GCP Release Notes: April 29, 2026

GCP Release Notes: April 29, 2026

Apigee X

Announcement

On April 29th, 2026, we began maintenance updates of Apigee instances configured for maintenance windows.

If you set a preferred window for maintenance for your instance, and your instance version is below 1-17-0-apigee-4, your instance will be updated to 1-17-0-apigee-4 within the next seven to 21 days. A notification containing the expected date of upgrade will be sent within the next two business days.

For more information on participating in scheduled maintenance windows, see Maintenance overview and Manage Apigee instance maintenance windows.

BigQuery

Breaking

Strict act-as mode is enforced globally for all Dataform repositories, requiring the use of a custom service account or user credentials for running Dataform workflows, BigQuery pipelines, notebooks, and data preparations.

Feature

You can now use the VECTOR_INDEX.STATISTICS function to calculate how much an indexed table’s data has drifted between when a vector index was created and the present. If table data has changed enough to require a vector index rebuild, you can use the ALTER VECTOR INDEX REBUILD statement to rebuild the vector index without downtime. These features are generally available (GA).

Feature

You can now use the PARTITION BY clause of the CREATE VECTOR INDEX statement to partition TreeAH vector indexes. Partitioning enables partition pruning and can decrease I/O costs. This feature is Generally Available.

Compute Engine

Feature

Preview: In an autoscaled managed instance group (MIG), you can monitor individual autoscaling events and view details to understand the reasons behind each autoscaling decision. For more information, see Monitor autoscaling events.

Confidential Space

Announcement

A Confidential Space image (260400) is available. Support for Confidential Space on H100 GPU (a3-highgpu-1g machine family) is generally available.

Dataform

Feature

You can use custom constraints with Organization Policy to provide more granular control over specific fields for the Folder and TeamFolder resources. For more information, see Create custom organization policy constraints. This feature is generally available (GA).

Breaking

Strict act-as mode is enforced globally for all Dataform repositories, requiring the use of a custom service account or user credentials for running Dataform workflows, BigQuery pipelines, notebooks, and data preparations.

Google Kubernetes Engine

Fixed

In GKE versions earlier than 1.34.6-gke.1154000 and 1.35.2-gke.1691000, mounting Cloud Storage buckets by using the Cloud Storage FUSE CSI driver can experience significant delays. This issue typically manifests as a CreateContainer error that states the following message: failed to reserve container name. This error is self-healing and resolves automatically after the underlying mount operation completes and the container runtime releases the reservation.

The delay is caused by an inefficient bucket access check performed by the CSI driver sidecar by using the ListObjects API method, which can take several hours to complete on buckets that contain millions of empty folders.

The error occurs because the kubelet enforces a strict two-minute timeout for the container creation request. If the FUSE mount process exceeds this time limit while the sidecar is performing the initial bucket access check, then the kubelet cancels the operation and retries. However, the container runtime remains blocked on the first attempt and retains the reservation for the container name.

The new GKE releases fix this issue by replacing the ListObjects check with the GetStorageLayout API method, which performs the same validation but returns almost instantly in most cases.

To resolve this issue, upgrade your cluster to one of the following versions:

  • 1.34.6-gke.1154000 or later
  • 1.35.2-gke.1691000 or later

For GKE version 1.33 clusters running version 1.33.5-gke.2435000 or later, you can mitigate this issue by setting the skipCSIBucketAccessCheck: "true" volume attribute to bypass the check.

There is no supported fix for this issue in cluster versions 1.33.5-gke.2435000 and earlier.

Google SecOps Marketplace

Change

UrlScan.io: Version 30.0

  • Added is_risky handling to the following action:

    • Url Check

Change

Siemplify: Version 107.0

  • Integration: Updated TIPCommon dependency.

Change

Microsoft Graph Mail: Version 41.0

  • Updated MSG attachments processing logic in the following connector:

    • Microsoft Graph Mail Connector

Change

Zerofox: Version 4.0

  • Integration: Updated documentation link.

Change

MISP: Version 39.0

  • Updated tag retrieval logic in the following actions:

    • Add Tag to an Attribute

    • Add Tag to an Event

    • Remove Tag from an Attribute

    • Remove Tag from an Event

Change

Anomali ThreatStream: Version 16.0

  • Added is_risky handling to the following action:

    • Enrich Entities

Change

Microsoft Graph Mail Delegated: Version 18.0

  • Updated MSG attachments processing logic in the following connector:

    • Microsoft Graph Mail Delegated Connector

Change

Palo Alto Cortex XDR: Version 28.0

  • Added the ability to ignore specific artifact types to the following connector:

    • Palo Alto Cortex XDR Connector

Change

Source code is now publicly available on GitHub for the following integrations:

  • Cisco Orbital: Version 9.0

  • F5 Big IQ: Version 8.0

  • FireEye EX: Version 14.0

  • HCL BigFix Inventory: Version 6.0

  • Illusive Networks: Version 8.0

  • Lastline: Version 10.0

  • McAfee ATD: Version 18.0

  • McAfee Active Response: Version 10.0

  • ObserveIT: Version 6.0

  • Outpost24: Version 9.0

  • Site24x7: Version 7.0

  • Splash: Version 8.0

  • Websense: Version 15.0

Source: Google Cloud Platform

Latest Posts

Pass It On
Leave a Comment

Comments

No comments yet. Why don’t you start the discussion?

Leave a Reply