Cluster Identity
Globally unique identifier for this cluster (base64 encoded random 32 bytes). Generated automatically by
talosctl gen config.Shared secret of the cluster (base64 encoded random 32 bytes). This secret is shared among cluster members but should never be sent over the network.
The name of the cluster.
Control Plane
The canonical control plane endpoint, which can be an IP address or DNS hostname. Must be a single-valued endpoint and may optionally include a port number.
The port that the API server listens on internally. May differ from the port in the endpoint field.
Cluster Network
Define pod and service network CIDRs:Cluster-wide network configuration.
Network Options
CNI plugin to use. Options:
flannel, custom, none.URLs to CNI manifests to apply. Used when
name is custom.The domain used by Kubernetes DNS.
The pod subnet CIDRs. Can include IPv4 and IPv6 for dual-stack clusters.
The service subnet CIDRs. Can include IPv4 and IPv6 for dual-stack clusters.
Custom CNI Example
Kubernetes Components
API Server
API server configuration.
API Server Options
The container image used in the API server manifest.
Extra arguments to supply to the API server.
Extra volumes to mount to the API server static pod.
Environment variables for the API server.
Extra certificate subject alternative names for the API server’s certificate.
Configure API server resource requests and limits.
Controller Manager
Controller manager configuration.
The container image used in the controller manager manifest.
Extra arguments to supply to the controller manager.
Configure controller manager resource requests and limits.
Scheduler
Scheduler configuration.
The container image used in the scheduler manifest.
Extra arguments to supply to the scheduler.
Custom kube-scheduler configuration object.
Kube-proxy
Kube-proxy configuration.
Disable kube-proxy deployment on cluster bootstrap.
The container image used in the kube-proxy manifest.
Proxy mode:
iptables or ipvs.Extra arguments to supply to kube-proxy.
etcd
etcd cluster configuration.
etcd Options
The container image used to create the etcd service.
The root certificate authority of the PKI. Composed of base64 encoded
crt and key.Extra arguments to supply to etcd.
Subnet CIDRs to use for advertising etcd endpoints.
CoreDNS
CoreDNS configuration.
Disable CoreDNS deployment on cluster bootstrap.
The CoreDNS container image to use.
Cluster Discovery
Cluster member discovery configuration.
Enable cluster member discovery.
Discovery service endpoint.
Secrets and Certificates
The bootstrap token used to join the cluster. Format:
<token-id>.<token-secret>.The base64 encoded root certificate authority used by Kubernetes.
The base64 encoded aggregator certificate authority used by Kubernetes for front-proxy certificate generation.
The base64 encoded private key for service account token generation.
Encryption at Rest
A key used for encryption of secret data at rest. Enables encryption with AESCBC.
A key used for encryption of secret data at rest. Enables encryption with secretbox. Secretbox has precedence over AESCBC.
Extra Manifests
A list of URLs that point to additional Kubernetes manifests. These are automatically deployed as part of the bootstrap.
A map of key-value pairs added as headers when fetching extra manifests.
Inline Manifests
A list of inline Kubernetes manifests. These are automatically deployed as part of the bootstrap.
Admin Kubeconfig
Settings for admin kubeconfig generation.
Certificate lifetime for admin kubeconfig. Default is 1 year.
Allow Scheduling on Control Planes
Allows running workload on control plane nodes.
Enabling this removes the
node-role.kubernetes.io/control-plane:NoSchedule taint from control plane nodes.