/device/model`.
# # Disk bus path.
# busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0
@@ -941,37 +926,37 @@ machine:
| `name` |
string |
- Disk name `/sys/block/{"<"}dev{">"}/device/name`. |
+ Disk name `/sys/block//device/name`. |
|
| `model` |
string |
- Disk model `/sys/block/{"<"}dev{">"}/device/model`. |
+ Disk model `/sys/block//device/model`. |
|
| `serial` |
string |
- Disk serial number `/sys/block/{"<"}dev{">"}/serial`. |
+ Disk serial number `/sys/block//serial`. |
|
| `modalias` |
string |
- Disk modalias `/sys/block/{"<"}dev{">"}/device/modalias`. |
+ Disk modalias `/sys/block//device/modalias`. |
|
| `uuid` |
string |
- Disk UUID `/sys/block/{"<"}dev{">"}/uuid`. |
+ Disk UUID `/sys/block//uuid`. |
|
| `wwid` |
string |
- Disk WWID `/sys/block/{"<"}dev{">"}/wwid`. |
+ Disk WWID `/sys/block//wwid`. |
|
@@ -2024,7 +2009,7 @@ APIServerConfig represents the kube apiserver configuration options.
```yaml
cluster:
apiServer:
- image: registry.k8s.io/kube-apiserver:v1.35.0-alpha.3 # The container image used in the API server manifest.
+ image: registry.k8s.io/kube-apiserver:v1.35.0 # The container image used in the API server manifest.
# Extra arguments to supply to the API server.
extraArgs:
feature-gates: ServerSideApply=true
@@ -2377,7 +2362,7 @@ ControllerManagerConfig represents the kube controller manager configuration opt
```yaml
cluster:
controllerManager:
- image: registry.k8s.io/kube-controller-manager:v1.35.0-alpha.3 # The container image used in the controller manager manifest.
+ image: registry.k8s.io/kube-controller-manager:v1.35.0 # The container image used in the controller manager manifest.
# Extra arguments to supply to the controller manager.
extraArgs:
feature-gates: ServerSideApply=true
@@ -2518,7 +2503,7 @@ ProxyConfig represents the kube proxy configuration options.
```yaml
cluster:
proxy:
- image: registry.k8s.io/kube-proxy:v1.35.0-alpha.3 # The container image used in the kube-proxy manifest.
+ image: registry.k8s.io/kube-proxy:v1.35.0 # The container image used in the kube-proxy manifest.
mode: ipvs # proxy mode of kube-proxy.
# Extra arguments to supply to kube-proxy.
extraArgs:
@@ -2579,7 +2564,7 @@ SchedulerConfig represents the kube scheduler configuration options.
```yaml
cluster:
scheduler:
- image: registry.k8s.io/kube-scheduler:v1.35.0-alpha.3 # The container image used in the scheduler manifest.
+ image: registry.k8s.io/kube-scheduler:v1.35.0 # The container image used in the scheduler manifest.
# Extra arguments to supply to the scheduler.
extraArgs:
feature-gates: AllBeta=true
@@ -2877,7 +2862,7 @@ EtcdConfig represents the etcd configuration options.
```yaml
cluster:
etcd:
- image: registry.k8s.io/etcd:v3.6.6 # The container image used to create the etcd service.
+ image: registry.k8s.io/etcd:v3.6.7 # The container image used to create the etcd service.
# The `ca` is the root certificate authority of the PKI.
ca:
crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t
@@ -2948,7 +2933,7 @@ CoreDNS represents the CoreDNS config values.
```yaml
cluster:
coreDNS:
- image: registry.k8s.io/coredns/coredns:v1.13.1 # The `image` field is an override to the default coredns image.
+ image: registry.k8s.io/coredns/coredns:v1.13.2 # The `image` field is an override to the default coredns image.
```
diff --git a/public/talos/v1.13/security/ca-rotation.mdx b/public/talos/v1.13/security/ca-rotation.mdx
index b09d339a..d6c1b779 100644
--- a/public/talos/v1.13/security/ca-rotation.mdx
+++ b/public/talos/v1.13/security/ca-rotation.mdx
@@ -29,7 +29,7 @@ Both rotation flows are described in detail below.
## Talos API
-### Automated Talos API CA Rotation
+### Automated Talos API CA rotation
Talos API CA rotation doesn't interrupt connections within the cluster, and it doesn't require a reboot of the nodes.
@@ -108,7 +108,7 @@ If other client access `talosconfig` files needs to be generated, use `talosctl
> Note: if using [Talos API access from Kubernetes](../../../kubernetes-guides/advanced-guides/talos-api-access-from-k8s) feature, pods might need to be restarted manually to pick up new `talosconfig`.
-### Manual Steps for Talos API CA Rotation
+### Manual steps for Talos API CA rotation
1. Generate new Talos CA (e.g. use `talosctl gen secrets` and use Talos CA).
2. Patch machine configuration on all nodes updating `.machine.acceptedCAs` with new CA certificate.
@@ -120,7 +120,7 @@ If other client access `talosconfig` files needs to be generated, use `talosctl
## Kubernetes API
-### Automated Kubernetes API CA Rotation
+### Automated Kubernetes API CA rotation
The automated process only rotates Kubernetes API CA, used by the `kube-apiserver`, `kubelet`, etc.
Other Kubernetes secrets might need to be rotated manually as required.
@@ -182,7 +182,7 @@ New `kubeconfig` can be fetched with `talosctl kubeconfig` command from the clus
Kubernetes pods might need to be restarted manually to pick up changes to the Kubernetes API CA.
-### Manual Steps for Kubernetes API CA Rotation
+### Manual steps for Kubernetes API CA rotation
Steps are similar [to the Talos API CA rotation](#manual-steps-for-talos-api-ca-rotation), but use:
diff --git a/public/talos/v1.13/security/cert-management.mdx b/public/talos/v1.13/security/cert-management.mdx
index a08c257b..24646df0 100644
--- a/public/talos/v1.13/security/cert-management.mdx
+++ b/public/talos/v1.13/security/cert-management.mdx
@@ -16,9 +16,9 @@ Each time you download the `kubeconfig` file from a Talos Linux cluster, the cli
The `talosconfig` file should be renewed at least once a year, using the `talosctl config new` command, as shown below, or by one of the other methods.
-## Generating New Client Configuration
+## Generating new client configuration
-### Using Controlplane Node
+### Using control plane node
If you have a valid (not expired) `talosconfig` with `os:admin` role,
a new client configuration file can be generated with `talosctl config new` against
@@ -30,7 +30,7 @@ talosctl -n CP1 config new talosconfig-reader --roles os:reader --crt-ttl 24h
A specific [role](./rbac) and certificate lifetime can be specified.
-### From Secrets Bundle
+### From secrets bundle
If a secrets bundle (`secrets.yaml` from `talosctl gen secrets`) was saved while
[generating machine configuration](../getting-started/#configure-talos):
@@ -41,7 +41,7 @@ talosctl gen config --with-secrets secrets.yaml --output-types talosconfig -o ta
> Note: `` and `` arguments don't matter, as they are not used for `talosconfig`.
-### From Control Plane Machine Configuration
+### From control plane machine configuration
In order to create a new key pair for client configuration, you will need the root Talos API CA.
The base64 encoded CA can be found in the control plane node's configuration file.
diff --git a/public/talos/v1.13/security/iam-roles-for-service-accounts.mdx b/public/talos/v1.13/security/iam-roles-for-service-accounts.mdx
index 7d5532e2..3dfc89fd 100644
--- a/public/talos/v1.13/security/iam-roles-for-service-accounts.mdx
+++ b/public/talos/v1.13/security/iam-roles-for-service-accounts.mdx
@@ -204,7 +204,7 @@ Patch your Talos `machineconfig` to use the new Service Account issuer and signi
talosctl apply-config --nodes --file machineconfig-patch.yaml
```
-## Step 3: Install Required Kubernetes Components
+## Step 3: Install required Kubernetes components
Two components are required on the cluster: `cert-manager` and `amazon-eks-pod-identity-webhook`.
diff --git a/public/talos/v1.13/security/verifying-images.mdx b/public/talos/v1.13/security/verifying-images.mdx
index 96a5603f..69dc0d22 100644
--- a/public/talos/v1.13/security/verifying-images.mdx
+++ b/public/talos/v1.13/security/verifying-images.mdx
@@ -11,7 +11,7 @@ Sidero Labs signs the container images generated for the Talos release with [cos
* `ghcr.io/siderolabs/imager` (Talos install image generator)
* all [system extension images](https://github.com/siderolabs/extensions/)
-## Verifying Container Image Signatures
+## Verifying container image signatures
The `cosign` tool can be used to verify the signatures of the Talos container images:
@@ -29,7 +29,7 @@ The following checks were performed on each of these signatures:
The image should be signed using [cosign certificate authority flow](https://docs.sigstore.dev/certificate_authority/certificate-issuing-overview/) by a Sidero Labs employee with and email from `siderolabs.com` domain.
-## Reproducible Builds
+## Reproducible builds
Talos builds for `kernel`, `initramfs`, `talosctl`, ISO image, and container images are reproducible.
So you can verify that the build is the same as the one as provided on [GitHub releases page](https://github.com/siderolabs/talos/releases).