, CVE-2025-29768, CVE-2025-1215, CVE-2025-24014, CVE-2025-22134.
Upgraded app-admin/sudo to v1.9.17_p1. This resolves CVE-2025-32462 and CVE-2025-32463.
Runtime sysctl changes:
- Added: kernel.apparmor_restrict_unprivileged_unconfined: 0
- Added: kernel.core_file_note_size_limit: 4194304
- Added: kernel.core_sort_vma: 0
- Added: net.ipv4.fib_multipath_hash_seed: 0
- Added: net.ipv4.tcp_pingpong_thresh: 1
- Added: net.ipv6.conf.all.ra_honor_pio_life: 0
- Added: net.ipv6.conf.all.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.all.regen_min_advance: 2
- Added: net.ipv6.conf.default.ra_honor_pio_life: 0
- Added: net.ipv6.conf.default.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.default.regen_min_advance: 2
- Added: net.ipv6.conf.docker0.ra_honor_pio_life: 0
- Added: net.ipv6.conf.docker0.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.docker0.regen_min_advance: 2
- Added: net.ipv6.conf.eth0.ra_honor_pio_life: 0
- Added: net.ipv6.conf.eth0.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.eth0.regen_min_advance: 2
- Added: net.ipv6.conf.lo.ra_honor_pio_life: 0
- Added: net.ipv6.conf.lo.ra_honor_pio_pflag: 0
- Added: net.ipv6.conf.lo.regen_min_advance: 2
- Added: vm.enable_soft_offline: 1
- Changed: fs.epoll.max_user_watches: 1809007 -> 1808517
- Changed: fs.fanotify.max_user_marks: 67544 -> 68412
- Changed: fs.file-max: 811755 -> 811539
- Changed: fs.inotify.max_user_watches: 63425 -> 64189
- Changed: kernel.threads-max: 63487 -> 63178
- Changed: net.ipv4.tcp_mem: 94041 125391 188082 -> 94017 125357 188034
- Changed: net.ipv4.udp_mem: 188085 250783 376170 -> 188034 250715 376068
- Changed: user.max_cgroup_namespaces: 31743 -> 31589
- Changed: user.max_fanotify_marks: 67544 -> 68412
- Changed: user.max_inotify_watches: 63425 -> 64189
- Changed: user.max_ipc_namespaces: 31743 -> 31589
- Changed: user.max_mnt_namespaces: 31743 -> 31589
- Changed: user.max_net_namespaces: 31743 -> 31589
- Changed: user.max_pid_namespaces: 31743 -> 31589
- Changed: user.max_time_namespaces: 31743 -> 31589
- Changed: user.max_user_namespaces: 31743 -> 31589
- Changed: user.max_uts_namespaces: 31743 -> 31589
- Changed: vm.lowmem_reserve_ratio: 256 256 32 0 0 -> 256 256 32 0
- Deleted: kernel.sched_child_runs_first: 0
Conversational Agents: 21 new Chirp 3 HD voices are now available across 34 locales.
Conversational Agents data stores: Conversational Agents now supports AlloyDB AI, Bigtable, Firestore, Spanner and Cloud SQL data store source as public GA features; Microsoft Entra ID source has now private GA support. See the data store documentation for a complete list.
Stop in-progress chat responses with IntelliJ
IntelliJ Gemini Code Assist 1.22.1
You can
stop chat responses
with IntelliJ Gemini Code Assist 1.22.1
. Undesired long running or errant chat
responses are immediately halted.
Thinking tokens
IntelliJ Gemini Code Assist 1.22.1
You'll see thinking insights into Gemini's thought process before IntelliJ Gemini Code Assist produces a response, to show you that Gemini is actively working on your request.
Mobile SDK patch 2.13.1 is released
This patch fixes an issue where the Android SDK didn't support deep linking in the customizable link format.
Looker 25.12 is expected to include the following changes, features, and fixes:
Expected Looker (original) deployment start: Monday, July 28, 2025
Expected Looker (original) final deployment and download available: Thursday, August 7, 2025
Expected Looker (Google Cloud core) deployment start: Monday, July 28, 2025
Expected Looker (Google Cloud core) final deployment: Wednesday, July 30, 2025
Because of security concerns, text tiles no longer support the form
and input
Markdown elements.
The Oracle JDBC driver has been updated to version 19.25.
For faster response time for queries in BigQuery, Looker will execute BigQuery queries by using jobCreationMode=JOB_CREATION_OPTIONAL
. If BigQuery can return immediate results, it will run the query without creating a job, so the record in the Looker query history will have a BigQuery query ID instead of a BigQuery job ID. See the Understanding query performance metrics documentation page for more information about the BigQuery BI Engine metrics.
The Query Concurrency System Activity Explore is now available. This Explore can help you identify periods of high load and investigate performance bottlenecks that are related to database connection limits. Note: This feature launch was delayed and is now available in Looker 25.14. This item was updated on August 13, 2025.
An issue has been fixed where certain API calls would fail to time out and would instead run indefinitely. Note: This item was added August 18, 2025.
Looker 25.12 contains the following accessibility improvements:
- Improved contrast for exit buttons on dialogs
- Improved contrast for checkbox borders
An issue has been fixed where pull requests could display a different user than the pull request's owner. This feature now performs as expected.
An issue has been fixed where the System Activity Query Metrics Explore was not reliably populating with data. This feature now performs as expected.
An issue has been fixed where API users could view a list of users on a Looker instance, even if they didn't have the see_users
permission. This feature now performs as expected.
An issue has been fixed where the response headers from some API calls were not set by Looker. This feature now performs as expected.
An issue has been fixed where exploring from a dashboard tile while editing a dashboard could result in a permissions error, even if the user had permission to view the Explore. This feature now performs as expected.
An issue has been fixed where the row limit in an Explore could display a blank field when the row limit was set to 5,000. This feature now performs as expected.
An issue has been fixed where some users were unable to create or edit BigQuery OAuth connections. This feature now performs as expected.
An issue has been fixed where SQL Runner would display a blank page if a user changed the visualization type after pivoting on a dimension. This feature now performs as expected.
An issue has been fixed where some queries to the internal database were unoptimized, affecting instance performance. This feature now performs as expected.
An issue has been fixed where a visualization template could fail to be displayed in the list of templates if the name contained certain unicode characters. This feature now performs as expected.
An issue has been fixed where invalid query killing statements could cause unnecessarily verbose log outputs. This feature now performs as expected.
An issue has been fixed where API users without the explore
permission could access visualization templates. This feature now performs as expected.
An issue has been fixed where Looker could return a 500 error while retrieving dashboard details if the details contained non-UTF-8 characters. This feature now performs as expected.
An issue has been fixed where forecasting didn't work properly on fields that were based on JSON data. This feature now performs as expected.
An issue has been fixed where Looker didn't properly sanitize slash characters in git references that were used for remote dependencies. This feature now performs as expected.
An issue has been fixed where fields could be sorted differently when a visualization was downloaded or scheduled as a PNG. This feature now performs as expected.
An issue has been fixed where the all_connections
API call could ignore the fields
parameter. This feature now performs as expected.
An issue has been fixed where a map visualization would display drill links for fields that were hidden from the visualization. This feature now performs as expected.
An issue has been fixed where some System Activity tables were missing the element_id
field. This feature now performs as expected.
An issue has been fixed where subtotals could be incorrectly formatted in PDF downloads when an HTML parameter was defined on the field and the "Expand tables to show all rows" option was enabled. This feature now performs as expected.
The Looker IDE now checks for subparameters in local and remote dependencies and displays a more informative error if the subparameters are missing. Local dependencies must be defined with a project subparameter, while remote dependencies require both a url
subparameter and a ref
subparameter.
An issue has been fixed where editing a merged query in an embedded session would open in a new tab. This feature now performs as expected.
An issue has been fixed where Looker could generate duplicate SQL table references if a PDT referenced a table directly as well as through a join. This feature now performs as expected.
An issue has been fixed where some PDT regeneration events were not tracked in System Activity. This feature now performs as expected.
When an Explore is saved as a new dashboard, Looker will create advanced filter type dashboard filters, rather than drop-down type dashboard filters, for number type parameters.
An issue has been fixed where SAML authentication could fail for a Looker (Google Cloud core) instance. This feature now performs as expected.
An issue has been fixed where the Looker Marketplace toggle was not being displayed in Looker core instances for users who were granted Admin permissions with an IAM role. This feature now performs as expected.
An issue has been fixed where installing multiple drivers for the same database type on a customer-hosted instance could cause Looker to display an error. This feature now performs as expected.
New report canvas sizes
Two new preset canvas size options are available, letting you control the width and height of your report on the screen. The new options are size A4, available in portrait or landscape orientations.
New alt text field for images
You can now add alt text to report images to make them accessible to screen readers. See the Web Content Accessibility Guidelines (WCAG) guidelines on alt text for more information about writing alt text.
Looker connector enhancements
Additional calculated field functions are now available in Preview.
Performance improvement for BigQuery data sources
Report viewers may notice improved performance when the report uses a BigQuery data source.
The BigQuery connector supports short query optimized mode. In this mode, when BigQuery determines it can finish a query quickly, BigQuery prioritizes returning immediate results instead of creating a BigQuery job. Short query optimized mode may apply in the following situations:
- When the data source uses Viewer's Credentials
- When the data source uses Owner's Credentials but you are not the credential owner.
There is no change in user experience or report behavior for data source credential owners.
Highlight charts by filter
The Applied Filters panel now lets you click on a filter to highlight all charts that the filter applies to.
Add descriptions to reports
You can now add text descriptions to a report. The report search now matches the report title as well as the description.
Partner connection launch update
The following partner connectors have been added to the Looker Studio Connector Gallery:
- Google Ads by Detrics
- Facebook Insights by Master Metrics
- Instagram Insights by Master Metrics
- Youtube by Master Metrics
- Google Ads by Master Metrics
- Google Analytics 4 by Master Metrics
- Dashbo by Dashbo
- Odoo Sign AppiWorks by Jivrus Technologies
- 快客-GSC 串接 by 黑客數位
- IntelliKid Systems by IntelliKid Systems LLC
- Odoo POS AppiWorks by Jivrus Technologies
- Google PageSpeed Insights by Supermetrics
For the Enterprise service tier, Security Command Center offers data residency support in the European Union, Saudi Arabia, and United States. This feature is in General Availability.
To upload your Wasm plugin code to Artifact Registry, you can use generic format repositories, in addition to Docker repositories. This feature is in Preview.
Chirp 3: HD voices now offers General Availability (GA) support for four additional Nordic languages: Danish (da-DK
), Finnish (fi-FI
), Norwegian Bokmål (nb-NO
), and Swedish (sv-SE
). For more information, see Chirp 3: HD voices.
Preview stage support for the following integration:
July 23, 2025
API GatewayOn July 23, 2025, we released an updated version of API Gateway.
Deprecation of Transport Layer Security (TLS) v1.0 and v1.1 protocols
API Gateway now enforces TLS v1.2+. You can opt out of enforcing TLS v1.2+ for your API Gateway's new security settings by reaching out to Google Cloud Support to continue using your current protocol.
AlloyDB Omni version 16.8.0 is generally available (GA). Version 16.8.0 includes the following features and changes:
- AlloyDB Omni supports PostgreSQL version 16.8.
- AlloyDB Omni supports the
pg_squeeze
extension that addresses table bloat and improves data locality. - You can set up the columnar engine storage cache on dedicated devices. For more information, see Configure the columnar engine in AlloyDB Omni.
- Improved I/O acceleration
due to bug fixes in
libaio
. - Active Directory authentication integration is generally available (GA), providing robust user authentication for your database clusters. For more information, see Integrate Active Directory with AlloyDB Omni.
- Active Directory group-based authorization is available in Preview, enabling granular permission management based on your Active Directory groups. For more information, see Integrate Active Directory group support with AlloyDB Omni.
AlloyDB Omni version 15.12.0 is generally available (GA). Version 15.12.0 includes the following features and changes:
- AlloyDB Omni supports PostgreSQL version 15.12.
- AlloyDB Omni supports the
pg_squeeze
extension that addresses table bloat and improves data locality. - You can set up the columnar engine storage cache on dedicated devices. For more information, see Configure the columnar engine in AlloyDB Omni.
The AlloyDB Omni Kubernetes operator version 1.5.0 is generally available (GA) and includes the following features and bug fixes:
You can install the operator using the Operator Lifecycle Manager (OLM) for Kubernetes and OpenShift environments. See "Install the AlloyDB Omni operator" for AlloyDB Omni 15.12.0 and 16.8.0 for details.
Low downtime, minor version upgrades for a database cluster in a high availability setup are available in Preview. For more information, see "Perform a minor database version upgrade for AlloyDB Omni on Kubernetes" in the documentation for AlloyDB Omni 15.12.0 and 16.8.0.
Active Directory authentication integration on your Kubernetes-based AlloyDB Omni database cluster is generally available (GA). For more information, see Integrate Active Directory with AlloyDB Omni on Kubernetes.
Active Directory group-based authorization on your Kubernetes-based AlloyDB Omni database cluster is available in Preview. For more information, see Integrate Active Directory group support on Kubernetes.
You can configure backups to be taken directly from a standby Kubernetes cluster in a high availability (HA) setup to offload backup operations from your primary instance. See "Backup and restore in Kubernetes" for AlloyDB Omni 15.12.0 and 16.8.0 for details.
The operator fully automatically replicates replication slots for cross-data-center replication to work with primary database clusters that have high availability (HA) enabled. You still need to make sure you have reliable and low latency network connectivity between the primary and secondary data centers, which is crucial for cross-data-center replication to function effectively. For more information, see "Work with cross-data-center replication" for AlloyDB Omni 15.12.0 and 16.8.0.
AlloyDB Omni Kubernetes images are now built on Red Hat's Universal Base Image (UBI) 9. For more information, see "Install AlloyDB Omni on Kubernetes" for AlloyDB Omni 15.12.0 and 16.8.0.
AlloyDB AI requires AlloyDB Omni version 15.5.5 or later.
When upgrading your AlloyDB Omni database clusters, be aware of specific upgrade paths and prerequisites depending on your current controlPlaneAgentsVersion
and environment:
If your database cluster's
controlPlaneAgentsVersion
is1.0.0
, you must first upgrade to1.1.1
before you upgrade to1.5.0
or higher. You can directly upgrade database clusters withcontrolPlaneAgentsVersion
1.1.0
or later to1.5.0
.If you use an OpenShift database cluster that runs
controlPlaneAgentsVersion
1.4.1
or earlier, you must run prerequisite steps before updating to1.5.0
. For more information, see "Update OpenShift database clusters from version1.4.1
or earlier" for AlloyDB Omni 15.12.0 and 16.8.0.
AlloyDB Omni version 16.8.0 is generally available (GA). Version 16.8.0 includes the following features and changes:
- AlloyDB Omni supports PostgreSQL version 16.8.
- AlloyDB Omni supports the
pg_squeeze
extension that addresses table bloat and improves data locality. - You can set up the columnar engine storage cache on dedicated devices. For more information, see Configure the columnar engine in AlloyDB Omni.
- Improved I/O acceleration
due to bug fixes in
libaio
. - Active Directory authentication integration is generally available (GA), providing robust user authentication for your database clusters. For more information, see Integrate Active Directory with AlloyDB Omni.
- Active Directory group-based authorization is available in Preview, enabling granular permission management based on your Active Directory groups. For more information, see Integrate Active Directory group support with AlloyDB Omni.
AlloyDB Omni version 15.12.0 is generally available (GA). Version 15.12.0 includes the following features and changes:
- AlloyDB Omni supports PostgreSQL version 15.12.
- AlloyDB Omni supports the
pg_squeeze
extension that addresses table bloat and improves data locality. - You can set up the columnar engine storage cache on dedicated devices. For more information, see Configure the columnar engine in AlloyDB Omni.
The AlloyDB Omni Kubernetes operator version 1.5.0 is generally available (GA) and includes the following features and bug fixes:
You can install the operator using the Operator Lifecycle Manager (OLM) for Kubernetes and OpenShift environments. See "Install the AlloyDB Omni operator" for AlloyDB Omni 15.12.0 and 16.8.0 for details.
Low downtime, minor version upgrades for a database cluster in a high availability setup are available in Preview. For more information, see "Perform a minor database version upgrade for AlloyDB Omni on Kubernetes" in the documentation for AlloyDB Omni 15.12.0 and 16.8.0.
Active Directory authentication integration on your Kubernetes-based AlloyDB Omni database cluster is generally available (GA). For more information, see Integrate Active Directory with AlloyDB Omni on Kubernetes.
Active Directory group-based authorization on your Kubernetes-based AlloyDB Omni database cluster is available in Preview. For more information, see Integrate Active Directory group support on Kubernetes.
You can configure backups to be taken directly from a standby Kubernetes cluster in a high availability (HA) setup to offload backup operations from your primary instance. See "Backup and restore in Kubernetes" for AlloyDB Omni 15.12.0 and 16.8.0 for details.
The operator fully automatically replicates replication slots for cross-data-center replication to work with primary database clusters that have high availability (HA) enabled. You still need to make sure you have reliable and low latency network connectivity between the primary and secondary data centers, which is crucial for cross-data-center replication to function effectively. For more information, see "Work with cross-data-center replication" for AlloyDB Omni 15.12.0 and 16.8.0.
AlloyDB Omni Kubernetes images are now built on Red Hat's Universal Base Image (UBI) 9. For more information, see "Install AlloyDB Omni on Kubernetes" for AlloyDB Omni 15.12.0 and 16.8.0.
AlloyDB AI requires AlloyDB Omni version 15.5.5 or later.
When upgrading your AlloyDB Omni database clusters, be aware of specific upgrade paths and prerequisites depending on your current controlPlaneAgentsVersion
and environment:
If your database cluster's
controlPlaneAgentsVersion
is1.0.0
, you must first upgrade to1.1.1
before you upgrade to1.5.0
or higher. You can directly upgrade database clusters withcontrolPlaneAgentsVersion
1.1.0
or later to1.5.0
.If you use an OpenShift database cluster that runs
controlPlaneAgentsVersion
1.4.1
or earlier, you must run prerequisite steps before updating to1.5.0
. For more information, see "Update OpenShift database clusters from version1.4.1
or earlier" for AlloyDB Omni 15.12.0 and 16.8.0.
If your environment uses dag-factory
package version 0.22, then you might
experience DAG failures in Cloud Composer versions that have
apache-airflow-providers-cncf-kubernetes
package version 10.4.2 or later. At
the same time, upgrading the dag-factory
package to version 0.23 might require
you to update your DAG code to make it compatible.
If your environment uses dag-factory
version 0.22, we recommend to do the
following:
- Temporarily postpone upgrading your environment until you're ready to switch
to
dag-factory
version 0.23. Last versions of Cloud Composer that support version 0.22 are composer-3-airflow-2.10.5-build.3, composer-3-airflow-2.9.3-build.23, composer-2.13.1-airflow-2.10.5, and composer-2.13.1-airflow-2.9.3 released on May 14, 2025. - When you are ready to upgrade, update your DAGs for compatibility with 0.23.
We recommend to do this in a development environment first.
Install
dag-factory
version 0.23, then check that your DAGs are parsed and are working correctly, and update them if needed. After your DAGs are compatible, installdag-factory
version 0.23 in your production environment and transfer the updated DAGs. Your environment can now be upgraded to a later version of Cloud Composer or Airflow. - If your environment is already upgraded to a later version of Cloud Composer
and you experience problems, then update
dag-factory
to version 0.23 and update your DAGs for compatibility with 0.23.
The Cloud Data Fusion version 6.10.1.5 patch revision is generally available (GA). 6.10.1.5 includes reliability fixes.
When a regional Persistent Disk volume is fully replicated, Compute Engine now refreshes its replica recovery checkpoint every 15 minutes.
Learn more about Regional Persistent Disk replica recovery checkpoints and how to use checkpoints to recover a degraded disk.
Grounding with Google Maps is available in all regions (except for the EEA) as a Preview (Pre-GA) feature.
Cloud Armor supports internal service security policies for the service mesh to enforce global server-side rate limiting per client in Preview.
Siemplify: Version 94.0
The following new actions have been added:
Get Custom Field Values
Resume Case SLA
Pause Case SLA
Sophos: Version 18.0
Added ability to work with new authentication method in the following action:
- Get Events Log
July 22, 2025
Apigee API hubAPI hub provisioning now enables Apigee API
When you provision API hub, it now enables the Apigee API (apigee.googleapis.com
) in your Google Cloud project. If Apigee isn't already provisioned, an Apigee organization is also automatically created in your project as part of the provisioning process.
API hub remains a free service. Enabling the Apigee API has no additional pricing or billing implications for your project.
For more information, see Provision API hub in the Cloud console.
API hub deprovisioning changes
Deprovisioning an API hub instance now also deletes any associated Apigee organizations from your Google Cloud project, provided those Apigee organizations have no Apigee instances.
If you deprovision an API hub instance, you can reprovision it later, but you'll need to wait 7 days before you can do so.
For more information, see Deprovision Apigee API hub.
VPC Service Controls (VPC-SC) is GA
VPC Service Controls in API hub is now GA.
For more information, see VPC Service Controls for API hub.
You can now use the
VECTOR_INDEX.STATISTICS
function to calculate how much an indexed table's data has drifted between when a
vector index was created and the present. If table data has changed enough
to require a vector index rebuild, you can use the
ALTER VECTOR INDEX REBUILD
statement
to rebuild the vector index. This feature is in Preview.
Access Transparency supports BigQuery data preparation in the GA stage.
The CREATE EXTERNAL TABLE
and LOAD DATA
statements now support the following options in Preview:
null_markers
: define the strings that representNULL
values in CSV files.source_column_match
: specify how loaded columns are matched to the schema. You can match columns by position or by name.
You can now use the MATCH_RECOGNIZE
clause in your SQL queries to filter and aggregate matches across rows in a table. This feature is in Preview.
Preview: Multi-writer support for Hyperdisk Extreme disks. You can give up to 16 instances simultaneous read-write access to the same disk. For more information, see Share disks between instances.
Custom extractor model pretrained-foundation-model-v1.5-pro-2025-06-20
powered by Gemini 2.5 Pro is in Public Preview. It has ML processing available for US and EU regions, and 30 page per minute processing requests.
For more information, see Managing processor versions.
Gemini 2.5 Flash-Lite is now generally available and accessible using the API and Vertex AI Studio. This GA release includes support for explicit caching and batch prediction, as well as expanded region support.
See Gemini 2.5 Flash-Lite for more information.
(New guide) Secure apps and resources by using context-aware access: Describes how you can use context-aware access to secure different types of apps and resources.
(New guide) Best practices for securing apps and resources by using context-aware access: Describes best practices for using context-aware access to secure apps and resources.
Google Distributed Cloud (software only) for VMware 1.31.700-gke.72 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.31.700-gke.72 runs on Kubernetes v1.31.10-gke.200.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
The following issues were fixed in 1.31.700-gke.72:
- Fixed vulnerabilities listed in Vulnerability fixes.
Google Distributed Cloud for bare metal 1.31.700-gke.72 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.31.700-gke.72 runs on Kubernetes v1.31.10-gke.200.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following functional changes were made in 1.31.700-gke.72:
- Updated the validation checks for cluster upgrades to enforce the cluster version skew rules for user clusters.
The following issues were fixed in 1.31.700-gke.72:
- Fixed vulnerabilities listed in Vulnerability fixes.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
Silent Host Monitoring
New configuration options are now available for Silent Host Monitoring. You can now define detection rule-based Silent Host Monitoring in SecOps using UDM fields or labels, configurable within a specified time window.
For more information, see Silent host monitoring.
Silent Host Monitoring
New configuration options are now available for Silent Host Monitoring. You can now define detection rule-based Silent Host Monitoring in SecOps using UDM fields or labels, configurable within a specified time window.
For more information, see Silent host monitoring.
Google Cloud NetApp Volumes now supports multi-VPC peering for all service levels. For more information, see Connect additional networks.
The Setup guide in Security Command Center Enterprise, used to monitor the activation progress and configure services, is now in General Availability.
The Impair Defenses: Two Step Verification Disabled
finding type of Event Threat Detection was renamed to Persistence: Two Step Verification Disabled
. For a complete list of Event Threat Detection finding types, see Event Threat Detection overview.
July 21, 2025
Access TransparencyAccess Transparency supports BigQuery data preparation in the GA stage.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-bigquery
2.53.0 (2025-07-14)
Features
- bigquery: Add OpenTelemetry support to BigQuery rpcs (#3860) (e2d23c1)
- bigquery: Add support for custom timezones and timestamps (#3859) (e5467c9)
- Next release from main branch is 2.53.0 (#3879) (c47a062)
Bug Fixes
Dependencies
- Update dependency com.google.api.grpc:proto-google-cloud-bigqueryconnection-v1 to v2.69.0 (#3870) (a7f1007)
- Update dependency com.google.apis:google-api-services-bigquery to v2-rev20250615-2.0.0 (#3872) (f081589)
- Update dependency com.google.cloud:sdk-platform-java-config to v3.50.1 (#3878) (0e971b8)
Documentation
Python
Changes for google-cloud-bigquery
3.35.0 (2025-07-15)
Features
- Add null_markers property to LoadJobConfig and CSVOptions (#2239) (289446d)
- Add total slot ms to RowIterator (#2233) (d44bf02)
- Add UpdateMode to update_dataset (#2204) (eb9c2af)
- Adds dataset_view parameter to get_dataset method (#2198) (28a5750)
- Adds date_format to load job and external config (#2231) (7d31828)
- Adds datetime_format as an option (#2236) (54d3dc6)
- Adds source_column_match and associated tests (#2227) (6d5d236)
- Adds time_format and timestamp_format and associated tests (#2238) (371ad29)
- Adds time_zone to external config and load job (#2229) (b2300d0)
Bug Fixes
- Adds magics.context.project to eliminate issues with unit tests … (#2228) (27ff3a8)
- Fix rows returned when both start_index and page_size are provided (#2181) (45643a2)
- Make AccessEntry equality consistent with from_api_repr (#2218) (4941de4)
- Update type hints for various BigQuery files (#2206) (b863291)
Documentation
You can now use the DISTINCT
pipe operator to select distinct rows from a table in your pipe syntax queries. This feature is generally available (GA).
A weekly digest of client library updates from across the Cloud SDK.
Managed Cloud Service Mesh will start using proxy version csm_mesh_proxy.20250623b_RC00
for Gateway API on GKE clusters. This proxy version maps closest to Envoy version 1.35. This change is rolling out to all release channels.
Generally available: The general-purpose C4D machine series offers the following bare metal machine types:
c4d-standard-384-metal
c4d-highcpu-384-metal
c4d-highmem-384-metal
This is the first machine series to offer AMD-based bare metal instances. Bare metal instances let you create an instance with direct access to the machine's CPU and memory, without a virtualization layer in the middle. C4D uses Titanium to deliver more compute and memory resources for your workloads by offloading network and I/O processing from the host hardware. To learn more, see C4D machine series. For information about bare metal instances, including regional availability, see Bare metal instances on Compute Engine.
cos-109-17800-570-5
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.143 | v24.0.9 | v1.7.27 | See List |
This is an LTS Refresh release.
Updated the NVIDIA GPU driver policy for New Feature Branch (NFB) drivers. The LATEST tag has been updated to point to the stable 570.133.20 Production Branch. The 575.57.08 NFB driver remains available for development and testing but must now be selected by its specific version number.
Upgraded app-admin/google-guest-configs to v20250516.00.
Upgraded app-containers/docker-credential-helpers to v0.9.3.
Updated app-misc/jq to v1.8.1.
Upgraded net-fs/cifs-utils to v7.4.
Upgraded sys-libs/libcap to v2.76.
Upgraded dev-db/sqlite to v3.50.1.
Upgraded app-arch/unzip to v6.0_p29.
Upgraded app-arch/gzip to v1.14.
Fixed an issue where some workloads could cause a full system hang when running close to their memory limit.
Upgraded sys-libs/talloc to v2.4.3.
Runtime sysctl changes:
- Changed: fs.file-max: 812258 -> 812234
Fixed KCTF-103406b in the Linux kernel
cos-121-18867-90-97
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.93 | v27.5.1 | v2.0.4 | See List |
Updated the NVIDIA GPU driver policy for New Feature Branch (NFB) drivers. The LATEST tag has been updated to point to the stable 570.133.20 Production Branch. The 575.57.08 NFB driver remains available for development and testing but must now be selected by its specific version number. Removed 575.57.08 NFB driver support for NVIDIA_GB200 machine.
Added ARM support for the Lustre 2.14.0 drivers.
Fixed an issue where some workloads could cause a full system hang when running close to their memory limit.
Fixed CVE-2024-6174 and CVE-2024-11584 in cloud-init.
Fixed KCTF-103406b in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811807 -> 811784
cos-117-18613-263-75
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.93 | v24.0.9 | v1.7.27 | See List |
Updated the NVIDIA GPU driver policy for New Feature Branch (NFB) drivers. The LATEST tag has been updated to point to the stable 570.133.20 Production Branch. The 575.57.08 NFB driver remains available for development and testing but must now be selected by its specific version number. Removed 575.57.08 NFB driver support for NVIDIA_GB200 machine.
Added ARM support for the Lustre 2.14.0 drivers.
Fixed an issue where some workloads could cause a full system hang when running close to their memory limit.
Fixed KCTF-103406b in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 811784 -> 811820
cos-113-18244-382-65
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.141 | v24.0.9 | v1.7.27 | See List |
Updated the NVIDIA GPU driver policy for New Feature Branch (NFB) drivers. The LATEST tag has been updated to point to the stable 570.133.20 Production Branch. The 575.57.08 NFB driver remains available for development and testing but must now be selected by its specific version number.
Fixed an issue where some workloads could cause a full system hang when running close to their memory limit.
Fixed KCTF-103406b in the Linux kernel.
Runtime sysctl changes:
- Changed: fs.file-max: 812031 -> 811983
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-datastore
2.31.0 (2025-07-14)
Features
Dependencies
Google Distributed Cloud (software only) for VMware 1.30.1100-gke.67 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.30.1100-gke.67 runs on Kubernetes v1.30.12-gke.800.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
The following issues were fixed in 1.30.1100-gke.67:
- Fixed vulnerabilities listed in Vulnerability fixes.
Google Distributed Cloud for bare metal 1.30.1100-gke.67 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.30.1100-gke.67 runs on Kubernetes v1.30.12-gke.800.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following issues were fixed in 1.30.1100-gke.67:
- Fixed vulnerabilities listed in Vulnerability fixes.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
In GKE version 1.33.2-gke.1111000 and later, you can use compute classes to set
Kubernetes labels
on all nodes that are created for that compute class. These labels are applied
to the corresponding Node
objects in the Kubernetes API. For more information
about setting node labels in compute classes, see the
ComputeClass custom resource definition.
New parser documentation now available
New parser documentation is available to help you ingest and normalize logs from the following sources:
Collect Aruba EdgeConnect SD-WAN logs
Collect Atlassian Cloud Admin Audit logs
Collect Avigilon Access Control Manager logs
Collect Barracuda CloudGen Firewall logs
Collect Barracuda Web Filter logs
Collect Check Point Harmony logs
Collect CipherTrust Manager logs
Collect CyberArk Privilege Cloud logs
New parser documentation now available
New parser documentation is available to help you ingest and normalize logs from the following sources:
Collect Aruba EdgeConnect SD-WAN logs
Collect Atlassian Cloud Admin Audit logs
Collect Avigilon Access Control Manager logs
Collect Barracuda CloudGen Firewall logs
Collect Barracuda Web Filter logs
Collect Check Point Harmony logs
Collect CipherTrust Manager logs
Collect CyberArk Privilege Cloud logs
You can ask Gemini for predefined role suggestions using the IAM role picker in the Google Cloud Console. This feature is in preview.
For more information, see Get predefined role suggestions with Gemini assistance.
A weekly digest of client library updates from across the Cloud SDK.
Go
Changes for pubsub/apiv1
2.0.0 (2025-07-16)
To migrate from the v1 cloud.google.com/go/pubsub, please follow the migration guide
Features
- pubsub/v2: Add MessageTransformationFailureReason to IngestionFailureEvent (208745b)
- pubsub/v2: Add new v2 library (#12218) (c798f62)
- pubsub/v2: Add SchemaViolationReason to IngestionFailureEvent (d8ae687)
- pubsub/v2: Generate renamed go pubsub admin clients (a95a0bf)
- pubsub/v2: Release 2.0.0 (#12568) (704efce)
Documentation
- pubsub/v2: Document that the
acknowledge_confirmation
andmodify_ack_deadline_confirmation
fields in message.google.pubsub.v1.StreamingPullResponse
are not guaranteed to be populated (208745b) - pubsub/v2: Standardize spelling of "acknowledgment" in Pub/Sub protos (d8ae687)
- pubsub/v2: Update v2 package docs with migration guide (#12564) (5ef6068)
Java
Changes for google-cloud-pubsub
1.141.0 (2025-07-11)
Features
- Add MessageTransformationFailureReason to IngestionFailureEvent (8271399)
- Next release from main branch is 1.141.0 (#2481) (bd9f385)
Bug Fixes
- deps: Update the Java code generator (gapic-generator-java) to 2.60.1 (c9ef2cd)
Dependencies
- Update dependency com.google.cloud:google-cloud-bigquery to v2.52.0 (#2467) (fe08a6f)
- Update dependency com.google.cloud:google-cloud-core to v2.58.1 (#2476) (96a2354)
- Update dependency com.google.cloud:google-cloud-storage to v2.53.2 (#2469) (fa51a01)
- Update dependency com.google.cloud:sdk-platform-java-config to v3.50.1 (#2477) (e1657cb)
- Update googleapis/sdk-platform-java action to v2.60.0 (#2471) (2b0e8e0)
- Update googleapis/sdk-platform-java action to v2.60.1 (#2475) (e7c0b5d)
The Aggregations panel on the Findings page in Security Command Center Enterprise has been enhanced and is now called Quick Filters. For information about filtering results on the Findings page, see Review and manage findings.
You can set up the Agent for Compute Workloads to collect metrics of your Oracle workloads running on Google Compute Engine instances. For more information, see Set up the agent for Oracle.
July 20, 2025
Cloud Data FusionThe SAP ODP plugin version 0.12 is available in Cloud Data Fusion version 6.10 and later. This release includes the following changes:
- Support for old SAP ODP RFCs is removed to align with SAP Note 3255746.
- Messages have been updated when attempting to extract data from unsupported hierarchy data sources.
We recommend upgrading all your pipelines to the latest SAP ODP plugin version, as earlier versions are no longer compliant with SAP Guidelines.
Release 6.3.54 is being rolled out to the first phase of regions as listed here.
This release contains internal and customer bug fixes.
July 19, 2025
Google SecOps SOARRelease 6.3.53 is now available for all regions.
July 18, 2025
AI HypercomputerGenerally available: You can troubleshoot workloads with slow performance by using straggler detection metrics and logs.
Stragglers are single-point, non-crashing failures that eventually slow down your entire workload. Large-scale ML workloads are very susceptible to stragglers, and VMs with stragglers are often very difficult to notice and pinpoint without straggler detection.
For more information, see Monitor VMs and Slurm clusters and Troubleshoot slow performance.
Access Approval supports Network Connectivity Center in the GA stage.
Access Approval supports Cloud Asset Inventory in the GA stage.
Access Approval supports Cloud Deploy in the GA stage.
Access Transparency supports Network Connectivity Center in the GA stage.
Access Transparency supports Cloud Asset Inventory in the GA stage.
Access Transparency supports Cloud Deploy in the GA stage.
Apigee and hybrid plugin instance management
You can now create and delete plugin instances for Apigee and Apigee Hybrid while associating the respective Apigee runtime projects to API hub.
For more information, see Auto-register Apigee proxies.
Apigee and Apigee hybrid plugin creation now requires source project ID
When creating new instances of the Apigee X and hybrid plugin, you must now provide a source project ID. This source project ID is the Google Cloud project from which the plugin will import data.
This is a breaking change and will affect any existing API calls that create these plugins without explicitly providing this ID.
Action Required: Update your API calls to include the appropriate source project ID when creating new Apigee X and hybrid plugins. Failing to do so will result in creation errors.
Edit plugin instances changes
You can now change or modify the name and curation logic of your plugin instance.
For more information, see Edit a plugin instance.
Resource URI format for Apigee deployments
To ensure optimal functionality and consistency while creating or updating Apigee deployments, we now recommend that the Resource URI conforms to the following format:
organizations/([^/]+)/environments/([^/]+)/apis/([^/]+)$
For more information, see Introduction to deployments.
The following resource types are now publicly available through the ExportAssets, ListAssets, BatchGetAssetsHistory, QueryAssets, Feed, and Search (SearchAllResources, SearchAllIamPolicies) APIs.
- Service Management API
servicemanagement.googleapis.com/Service
Generally available: You can create instant and standard snapshots from Hyperdisk volumes in multi-writer mode. You can also clone Hyperdisk volumes in multi-writer mode.
For more information, see Share disks between instances.
Quality AI offers multiple scorecards in preview. With multiple scorecards, Quality AI can evaluate a single conversation against different criteria and provide multiple conversation scores. You can also choose which scorecard data to view on each page of the console.
Improved code completion speed
VS Code Gemini Code Assist 2.41.0
Code completion suggestion speed is improved with VS Code Extension 2.41.0
.
New SAP certification for operating system: SLES 15 SP7 for SAP
For use with SAP HANA and SAP NetWeaver on Google Cloud, SAP has certified the operating system SUSE Linux Enterprise Server (SLES) 15 SP7 for SAP.
For more information, see:
July 17, 2025
Assured WorkloadsThe Data Boundary for Impact Level 4 (IL4) now supports the following products:
- Certificate Authority Service
- Cloud Build
- Cloud NAT
- GKE Hub
- Memorystore for Redis
- Secret Manager
- Sensitive Data Protection
The Data Boundary for Impact Level 5 (IL5) now supports the following products:
- Certificate Authority Service
- Cloud Build
- Cloud NAT
- Cloud VPN
- GKE Hub
- Memorystore for Redis
- Secret Manager
- Sensitive Data Protection
See Supported products by control package for more information.
You can now use the WITH
pipe operator to define common table expressions in your pipe syntax queries. This feature is generally available (GA).
You can now use named windows in your pipe syntax queries. This feature is generally available (GA).
Highly resilient environments are now generally available (GA) in Cloud Composer 3.
Application-specific resource attributes are attached to your trace data when your App Hub applications use supported Google Cloud resources, or when you instrument an application with OpenTelemetry and use the Google Cloud Telemetry endpoint. To learn more, see the following:
Application-specific resource attributes are attached to your trace data when your App Hub applications use supported Google Cloud resources, or when you instrument an application with OpenTelemetry and use the Google Cloud Telemetry endpoint. You can use the Trace Explorer to filter by your application, your service, or your workload. To learn more, see the following:
Conversational Agents: CMEK is now available in EU regions.
Conversational Agents: The conversational history flow analysis feature is now available.
Conversational Agents: The model gemini-2.5-flash
is now available in all regions. This change applies to the following features:
- Generators
- Playbooks (Public Preview)
- Data stores tools (Public Preview)
Checkpoints, selected code snippets and terminal output, and other features are now Generally Available (GA)
The following features, which launched in Preview in May and June 2025, are now Generally Available:
Veo 3 preview models now support upscaling for 1080p resolution using the new resolution
parameter. For more information, see Veo on Vertex AI.
The Detailed Disbursements and Customer Incremental Insights ISV reports are now available in BigQuery. These reports leverage BigQuery's out-of-the-box connectors to aggregate your Google Cloud Marketplace data with other data sources for your analysis, reporting, and data visualization needs.
Learn how to enable these new reports from the Producer Portal.
Google Distributed Cloud (software only) for VMware 1.32.200-gke.104 is now available for download. To upgrade, see Upgrade a cluster. Google Distributed Cloud 1.32.200-gke.104 runs on Kubernetes v1.32.4-gke.1000.
If you are using a third-party storage vendor, check the GDC Ready storage partners document to make sure the storage vendor has already passed the qualification for this release.
After a release, it takes approximately 7 to 14 days for the version to become available for use with GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
The following issues were fixed in 1.32.200-gke.104:
- Fixed vulnerabilities listed in Vulnerability fixes.
Google Distributed Cloud for bare metal 1.32.200-gke.104 is now available for download. To upgrade, see Upgrade clusters. Google Distributed Cloud for bare metal 1.32.200-gke.104 runs on Kubernetes v1.32.4-gke.1000.
After a release, it takes approximately 7 to 14 days for the version to become available for installations or upgrades with the GKE On-Prem API clients: the Google Cloud console, the gcloud CLI, and Terraform.
If you use a third-party storage vendor, check the Ready storage partners document to make sure the storage vendor has already passed the qualification for this release of Google Distributed Cloud for bare metal.
The following issues were fixed in 1.32.200-gke.104:
Fixed a known issue where Keepalived failover is blocked when the corresponding HAProxy instance is unreachable. This issue prevented the control plane VIP from being made available on a new, healthy node.
Fixed an issue that caused nodes to get stuck in maintenance mode. Health checks have been updated so that the network check job skips connectivity checks for nodes that are in maintenance mode.
Fixed vulnerabilities listed in Vulnerability fixes.
For information about the latest known issues, see Google Distributed Cloud for bare metal known issues in the Troubleshooting section.
Report abuse
Looker Studio report viewers can now report abusive content. Content is automatically reviewed, and content that is reported as abusive is hidden or deleted.
Performance improvement for BigQuery data sources
Report viewers may notice improved performance when the report uses a BigQuery data source.
The BigQuery connector supports short query optimized mode. In this mode, when BigQuery determines that it can finish a query quickly, BigQuery prioritizes returning immediate results instead of creating a BigQuery job. Short query optimized mode may apply in the following situations:
- When the data source uses Viewer's Credentials
- When the data source uses Owner's Credentials but you are not the credential owner
There is no change in user experience or report behavior for data source credential owners.
The following Container Threat Detection detectors for file monitoring are in Preview:
Collection: Pam.d Modification
Credential Access: Access Sensitive Files on Nodes
Defense Evasion: Disable or modify Linux audit system
Defense Evasion: Root Certificate Installed
Execution: Suspicious Cron Modification
Persistence: Modify ld.so.preload
The following Security Command Center Enterprise pages in the Google Cloud console now fully replace equivalent pages that you accessed previously in the Google Security Operations console.
- Risk Overview
- Issues
- Assets (previously called Resources)
- Findings
Left navigation links in the Google Security Operations console open the related Google Cloud console page. See the earlier release announcement about these pages.
July 16, 2025
BigQueryYou can now add comments to notebooks, data canvases, data preparation files, or saved queries. You can also reply to existing comments or get a link to them. This feature is in Preview.
You can now create BigQuery ML models by using the Google Cloud console user interface. This feature is in Preview.
Spend-based committed use discount (CUD) metadata export to BigQuery (public preview)
You can now access spend-based CUD metadata programmatically through a BigQuery export. This data provides a comprehensive, daily snapshot of spend-based CUDs, which you can join with other billing data exports for improved CUD reporting and management.
The Oracle plugin version 1.12.3 is available in Cloud Data Fusion (via Hub) versions 6.11.0 and later, and 1.11.8 is available in Cloud Data Fusion (via Hub) version 6.10.
This release provides backward compatibility for recent schema changes, including the following:
- Precisionless numbers: In version 1.10.0, precisionless numbers were handled as strings.
- Improved timestamp handling: Version 1.11.0 introduced improvements to timestamp handling.
To address backward compatibility for these changes, two new hidden fields are introduced in Oracle batch source configurations: treatPrecisionlessNumAsDeci
and treatAsOldTimestamp
. Both flags default to false
. To enable these flags, edit the respective values in your exported connection JSON (if using connections) or pipeline JSON (if not using connections) before re-importing or re-deploying (PLUGIN-1893).
You can disable the built-in run.app
URL of a Cloud Run service to ensure that traffic can only ingress through paths that you've explicitly configured (GA).
1.26.0-asm.11 is now available for in-cluster Cloud Service Mesh.
You can now download 1.26.0-asm.11 for in-cluster Cloud Service Mesh. It includes the features of Istio 1.26.0 subject to the list of supported features.
The following environment variables and annotations are not supported:
ENABLE_GATEWAY_API_MANUAL_DEPLOYMENT
RETRY_IGNORE_PREVIOUS_HOSTS
ENABLE_CLUSTER_TRUST_BUNDLE_API
OMIT_EMPTY_VALUES
PILOT_SPAWN_UPSTREAM_SPAN_FOR_GATEWAY
MAX_CONNECTIONS_PER_SOCKET_EVENT_LOOP
with the value 1- Referencing ConfigMaps in a DestinationRule with TLS mode set to SIMPLE mode is not supported
The ENABLE_AUTO_SNI
flag is still supported to stay aligned with the legacy behavior.
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh. Cloud Service Mesh version 1.26.0-asm.11 uses Envoy v1.34.2-dev.
In-cluster Cloud Service Mesh 1.23 is no longer supported. For more information and to view the earliest end-of-life dates for other versions, see Supported versions.
1.25.3-asm.11 is now available for in-cluster Cloud Service Mesh.
You can now download 1.25.3-asm.11 for in-cluster Cloud Service Mesh. It includes the features of Istio 1.25.3 subject to the list of supported features. Cloud Service Mesh version 1.25.3-asm.11 uses envoy v1.33.4-dev.
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh.
1.24.6-asm.9 is now available for in-cluster Cloud Service Mesh.
You can now download 1.24.6-asm.9 for in-cluster Cloud Service Mesh. It includes the features of Istio 1.24.6 subject to the list of supported features. Cloud Service Mesh version 1.24.6-asm.9 uses envoy v1.32.7-dev.
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh.
Added Gemma 3 fine-tuning notebook using Axolotl docker with support for 1b, 4b, 12b, and 27b variants.
(2025-R30) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- The following versions are now available in the Rapid channel:
Regular channel
- The following versions are now available in the Regular channel:
Stable channel
- The following versions are now available in the Stable channel:
Extended channel
- The following versions are now available in the Extended channel:
No channel
- The following versions are now available:
- The following node versions are now available:
To enable upcoming support for mTLS and client certificates, Google Front Ends
(GFEs) that power GKE DNS-based control plane public endpoints will add client
certificate requests during the TLS handshake. Requests are already incorporated
into GKE DNS-based control plane public endpoints where hostnames end with
us-central1.gke.goog
. For all other GKE DNS-based control plane public
endpoints, this will roll out between August 18, 2025 and August 22, 2025.
Until mTLS and client certificate configuration options are available, the following details apply:
- A client certificate request in a TLS handshake doesn't mean that
kubectl
(or other compatible clients) must provide a client certificate. Client certificates are neither mandatory nor configurable. - TLS libraries in current operating systems send a "no client certificate" response to the public endpoint's client certificate request.
- GKE DNS-based control plane public endpoints will not enforce client certificates or mTLS requirements until a future announcement about configuration options.
If you use an intermediate proxy between kubectl
(or other compatible
clients) and a GKE DNS-based control plane public endpoint, ensure that it fully
adheres to
Section 7.4.4 of RFC 5246,
Section 4.4.2 of RFC 8446,
or
Section 4.4.2.4 of RFC 8446.
(2025-R30) Version updates
- The following versions are now available in the Extended channel:
(2025-R30) Version updates
- The following versions are now available:
- The following node versions are now available:
(2025-R30) Version updates
- The following versions are now available in the Rapid channel:
(2025-R30) Version updates
- The following versions are now available in the Regular channel:
(2025-R30) Version updates
- The following versions are now available in the Stable channel:
Google Chronicle: Version 62.0
The following new actions have been added:
Remove Rows From Data Table
Get Data Tables
Is Value In Data Table
Add Rows To Data Table
Azure Security Center: Version 11.0
- Integration: Refactored the integration code to support the updated API.
Mandiant Threat Intelligence: Version 14.0
Improved entity processing logic in the following action:
- Enrich Entities
Microsoft Azure Sentinel: Version 55.0
Updated logger initialization in the following connector:
- Microsoft Azure Sentinel - Incident Connector v2
MySQL: Version 5.0
Refined query processing in the following action:
- Run SQL Query
You can now use Valkey GLIDE to connect your applications to Memorystore for Valkey instances.
Added Gemma 3 fine-tuning notebook using Axolotl docker with support for 1b, 4b, 12b, and 27b variants.
July 15, 2025
App Engine flexible environment GoSupport for Go 1.24 runtime is in Preview.
Support for Go 1.24 runtime is in Preview.
You can now commercialize your BigQuery sharing listings on Google Cloud Marketplace. This feature is generally available (GA).
You can flatten JSON columns in BigQuery data preparation with a single operation. This feature is generally available (GA).
Compute flexible committed use discounts (CUDs) have expanded to also cover your Cloud Billing account's spend across Cloud Run services with request-based billing and Cloud Run functions.
The improved spend-based CUD experience is available without requiring an opt-in for new users or users who don't have an active spend-based CUD.
To learn more about how opting into the new model affects your flexible CUDs, see Committed use discounts.
Support for the Go 1.24 runtime is in Preview.
Support for the Go 1.24 runtime is in Preview.
Compute flexible committed use discounts (CUDs) offer expanded coverage by supporting the following resources and services:
- Memory-optimized M1, M2, M3, and M4 VMs
- Compute-optimized H3 instances
- Cloud Run services with request-based billing
- Cloud Run Functions
To receive the expanded coverage for flexible CUDs, you must opt in to the new spend-based CUD model. Cloud Billing accounts that meet specific criteria are automatically opted into the new model. On January 21, 2026, all remaining accounts will automatically migrate to the new model. You can opt in before that date to start receiving the expanded coverage. To learn more about the new model and the opt-in details, see Spend-based CUDs program improvements.
To learn more about this change and how your flexible CUDs apply after you opt in, see Compute flexible CUDs.
Dataproc on Compute Engine: Starting August 18, 2025, the following diagnostic properties will be enabled by default for newly created Dataproc clusters:
dataproc:diagnostic.capture.enabled
: Enables the collection of checkpoint data in the cluster temp bucket.dataproc:dataproc.logging.extended.enabled
: Enables the collection of logs for the Knox, Zeppelin, Ranger-usersync, Jupyter_notebook, Jupyter_kernel_gateway components and the Spark History-Server in Cloud Logging.dataproc:dataproc.logging.syslog.enabled
: Enables the collection of VM syslogs in Cloud Logging.To continue using the Ops Agent initialization action
opsagent.sh
to ingest syslogs from Dataproc cluster nodes, do one of the following:- Recommended: Use
opsagent_nosyslog.sh
since VM syslogs will now be emitted by default from Dataproc clusters. - Set the
dataproc:dataproc.logging.syslog.enabled=false
and continue usingopsagent.sh
to ingest syslogs.
- Recommended: Use
Note: To disable any of these features, set the corresponding property to false
during cluster creation.
New Dataproc on Compute Engine subminor image versions:
2.3.6-debian12
, 2.3.6-ubuntu22
, 2.3.6-ml-ubuntu22
, and 2.3.6-rocky9
The 2.3.6-ml-ubuntu22
image extends the 2.3 base image with ML-specific libraries.
Dataproc now allows Dynamic update of multi-tenancy clusters.
The Google Cloud Managed Service for Apache Kafka service creates new brokers automatically based on the memory and vCPU configuration of the cluster. When you update a cluster's size, the service now performs a safety check to verify that individual brokers have sufficient capacity for their portion of the traffic. For more information, see Update the memory and vCPUs.
General availability: The Go Pub/Sub client library has a new major version. For more information on how to migrate from v1 to v2, see the Migration guide.
July 14, 2025
AlloyDB for PostgreSQLYou can now create an AlloyDB instance with a specific IP address range using the Google Cloud CLI, Terraform, or REST API. You can also override IP address range allocations configured during cluster creation. For more information, see Create an instance with a specific IP address range. This feature is generally available GA.
On July 14, 2025 we released an updated version of Advanced API Security
Note: Rollouts of this release to production instances will begin within two business days and may take four or more business days to complete across all Google Cloud zones. Your instances may not have the feature available until the rollout is complete.
Support for editing and deleting security actions
With this release you can edit and delete existing security actions using either the UI or the Apigee Management APIs.
For usage information, see the security actions documentation.
We're changing the way we provide support dates for Airflow builds in Cloud Composer 3. Before this change, some Airflow builds had their end of support date listed as "To be announced" until a later Airflow version became available. We're deprecating this approach for all builds that are released after July 01, 2025.
We are now providing support dates that depend on a date when a particular Airflow build was released:
- We are introducing the standard support period of 12 months after the release date.
- All Airflow builds that didn't have an end of support date when this change was introduced are supported until July 1, 2026. Because of this change, some Airflow builds released before July 1, 2025 are supported for longer than the standard support period.
- All Airflow builds that had their support date shorter than 12 months are now supported for 12 months since the date of their initial release.
- All builds released after July 1, 2025 will use the standard support period.
A weekly digest of client library updates from across the Cloud SDK.
A weekly digest of client library updates from across the Cloud SDK.
Java
Changes for google-cloud-storage
2.53.3 (2025-07-09)
Bug Fixes
Dependencies
Storage Insights datasets offer the latest snapshot of the bucket and object metadata. The bucket_attributes_latest_snapshot_view
and object_attributes_latest_snapshot_view
views give you access to the latest metadata. Also, the events_view
view has been updated with a globalManifest.snapshotTime
column and an eventCode
to track when the dataset was last refreshed.
As of June 20, 2025, Confidential VM instances using AMD SEV-SNP or Intel TDX do not support remote attestation when running the following guest OS images:
SLES 15 SP7
Ubuntu 25.04
To restore remote attestation, use an earlier guest OS version such as SLES 15 SP6 or Ubuntu 24.04.
Config Connector version 1.132.1 is now available.
Reconciliation Improvements:
- SpannerInstance
- You can opt-in the direct controller by adding the
alpha.cnrm.cloud.google.com/reconciler: direct
annotation to theSpannerInstance
resource`. - Direct controller is opt-in if using the following fields:
spec.labels
spec.defaultBackupScheduleType
spec.edition
spec.autoscalingConfig
- You can opt-in the direct controller by adding the
cos-117-18613-263-66
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.93 | v24.0.9 | v1.7.27 | See List |
Upgraded nvidia-container-toolkit to v1.17.8. This fixes CVE-2025-23266.
Updated google-guest-agent to v20250701.01.
Updated app-editors/nano to v8.5. This resolves CVE-2024-5742.
Upgraded vim, vim-core to version 9.1.1500. This fixes CVE-2025-26603, CVE-2025-27423, CVE-2025-29768, CVE-2025-1215, CVE-2025-24014, CVE-2025-22134.
Runtime sysctl changes:
- Changed: fs.file-max: 811799 -> 811784
cos-109-17800-519-47
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.141 | v24.0.9 | v1.7.27 | See List |
Upgraded nvidia-container-toolkit to v1.17.8. This fixes CVE-2025-23266.
Upgraded sys-apps/less to v679.
Updated app-editors/nano to v8.5. This resolves CVE-2024-5742.
Upgraded vim, vim-core to version 9.1.1500. This fixes CVE-2025-26603, CVE-2025-27423, CVE-2025-29768, CVE-2025-1215, CVE-2025-24014, CVE-2025-22134.
Runtime sysctl changes:
- Changed: fs.file-max: 812201 -> 812258
cos-121-18867-90-85
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.93 | v27.5.1 | v2.0.4 | See List |
Upgraded nvidia-container-toolkit to v1.17.8. This fixes CVE-2025-23266.
Updated google-guest-agent to v20250701.01.
Updated app-editors/nano to v8.5. This resolves CVE-2024-5742.
Upgraded vim, vim-core to version 9.1.1500. This fixes CVE-2025-26603, CVE-2025-27423, CVE-2025-29768, CVE-2025-1215, CVE-2025-24014, CVE-2025-22134.
cos-113-18244-382-60
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.141 | v24.0.9 | v1.7.27 | See List |
Upgraded nvidia-container-toolkit to v1.17.8. This fixes CVE-2025-23266.
Upgraded sys-apps/less to v679.
Updated app-editors/nano to v8.5. This resolves CVE-2024-5742.
Upgraded vim, vim-core to version 9.1.1500. This fixes CVE-2025-26603, CVE-2025-27423, CVE-2025-29768, CVE-2025-1215, CVE-2025-24014, CVE-2025-22134.
Updates to the automatic cataloging of Dataform metadata in Dataplex improve the near real-time management and search capabilities for repository metadata. These features are generally available (GA).
The following framework versions have reached their end of patch and support dates:
- Base versions with CUDA 12.4 and earlier
- Tensorflow versions 2.17 and earlier
- PyTorch versions 2.3 and earlier
To view the end of patch and support dates, see Supported framework versions.
For more information on what the end of patch and support date means, see Support policy schedule.
If you must use an image after deprecation against Google security recommendations and at your own risk, see After deprecation.
Multimodal MedGemma 27B IT, MedSigLIP, and T5Gemma models are available through Model Garden.
VMware Engine ve2
nodes are now available in the São Paulo, Brazil (southamerica-east1-c
) zone in the São Paulo region (southamerica-east1
).
Windows NVMe attached disks are supported only in GKE version 1.33.2-gke.1240000 and later. In earlier GKE versions, creating PersistentVolumeClaims on Windows nodes that use NVMe volumes results in errors. For more information about the disk interface types that are used by machine families, see the Compute Engine Machine series comparison.
If you have Windows workloads that use machine families that support only NVMe, upgrade your clusters to version 1.33.2-gke.1240000 or later.
A weekly digest of client library updates from across the Cloud SDK.
In the Google Kubernetes Engine (GKE) security posture dashboard, the software vulnerabilities pane is available in Preview, not General Availability.
Spanner Data Boost supports data stored on hard disk drives (HDD). This feature is generally available (GA).
Preview stage support for the following integration:
Multimodal MedGemma 27B IT, MedSigLIP, and T5Gemma models are available through Model Garden.
July 13, 2025
Google SecOps SOARRelease 6.3.53 is being rolled out to the first phase of regions as listed here.
This release contains internal and customer bug fixes.
July 12, 2025
Google SecOps SOARRelease 6.3.52 is now available for all regions.
July 11, 2025
Agent AssistGoogle Cloud provides quotas for using Agent Assist APIs. Each feature uses specific APIs, which have their own quotas.
We're excited to announce the launch of Editable Backup Plans, a new feature designed to give you more flexibility and control over your data protection strategy. You can now modify your existing backup plans directly, eliminating the need to create new plans and reassign them when your requirements change. This makes it easier than ever to adapt to evolving business needs, optimize for cost, and correct configuration errors on the fly.
What's new:
Directly Edit Key Settings: You can now change the description, schedule, backup window, and retention periods of your existing backup plans. You can also add or remove backup rules as needed.
Automatic Updates: Once a plan is edited, the changes are automatically applied to all resources protected by that plan for all future backups. There's no need to manually detach and reattach the plan.
Backward Compatibility: This new capability is available for all backup plans, including those created before this update.
Important Note: While most settings in a backup plan are now editable, the assigned backup vault cannot be changed. To store backups in a different vault, a new backup plan must be created.
The following resource types are now publicly available through the ExportAssets, ListAssets, BatchGetAssetsHistory, QueryAssets, and Feed APIs.
- Parameter Manager
parametermanager.googleapis.com/Parameter
parametermanager.googleapis.com/ParameterVersion
(2025-R29) Version updates
- The following versions are now available in the Extended channel:
(2025-R29) Version updates
- The following versions are now available:
- The following node versions are now available:
(2025-R29) Version updates
- The following versions are now available in the Rapid channel:
(2025-R29) Version updates
- The following versions are now available in the Regular channel:
(2025-R29) Version updates
- The following versions are now available in the Stable channel:
(2025-R29) Version updates
GKE cluster versions have been updated.
New versions available for upgrades and new clusters.
The following Kubernetes versions are now available for new clusters and for opt-in control plane upgrades and node upgrades for existing clusters. For more information on versioning and upgrades, see GKE versioning and support and Upgrades.
Rapid channel
- The following versions are now available in the Rapid channel:
Regular channel
- The following versions are now available in the Regular channel:
Stable channel
- The following versions are now available in the Stable channel:
Extended channel
- The following versions are now available in the Extended channel:
No channel
- The following versions are now available:
- The following node versions are now available:
Notebook Security Scanner is a built-in package vulnerability detection service of Security Command Center. This feature is available in Preview to the Security Command Center Premium or Enterprise tier.
You can enable and use Notebook Security Scanner to detect vulnerabilities in Python packages that are used in Colab Enterprise notebooks (files with the ipynb
filename extension) and resolve those package vulnerability findings.
To reduce the cost of running your inference jobs, you can now use flex-start VMs, which are powered by Dynamic Workload Scheduler. Flex-start VMs offer significant discounts and are well-suited for short-duration workloads. This feature is available in Preview.
For more information, see Use DWS flex-start VMs with inference.
July 10, 2025
AI HypercomputerGenerally available: You can now manage the Collective Communication Analyzer (CoMMA), a library that uses the NVIDIA Collective Communication Library (NCCL) profiler plugin to collect detailed NCCL telemetry for GPU machine types. The collected performance metrics and operational events are used for analyzing and optimizing large-scale AI and ML training workloads.
CoMMA is automatically installed and enabled on A4X, A4 High, and A3 Ultra machine types when using specific images. You can manage this data collection by disabling the plugin, adjusting its data granularity levels, or manually installing it on other GPU machine types. For more information, see Enable, disable, and configure CoMMA.
You can now launch clusters with the following Kubernetes versions. Click on the following links to see the release notes associated with these patches:
You can now launch clusters with the following Kubernetes versions. Click on the following links to see the release notes associated with these patches:
You can now launch clusters with the following Kubernetes versions. Click on the following links to see the release notes associated with these patches:
A new major engine version is now available for Retail and Commercial lines of business, within the v4 tuning version. This includes a more reliable training performance when using optional enum input fields.
New minor engine version released for commercial line of business within the v004 tuning version. This extends support for the major version and includes no significant changes over the previous minor version.
New alignment option for Cartesian charts
The new Align with grid setting lets you set the alignment of the chart legend with the position of the chart grid, instead of aligning with the chart title.
This setting is available for Cartesian charts in reports that have modern charts enabled.
In the Google Cloud console, the Google Kubernetes Engine (GKE) security posture dashboard shows the top software vulnerabilities that affect your GKE workloads. This feature is in General Availability.
M131 release
The M131 release of Vertex AI Workbench instances includes the following:
- Updated the Dataproc JupyterLab plugin to version 0.1.89.
July 09, 2025
AI ApplicationsAI Applications: Quotas
AI Applications offers the following allocation quotas in the global region (global
), the US multi-region (us
), and the EU multi-region (eu
) under the Discovery Engine API:
- Number of data stores per project
- Number of documents per project
- Number of engines per project
- Number of user events
The number of data stores, documents, user events, and engines across all locations can't exceed the total per-project quota for that resource.
For more information, see Quotas.
hybrid v1.13.4
On July 9, 2025 we released an updated version of the Apigee hybrid software, 1.13.4.
- For information on upgrading, see Upgrading Apigee hybrid to version 1.13.
- For information on new installations, see The big picture.
Bug ID | Description |
---|---|
420675540 | Fixed Cassandra based replication for runtime contracts in synchronizer. |
401746333 | Fixed a java.lang.ClassCircularityError that could occur in Java Callouts due to an issue with the class loading mechanism. |
382565315 | A memory leak within the Security Policy has been addressed, improving system stability. |
375360455 | Updated apigee-runtime drain timeout to 300s to fix connection termination issue during pod termination. |
Bug ID | Description |
---|---|
396944778 | Security fixes for apigee-synchronizer . This addresses the following vulnerabilities: |
392934392 | Security fixes for apigee-logger . |
N/A | Security fixes for apigee-mart-server . This addresses the following vulnerability: |
N/A | Security fixes for apigee-mint-task-scheduler . This addresses the following vulnerability: |
N/A | Security fixes for apigee-redis . This addresses the following vulnerabilities: |
N/A | Security fixes for apigee-runtime . This addresses the following vulnerability: |
N/A | Security fixes for apigee-synchronizer . This addresses the following vulnerability: |
N/A | Security fixes for vault . This addresses the following vulnerability: |
We are gradually rolling out a change that switches the default version from Cloud Composer 2 to Cloud Composer 3 in the Cloud Composer API.
In regions where the change is rolled out, a Cloud Composer 3 environment is created by default when a version is not specified in Google Cloud CLI, Cloud Composer API, or Terraform. If you use automation scripts to provision Cloud Composer 2 environments, make sure that you explicitly specify a Cloud Composer 2 version.
In this release, the change is rolling out in the following regions: africa-south1, asia-northeast2, asia-south2, asia-southeast2, europe-southwest1, europe-west10, europe-west12, europe-west8, me-central1, me-central2, me-west1, southamerica-west1, and us-south1.
(Available without upgrading) During Cloud Composer 2 environment operations, a more informative error message is returned when an environment's web server has connectivity issues.
New Airflow builds are available in Cloud Composer 3:
New images are available in Cloud Composer 2:
Cloud Composer versions 2.8.4 and 2.8.5 have reached their end of support period.
Application Load Balancers and Proxy Network Load Balancers now support TLS certificates with large key sizes. Previously, these load balancers supported only certificates with RSA-2048 or ECDSA P-256 key types. With this update, you can now use self-managed certificates with RSA-3072, RSA-4096, and ECDSA P-384 keys.
Key details:
Supported key types (for self-managed certificates): RSA-2048, RSA-3072, RSA-4096, ECDSA P-256, and ECDSA P-384
Load balancing coverage for self managed certificates:
Certificate Manager SSL certificates: Global and regional load balancing
Compute Engine SSL Certificates: Regional load balancing
Pricing: An additional charge of $0.45 per 1 million connections applies with certificates that use RSA-3072 and RSA-4096 key types. There are no per-connection charges for certificates that use RSA-2048, ECDSA P-256, or ECDSA P-384 key types.
For more information, see the documentation for Supported key types.
This capability is now in General Availability.
1.25.3-asm.8 is now available for in-cluster Cloud Service Mesh.
You can now download 1.25.3-asm.8 for in-cluster Cloud Service Mesh. It includes the features of Istio 1.25.3 subject to the list of supported features. Cloud Service Mesh version 1.25.3-asm.8 uses envoy v1.33.4-dev.
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh.
1.24.6-asm.4 is now available for in-cluster Cloud Service Mesh.
You can now download 1.24.6-asm.4 for in-cluster Cloud Service Mesh. It includes the features of Istio 1.24.6 subject to the list of supported features. Cloud Service Mesh version 1.24.6-asm.4 uses envoy v1.32.7-dev.
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh.
1.23.6-asm.11 is now available for in-cluster Cloud Service Mesh.
You can now download 1.23.6-asm.11 for in-cluster Cloud Service Mesh. It includes the features of Istio 1.23.6 subject to the list of supported features. Cloud Service Mesh version 1.23.6-asm.11 uses envoy v1.31.9-dev.
For details on upgrading Cloud Service Mesh, see Upgrade Cloud Service Mesh.
General availability: Metrics for all Google Cloud Managed Service for Apache Kafka resources are now available, with some exceptions. Exceptions include the request_count
and topic_error_count
metrics for Kafka clusters and Kafka Connect connectors. For a list of supported metrics, see Metrics for Cloud Managed Service for Apache Kafka.
BMC Remedy ITSM: Version 9.0
Updated input parameter processing in the following action:
- Create Incident
ServiceNow: Version 58.0
Updated processing of record object in the following connector:
- ServiceNow - ServiceNow Connector
Siemplify: Version 93.0
Updated action logic in the following actions:
Get Case Details
Get Similar Cases
Enhanced tagging capabilities for Secret Manager: You can now add tags directly at the time of secret creation. This new feature lets you provide essential metadata for your resources and helps with better organization, cost tracking, and automated policy application from the time a secret is created. In addition to this, tagging for regional secrets is now fully supported, both during secret creation and for existing regional secrets. For more information, see the documentation on tags for global secrets and regional secrets.
Soft-enforced rate limits for modifying secrets and secret versions: We have introduced soft-enforced rate limits for the following operations in Secret Manager:
AddSecretVersion
UpdateSecret
EnableSecretVersion
DisableSecretVersion
DestroySecretVersion
Soft enforcement lets us continue serving requests beyond the defined quota as long as our backend systems can comfortably handle the increased load. For details, see the Quotas and limits documentation.
Dynamic Private Service Connect interfaces are available in Preview. You can update VM instances to add or remove dynamic Private Service Connect interfaces without restarting or recreating the instance.
For more information, see Private Service Connect interface types.
VPC Network Peering supports peering connections in consensus mode. This feature is available in Preview. For more information, see Update strategy.
July 08, 2025
App HubDataproc Metastore services are now generally available (GA).
Starting August 1, 2025, GoogleSQL will become the default dialect for queries run from the command line interface (CLI) or API. To use LegacySQL, you will need to explicitly specify it in your requests or set the configuration setting default_sql_dialect_option
to 'default_legacy_sql'
at the project or organization level.
As of July 8, 2025, Cloud Life Sciences is beginning to shut down.
Batch is generally available and is a comprehensive successor that supports all use cases for Cloud Life Sciences. Learn how to migrate to Batch.
Zonal affinity, configured on the backend service of an internal passthrough Network Load Balancer, lets you limit cross-zone traffic, reduce latency, and improve performance, all while maintaining the benefits of a multi-zonal architecture.
Internal passthrough Network Load Balancers support three zonal affinity options that offer varying degrees of preference for routing new connections to eligible backends that are in the same zone as a supported client.
For more information, see Zonal affinity for internal passthrough Network Load Balancers.
This feature is in Preview.
Cloud SQL for SQL Server now offers Active Directory support for write endpoints. For more information, see Write endpoints across forests.
You can now create caches with Anywhere Cache in the us-west3-a
, us-west3-b
, and us-west3-c
zones. For more information about supported locations for Anywhere Cache, see Supported locations.
Vertex AI Agent Engine
Vertex AI Agent Engine Memory Bank is now available in Preview. Memory Bank lets you dynamically generate long-term memories based on users' conversations with your agent.
Cloud Armor preconfigured WAF rules can now inspect up to the first 64kB (either 8kB, 16kB, 32kB, 48kB, or 64kB) of the POST or PATCH request body content in Preview.
Mobile SDK 2.13 is released
Mobile SDK 2.13 includes the following updates:
End-users can download chat transcripts to their devices during a session or after a session ends. For more information, see Download chat transcripts using the web SDK and mobile SDKs.
The user experience with post-session virtual assistants is improved in the following ways:
You can configure an opt-in banner to appear for the post-session virtual assistant experience.
The user interface makes it easier for an end-user to know whether they are speaking to a human agent or a post-session virtual agent.
End-users can navigate the user interface using keyboard shortcuts in conformance with the W3C Web Content Accessibility Guidelines.
You can configure your instance to let end-users skip customer satisfaction surveys.
The following issues were addressed in this release:
Android SDK:
- Fixed an issue where system messages containing an empty space were being sent, even though the message strings were set to NULL.
iOS SDK:
Fixed an issue where the "Skip the human agent" button was displayed after an end-user was transferred to a virtual agent.
Fixed an issue where a notification sound played for new chat messages despite the end-user disabling notifications.
BigQuery Connector for SAP version 2.9
Version 2.9 of the BigQuery Connector for SAP is generally available (GA). This version introduces Change Data Capture (CDC) replication of SAP data into BigQuery through Pub/Sub. This replication path keeps your BigQuery tables up-to-date with the latest changes from your SAP data sources, eliminating the need for custom deduplication.
For more information, see What's new with BigQuery Connector for SAP.
Secure Source Manager is now available in the following regions:
- australia-southeast1 (Sydney)
- asia-northeast1 (Tokyo)
The following features of policy-based routes are available in General Availability:
- Applying policy-based routes to IPv6 traffic
- Using a next hop that is in a peered VPC network
For more information, see Create policy-based routes.
July 07, 2025
AI HypercomputerPreview: You can use future reservations in calendar mode to obtain resources for up to 90 days. By creating a request in calendar mode, you can reserve up to 80 GPU VMs for a future date and time. Then, you can use that capacity to run the following workloads:
Model pre-training
Model fine-tuning
Simulations
Inference
For more information, see Choose a consumption option.
You can now use your Google Account user credentials to authorize the execution of a data preparation in development. For more information, see Manually run a data preparation in development. This feature is in preview.
When you undelete a table, Bigtable automatically enables deletion protection for that table.
Tags data for regional Secret Manager secret usage is available in both the Standard usage cost export and the Detailed usage cost export.
Tags for Global secrets have been available since August 8, 2024. With this update, you can now tag Regional secrets as well.
To learn more about Tags, see Tags overview. To learn about using Tags in your cost data exported to BigQuery, see about tags and query examples with tags.
A weekly digest of client library updates from across the Cloud SDK.
Python
Changes for google-cloud-storage
3.2.0 (2025-07-04)
Features
Cloud Workstations is available in the europe-central2
region (Warsaw). For more information, see Locations.
cos-121-18867-90-77
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.93 | v27.5.1 | v2.0.4 | See List |
Upgraded app-admin/sudo to v1.9.17_p1. This resolves CVE-2025-32462 and CVE-2025-32463.
cos-117-18613-263-58
Kernel | Docker | Containerd | GPU Drivers |
COS-6.6.93 | v24.0.9 | v1.7.27 | See List |
Upgraded app-admin/sudo to v1.9.17_p1. This resolves CVE-2025-32462 and CVE-2025-32463.
cos-113-18244-382-54
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.141 | v24.0.9 | v1.7.27 | See List |
Upgraded app-admin/sudo to v1.9.17_p1. This resolves CVE-2025-32462 and CVE-2025-32463.
cos-109-17800-519-41
Kernel | Docker | Containerd | GPU Drivers |
COS-6.1.141 | v24.0.9 | v1.7.27 | See List |
Upgraded app-admin/sudo to v1.9.17_p1. This resolves CVE-2025-32462 and CVE-2025-32463.
The Cluster Scheduled Stop feature is available in preview. You can use this feature to stop clusters after a specified idle period, at a specified future time, or after a specified period from the cluster creation or update request.
Session metadata in Conversational Insights conversations is GA
The Google Cloud CCaaS capability of including session metadata when creating conversations in Conversational Insights is now generally available (GA). Metadata values are available for each conversation. For more information, see Conversational Insights and Quality AI.
When upgrading to Windows Server 2022 or newer images on your GCVE private clouds, you can use a combination of Windows Server BYOL for Windows Server 2019 and earlier images and on-demand licensing for Google-provided Windows Server 2022. For more information, see Use a combination of BYOL and on-demand Windows Server licenses from Google.
Dashboards for enhanced visualizations and threat hunting
You can now use the Google SecOps Dashboards to enhance data visualization, investigations, and threat hunting.
Key capabilities include:
- SOAR data availability
- Downloadable reports
- Custom drilldowns
- Markdown widgets
- 51 curated dashboards covering a broad range of security categories and use cases.
For more information, see Dashboards.
Dashboards for enhanced visualizations and threat hunting
You can now use the Google SecOps Dashboards to enhance data visualization, investigations, and threat hunting.
Key capabilities include:
- SOAR data availability
- Downloadable reports
- Custom drilldowns
- Markdown widgets
- 51 curated dashboards covering a broad range of security categories and use cases.
For more information, see Dashboards.
You can now use the Google Cloud console to work with cross-region replication. This feature is Generally Available.
The feature to create Memorystore for Valkey instances in Cluster Enabled and Cluster Disabled modes is now Generally Available.
General availability support for the following integration:
July 06, 2025
Google SecOps SOARRelease 6.3.52 is being rolled out to the first phase of regions as listed here.
This release contains the following feature:
Share Case Queue Filters
You can now share case queue filters with other users. These filters can be saved with specific criteria, such as assignee roles, and shared with individual users, SOC roles, or all users in your organization for quick access.
For more information, see Apply and save filters.