| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547 | version: v1alpha1 # Indicates the schema used to decode the contents.debug: false # Enable verbose logging to the console.persist: true # description: |# Provides machine specific configuration options.machine:    type: worker # Defines the role of the machine within the cluster.    token: u7240y.plogoeorz04f09sw # The `token` is used by a machine to join the PKI of the cluster.    # The root certificate authority of the PKI.    ca:        crt: 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        key: ""    # Extra certificate subject alternative names for the machine's certificate.    certSANs: []    #   # Uncomment this to enable SANs.    #   - 10.0.0.10    #   - 172.16.0.10    #   - 192.168.0.10    # Used to provide additional options to the kubelet.    kubelet:        image: ghcr.io/siderolabs/kubelet:v1.28.0 # The `image` field is an optional reference to an alternative kubelet image.        defaultRuntimeSeccompProfileEnabled: true # Enable container runtime default Seccomp profile.        disableManifestsDirectory: true # The `disableManifestsDirectory` field configures the kubelet to get static pod manifests from the /etc/kubernetes/manifests directory.                # # The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.        # clusterDNS:        #     - 10.96.0.10        #     - 169.254.2.53        # # The `extraArgs` field is used to provide additional flags to the kubelet.        # extraArgs:        #     key: value        # # The `extraMounts` field is used to add additional mounts to the kubelet container.        # extraMounts:        #     - destination: /var/lib/example        #       type: bind        #       source: /var/lib/example        #       options:        #         - bind        #         - rshared        #         - rw        # # The `extraConfig` field is used to provide kubelet configuration overrides.        # extraConfig:        #     serverTLSBootstrap: true        # # The `nodeIP` field is used to configure `--node-ip` flag for the kubelet.        # nodeIP:        #     # The `validSubnets` field configures the networks to pick kubelet node IP from.        #     validSubnets:        #         - 10.0.0.0/8        #         - '!10.0.0.3/32'        #         - fdc7::/16    # Provides machine specific network configuration options.    network:    # # `interfaces` is used to define the network interface configuration.    #  interfaces:    #    - interface: eth0 #np0s1 # The interface name.    #       # Assigns static IP addresses to the interface.    #       addresses:    #         - 192.168.2.0/24    #       # A list of routes associated with the interface.    #       routes:    #         - network: 0.0.0.0/0 # The route's network (destination).    #           gateway: 192.168.2.1 # The route's gateway (if empty, creates link scope route).    #           metric: 1024 # The optional metric for the route.    #       mtu: 1500 # The interface's MTU.    #           #       # # Picks a network device using the selector.    #       # # select a device with bus prefix 00:*.    #       # deviceSelector:    #       #     busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.    #       # # select a device with mac address matching `*:f0:ab` and `virtio` kernel driver.    #       # deviceSelector:    #       #     hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.    #       #     driver: virtio # Kernel driver, supports matching by wildcard.    #       # # select a device with bus prefix 00:*, a device with mac address matching `*:f0:ab` and `virtio` kernel driver.    #       # deviceSelector:    #       #     - busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.    #       #     - hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.    #       #       driver: virtio # Kernel driver, supports matching by wildcard.    #       # # Bond specific options.    #       # bond:    #       #     # The interfaces that make up the bond.    #       #     interfaces:    #       #         - enp2s0    #       #         - enp2s1    #       #     # Picks a network device using the selector.    #       #     deviceSelectors:    #       #         - busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.    #       #         - hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.    #       #           driver: virtio # Kernel driver, supports matching by wildcard.    #       #     mode: 802.3ad # A bond option.    #       #     lacpRate: fast # A bond option.    #       # # Bridge specific options.    #       # bridge:    #       #     # The interfaces that make up the bridge.    #       #     interfaces:    #       #         - enxda4042ca9a51    #       #         - enxae2a6774c259    #       #     # A bridge option.    #       #     stp:    #       #         enabled: true # Whether Spanning Tree Protocol (STP) is enabled.    #       # # Indicates if DHCP should be used to configure the interface.    #       # dhcp: true    #       # # DHCP specific options.    #       # dhcpOptions:    #       #     routeMetric: 1024 # The priority of all routes received via DHCP.    #       # # Wireguard specific configuration.    #       # # wireguard server example    #       # wireguard:    #       #     privateKey: ABCDEF... # Specifies a private key configuration (base64 encoded).    #       #     listenPort: 51111 # Specifies a device's listening port.    #       #     # Specifies a list of peer configurations to apply to a device.    #       #     peers:    #       #         - publicKey: ABCDEF... # Specifies the public key of this peer.    #       #           endpoint: 192.168.1.3 # Specifies the endpoint of this peer entry.    #       #           # AllowedIPs specifies a list of allowed IP addresses in CIDR notation for this peer.    #       #           allowedIPs:    #       #             - 192.168.1.0/24    #       # # wireguard peer example    #       # wireguard:    #       #     privateKey: ABCDEF... # Specifies a private key configuration (base64 encoded).    #       #     # Specifies a list of peer configurations to apply to a device.    #       #     peers:    #       #         - publicKey: ABCDEF... # Specifies the public key of this peer.    #       #           endpoint: 192.168.1.2:51822 # Specifies the endpoint of this peer entry.    #       #           persistentKeepaliveInterval: 10s # Specifies the persistent keepalive interval for this peer.    #       #           # AllowedIPs specifies a list of allowed IP addresses in CIDR notation for this peer.    #       #           allowedIPs:    #       #             - 192.168.1.0/24    #       # # Virtual (shared) IP address configuration.    #       # # layer2 vip example    #       # vip:    #       #     ip: 172.16.199.55 # Specifies the IP address to be used.    # # Used to statically set the nameservers for the machine.      nameservers:          - 192.168.1.87    # # Allows for extra entries to be added to the `/etc/hosts` file    # extraHostEntries:    #     - ip: 192.168.1.100 # The IP of the host.    #       # The host alias.    #       aliases:    #         - example    #         - example.domain.tld    # # Configures KubeSpan feature.    # kubespan:    #     enabled: true # Enable the KubeSpan feature.    # Used to provide instructions for installations.    install:        disk: /dev/mmcblk0 # The disk used for installations.        image: ghcr.io/siderolabs/installer:v1.5.1 # Allows for supplying the image used to perform the installation.        wipe: false # false # Indicates if the installation disk should be wiped at installation time.                # # Look up disk using disk attributes like model, size, serial and others.        # diskSelector:        #     size: '<= 1TB' # Disk size.        #     model: WDC* # Disk model `/sys/block/<dev>/device/model`.        #     busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0 # Disk bus path.        #     busPath: '*usb3*'        # # Allows for supplying extra kernel args via the bootloader.        # extraKernelArgs:        #     - talos.platform=metal        #     - reboot=k        # # Allows for supplying additional system extension images to install on top of base Talos image.        # extensions:        #     - image: ghcr.io/siderolabs/gvisor:20220117.0-v1.0.0 # System extension image.    # Used to configure the machine's container image registry mirrors.    registries: {}    # # Specifies mirror configuration for each registry host namespace.    # mirrors:    #     ghcr.io:    #         # List of endpoints (URLs) for registry mirrors to use.    #         endpoints:    #             - https://registry.insecure    #             - https://ghcr.io/v2/    # # Specifies TLS & auth configuration for HTTPS image registries.    # config:    #     registry.insecure:    #         # The TLS configuration for the registry.    #         tls:    #             insecureSkipVerify: true # Skip TLS server certificate verification (not recommended).    #                 #             # # Enable mutual TLS authentication with the registry.    #             # clientIdentity:    #             #     crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t    #             #     key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==    #             #         # # The auth configuration for this registry.    #         # auth:    #         #     username: username # Optional registry authentication.    #         #     password: password # Optional registry authentication.    # Features describe individual Talos features that can be switched on or off.    features:        rbac: true # Enable role-based access control (RBAC).        stableHostname: true # Enable stable default hostname.        apidCheckExtKeyUsage: true # Enable checks for extended key usage of client certificates in apid.          #diskQuotaSupport: true # Enable XFS project quota support for EPHEMERAL partition and user disks.                # # Configure Talos API access from Kubernetes pods.        # kubernetesTalosAPIAccess:        #     enabled: true # Enable Talos API access from Kubernetes pods.        #     # The list of Talos API roles which can be granted for access from Kubernetes pods.        #     allowedRoles:        #         - os:reader        #     # The list of Kubernetes namespaces Talos API access is available from.        #     allowedKubernetesNamespaces:        #         - kube-system        # # Provides machine specific control plane configuration options.    # # ControlPlane definition example.    # controlPlane:    #     # Controller manager machine specific configuration options.    #     controllerManager:    #         disabled: false # Disable kube-controller-manager on the node.    #     # Scheduler machine specific configuration options.    #     scheduler:    #         disabled: true # Disable kube-scheduler on the node.    # # Used to provide static pod definitions to be run by the kubelet directly bypassing the kube-apiserver.    # # nginx static pod.    # pods:    #     - apiVersion: v1    #       kind: pod    #       metadata:    #         name: nginx    #       spec:    #         containers:    #             - image: nginx    #               name: nginx    # # Used to partition, format and mount additional disks.    # # MachineDisks list example.    # disks:    #     - device: /dev/sdb # The name of the disk to use.    #       # A list of partitions to create on the disk.    #       partitions:    #         - mountpoint: /var/mnt/extra # Where to mount the partition.    #               #           # # The size of partition: either bytes or human readable representation. If `size:` is omitted, the partition is sized to occupy the full disk.    #           # # Human readable representation.    #           # size: 100 MB    #           # # Precise value in bytes.    #           # size: 1073741824    # # Allows the addition of user specified files.    # # MachineFiles usage example.    # files:    #     - content: '...' # The contents of the file.    #       permissions: 0o666 # The file's permissions in octal.    #       path: /tmp/file.txt # The path of the file.    #       op: append # The operation to use    # # The `env` field allows for the addition of environment variables.    # # Environment variables definition examples.    # env:    #     GRPC_GO_LOG_SEVERITY_LEVEL: info    #     GRPC_GO_LOG_VERBOSITY_LEVEL: "99"    #     https_proxy: http://SERVER:PORT/    # env:    #     GRPC_GO_LOG_SEVERITY_LEVEL: error    #     https_proxy: https://USERNAME:PASSWORD@SERVER:PORT/    # env:    #     https_proxy: http://DOMAIN\USERNAME:PASSWORD@SERVER:PORT/    # # Used to configure the machine's time settings.    # # Example configuration for cloudflare ntp server.    # time:    #     disabled: false # Indicates if the time service is disabled for the machine.    #     # Specifies time (NTP) servers to use for setting the system time.    #     servers:    #         - time.cloudflare.com    #     bootTimeout: 2m0s # Specifies the timeout when the node time is considered to be in sync unlocking the boot sequence.    # # Used to configure the machine's sysctls.    # # MachineSysctls usage example.    # sysctls:    #     kernel.domainname: talos.dev    #     net.ipv4.ip_forward: "0"    # # Used to configure the machine's sysfs.    # # MachineSysfs usage example.    # sysfs:    #     devices.system.cpu.cpu0.cpufreq.scaling_governor: performance    # # Machine system disk encryption configuration.    # systemDiskEncryption:    #     # Ephemeral partition encryption.    #     ephemeral:    #         provider: luks2 # Encryption provider to use for the encryption.    #         # Defines the encryption keys generation and storage method.    #         keys:    #             - # Deterministically generated key from the node UUID and PartitionLabel.    #               nodeID: {}    #               slot: 0 # Key slot number for LUKS2 encryption.    #                   #               # # KMS managed encryption key.    #               # kms:    #               #     endpoint: https://192.168.88.21:4443 # KMS endpoint to Seal/Unseal the key.    #             #         # # Cipher kind to use for the encryption. Depends on the encryption provider.    #         # cipher: aes-xts-plain64    #         # # Defines the encryption sector size.    #         # blockSize: 4096    #         # # Additional --perf parameters for the LUKS2 encryption.    #         # options:    #         #     - no_read_workqueue    #         #     - no_write_workqueue    # # Configures the udev system.    udev:        # List of udev rules to apply to the udev system        rules:            - SUBSYSTEM=="sound", KERNEL=="renderD*", GROUP="audio", MODE="0660"              #SUBSYSTEM=="sound", GROUP="audio", \              #OPTIONS+="static_node=snd/seq", OPTIONS+="static_node=snd/timer"    # # Configures the logging system.    # logging:    #     # Logging destination.    #     destinations:    #         - endpoint: tcp://1.2.3.4:12345 # Where to send logs. Supported protocols are "tcp" and "udp".    #           format: json_lines # Logs format.    # # Configures the kernel.    # kernel:    #     # Kernel modules to load.    #     modules:    #         - name: brtfs # Module name.    # # Configures the seccomp profiles for the machine.    # seccompProfiles:    #     - name: audit.json # The `name` field is used to provide the file name of the seccomp profile.    #       # The `value` field is used to provide the seccomp profile.    #       value:    #         defaultAction: SCMP_ACT_LOG    # # Configures the node labels for the machine.    # # node labels example.# Provides cluster specific configuration options.cluster:    id: DnLy-yXXaIqQRaELsr5VZj-rnVj7jUxyyv69GkmgDIQ= # Globally unique identifier for this cluster (base64 encoded random 32 bytes).    secret: ssgf5bbwHcen8w5i48nlDIdsUcTf9O3AoO3EQDTbpmo= # Shared secret of cluster (base64 encoded random 32 bytes).    # Provides control plane specific configuration options.    controlPlane:        endpoint: https://talos-master.dezendorf.net:6443 # Endpoint is the canonical controlplane endpoint, which can be an IP address or a DNS hostname.    # Provides cluster specific network configuration options.    network:        dnsDomain: cluster.local # The domain used by Kubernetes DNS.        # The pod subnet CIDR.        podSubnets:            - 10.244.0.0/16        # The service subnet CIDR.        serviceSubnets:            - 10.96.0.0/12                # # The CNI used.        # cni:        #     name: custom # Name of CNI to use.        #     # URLs containing manifests to apply for the CNI.        #     urls:        #         - https://docs.projectcalico.org/archive/v3.20/manifests/canal.yaml    token: zszgpu.9yqk443feyidmnx3 # The [bootstrap token](https://kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/) used to join the cluster.    # The base64 encoded root certificate authority used by Kubernetes.    ca:        crt: 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        key: ""    # Configures cluster member discovery.    discovery:        enabled: true # Enable the cluster membership discovery feature.        # Configure registries used for cluster member discovery.        registries:            # Kubernetes registry uses Kubernetes API server to discover cluster members and stores additional information            kubernetes:                disabled: true # Disable Kubernetes discovery registry.            # Service registry is using an external service to push and pull information about cluster members.            service: {}            # # External service endpoint.            # endpoint: https://discovery.talos.dev/        # # A key used for the [encryption of secret data at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/).    # # Decryption secret example (do not use in production!).    # aescbcEncryptionSecret: z01mye6j16bspJYtTB/5SFX8j7Ph4JXxM2Xuu4vsBPM=    # # A key used for the [encryption of secret data at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/).    # # Decryption secret example (do not use in production!).    # secretboxEncryptionSecret: z01mye6j16bspJYtTB/5SFX8j7Ph4JXxM2Xuu4vsBPM=    # # The base64 encoded aggregator certificate authority used by Kubernetes for front-proxy certificate generation.    # # AggregatorCA example.    # aggregatorCA:    #     crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t    #     key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==    # # The base64 encoded private key for service account token generation.    # # AggregatorCA example.    # serviceAccount:    #     key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==    # # API server specific configuration options.    # apiServer:    #     image: registry.k8s.io/kube-apiserver:v1.28.0 # The container image used in the API server manifest.    #     # Extra arguments to supply to the API server.    #     extraArgs:    #         feature-gates: ServerSideApply=true    #         http2-max-streams-per-connection: "32"    #     # Extra certificate subject alternative names for the API server's certificate.    #     certSANs:    #         - 1.2.3.4    #         - 4.5.6.7    #     # Configure the API server admission plugins.    #     admissionControl:    #         - name: PodSecurity # Name is the name of the admission controller.    #           # Configuration is an embedded configuration object to be used as the plugin's    #           configuration:    #             apiVersion: pod-security.admission.config.k8s.io/v1alpha1    #             defaults:    #                 audit: restricted    #                 audit-version: latest    #                 enforce: baseline    #                 enforce-version: latest    #                 warn: restricted    #                 warn-version: latest    #             exemptions:    #                 namespaces:    #                     - kube-system    #                 runtimeClasses: []    #                 usernames: []    #             kind: PodSecurityConfiguration    #     # Configure the API server audit policy.    #     auditPolicy:    #         apiVersion: audit.k8s.io/v1    #         kind: Policy    #         rules:    #             - level: Metadata    # # Controller manager server specific configuration options.    # controllerManager:    #     image: registry.k8s.io/kube-controller-manager:v1.28.0 # The container image used in the controller manager manifest.    #     # Extra arguments to supply to the controller manager.    #     extraArgs:    #         feature-gates: ServerSideApply=true    # # Kube-proxy server-specific configuration options    proxy:    #     disabled: false # Disable kube-proxy deployment on cluster bootstrap.    #     image: registry.k8s.io/kube-proxy:v1.28.0 # The container image used in the kube-proxy manifest.        mode: ipvs # proxy mode of kube-proxy.    #     # Extra arguments to supply to kube-proxy.        extraArgs:            ipvs-strict-arp: true            proxy-mode: iptables    # # Scheduler server specific configuration options.    # scheduler:    #     image: registry.k8s.io/kube-scheduler:v1.28.0 # The container image used in the scheduler manifest.    #     # Extra arguments to supply to the scheduler.    #     extraArgs:    #         feature-gates: AllBeta=true    # # Etcd specific configuration options.    # etcd:    #     image: gcr.io/etcd-development/etcd:v3.5.9 # The container image used to create the etcd service.    #     # The `ca` is the root certificate authority of the PKI.    #     ca:    #         crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t    #         key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==    #     # Extra arguments to supply to etcd.    #     extraArgs:    #         election-timeout: "5000"    #     # The `advertisedSubnets` field configures the networks to pick etcd advertised IP from.    #     advertisedSubnets:    #         - 10.0.0.0/8    # # Core DNS specific configuration options.    # coreDNS:    #     image: registry.k8s.io/coredns/coredns:v1.10.1 # The `image` field is an override to the default coredns image.    # # External cloud provider configuration.    # externalCloudProvider:    #     enabled: true # Enable external cloud provider.    #     # A list of urls that point to additional manifests for an external cloud provider.    #     manifests:    #         - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/rbac.yaml    #         - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/aws-cloud-controller-manager-daemonset.yaml    # # A list of urls that point to additional manifests.    # extraManifests:    #     - https://www.example.com/manifest1.yaml    #     - https://www.example.com/manifest2.yaml    # # A map of key value pairs that will be added while fetching the extraManifests.    # extraManifestHeaders:    #     Token: "1234567"    #     X-ExtraInfo: info    # # A list of inline Kubernetes manifests.    # inlineManifests:    #     - name: namespace-ci # Name of the manifest.    #       contents: |- # Manifest contents as a string.    #         apiVersion: v1    #         kind: Namespace    #         metadata:    #         	name: ci    # # Settings for admin kubeconfig generation.    # adminKubeconfig:    #     certLifetime: 1h0m0s # Admin kubeconfig certificate lifetime (default is 1 year).    # # Allows running workload on control-plane nodes.    # allowSchedulingOnControlPlanes: true
 |