You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The default installer image has been updated to use the Image Factory.
Host DNS Configuration
HostDNS configuration was moved from the v1alpha1 config .machine.features.hostDNS field to the new hostDNS in the ResolverConfig document.
NTS for Time Synchronization
Talos now supports Network Time Security (NTS) for secure time synchronization.
This feature enhances the security of NTP by providing cryptographic authentication of time sources.
NTS is enabled by default (without any configuration sources) for the default time.cloudflare.com time server
NTS can be enabled for custom time servers via the new useNTS field in the TimeServerConfig document.
TLS 1.3 Minimum Version
Talos now runs etcd and kube-apiserver with a minimum TLS version of 1.3, improving security by leveraging the latest TLS features and cipher suites.
Custom settings for cipher suites have been removed, as they are ignored when TLS 1.3 is used, which simplifies configuration and ensures the use of modern, secure defaults.
Likely cause: The kube-prometheus-stack-prometheus-node-exporter pod is stuck in a permanent InvalidImageName state due to a chart rendering bug in kube-prometheus-stack@85.1.3, and the windsor check node-health Terraform provisioner fails immediately on this pre-existing broken pod when run after the Talos 1.12.6 → 1.13.2 upgrade.
Evidence: The pod kube-prometheus-stack-prometheus-node-exporter-ftts9 in system-telemetry has status InvalidImageName with event Failed to apply default image tag "quay.io/prometheus/node-exporter:v1.11.1@sha256:0f422f62c15f154af8d8572b23d623aebfb10cec73a5c654d18f911f3f9df241-distroless": couldn't parse image name: invalid reference format. The chart's prometheus-node-exporter subchart appends -distroless as an OS variant suffix to the digest hash, producing an unparseable OCI reference. The Windsor Up step completed in 19 seconds — far too short to have hit the --timeout 5m health check ceiling — consistent with windsor check node-health returning immediately on a non-transient pod failure. The Talos upgrade itself succeeded: the node now reports Talos (v1.13.2) / v1.35.4, and the Talos API is healthy at 10.5.0.10:50000. The failure only surfaces in the upgrade path because baseline Flux reconciliation pre-deploys kube-prometheus-stack (including the broken node-exporter DaemonSet) before the HEAD Windsor Up health check runs; in a fresh install the health check executes before Flux reaches the telemetry kustomization.
Suggested next step: Fix the pre-existing node-exporter rendering bug in kustomize/telemetry/base/prometheus/helm-release.yaml by adding os.name: "" (or os.name: linux) under prometheus-node-exporter.image so the subchart stops appending -distroless to the image tag — this unblocks both this PR's upgrade test and any future upgrade runs against this chart version.
Live read-only inspection by Claude. Support bundle attached to the run artifacts.
Likely cause: The local quay.test:5000 registry mirror returns 500 Internal Server Error when kubelet attempts to pull the Grafana sidecar image from quay.io, causing the Grafana pod to stay in ImagePullBackOff and windsor up to time out.
Evidence: Pod grafana-647844db59-jrt2b in system-observability is 1/2 Ready — the grafana container (docker.io) started fine, but the k8s-sidecar container is stuck: Failed to pull image "quay.io/kiwigrid/k8s-sidecar:2.7.1@sha256:2670f251f80d990635460c0116497a9cc3202069e8826f1a279af300ecd9f75e": unexpected status from HEAD request to http://quay.test:5000/v2/kiwigrid/k8s-sidecar/manifests/sha256:2670f251f80d990635460c0116497a9cc3202069e8826f1a279af300ecd9f75e?ns=quay.io: 500 Internal Server Error. This stalls the observability kustomization (status Unknown / Reconciliation in progress for 13 min) and the grafana HelmRelease (status Running 'install' action with timeout of 15m0s). The PR only changes two lines (Talos 1.12.6 → 1.13.0) and does not touch the Grafana HelmRelease; the upgrade job's baseline (main / Talos 1.12.6) also failed at Windsor Up, pointing to a shared quay.test proxy error rather than a regression from this PR.
Suggested next step: Re-run the integration job to rule out a transient quay.io proxy error; if it fails again, investigate why quay.test:5000 returns 500 for kiwigrid/k8s-sidecar (the mirror may not have this image cached and is failing to fetch it from upstream quay.io).
Live read-only inspection by Claude. Support bundle attached to the run artifacts.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
This PR contains the following updates:
1.12.6→1.13.2Warning
Some dependencies could not be looked up. Check the Dependency Dashboard for more information.
Release Notes
siderolabs/talos (talos)
v1.13.2Compare Source
Talos 1.13.2 (2026-05-12)
Welcome to the v1.13.2 release of Talos!
Please try out the release binaries and report any issues at
https://github.com/siderolabs/talos/issues.
Component Updates
Etcd: 3.6.11
Linux: 6.18.29
Talos is built with Go 1.26.3.
Contributors
Changes
1 commit
c5d7c65release(v1.13.2): prepare releaseDependency Changes
Previous release can be found at v1.13.1
Images
v1.13.0Compare Source
Welcome to the v1.14.0-alpha.0 release of Talos!
This is a pre-release of Talos
Please try out the release binaries and report any issues at
https://github.com/siderolabs/talos/issues.
Default Installer Image
The default installer image has been updated to use the Image Factory.
Host DNS Configuration
HostDNS configuration was moved from the v1alpha1 config
.machine.features.hostDNSfield to the newhostDNSin theResolverConfigdocument.NTS for Time Synchronization
Talos now supports Network Time Security (NTS) for secure time synchronization.
This feature enhances the security of NTP by providing cryptographic authentication of time sources.
NTS is enabled by default (without any configuration sources) for the default
time.cloudflare.comtime serverNTS can be enabled for custom time servers via the new
useNTSfield in theTimeServerConfigdocument.TLS 1.3 Minimum Version
Talos now runs etcd and kube-apiserver with a minimum TLS version of 1.3, improving security by leveraging the latest TLS features and cipher suites.
Custom settings for cipher suites have been removed, as they are ignored when TLS 1.3 is used, which simplifies configuration and ensures the use of modern, secure defaults.
Component Updates
Linux: 6.18.25
Kubernetes: 1.36.0
Talos is built with Go 1.26.2.
Contributors
Changes
103 commits
8a037a56etest: fix flaky tests08c81d838feat: bump kernel to 6.18.25fe40b6e58fix(ci): fetch empty pr labels837a9ed07feat: move host DNS config into ResolverConfig96a8ecd1efeat: default to factory installer imagef19eef78bfix: revert add extraArgs from service-account-issuer6821225b6fix: revert use append instead of prepend in service-account-issuerb43c3a124feat: add quirk for talosctl factory downloadsdf0b9a8darefactor: make all controller unit-test follow modern patternsc2948cef2feat: support auth for Image Factory in cluster create560bcf0cafeat: enforce TLS 1.3 minmum version for Kubernetes components3db14309efix(talosctl): ensure uncordon runs after reboot/upgrade errorsecf2fa855feat: update Kubernetes to v1.36.071557eaddfix(ci): skip misc jobs not on pull request026313b7cdocs: rename security-insights.yml to lowercase for LFX detectiondc4ffd490fix(ci): fix jobs not interpolating matrix due to condition25e2f37e2chore: generate comments for fields in resource proto149592fa5fix: watch kubelet's kubeconfig and time out for cache sync1f315e6e9feat: update Linux to 6.18.230198eedc2feat: add NTS (Network Time Security) support for NTP time sync6830a8b97fix(ci): matrix jobs cleanups71aeb347ftest: fix OOM test flake9b9542cc5test: fix a flake in the manifest sync test863d882b6test: add image verification for factory.talos.devbba0b4aeechore(ci): nvidia update helm values3399ff4defix: propagate route table down to the resourcec684ec60echore: prepare for Talos 1.14 releaseed9545d0dchore(ci): bump gpu operator version4de3e4393fix(ci): cron triggered workflows212182e6fchore: bump container registry libraryc028db0b8fix: do not flip machine stage to rebooting during shutdown6ce62d9e8fix(ci): workflow runs withworkflow_run509cd9733fix: boot entry detection5e3f30188feat(ci): rework to schedule daily runs after a cron7fa4d3919fix: zfs extensions test1ef8e630atest: allow more tests to run in FIPS strict modebdcc9321bfix: reduce memory dashboard usage2d177af82chore: update Syft to v1.42.4+patches0d8362119fix: return failed precondition on upgrade when not installedbe58eafabfix: wrong slot of encryption key was logged015081c76feat: update dependencies9fbb7c95dfix: audit trustd code for security986e97fc7feat: update Flannel to 0.28.4f3817d1d1chore: update sign images to support image name suffixe776721f3feat: update Kubernetes 1.36.0-rc.1f6e7346fafix: encode extra args fields in resources with new id3c7bb80bachore: bump tools3ba35c9b9chore(ci): nvidia try UKI boote3e8f01cachore: bump tools181584a5ffix: handle boot failurec464c7e88fix: upgrade API in maintenance mode (legacy)b7512d912feat: update Kubernetes to 1.36.0-rc.04ba11156frefactor: allow overriding out image name suffixc81aa125cfix: panic in reading PCR values6a3ab87c5feat(ci): add nvidia arm64 matrix21f459aabfix(talosctl): always use default GRPC dial optionsca208e514fix: validate hostDNS forwarding requires hostDNS to be enabled9fcb9e05bfeat: bump go to 1.26.20bfdf7f70fix: create correct blackhole routes for IPv452b920032feat: add client-side Kubernetes node drain to reboot and upgrade commands968ec1e0crefactor: propagate NAME properly, allow to set on buildacc69c346fix: set the minimum TLS version to 1.30cfa6e302chore: bump some tool dependencies4229bb9d2feat: add dis-vulncheck toold697f5538fix: don't set xattrs while decompressing extensions34fb2cbe5refactor: remove manual shell completion and replace with cobra completion79fa2e300feat: allow more nvidia and nvme files from extensions414f78a29feat: allow glibc ld files in etc1bbba4301feat: update Flannel to v0.28.255815e0fafix: handle ISOs with zeroes in volume labels7b6ab0c1cfeat: add flag to force fallback to legacy upgrade5e24d5265feat: add resource view to talosctl dashboard649ab7fe4fix: add os:meta:writer role to the dashboard10cdfa909fix: drop talosctl install087ced85ffix: unseal with "slow" TPM11ab0a8c5fix: drop unused type from ExternalVolume schemae2df0f6cefix: always grow disks919d8c365chore: drop debug shell783a35851fix: add metal-agent mode to runtime capabilities37b2221ccdocs: add SECURITY-INSIGHTS.yml for OSPS Baseline QA-04.01bed2bd414feat: add graceful power off support to QEMU VM launcher3400059ccfix: incorrect route source for on-link routesb3dfbf743feat: bump musl to 1.2.64227921b3test: fix the PKI mismatch test flakef2bc2dcc6feat: update NVIDIA production drivers to 595.58.03aa5946dd3test: fix cron failures for provision-1 & provision-21dd701efafix: allow blockdevice wipe in maintenance mode786bf00abfeat: add --platform=all support to image cache-createe1f645e3cfeat: validate luks headers for tamperingad72c7300test: improve maintenance API provision tests70cefab6atest: fix the flakes in tests with trusted rootsaacff17f4test: bump memory for Flannel netpolicy tests9c3459114feat: update Linux to 6.18.19, CNI to 1.9.1038cb8735feat: enforce PID check on connections to services over file socketse2b2dd3eachore: update go-kubernetes library9597714f6fix: add symlinks nvidia-ctk and nvidia-cdi-hook in /usr/bin8ac47d677fix: unset rlimits for extension servicesb1a02f368feat: update Kubernetes to 1.36.0-beta.0362fdc9ecfeat: update etcd to 3.6.90a47f40b3fix(machined): clear stale bond ARP/NS targets on decode86344639ffix: update diff library to v1.0.1eff89d1edfix: panics in diff algorithms8e1c8a7a9test: fix the apid test against AWS/GCPChanges from siderolabs/go-kubeconfig
2 commits
d0b8f82chore: rekres and bump depsc356eebfix: fix context conflict detection add New() constructorChanges from siderolabs/grpc-proxy
3 commits
d670c42chore: bump dependencies8614c71chore: bump deps80677e0fix: propagate the headers before the messageChanges from siderolabs/pkgs
22 commits
6a53a93feat: bump kernel to 6.18.25f567bcefeat: disable more stuff in Kconfigffd9790feat: bump kernel to 6.18.24b7c709afeat: bump depse5e5b3cfeat: update Linux to 6.18.231a4cd20fix: renovate configd0ed6edfeat: update dependencies6ea49c7fix: support disabling module signature verification6520ec4feat: update containerd to 2.2.337ce992feat: enable CONFIG_UHID and CONFIG_INPUT_JOYDEV as modulescddd934feat: update backportable dependencies32e4077feat: update OpenSSL2d241e7feat: update Go to 1.26.2 and small deps updates7f540cefeat: disable dynamic SCS3bef043feat: update runc to 1.4.2c6e6f10feat: update Linux to 6.18.21a9e8afafix: libarchive install prefixe4d0113feat: update for musl 1.2.69142603feat: update NVIDIA production to 595.58.0322fa669feat: update Linux to 6.18.1903680aefeat: update containerd patch verifier rolebdc239efeat: enable CHECKPOINT_RESTORE optionChanges from siderolabs/proto-codec
1 commit
9b8a14echore: bump dependenciesChanges from siderolabs/siderolink
1 commit
0a1933cchore: bump dependenciesChanges from siderolabs/tools
7 commits
44ad18cfeat: bump depsf3d0dd9fix: renovate configs4ac4449feat: update dependencies027744ffeat: bump OpenSSL to 3.6.27067f1ffeat: update util-linux to 2.41.46cb3e56feat: update Go to 1.26.29186c5ffeat: update musl to 1.2.6Dependency Changes
5adc3eb->11b94edPrevious release can be found at v1.13.0
v1.12.7Compare Source
Talos 1.12.7 (2026-04-24)
Welcome to the v1.12.7 release of Talos!
Please try out the release binaries and report any issues at
https://github.com/siderolabs/talos/issues.
Component Updates
Linux: 6.18.24
containerd: 2.1.7
etcd: 3.6.9
Kubernetes: v1.35.4
Talos is built with Go 1.25.9.
Contributors
Changes
19 commits
91c6399release(v1.12.7): prepare release3b228cafeat: bring in apparmor profile files1a05b4afeat: update kubernetes to v1.35.4b796be0feat: bump pkgs, spdystreama75ce6ffeat: bump pkgs, toolsc1ea8dbtest: fix OOM test flaked5b691bfix: watch kubelet's kubeconfig and time out for cache sync27655c5fix: propagate route table down to the resourcefcda84bfix: boot entry detection330561cfix: do not flip machine stage to rebooting during shutdown8ef4488fix: zfs extensions test8bc593dfix: wrong slot of encryption key was logged89f5615fix: panic in reading PCR values317deedfeat: add dis-vulncheck tool0654a7ffix: handle ISOs with zeroes in volume labelse16007bfix: unseal with "slow" TPM388a56bfix: incorrect route source for on-link routes7e42474test: fix the flakes in tests with trusted rootsd52ebe2feat: update etcd to 3.6.9Changes from siderolabs/pkgs
8 commits
86d6af1fix: install apparmor parser require config filesd6b125ffeat: bump systemd191632cfeat: bump kernel to 6.18.2413cbc68feat: bump tools, toolchain and containerd709678dfeat: update Linux to 6.18.2334de6dbfix: support disabling module signature verificatione30789afeat: update backportable dependencies830d895feat: update Linux to 6.18.21Changes from siderolabs/tools
3 commits
bbd753dfeat: bump toolchain61955e9feat: bump OpenSSL to 3.6.223de89ffeat: update util-linux to 2.41.4Dependency Changes
Previous release can be found at v1.12.6
Images
Configuration
📅 Schedule: (UTC)
🚦 Automerge: Enabled.
♻ Rebasing: Whenever PR is behind base branch, or you tick the rebase/retry checkbox.
🔕 Ignore: Close this PR and you won't be reminded about this update again.
This PR was generated by Mend Renovate. View the repository job log.