Back to Talos

Config

website/content/v1.13/reference/configuration/v1alpha1/config.md

1.13.083.1 KB
Original Source
<!-- markdownlint-disable -->

{{< highlight yaml >}} version: v1alpha1 machine: # ... cluster: # ... {{< /highlight >}}

FieldTypeDescriptionValue(s)
versionstringIndicates the schema used to decode the contents.v1alpha1
debugboolEnable verbose logging to the console.
All system containers logs will flow into serial console.

Note: To avoid breaking Talos bootstrap flow enable this option only if serial console can handle high message throughput. |true yes false no | |machine |<a href="#Config.machine">MachineConfig</a> |Provides machine specific configuration options. | | |cluster |<a href="#Config.cluster">ClusterConfig</a> |Provides cluster specific configuration options. | |

machine {#Config.machine}

MachineConfig represents the machine-specific config values.

{{< highlight yaml >}} machine: type: controlplane # InstallConfig represents the installation options for preparing a node. install: disk: /dev/sda # The disk used for installations. image: ghcr.io/siderolabs/installer:latest # Allows for supplying the image used to perform the installation. wipe: false # Indicates if the installation disk should be wiped at installation time. grubUseUKICmdline: true # Indicates if legacy GRUB bootloader should use kernel cmdline from the UKI instead of building it on the host.

    # # Look up disk using disk attributes like model, size, serial and others.
    # diskSelector:
    #     size: 4GB # Disk size.
    #     model: WDC* # Disk model `/sys/block/<dev>/device/model`.
    #     busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0 # Disk bus path.

{{< /highlight >}}

FieldTypeDescriptionValue(s)
typestringDefines the role of the machine within the cluster.

Control Plane

Control Plane node type designates the node as a control plane member. This means it will host etcd along with the Kubernetes controlplane components such as API Server, Controller Manager, Scheduler.

Worker

Worker node type designates the node as a worker node. This means it will be an available compute node for scheduling workloads.

This node type was previously known as "join"; that value is still supported but deprecated. |controlplane worker | |token |string |The token is used by a machine to join the PKI of the cluster. Using this token, a machine will create a certificate signing request (CSR), and request a certificate that will be used as its' identity. <details><summary>Show example(s)</summary>example token:{{< highlight yaml >}} token: 328hom.uqjzh6jnn2eie9oi {{< /highlight >}}</details> | | |ca |PEMEncodedCertificateAndKey |The root certificate authority of the PKI. It is composed of a base64 encoded crt and key. <details><summary>Show example(s)</summary>machine CA example:{{< highlight yaml >}} ca: crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t key: LS0tIEVYQU1QTEUgS0VZIC0tLQ== {{< /highlight >}}</details> | | |acceptedCAs |[]PEMEncodedCertificate |The certificates issued by certificate authorities are accepted in addition to issuing 'ca'. It is composed of a base64 encoded crt``. | | |certSANs |[]string |Extra certificate subject alternative names for the machine's certificate. By default, all non-loopback interface IPs are automatically added to the certificate's SANs. <details><summary>Show example(s)</summary>Uncomment this to enable SANs.:{{< highlight yaml >}} certSANs: - 10.0.0.10 - 172.16.0.10 - 192.168.0.10 {{< /highlight >}}</details> | | |controlPlane |<a href="#Config.machine.controlPlane">MachineControlPlaneConfig</a> |Provides machine specific control plane configuration options. <details><summary>Show example(s)</summary>ControlPlane definition example.:{{< highlight yaml >}} controlPlane: # Controller manager machine specific configuration options. controllerManager: disabled: false # Disable kube-controller-manager on the node. # Scheduler machine specific configuration options. scheduler: disabled: true # Disable kube-scheduler on the node. {{< /highlight >}}</details> | | |kubelet|<a href="#Config.machine.kubelet">KubeletConfig</a> |Used to provide additional options to the kubelet. <details><summary>Show example(s)</summary>Kubelet definition example.:{{< highlight yaml >}} kubelet: image: ghcr.io/siderolabs/kubelet:v1.36.0 # Theimagefield is an optional reference to an alternative kubelet image. # TheextraArgs` field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true

# # The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.
# clusterDNS:
#     - 10.96.0.10
#     - 169.254.2.53

# # The `extraMounts` field is used to add additional mounts to the kubelet container.
# extraMounts:
#     - destination: /var/lib/example # Destination is the absolute path where the mount will be placed in the container.
#       type: bind # Type specifies the mount kind.
#       source: /var/lib/example # Source specifies the source path of the mount.
#       # Options are fstab style mount options.
#       options:
#         - bind
#         - rshared
#         - rw

# # The `extraConfig` field is used to provide kubelet configuration overrides.
# extraConfig:
#     serverTLSBootstrap: true

# # The `KubeletCredentialProviderConfig` field is used to provide kubelet credential configuration.
# credentialProviderConfig:
#     apiVersion: kubelet.config.k8s.io/v1
#     kind: CredentialProviderConfig
#     providers:
#         - apiVersion: credentialprovider.kubelet.k8s.io/v1
#           defaultCacheDuration: 12h
#           matchImages:
#             - '*.dkr.ecr.*.amazonaws.com'
#             - '*.dkr.ecr.*.amazonaws.com.cn'
#             - '*.dkr.ecr-fips.*.amazonaws.com'
#             - '*.dkr.ecr.us-iso-east-1.c2s.ic.gov'
#             - '*.dkr.ecr.us-isob-east-1.sc2s.sgov.gov'
#           name: ecr-credential-provider

# # The `nodeIP` field is used to configure `--node-ip` flag for the kubelet.
# nodeIP:
#     # The `validSubnets` field configures the networks to pick kubelet node IP from.
#     validSubnets:
#         - 10.0.0.0/8
#         - '!10.0.0.3/32'
#         - fdc7::/16

{{< /highlight >}}</details> | | |pods |[]Unstructured |Used to provide static pod definitions to be run by the kubelet directly bypassing the kube-apiserver.

Static pods can be used to run components which should be started before the Kubernetes control plane is up. Talos doesn't validate the pod definition. Updates to this field can be applied without a reboot.

See https://kubernetes.io/docs/tasks/configure-pod-container/static-pod/. <details><summary>Show example(s)</summary>nginx static pod.:{{< highlight yaml >}} pods: - apiVersion: v1 kind: pod metadata: name: nginx spec: containers: - image: nginx name: nginx {{< /highlight >}}</details> | | |install |<a href="#Config.machine.install">InstallConfig</a> |Used to provide instructions for installations.

Note that this configuration section gets silently ignored by Talos images that are considered pre-installed. To make sure Talos installs according to the provided configuration, Talos should be booted with ISO or PXE-booted. <details><summary>Show example(s)</summary>MachineInstall config usage example.:{{< highlight yaml >}} install: disk: /dev/sda # The disk used for installations. image: ghcr.io/siderolabs/installer:latest # Allows for supplying the image used to perform the installation. wipe: false # Indicates if the installation disk should be wiped at installation time. grubUseUKICmdline: true # Indicates if legacy GRUB bootloader should use kernel cmdline from the UKI instead of building it on the host.

# # Look up disk using disk attributes like model, size, serial and others.
# diskSelector:
#     size: 4GB # Disk size.
#     model: WDC* # Disk model `/sys/block/<dev>/device/model`.
#     busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0 # Disk bus path.

{{< /highlight >}}</details> | | |files |<a href="#Config.machine.files.">[]MachineFile</a> |Allows the addition of user specified files. The value of op can be create, overwrite, or append. In the case of create, path must not exist. In the case of overwrite, and append, path must be a valid file. If an op value of append is used, the existing file will be appended. Note that the file contents are not required to be base64 encoded. <details><summary>Show example(s)</summary>MachineFiles usage example.:{{< highlight yaml >}} files: - content: '...' # The contents of the file. permissions: 0o666 # The file's permissions in octal. path: /tmp/file.txt # The path of the file. op: append # The operation to use {{< /highlight >}}</details> | | |sysctls |map[string]string |Used to configure the machine's sysctls. <details><summary>Show example(s)</summary>MachineSysctls usage example.:{{< highlight yaml >}} sysctls: kernel.domainname: talos.dev net.ipv4.ip_forward: "0" net/ipv6/conf/eth0.100/disable_ipv6: "1" {{< /highlight >}}</details> | | |sysfs |map[string]string |Used to configure the machine's sysfs. <details><summary>Show example(s)</summary>MachineSysfs usage example.:{{< highlight yaml >}} sysfs: devices.system.cpu.cpu0.cpufreq.scaling_governor: performance {{< /highlight >}}</details> | | |features |<a href="#Config.machine.features">FeaturesConfig</a> |Features describe individual Talos features that can be switched on or off. <details><summary>Show example(s)</summary>{{< highlight yaml >}} features: diskQuotaSupport: true # Enable XFS project quota support for EPHEMERAL partition and user disks.

# # Configure Talos API access from Kubernetes pods.
# kubernetesTalosAPIAccess:
#     enabled: true # Enable Talos API access from Kubernetes pods.
#     # The list of Talos API roles which can be granted for access from Kubernetes pods.
#     allowedRoles:
#         - os:reader
#     # The list of Kubernetes namespaces Talos API access is available from.
#     allowedKubernetesNamespaces:
#         - kube-system

{{< /highlight >}}</details> | | |udev |<a href="#Config.machine.udev">UdevConfig</a> |Configures the udev system. <details><summary>Show example(s)</summary>{{< highlight yaml >}} udev: # List of udev rules to apply to the udev system rules: - SUBSYSTEM=="drm", KERNEL=="renderD*", GROUP="44", MODE="0660" {{< /highlight >}}</details> | | |logging |<a href="#Config.machine.logging">LoggingConfig</a> |Configures the logging system. <details><summary>Show example(s)</summary>{{< highlight yaml >}} logging: # Logging destination. destinations: - endpoint: tcp://1.2.3.4:12345 # Where to send logs. Supported protocols are "tcp" and "udp". format: json_lines # Logs format. {{< /highlight >}}</details> | | |kernel |<a href="#Config.machine.kernel">KernelConfig</a> |Configures the kernel. <details><summary>Show example(s)</summary>{{< highlight yaml >}} kernel: # Kernel modules to load. modules: - name: btrfs # Module name. {{< /highlight >}}</details> | | |seccompProfiles |<a href="#Config.machine.seccompProfiles.">[]MachineSeccompProfile</a> |Configures the seccomp profiles for the machine. <details><summary>Show example(s)</summary>{{< highlight yaml >}} seccompProfiles: - name: audit.json # The name field is used to provide the file name of the seccomp profile. # The value field is used to provide the seccomp profile. value: defaultAction: SCMP_ACT_LOG {{< /highlight >}}</details> | | |baseRuntimeSpecOverrides |Unstructured |Override (patch) settings in the default OCI runtime spec for CRI containers.

It can be used to set some default container settings which are not configurable in Kubernetes, for example default ulimits. Note: this change applies to all newly created containers, and it requires a reboot to take effect. <details><summary>Show example(s)</summary>override default open file limit:{{< highlight yaml >}} baseRuntimeSpecOverrides: process: rlimits: - hard: 1024 soft: 1024 type: RLIMIT_NOFILE {{< /highlight >}}</details> | | |nodeLabels |map[string]string |Configures the node labels for the machine.

Note: In the default Kubernetes configuration, worker nodes are restricted to set labels with some prefixes (see NodeRestriction admission plugin). <details><summary>Show example(s)</summary>node labels example.:{{< highlight yaml >}} nodeLabels: exampleLabel: exampleLabelValue {{< /highlight >}}</details> | | |nodeAnnotations |map[string]string |Configures the node annotations for the machine. <details><summary>Show example(s)</summary>node annotations example.:{{< highlight yaml >}} nodeAnnotations: customer.io/rack: r13a25 {{< /highlight >}}</details> | | |nodeTaints |map[string]string |Configures the node taints for the machine. Effect is optional.

Note: In the default Kubernetes configuration, worker nodes are not allowed to modify the taints (see NodeRestriction admission plugin). <details><summary>Show example(s)</summary>node taints example.:{{< highlight yaml >}} nodeTaints: exampleTaint: exampleTaintValue:NoSchedule {{< /highlight >}}</details> | |

controlPlane {#Config.machine.controlPlane}

MachineControlPlaneConfig machine specific configuration options.

{{< highlight yaml >}} machine: controlPlane: # Controller manager machine specific configuration options. controllerManager: disabled: false # Disable kube-controller-manager on the node. # Scheduler machine specific configuration options. scheduler: disabled: true # Disable kube-scheduler on the node. {{< /highlight >}}

FieldTypeDescriptionValue(s)
controllerManager<a href="#Config.machine.controlPlane.controllerManager">MachineControllerManagerConfig</a>Controller manager machine specific configuration options.
scheduler<a href="#Config.machine.controlPlane.scheduler">MachineSchedulerConfig</a>Scheduler machine specific configuration options.

controllerManager {#Config.machine.controlPlane.controllerManager}

MachineControllerManagerConfig represents the machine specific ControllerManager config values.

FieldTypeDescriptionValue(s)
disabledboolDisable kube-controller-manager on the node.

scheduler {#Config.machine.controlPlane.scheduler}

MachineSchedulerConfig represents the machine specific Scheduler config values.

FieldTypeDescriptionValue(s)
disabledboolDisable kube-scheduler on the node.

kubelet {#Config.machine.kubelet}

KubeletConfig represents the kubelet config values.

{{< highlight yaml >}} machine: kubelet: image: ghcr.io/siderolabs/kubelet:v1.36.0 # The image field is an optional reference to an alternative kubelet image. # The extraArgs field is used to provide additional flags to the kubelet. extraArgs: feature-gates: ServerSideApply=true

    # # The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.
    # clusterDNS:
    #     - 10.96.0.10
    #     - 169.254.2.53

    # # The `extraMounts` field is used to add additional mounts to the kubelet container.
    # extraMounts:
    #     - destination: /var/lib/example # Destination is the absolute path where the mount will be placed in the container.
    #       type: bind # Type specifies the mount kind.
    #       source: /var/lib/example # Source specifies the source path of the mount.
    #       # Options are fstab style mount options.
    #       options:
    #         - bind
    #         - rshared
    #         - rw

    # # The `extraConfig` field is used to provide kubelet configuration overrides.
    # extraConfig:
    #     serverTLSBootstrap: true

    # # The `KubeletCredentialProviderConfig` field is used to provide kubelet credential configuration.
    # credentialProviderConfig:
    #     apiVersion: kubelet.config.k8s.io/v1
    #     kind: CredentialProviderConfig
    #     providers:
    #         - apiVersion: credentialprovider.kubelet.k8s.io/v1
    #           defaultCacheDuration: 12h
    #           matchImages:
    #             - '*.dkr.ecr.*.amazonaws.com'
    #             - '*.dkr.ecr.*.amazonaws.com.cn'
    #             - '*.dkr.ecr-fips.*.amazonaws.com'
    #             - '*.dkr.ecr.us-iso-east-1.c2s.ic.gov'
    #             - '*.dkr.ecr.us-isob-east-1.sc2s.sgov.gov'
    #           name: ecr-credential-provider

    # # The `nodeIP` field is used to configure `--node-ip` flag for the kubelet.
    # nodeIP:
    #     # The `validSubnets` field configures the networks to pick kubelet node IP from.
    #     validSubnets:
    #         - 10.0.0.0/8
    #         - '!10.0.0.3/32'
    #         - fdc7::/16

{{< /highlight >}}

FieldTypeDescriptionValue(s)
imagestringThe image field is an optional reference to an alternative kubelet image. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: ghcr.io/siderolabs/kubelet:v1.36.0
{{< /highlight >}}</details>
clusterDNS[]stringThe ClusterDNS field is an optional reference to an alternative kubelet clusterDNS ip list. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
clusterDNS:
- 10.96.0.10
- 169.254.2.53

{{< /highlight >}}</details> | | |extraArgs |Args |The extraArgs field is used to provide additional flags to the kubelet. <details><summary>Show example(s)</summary>{{< highlight yaml >}} extraArgs: key: value {{< /highlight >}}{{< highlight yaml >}} extraArgs: key: - value1 - value2 {{< /highlight >}}</details> | | |extraMounts |<a href="#Config.machine.kubelet.extraMounts.">[]ExtraMount</a> |The extraMounts field is used to add additional mounts to the kubelet container. Note that either bind or rbind are required in the options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} extraMounts: - destination: /var/lib/example # Destination is the absolute path where the mount will be placed in the container. type: bind # Type specifies the mount kind. source: /var/lib/example # Source specifies the source path of the mount. # Options are fstab style mount options. options: - bind - rshared - rw {{< /highlight >}}</details> | | |extraConfig |Unstructured |The extraConfig field is used to provide kubelet configuration overrides.

Some fields are not allowed to be overridden: authentication and authorization, cgroups configuration, ports, etc. <details><summary>Show example(s)</summary>{{< highlight yaml >}} extraConfig: serverTLSBootstrap: true {{< /highlight >}}</details> | | |credentialProviderConfig |Unstructured |The KubeletCredentialProviderConfig field is used to provide kubelet credential configuration. <details><summary>Show example(s)</summary>{{< highlight yaml >}} credentialProviderConfig: apiVersion: kubelet.config.k8s.io/v1 kind: CredentialProviderConfig providers: - apiVersion: credentialprovider.kubelet.k8s.io/v1 defaultCacheDuration: 12h matchImages: - '.dkr.ecr..amazonaws.com' - '.dkr.ecr..amazonaws.com.cn' - '.dkr.ecr-fips..amazonaws.com' - '.dkr.ecr.us-iso-east-1.c2s.ic.gov' - '.dkr.ecr.us-isob-east-1.sc2s.sgov.gov' name: ecr-credential-provider {{< /highlight >}}</details> | | |defaultRuntimeSeccompProfileEnabled |bool |Enable container runtime default Seccomp profile. |true yes false no | |registerWithFQDN |bool |The registerWithFQDN field is used to force kubelet to use the node FQDN for registration. This is required in clouds like AWS. |true yes false no | |nodeIP |<a href="#Config.machine.kubelet.nodeIP">KubeletNodeIPConfig</a> |The nodeIP field is used to configure --node-ip flag for the kubelet. This is used when a node has multiple addresses to choose from. <details><summary>Show example(s)</summary>{{< highlight yaml >}} nodeIP: # The validSubnets field configures the networks to pick kubelet node IP from. validSubnets: - 10.0.0.0/8 - '!10.0.0.3/32' - fdc7::/16 {{< /highlight >}}</details> | | |skipNodeRegistration |bool |The skipNodeRegistration is used to run the kubelet without registering with the apiserver. This runs kubelet as standalone and only runs static pods. |true yes false no | |disableManifestsDirectory |bool |The disableManifestsDirectory field configures the kubelet to get static pod manifests from the /etc/kubernetes/manifests directory. It's recommended to configure static pods with the "pods" key instead. |true yes false no |

extraMounts[] {#Config.machine.kubelet.extraMounts.}

ExtraMount wraps OCI Mount specification.

{{< highlight yaml >}} machine: kubelet: extraMounts: - destination: /var/lib/example # Destination is the absolute path where the mount will be placed in the container. type: bind # Type specifies the mount kind. source: /var/lib/example # Source specifies the source path of the mount. # Options are fstab style mount options. options: - bind - rshared - rw {{< /highlight >}}

FieldTypeDescriptionValue(s)
destinationstringDestination is the absolute path where the mount will be placed in the container.
typestringType specifies the mount kind.
sourcestringSource specifies the source path of the mount.
options[]stringOptions are fstab style mount options.
uidMappings<a href="#Config.machine.kubelet.extraMounts..uidMappings.">[]LinuxIDMapping</a>UID/GID mappings used for changing file owners w/o calling chown, fs should support it.

Every mount point could have its own mapping. | | |gidMappings |<a href="#Config.machine.kubelet.extraMounts..gidMappings.">[]LinuxIDMapping</a> |UID/GID mappings used for changing file owners w/o calling chown, fs should support it.

Every mount point could have its own mapping. | |

uidMappings[] {#Config.machine.kubelet.extraMounts..uidMappings.}

LinuxIDMapping represents the Linux ID mapping.

FieldTypeDescriptionValue(s)
containerIDuint32ContainerID is the starting UID/GID in the container.
hostIDuint32HostID is the starting UID/GID on the host to be mapped to 'ContainerID'.
sizeuint32Size is the number of IDs to be mapped.
gidMappings[] {#Config.machine.kubelet.extraMounts..gidMappings.}

LinuxIDMapping represents the Linux ID mapping.

FieldTypeDescriptionValue(s)
containerIDuint32ContainerID is the starting UID/GID in the container.
hostIDuint32HostID is the starting UID/GID on the host to be mapped to 'ContainerID'.
sizeuint32Size is the number of IDs to be mapped.

nodeIP {#Config.machine.kubelet.nodeIP}

KubeletNodeIPConfig represents the kubelet node IP configuration.

{{< highlight yaml >}} machine: kubelet: nodeIP: # The validSubnets field configures the networks to pick kubelet node IP from. validSubnets: - 10.0.0.0/8 - '!10.0.0.3/32' - fdc7::/16 {{< /highlight >}}

FieldTypeDescriptionValue(s)
validSubnets[]stringThe validSubnets field configures the networks to pick kubelet node IP from.
For dual stack configuration, there should be two subnets: one for IPv4, another for IPv6.
IPs can be excluded from the list by using negative match with !, e.g !10.0.0.0/8.
Negative subnet matches should be specified last to filter out IPs picked by positive matches.
If not specified, node IP is picked based on cluster podCIDRs: IPv4/IPv6 address or both.

install {#Config.machine.install}

InstallConfig represents the installation options for preparing a node.

{{< highlight yaml >}} machine: install: disk: /dev/sda # The disk used for installations. image: ghcr.io/siderolabs/installer:latest # Allows for supplying the image used to perform the installation. wipe: false # Indicates if the installation disk should be wiped at installation time. grubUseUKICmdline: true # Indicates if legacy GRUB bootloader should use kernel cmdline from the UKI instead of building it on the host.

    # # Look up disk using disk attributes like model, size, serial and others.
    # diskSelector:
    #     size: 4GB # Disk size.
    #     model: WDC* # Disk model `/sys/block/<dev>/device/model`.
    #     busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0 # Disk bus path.

{{< /highlight >}}

FieldTypeDescriptionValue(s)
diskstringThe disk used for installations. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
disk: /dev/sda
{{< /highlight >}}{{< highlight yaml >}}
disk: /dev/nvme0
{{< /highlight >}}</details>
diskSelector<a href="#Config.machine.install.diskSelector">InstallDiskSelector</a>Look up disk using disk attributes like model, size, serial and others.
Always has priority over disk. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
diskSelector:
size: '>= 1TB' # Disk size.
model: WDC* # Disk model `/sys/block/<dev>/device/model`.

# # Disk bus path.
# busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0
# busPath: /pci0000:00/*

{{< /highlight >}}</details> | | |image |string |Allows for supplying the image used to perform the installation. Image reference for each Talos release can be found on GitHub releases page. <details><summary>Show example(s)</summary>{{< highlight yaml >}} image: ghcr.io/siderolabs/installer:latest {{< /highlight >}}</details> | | |wipe |bool |Indicates if the installation disk should be wiped at installation time. Defaults to true. |true yes false no | |legacyBIOSSupport |bool |Indicates if MBR partition should be marked as bootable (active). Should be enabled only for the systems with legacy BIOS that doesn't support GPT partitioning scheme. | | |grubUseUKICmdline |bool |Indicates if legacy GRUB bootloader should use kernel cmdline from the UKI instead of building it on the host. This changes the way cmdline is managed with GRUB bootloader to be more consistent with UKI/systemd-boot. | |

diskSelector {#Config.machine.install.diskSelector}

InstallDiskSelector represents a disk query parameters for the install disk lookup.

{{< highlight yaml >}} machine: install: diskSelector: size: '>= 1TB' # Disk size. model: WDC* # Disk model /sys/block/<dev>/device/model.

        # # Disk bus path.
        # busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0
        # busPath: /pci0000:00/*

{{< /highlight >}}

FieldTypeDescriptionValue(s)
sizeInstallDiskSizeMatcherDisk size. <details><summary>Show example(s)</summary>Select a disk which size is equal to 4GB.:{{< highlight yaml >}}
size: 4GB
{{< /highlight >}}Select a disk which size is greater than 1TB.:{{< highlight yaml >}}
size: '> 1TB'
{{< /highlight >}}Select a disk which size is less or equal than 2TB.:{{< highlight yaml >}}
size: <= 2TB
{{< /highlight >}}</details>
namestringDisk name /sys/block/<dev>/device/name.
modelstringDisk model /sys/block/<dev>/device/model.
serialstringDisk serial number /sys/block/<dev>/serial.
modaliasstringDisk modalias /sys/block/<dev>/device/modalias.
uuidstringDisk UUID /sys/block/<dev>/uuid.
wwidstringDisk WWID /sys/block/<dev>/wwid.
typeInstallDiskTypeDisk Type.ssd
hdd
nvme
sd
busPathstringDisk bus path. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0
{{< /highlight >}}{{< highlight yaml >}}
busPath: /pci0000:00/*
{{< /highlight >}}</details>

files[] {#Config.machine.files.}

MachineFile represents a file to write to disk.

{{< highlight yaml >}} machine: files: - content: '...' # The contents of the file. permissions: 0o666 # The file's permissions in octal. path: /tmp/file.txt # The path of the file. op: append # The operation to use {{< /highlight >}}

FieldTypeDescriptionValue(s)
contentstringThe contents of the file.
permissionsFileModeThe file's permissions in octal.
pathstringThe path of the file.
opstringThe operation to usecreate
append
overwrite

features {#Config.machine.features}

FeaturesConfig describes individual Talos features that can be switched on or off.

{{< highlight yaml >}} machine: features: diskQuotaSupport: true # Enable XFS project quota support for EPHEMERAL partition and user disks.

    # # Configure Talos API access from Kubernetes pods.
    # kubernetesTalosAPIAccess:
    #     enabled: true # Enable Talos API access from Kubernetes pods.
    #     # The list of Talos API roles which can be granted for access from Kubernetes pods.
    #     allowedRoles:
    #         - os:reader
    #     # The list of Kubernetes namespaces Talos API access is available from.
    #     allowedKubernetesNamespaces:
    #         - kube-system

{{< /highlight >}}

FieldTypeDescriptionValue(s)
kubernetesTalosAPIAccess<a href="#Config.machine.features.kubernetesTalosAPIAccess">KubernetesTalosAPIAccessConfig</a>Configure Talos API access from Kubernetes pods.

This feature is disabled if the feature config is not specified. <details><summary>Show example(s)</summary>{{< highlight yaml >}} kubernetesTalosAPIAccess: enabled: true # Enable Talos API access from Kubernetes pods. # The list of Talos API roles which can be granted for access from Kubernetes pods. allowedRoles: - os:reader # The list of Kubernetes namespaces Talos API access is available from. allowedKubernetesNamespaces: - kube-system {{< /highlight >}}</details> | | |diskQuotaSupport |bool |Enable XFS project quota support for EPHEMERAL partition and user disks. Also enables kubelet tracking of ephemeral disk usage in the kubelet via quota. | | |kubePrism |<a href="#Config.machine.features.kubePrism">KubePrism</a> |KubePrism - local proxy/load balancer on defined port that will distribute requests to all API servers in the cluster. | | |hostDNS |<a href="#Config.machine.features.hostDNS">HostDNSConfig</a> |Configures host DNS caching resolver. | | |imageCache |<a href="#Config.machine.features.imageCache">ImageCacheConfig</a> |Enable Image Cache feature. | | |nodeAddressSortAlgorithm |string |Select the node address sort algorithm. The 'v1' algorithm sorts addresses by the address itself. The 'v2' algorithm prefers more specific prefixes. If unset, defaults to 'v1'. | |

kubernetesTalosAPIAccess {#Config.machine.features.kubernetesTalosAPIAccess}

KubernetesTalosAPIAccessConfig describes the configuration for the Talos API access from Kubernetes pods.

{{< highlight yaml >}} machine: features: kubernetesTalosAPIAccess: enabled: true # Enable Talos API access from Kubernetes pods. # The list of Talos API roles which can be granted for access from Kubernetes pods. allowedRoles: - os:reader # The list of Kubernetes namespaces Talos API access is available from. allowedKubernetesNamespaces: - kube-system {{< /highlight >}}

FieldTypeDescriptionValue(s)
enabledboolEnable Talos API access from Kubernetes pods.
allowedRoles[]stringThe list of Talos API roles which can be granted for access from Kubernetes pods.

Empty list means that no roles can be granted, so access is blocked. | | |allowedKubernetesNamespaces |[]string |The list of Kubernetes namespaces Talos API access is available from. | |

kubePrism {#Config.machine.features.kubePrism}

KubePrism describes the configuration for the KubePrism load balancer.

FieldTypeDescriptionValue(s)
enabledboolEnable KubePrism support - will start local load balancing proxy.
portintKubePrism port.

hostDNS {#Config.machine.features.hostDNS}

HostDNSConfig describes the configuration for the host DNS resolver.

FieldTypeDescriptionValue(s)
enabledboolEnable host DNS caching resolver.
forwardKubeDNSToHostboolUse the host DNS resolver as upstream for Kubernetes CoreDNS pods.

When enabled, CoreDNS pods use host DNS server as the upstream DNS (instead of using configured upstream DNS resolvers directly). | | |resolveMemberNames |bool |Resolve member hostnames using the host DNS resolver.

When enabled, cluster member hostnames and node names are resolved using the host DNS resolver. This requires service discovery to be enabled. | |

imageCache {#Config.machine.features.imageCache}

ImageCacheConfig describes the configuration for the Image Cache feature.

FieldTypeDescriptionValue(s)
localEnabledboolEnable local image cache.

udev {#Config.machine.udev}

UdevConfig describes how the udev system should be configured.

{{< highlight yaml >}} machine: udev: # List of udev rules to apply to the udev system rules: - SUBSYSTEM=="drm", KERNEL=="renderD*", GROUP="44", MODE="0660" {{< /highlight >}}

FieldTypeDescriptionValue(s)
rules[]stringList of udev rules to apply to the udev system

logging {#Config.machine.logging}

LoggingConfig struct configures Talos logging.

{{< highlight yaml >}} machine: logging: # Logging destination. destinations: - endpoint: tcp://1.2.3.4:12345 # Where to send logs. Supported protocols are "tcp" and "udp". format: json_lines # Logs format. {{< /highlight >}}

FieldTypeDescriptionValue(s)
destinations<a href="#Config.machine.logging.destinations.">[]LoggingDestination</a>Logging destination.

destinations[] {#Config.machine.logging.destinations.}

LoggingDestination struct configures Talos logging destination.

FieldTypeDescriptionValue(s)
endpoint<a href="#Config.machine.logging.destinations..endpoint">Endpoint</a>Where to send logs. Supported protocols are "tcp" and "udp". <details><summary>Show example(s)</summary>{{< highlight yaml >}}
endpoint: udp://127.0.0.1:12345
{{< /highlight >}}{{< highlight yaml >}}
endpoint: tcp://1.2.3.4:12345
{{< /highlight >}}</details>
formatstringLogs format.json_lines
extraTagsmap[string]stringExtra tags (key-value) pairs to attach to every log message sent.
endpoint {#Config.machine.logging.destinations..endpoint}

Endpoint represents the endpoint URL parsed out of the machine config.

{{< highlight yaml >}} machine: logging: destinations: - endpoint: https://1.2.3.4:6443 {{< /highlight >}}

{{< highlight yaml >}} machine: logging: destinations: - endpoint: https://cluster1.internal:6443 {{< /highlight >}}

{{< highlight yaml >}} machine: logging: destinations: - endpoint: udp://127.0.0.1:12345 {{< /highlight >}}

{{< highlight yaml >}} machine: logging: destinations: - endpoint: tcp://1.2.3.4:12345 {{< /highlight >}}

FieldTypeDescriptionValue(s)

kernel {#Config.machine.kernel}

KernelConfig struct configures Talos Linux kernel.

{{< highlight yaml >}} machine: kernel: # Kernel modules to load. modules: - name: btrfs # Module name. {{< /highlight >}}

FieldTypeDescriptionValue(s)
modules<a href="#Config.machine.kernel.modules.">[]KernelModuleConfig</a>Kernel modules to load.

modules[] {#Config.machine.kernel.modules.}

KernelModuleConfig struct configures Linux kernel modules to load.

FieldTypeDescriptionValue(s)
namestringModule name.
parameters[]stringModule parameters, changes applied after reboot.

seccompProfiles[] {#Config.machine.seccompProfiles.}

MachineSeccompProfile defines seccomp profiles for the machine.

{{< highlight yaml >}} machine: seccompProfiles: - name: audit.json # The name field is used to provide the file name of the seccomp profile. # The value field is used to provide the seccomp profile. value: defaultAction: SCMP_ACT_LOG {{< /highlight >}}

FieldTypeDescriptionValue(s)
namestringThe name field is used to provide the file name of the seccomp profile.
valueUnstructuredThe value field is used to provide the seccomp profile.

cluster {#Config.cluster}

ClusterConfig represents the cluster-wide config values.

{{< highlight yaml >}} cluster: # ControlPlaneConfig represents the control plane configuration options. controlPlane: endpoint: https://1.2.3.4 # Endpoint is the canonical controlplane endpoint, which can be an IP address or a DNS hostname. localAPIServerPort: 443 # The port that the API server listens on internally. clusterName: talos.local # ClusterNetworkConfig represents kube networking configuration options. network: # The CNI used. cni: name: flannel # Name of CNI to use. dnsDomain: cluster.local # The domain used by Kubernetes DNS. # The pod subnet CIDR. podSubnets: - 10.244.0.0/16 # The service subnet CIDR. serviceSubnets: - 10.96.0.0/12 {{< /highlight >}}

FieldTypeDescriptionValue(s)
idstringGlobally unique identifier for this cluster (base64 encoded random 32 bytes).
secretstringShared secret of cluster (base64 encoded random 32 bytes).
This secret is shared among cluster members but should never be sent over the network.
controlPlane<a href="#Config.cluster.controlPlane">ControlPlaneConfig</a>Provides control plane specific configuration options. <details><summary>Show example(s)</summary>Setting controlplane endpoint address to 1.2.3.4 and port to 443 example.:{{< highlight yaml >}}
controlPlane:
endpoint: https://1.2.3.4 # Endpoint is the canonical controlplane endpoint, which can be an IP address or a DNS hostname.
localAPIServerPort: 443 # The port that the API server listens on internally.

{{< /highlight >}}</details> | | |clusterName |string |Configures the cluster's name. | | |network |<a href="#Config.cluster.network">ClusterNetworkConfig</a> |Provides cluster specific network configuration options. <details><summary>Show example(s)</summary>Configuring with flannel CNI and setting up subnets.:{{< highlight yaml >}} network: # The CNI used. cni: name: flannel # Name of CNI to use. dnsDomain: cluster.local # The domain used by Kubernetes DNS. # The pod subnet CIDR. podSubnets: - 10.244.0.0/16 # The service subnet CIDR. serviceSubnets: - 10.96.0.0/12 {{< /highlight >}}</details> | | |token |string |The bootstrap token used to join the cluster. <details><summary>Show example(s)</summary>Bootstrap token example (do not use in production!).:{{< highlight yaml >}} token: wlzjyw.bei2zfylhs2by0wd {{< /highlight >}}</details> | | |aescbcEncryptionSecret |string |A key used for the encryption of secret data at rest. Enables encryption with AESCBC. <details><summary>Show example(s)</summary>Decryption secret example (do not use in production!).:{{< highlight yaml >}} aescbcEncryptionSecret: z01mye6j16bspJYtTB/5SFX8j7Ph4JXxM2Xuu4vsBPM= {{< /highlight >}}</details> | | |secretboxEncryptionSecret |string |A key used for the encryption of secret data at rest. Enables encryption with secretbox. Secretbox has precedence over AESCBC. <details><summary>Show example(s)</summary>Decryption secret example (do not use in production!).:{{< highlight yaml >}} secretboxEncryptionSecret: z01mye6j16bspJYtTB/5SFX8j7Ph4JXxM2Xuu4vsBPM= {{< /highlight >}}</details> | | |ca |PEMEncodedCertificateAndKey |The base64 encoded root certificate authority used by Kubernetes. <details><summary>Show example(s)</summary>ClusterCA example.:{{< highlight yaml >}} ca: crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t key: LS0tIEVYQU1QTEUgS0VZIC0tLQ== {{< /highlight >}}</details> | | |acceptedCAs |[]PEMEncodedCertificate |The list of base64 encoded accepted certificate authorities used by Kubernetes. | | |aggregatorCA |PEMEncodedCertificateAndKey |The base64 encoded aggregator certificate authority used by Kubernetes for front-proxy certificate generation.

This CA can be self-signed. <details><summary>Show example(s)</summary>AggregatorCA example.:{{< highlight yaml >}} aggregatorCA: crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t key: LS0tIEVYQU1QTEUgS0VZIC0tLQ== {{< /highlight >}}</details> | | |serviceAccount |PEMEncodedKey |The base64 encoded private key for service account token generation. <details><summary>Show example(s)</summary>AggregatorCA example.:{{< highlight yaml >}} serviceAccount: key: LS0tIEVYQU1QTEUgS0VZIC0tLQ== {{< /highlight >}}</details> | | |apiServer |<a href="#Config.cluster.apiServer">APIServerConfig</a> |API server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} apiServer: image: registry.k8s.io/kube-apiserver:v1.36.0 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true http2-max-streams-per-connection: "32" # Extra certificate subject alternative names for the API server's certificate. certSANs: - 1.2.3.4 - 4.5.6.7

# # Configure the API server admission plugins.
# admissionControl:
#     - name: PodSecurity # Name is the name of the admission controller.
#       # Configuration is an embedded configuration object to be used as the plugin's
#       configuration:
#         apiVersion: pod-security.admission.config.k8s.io/v1alpha1
#         defaults:
#             audit: restricted
#             audit-version: latest
#             enforce: baseline
#             enforce-version: latest
#             warn: restricted
#             warn-version: latest
#         exemptions:
#             namespaces:
#                 - kube-system
#             runtimeClasses: []
#             usernames: []
#         kind: PodSecurityConfiguration

# # Configure the API server audit policy.
# auditPolicy:
#     apiVersion: audit.k8s.io/v1
#     kind: Policy
#     rules:
#         - level: Metadata

# # Configure the API server authorization config. Node and RBAC authorizers are always added irrespective of the configuration.
# authorizationConfig:
#     - type: Webhook # Type is the name of the authorizer. Allowed values are `Node`, `RBAC`, and `Webhook`.
#       name: webhook # Name is used to describe the authorizer.
#       # webhook is the configuration for the webhook authorizer.
#       webhook:
#         connectionInfo:
#             type: InClusterConfig
#         failurePolicy: Deny
#         matchConditionSubjectAccessReviewVersion: v1
#         matchConditions:
#             - expression: has(request.resourceAttributes)
#             - expression: '!(\''system:serviceaccounts:kube-system\'' in request.groups)'
#         subjectAccessReviewVersion: v1
#         timeout: 3s
#     - type: Webhook # Type is the name of the authorizer. Allowed values are `Node`, `RBAC`, and `Webhook`.
#       name: in-cluster-authorizer # Name is used to describe the authorizer.
#       # webhook is the configuration for the webhook authorizer.
#       webhook:
#         connectionInfo:
#             type: InClusterConfig
#         failurePolicy: NoOpinion
#         matchConditionSubjectAccessReviewVersion: v1
#         subjectAccessReviewVersion: v1
#         timeout: 3s

{{< /highlight >}}</details> | | |controllerManager |<a href="#Config.cluster.controllerManager">ControllerManagerConfig</a> |Controller manager server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} controllerManager: image: registry.k8s.io/kube-controller-manager:v1.36.0 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}</details> | | |proxy |<a href="#Config.cluster.proxy">ProxyConfig</a> |Kube-proxy server-specific configuration options <details><summary>Show example(s)</summary>{{< highlight yaml >}} proxy: image: registry.k8s.io/kube-proxy:v1.36.0 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: proxy-mode: iptables

# # Disable kube-proxy deployment on cluster bootstrap.
# disabled: false

{{< /highlight >}}</details> | | |scheduler |<a href="#Config.cluster.scheduler">SchedulerConfig</a> |Scheduler server specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} scheduler: image: registry.k8s.io/kube-scheduler:v1.36.0 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true {{< /highlight >}}</details> | | |discovery |<a href="#Config.cluster.discovery">ClusterDiscoveryConfig</a> |Configures cluster member discovery. <details><summary>Show example(s)</summary>{{< highlight yaml >}} discovery: enabled: true # Enable the cluster membership discovery feature. # Configure registries used for cluster member discovery. registries: # Kubernetes registry uses Kubernetes API server to discover cluster members and stores additional information kubernetes: {} # Service registry is using an external service to push and pull information about cluster members. service: endpoint: https://discovery.talos.dev/ # External service endpoint. {{< /highlight >}}</details> | | |etcd |<a href="#Config.cluster.etcd">EtcdConfig</a> |Etcd specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} etcd: image: registry.k8s.io/etcd:v3.6.9 # The container image used to create the etcd service. # The ca is the root certificate authority of the PKI. ca: crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t key: LS0tIEVYQU1QTEUgS0VZIC0tLQ== # Extra arguments to supply to etcd. extraArgs: election-timeout: "5000"

# # The `advertisedSubnets` field configures the networks to pick etcd advertised IP from.
# advertisedSubnets:
#     - 10.0.0.0/8

{{< /highlight >}}</details> | | |coreDNS |<a href="#Config.cluster.coreDNS">CoreDNS</a> |Core DNS specific configuration options. <details><summary>Show example(s)</summary>{{< highlight yaml >}} coreDNS: image: registry.k8s.io/coredns/coredns:v1.14.2 # The image field is an override to the default coredns image. {{< /highlight >}}</details> | | |externalCloudProvider |<a href="#Config.cluster.externalCloudProvider">ExternalCloudProviderConfig</a> |External cloud provider configuration. <details><summary>Show example(s)</summary>{{< highlight yaml >}} externalCloudProvider: enabled: true # Enable external cloud provider. # A list of urls that point to additional manifests for an external cloud provider. manifests: - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/rbac.yaml - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/aws-cloud-controller-manager-daemonset.yaml {{< /highlight >}}</details> | | |extraManifests |[]string |A list of urls that point to additional manifests. These will get automatically deployed as part of the bootstrap. <details><summary>Show example(s)</summary>{{< highlight yaml >}} extraManifests: - https://www.example.com/manifest1.yaml - https://www.example.com/manifest2.yaml {{< /highlight >}}</details> | | |extraManifestHeaders |map[string]string |A map of key value pairs that will be added while fetching the extraManifests. <details><summary>Show example(s)</summary>{{< highlight yaml >}} extraManifestHeaders: Token: "1234567" X-ExtraInfo: info {{< /highlight >}}</details> | | |inlineManifests |<a href="#Config.cluster.inlineManifests.">[]ClusterInlineManifest</a> |A list of inline Kubernetes manifests. These will get automatically deployed as part of the bootstrap. <details><summary>Show example(s)</summary>{{< highlight yaml >}} inlineManifests: - name: namespace-ci # Name of the manifest. contents: |- # Manifest contents as a string. apiVersion: v1 kind: Namespace metadata: name: ci {{< /highlight >}}</details> | | |adminKubeconfig |<a href="#Config.cluster.adminKubeconfig">AdminKubeconfigConfig</a> |Settings for admin kubeconfig generation. Certificate lifetime can be configured. <details><summary>Show example(s)</summary>{{< highlight yaml >}} adminKubeconfig: certLifetime: 1h0m0s # Admin kubeconfig certificate lifetime (default is 1 year). {{< /highlight >}}</details> | | |allowSchedulingOnControlPlanes |bool |Allows running workload on control-plane nodes. <details><summary>Show example(s)</summary>{{< highlight yaml >}} allowSchedulingOnControlPlanes: true {{< /highlight >}}</details> |true yes false no |

controlPlane {#Config.cluster.controlPlane}

ControlPlaneConfig represents the control plane configuration options.

{{< highlight yaml >}} cluster: controlPlane: endpoint: https://1.2.3.4 # Endpoint is the canonical controlplane endpoint, which can be an IP address or a DNS hostname. localAPIServerPort: 443 # The port that the API server listens on internally. {{< /highlight >}}

FieldTypeDescriptionValue(s)
endpoint<a href="#Config.cluster.controlPlane.endpoint">Endpoint</a>Endpoint is the canonical controlplane endpoint, which can be an IP address or a DNS hostname.
It is single-valued, and may optionally include a port number. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
endpoint: https://1.2.3.4:6443
{{< /highlight >}}{{< highlight yaml >}}
endpoint: https://cluster1.internal:6443
{{< /highlight >}}</details>
localAPIServerPortintThe port that the API server listens on internally.
This may be different than the port portion listed in the endpoint field above.
The default is 6443.

endpoint {#Config.cluster.controlPlane.endpoint}

Endpoint represents the endpoint URL parsed out of the machine config.

{{< highlight yaml >}} cluster: controlPlane: endpoint: https://1.2.3.4:6443 {{< /highlight >}}

{{< highlight yaml >}} cluster: controlPlane: endpoint: https://cluster1.internal:6443 {{< /highlight >}}

{{< highlight yaml >}} cluster: controlPlane: endpoint: udp://127.0.0.1:12345 {{< /highlight >}}

{{< highlight yaml >}} cluster: controlPlane: endpoint: tcp://1.2.3.4:12345 {{< /highlight >}}

FieldTypeDescriptionValue(s)

network {#Config.cluster.network}

ClusterNetworkConfig represents kube networking configuration options.

{{< highlight yaml >}} cluster: network: # The CNI used. cni: name: flannel # Name of CNI to use. dnsDomain: cluster.local # The domain used by Kubernetes DNS. # The pod subnet CIDR. podSubnets: - 10.244.0.0/16 # The service subnet CIDR. serviceSubnets: - 10.96.0.0/12 {{< /highlight >}}

FieldTypeDescriptionValue(s)
cni<a href="#Config.cluster.network.cni">CNIConfig</a>The CNI used.
Composed of "name" and "urls".
The "name" key supports the following options: "flannel", "custom", and "none".
"flannel" uses Talos-managed Flannel CNI, and that's the default option.
"custom" uses custom manifests that should be provided in "urls".
"none" indicates that Talos will not manage any CNI installation. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
cni:
name: custom # Name of CNI to use.
# URLs containing manifests to apply for the CNI.
urls:
    - https://docs.projectcalico.org/archive/v3.20/manifests/canal.yaml

{{< /highlight >}}</details> | | |dnsDomain |string |The domain used by Kubernetes DNS. The default is cluster.local <details><summary>Show example(s)</summary>{{< highlight yaml >}} dnsDomain: cluster.local {{< /highlight >}}</details> | | |podSubnets |[]string |The pod subnet CIDR. <details><summary>Show example(s)</summary>{{< highlight yaml >}} podSubnets: - 10.244.0.0/16 {{< /highlight >}}</details> | | |serviceSubnets |[]string |The service subnet CIDR. <details><summary>Show example(s)</summary>{{< highlight yaml >}} serviceSubnets: - 10.96.0.0/12 {{< /highlight >}}</details> | |

cni {#Config.cluster.network.cni}

CNIConfig represents the CNI configuration options.

{{< highlight yaml >}} cluster: network: cni: name: custom # Name of CNI to use. # URLs containing manifests to apply for the CNI. urls: - https://docs.projectcalico.org/archive/v3.20/manifests/canal.yaml {{< /highlight >}}

FieldTypeDescriptionValue(s)
namestringName of CNI to use.flannel
custom
none
urls[]stringURLs containing manifests to apply for the CNI.
Should be present for "custom", must be empty for "flannel" and "none".
flannel<a href="#Config.cluster.network.cni.flannel">FlannelCNIConfig</a>description:
Flannel configuration options.
flannel {#Config.cluster.network.cni.flannel}

FlannelCNIConfig represents the Flannel CNI configuration options.

FieldTypeDescriptionValue(s)
extraArgs[]stringExtra arguments for 'flanneld'. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
extraArgs:
- --iface-can-reach=192.168.1.1

{{< /highlight >}}</details> | | |kubeNetworkPoliciesEnabled |bool |Deploys kube-network-policies along with Flannel.

This enables Kubernetes Network Policies support in the cluster. | |

apiServer {#Config.cluster.apiServer}

APIServerConfig represents the kube apiserver configuration options.

{{< highlight yaml >}} cluster: apiServer: image: registry.k8s.io/kube-apiserver:v1.36.0 # The container image used in the API server manifest. # Extra arguments to supply to the API server. extraArgs: feature-gates: ServerSideApply=true http2-max-streams-per-connection: "32" # Extra certificate subject alternative names for the API server's certificate. certSANs: - 1.2.3.4 - 4.5.6.7

    # # Configure the API server admission plugins.
    # admissionControl:
    #     - name: PodSecurity # Name is the name of the admission controller.
    #       # Configuration is an embedded configuration object to be used as the plugin's
    #       configuration:
    #         apiVersion: pod-security.admission.config.k8s.io/v1alpha1
    #         defaults:
    #             audit: restricted
    #             audit-version: latest
    #             enforce: baseline
    #             enforce-version: latest
    #             warn: restricted
    #             warn-version: latest
    #         exemptions:
    #             namespaces:
    #                 - kube-system
    #             runtimeClasses: []
    #             usernames: []
    #         kind: PodSecurityConfiguration

    # # Configure the API server audit policy.
    # auditPolicy:
    #     apiVersion: audit.k8s.io/v1
    #     kind: Policy
    #     rules:
    #         - level: Metadata

    # # Configure the API server authorization config. Node and RBAC authorizers are always added irrespective of the configuration.
    # authorizationConfig:
    #     - type: Webhook # Type is the name of the authorizer. Allowed values are `Node`, `RBAC`, and `Webhook`.
    #       name: webhook # Name is used to describe the authorizer.
    #       # webhook is the configuration for the webhook authorizer.
    #       webhook:
    #         connectionInfo:
    #             type: InClusterConfig
    #         failurePolicy: Deny
    #         matchConditionSubjectAccessReviewVersion: v1
    #         matchConditions:
    #             - expression: has(request.resourceAttributes)
    #             - expression: '!(\''system:serviceaccounts:kube-system\'' in request.groups)'
    #         subjectAccessReviewVersion: v1
    #         timeout: 3s
    #     - type: Webhook # Type is the name of the authorizer. Allowed values are `Node`, `RBAC`, and `Webhook`.
    #       name: in-cluster-authorizer # Name is used to describe the authorizer.
    #       # webhook is the configuration for the webhook authorizer.
    #       webhook:
    #         connectionInfo:
    #             type: InClusterConfig
    #         failurePolicy: NoOpinion
    #         matchConditionSubjectAccessReviewVersion: v1
    #         subjectAccessReviewVersion: v1
    #         timeout: 3s

{{< /highlight >}}

FieldTypeDescriptionValue(s)
imagestringThe container image used in the API server manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-apiserver:v1.36.0
{{< /highlight >}}</details>
extraArgsArgsExtra arguments to supply to the API server.
extraVolumes<a href="#Config.cluster.apiServer.extraVolumes.">[]VolumeMountConfig</a>Extra volumes to mount to the API server static pod.
envEnvThe env field allows for the addition of environment variables for the control plane component.
certSANs[]stringExtra certificate subject alternative names for the API server's certificate.
admissionControl<a href="#Config.cluster.apiServer.admissionControl.">[]AdmissionPluginConfig</a>Configure the API server admission plugins. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
admissionControl:
- name: PodSecurity # Name is the name of the admission controller.
  # Configuration is an embedded configuration object to be used as the plugin's
  configuration:
    apiVersion: pod-security.admission.config.k8s.io/v1alpha1
    defaults:
        audit: restricted
        audit-version: latest
        enforce: baseline
        enforce-version: latest
        warn: restricted
        warn-version: latest
    exemptions:
        namespaces:
            - kube-system
        runtimeClasses: []
        usernames: []
    kind: PodSecurityConfiguration

{{< /highlight >}}</details> | | |auditPolicy |Unstructured |Configure the API server audit policy. <details><summary>Show example(s)</summary>{{< highlight yaml >}} auditPolicy: apiVersion: audit.k8s.io/v1 kind: Policy rules: - level: Metadata {{< /highlight >}}</details> | | |resources |<a href="#Config.cluster.apiServer.resources">ResourcesConfig</a> |Configure the API server resources. | | |authorizationConfig |<a href="#Config.cluster.apiServer.authorizationConfig.">[]AuthorizationConfigAuthorizerConfig</a> |Configure the API server authorization config. Node and RBAC authorizers are always added irrespective of the configuration. <details><summary>Show example(s)</summary>{{< highlight yaml >}} authorizationConfig: - type: Webhook # Type is the name of the authorizer. Allowed values are Node, RBAC, and Webhook. name: webhook # Name is used to describe the authorizer. # webhook is the configuration for the webhook authorizer. webhook: connectionInfo: type: InClusterConfig failurePolicy: Deny matchConditionSubjectAccessReviewVersion: v1 matchConditions: - expression: has(request.resourceAttributes) - expression: '!(''system:serviceaccounts:kube-system'' in request.groups)' subjectAccessReviewVersion: v1 timeout: 3s - type: Webhook # Type is the name of the authorizer. Allowed values are Node, RBAC, and Webhook. name: in-cluster-authorizer # Name is used to describe the authorizer. # webhook is the configuration for the webhook authorizer. webhook: connectionInfo: type: InClusterConfig failurePolicy: NoOpinion matchConditionSubjectAccessReviewVersion: v1 subjectAccessReviewVersion: v1 timeout: 3s {{< /highlight >}}</details> | |

extraVolumes[] {#Config.cluster.apiServer.extraVolumes.}

VolumeMountConfig struct describes extra volume mount for the static pods.

FieldTypeDescriptionValue(s)
hostPathstringPath on the host. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
hostPath: /var/lib/auth
{{< /highlight >}}</details>
mountPathstringPath in the container. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
mountPath: /etc/kubernetes/auth
{{< /highlight >}}</details>
readonlyboolMount the volume read only. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
readonly: true
{{< /highlight >}}</details>

admissionControl[] {#Config.cluster.apiServer.admissionControl.}

AdmissionPluginConfig represents the API server admission plugin configuration.

{{< highlight yaml >}} cluster: apiServer: admissionControl: - name: PodSecurity # Name is the name of the admission controller. # Configuration is an embedded configuration object to be used as the plugin's configuration: apiVersion: pod-security.admission.config.k8s.io/v1alpha1 defaults: audit: restricted audit-version: latest enforce: baseline enforce-version: latest warn: restricted warn-version: latest exemptions: namespaces: - kube-system runtimeClasses: [] usernames: [] kind: PodSecurityConfiguration {{< /highlight >}}

FieldTypeDescriptionValue(s)
namestringName is the name of the admission controller.
It must match the registered admission plugin name.
configurationUnstructuredConfiguration is an embedded configuration object to be used as the plugin's
configuration.

resources {#Config.cluster.apiServer.resources}

ResourcesConfig represents the pod resources.

FieldTypeDescriptionValue(s)
requestsUnstructuredRequests configures the reserved cpu/memory resources. <details><summary>Show example(s)</summary>resources requests.:{{< highlight yaml >}}
requests:
cpu: 1
memory: 1Gi

{{< /highlight >}}</details> | | |limits |Unstructured |Limits configures the maximum cpu/memory resources a container can use. <details><summary>Show example(s)</summary>resources requests.:{{< highlight yaml >}} limits: cpu: 2 memory: 2500Mi {{< /highlight >}}</details> | |

authorizationConfig[] {#Config.cluster.apiServer.authorizationConfig.}

AuthorizationConfigAuthorizerConfig represents the API server authorization config authorizer configuration.

{{< highlight yaml >}} cluster: apiServer: authorizationConfig: - type: Webhook # Type is the name of the authorizer. Allowed values are Node, RBAC, and Webhook. name: webhook # Name is used to describe the authorizer. # webhook is the configuration for the webhook authorizer. webhook: connectionInfo: type: InClusterConfig failurePolicy: Deny matchConditionSubjectAccessReviewVersion: v1 matchConditions: - expression: has(request.resourceAttributes) - expression: '!(''system:serviceaccounts:kube-system'' in request.groups)' subjectAccessReviewVersion: v1 timeout: 3s - type: Webhook # Type is the name of the authorizer. Allowed values are Node, RBAC, and Webhook. name: in-cluster-authorizer # Name is used to describe the authorizer. # webhook is the configuration for the webhook authorizer. webhook: connectionInfo: type: InClusterConfig failurePolicy: NoOpinion matchConditionSubjectAccessReviewVersion: v1 subjectAccessReviewVersion: v1 timeout: 3s {{< /highlight >}}

FieldTypeDescriptionValue(s)
typestringType is the name of the authorizer. Allowed values are Node, RBAC, and Webhook.
namestringName is used to describe the authorizer.
webhookUnstructuredwebhook is the configuration for the webhook authorizer.

controllerManager {#Config.cluster.controllerManager}

ControllerManagerConfig represents the kube controller manager configuration options.

{{< highlight yaml >}} cluster: controllerManager: image: registry.k8s.io/kube-controller-manager:v1.36.0 # The container image used in the controller manager manifest. # Extra arguments to supply to the controller manager. extraArgs: feature-gates: ServerSideApply=true {{< /highlight >}}

FieldTypeDescriptionValue(s)
imagestringThe container image used in the controller manager manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-controller-manager:v1.36.0
{{< /highlight >}}</details>
extraArgsArgsExtra arguments to supply to the controller manager.
extraVolumes<a href="#Config.cluster.controllerManager.extraVolumes.">[]VolumeMountConfig</a>Extra volumes to mount to the controller manager static pod.
envEnvThe env field allows for the addition of environment variables for the control plane component.
resources<a href="#Config.cluster.controllerManager.resources">ResourcesConfig</a>Configure the controller manager resources.

extraVolumes[] {#Config.cluster.controllerManager.extraVolumes.}

VolumeMountConfig struct describes extra volume mount for the static pods.

FieldTypeDescriptionValue(s)
hostPathstringPath on the host. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
hostPath: /var/lib/auth
{{< /highlight >}}</details>
mountPathstringPath in the container. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
mountPath: /etc/kubernetes/auth
{{< /highlight >}}</details>
readonlyboolMount the volume read only. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
readonly: true
{{< /highlight >}}</details>

resources {#Config.cluster.controllerManager.resources}

ResourcesConfig represents the pod resources.

FieldTypeDescriptionValue(s)
requestsUnstructuredRequests configures the reserved cpu/memory resources. <details><summary>Show example(s)</summary>resources requests.:{{< highlight yaml >}}
requests:
cpu: 1
memory: 1Gi

{{< /highlight >}}</details> | | |limits |Unstructured |Limits configures the maximum cpu/memory resources a container can use. <details><summary>Show example(s)</summary>resources requests.:{{< highlight yaml >}} limits: cpu: 2 memory: 2500Mi {{< /highlight >}}</details> | |

proxy {#Config.cluster.proxy}

ProxyConfig represents the kube proxy configuration options.

{{< highlight yaml >}} cluster: proxy: image: registry.k8s.io/kube-proxy:v1.36.0 # The container image used in the kube-proxy manifest. mode: ipvs # proxy mode of kube-proxy. # Extra arguments to supply to kube-proxy. extraArgs: proxy-mode: iptables

    # # Disable kube-proxy deployment on cluster bootstrap.
    # disabled: false

{{< /highlight >}}

FieldTypeDescriptionValue(s)
disabledboolDisable kube-proxy deployment on cluster bootstrap. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
disabled: false
{{< /highlight >}}</details>
imagestringThe container image used in the kube-proxy manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-proxy:v1.36.0
{{< /highlight >}}</details>
modestringproxy mode of kube-proxy.
The default is 'iptables'.
extraArgsArgsExtra arguments to supply to kube-proxy.

scheduler {#Config.cluster.scheduler}

SchedulerConfig represents the kube scheduler configuration options.

{{< highlight yaml >}} cluster: scheduler: image: registry.k8s.io/kube-scheduler:v1.36.0 # The container image used in the scheduler manifest. # Extra arguments to supply to the scheduler. extraArgs: feature-gates: AllBeta=true {{< /highlight >}}

FieldTypeDescriptionValue(s)
imagestringThe container image used in the scheduler manifest. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/kube-scheduler:v1.36.0
{{< /highlight >}}</details>
extraArgsArgsExtra arguments to supply to the scheduler.
extraVolumes<a href="#Config.cluster.scheduler.extraVolumes.">[]VolumeMountConfig</a>Extra volumes to mount to the scheduler static pod.
envEnvThe env field allows for the addition of environment variables for the control plane component.
resources<a href="#Config.cluster.scheduler.resources">ResourcesConfig</a>Configure the scheduler resources.
configUnstructuredSpecify custom kube-scheduler configuration.

extraVolumes[] {#Config.cluster.scheduler.extraVolumes.}

VolumeMountConfig struct describes extra volume mount for the static pods.

FieldTypeDescriptionValue(s)
hostPathstringPath on the host. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
hostPath: /var/lib/auth
{{< /highlight >}}</details>
mountPathstringPath in the container. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
mountPath: /etc/kubernetes/auth
{{< /highlight >}}</details>
readonlyboolMount the volume read only. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
readonly: true
{{< /highlight >}}</details>

resources {#Config.cluster.scheduler.resources}

ResourcesConfig represents the pod resources.

FieldTypeDescriptionValue(s)
requestsUnstructuredRequests configures the reserved cpu/memory resources. <details><summary>Show example(s)</summary>resources requests.:{{< highlight yaml >}}
requests:
cpu: 1
memory: 1Gi

{{< /highlight >}}</details> | | |limits |Unstructured |Limits configures the maximum cpu/memory resources a container can use. <details><summary>Show example(s)</summary>resources requests.:{{< highlight yaml >}} limits: cpu: 2 memory: 2500Mi {{< /highlight >}}</details> | |

discovery {#Config.cluster.discovery}

ClusterDiscoveryConfig struct configures cluster membership discovery.

{{< highlight yaml >}} cluster: discovery: enabled: true # Enable the cluster membership discovery feature. # Configure registries used for cluster member discovery. registries: # Kubernetes registry uses Kubernetes API server to discover cluster members and stores additional information kubernetes: {} # Service registry is using an external service to push and pull information about cluster members. service: endpoint: https://discovery.talos.dev/ # External service endpoint. {{< /highlight >}}

FieldTypeDescriptionValue(s)
enabledboolEnable the cluster membership discovery feature.
Cluster discovery is based on individual registries which are configured under the registries field.
registries<a href="#Config.cluster.discovery.registries">DiscoveryRegistriesConfig</a>Configure registries used for cluster member discovery.

registries {#Config.cluster.discovery.registries}

DiscoveryRegistriesConfig struct configures cluster membership discovery.

FieldTypeDescriptionValue(s)
kubernetes<a href="#Config.cluster.discovery.registries.kubernetes">RegistryKubernetesConfig</a>Kubernetes registry uses Kubernetes API server to discover cluster members and stores additional information
as annotations on the Node resources.

This feature is deprecated as it is not compatible with Kubernetes 1.32+. See https://github.com/siderolabs/talos/issues/9980 for more information. | | |service |<a href="#Config.cluster.discovery.registries.service">RegistryServiceConfig</a> |Service registry is using an external service to push and pull information about cluster members. | |

kubernetes {#Config.cluster.discovery.registries.kubernetes}

RegistryKubernetesConfig struct configures Kubernetes discovery registry.

FieldTypeDescriptionValue(s)
disabledboolDisable Kubernetes discovery registry.
service {#Config.cluster.discovery.registries.service}

RegistryServiceConfig struct configures Kubernetes discovery registry.

FieldTypeDescriptionValue(s)
disabledboolDisable external service discovery registry.
endpointstringExternal service endpoint. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
endpoint: https://discovery.talos.dev/
{{< /highlight >}}</details>

etcd {#Config.cluster.etcd}

EtcdConfig represents the etcd configuration options.

{{< highlight yaml >}} cluster: etcd: image: registry.k8s.io/etcd:v3.6.9 # The container image used to create the etcd service. # The ca is the root certificate authority of the PKI. ca: crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t key: LS0tIEVYQU1QTEUgS0VZIC0tLQ== # Extra arguments to supply to etcd. extraArgs: election-timeout: "5000"

    # # The `advertisedSubnets` field configures the networks to pick etcd advertised IP from.
    # advertisedSubnets:
    #     - 10.0.0.0/8

{{< /highlight >}}

FieldTypeDescriptionValue(s)
imagestringThe container image used to create the etcd service. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
image: registry.k8s.io/etcd:v3.6.9
{{< /highlight >}}</details>
caPEMEncodedCertificateAndKeyThe ca is the root certificate authority of the PKI.
It is composed of a base64 encoded crt and key. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
ca:
crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t
key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==

{{< /highlight >}}</details> | | |extraArgs |Args |Extra arguments to supply to etcd. Note that the following args are not allowed:

  • name
  • data-dir
  • initial-cluster-state
  • listen-peer-urls
  • listen-client-urls
  • cert-file
  • key-file
  • trusted-ca-file
  • peer-client-cert-auth
  • peer-cert-file
  • peer-trusted-ca-file
  • peer-key-file | | |advertisedSubnets |[]string |The advertisedSubnets field configures the networks to pick etcd advertised IP from.

IPs can be excluded from the list by using negative match with !, e.g !10.0.0.0/8. Negative subnet matches should be specified last to filter out IPs picked by positive matches. If not specified, advertised IP is selected as the first routable address of the node. <details><summary>Show example(s)</summary>{{< highlight yaml >}} advertisedSubnets: - 10.0.0.0/8 {{< /highlight >}}</details> | | |listenSubnets |[]string |The listenSubnets field configures the networks for the etcd to listen for peer and client connections.

If listenSubnets is not set, but advertisedSubnets is set, listenSubnets defaults to advertisedSubnets.

If neither advertisedSubnets nor listenSubnets is set, listenSubnets defaults to listen on all addresses.

IPs can be excluded from the list by using negative match with !, e.g !10.0.0.0/8. Negative subnet matches should be specified last to filter out IPs picked by positive matches. If not specified, advertised IP is selected as the first routable address of the node. | |

coreDNS {#Config.cluster.coreDNS}

CoreDNS represents the CoreDNS config values.

{{< highlight yaml >}} cluster: coreDNS: image: registry.k8s.io/coredns/coredns:v1.14.2 # The image field is an override to the default coredns image. {{< /highlight >}}

FieldTypeDescriptionValue(s)
disabledboolDisable coredns deployment on cluster bootstrap.
imagestringThe image field is an override to the default coredns image.

externalCloudProvider {#Config.cluster.externalCloudProvider}

ExternalCloudProviderConfig contains external cloud provider configuration.

{{< highlight yaml >}} cluster: externalCloudProvider: enabled: true # Enable external cloud provider. # A list of urls that point to additional manifests for an external cloud provider. manifests: - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/rbac.yaml - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/aws-cloud-controller-manager-daemonset.yaml {{< /highlight >}}

FieldTypeDescriptionValue(s)
enabledboolEnable external cloud provider.true
yes
false
no
manifests[]stringA list of urls that point to additional manifests for an external cloud provider.
These will get automatically deployed as part of the bootstrap. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
manifests:
- https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/rbac.yaml
- https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/aws-cloud-controller-manager-daemonset.yaml

{{< /highlight >}}</details> | |

inlineManifests[] {#Config.cluster.inlineManifests.}

ClusterInlineManifest struct describes inline bootstrap manifests for the user.

{{< highlight yaml >}} cluster: inlineManifests: - name: namespace-ci # Name of the manifest. contents: |- # Manifest contents as a string. apiVersion: v1 kind: Namespace metadata: name: ci {{< /highlight >}}

FieldTypeDescriptionValue(s)
namestringName of the manifest.
Name should be unique. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
name: csi
{{< /highlight >}}</details>
contentsstringManifest contents as a string. <details><summary>Show example(s)</summary>{{< highlight yaml >}}
contents: /etc/kubernetes/auth
{{< /highlight >}}</details>

adminKubeconfig {#Config.cluster.adminKubeconfig}

AdminKubeconfigConfig contains admin kubeconfig settings.

{{< highlight yaml >}} cluster: adminKubeconfig: certLifetime: 1h0m0s # Admin kubeconfig certificate lifetime (default is 1 year). {{< /highlight >}}

FieldTypeDescriptionValue(s)
certLifetimeDurationAdmin kubeconfig certificate lifetime (default is 1 year).
Field format accepts any Go time.Duration format ('1h' for one hour, '10m' for ten minutes).