Upgrading Talos Linux
OS upgrades are effected by an API call, which can be sent via the
talosctl CLI utility.
The upgrade API call passes a node the installer image to use to perform the upgrade. Each Talos version has a corresponding installer image, listed on the release page for the version, for example v1.3.7.
Upgrades use an A-B image scheme in order to facilitate rollbacks.
This scheme retains the previous Talos kernel and OS image following each upgrade.
If an upgrade fails to boot, Talos will roll back to the previous version.
Likewise, Talos may be manually rolled back via API (or
talosctl rollback), which will update the boot reference and reboot.
Unless explicitly told to
preserve data, an upgrade will cause the node to wipe the EPHEMERAL partition, remove itself from the etcd cluster (if it is a controlplane node), and make itself as pristine as is possible.
(This is the desired behavior except in specialised use cases such as single-node clusters.)
Note An upgrade of the Talos Linux OS will not (since v1.0) apply an upgrade to the Kubernetes version by default. Kubernetes upgrades should be managed separately per upgrading kubernetes.
Supported Upgrade Paths
Because Talos Linux is image based, an upgrade is almost the same as installing Talos, with the difference that the system has already been initialized with a configuration. The supported configuration may change between versions. The upgrade process should handle such changes transparently, but this migration is only tested between adjacent minor releases. Thus the recommended upgrade path is to always upgrade to the latest patch release of all intermediate minor releases.
For example, if upgrading from Talos 1.0 to Talos 1.2.4, the recommended upgrade path would be:
- upgrade from 1.0 to latest patch of 1.0 - to v1.0.6
- upgrade from v1.0.6 to latest patch of 1.1 - to v1.1.2
- upgrade from v1.1.2 to v1.2.4
Before Upgrade to v1.3.7
Custom CRI Configuration
If you were using a custom CRI configuration placed under
.machine.files setting, this will stop working after an upgrade to Talos 1.3.
Talos 1.3 fixes the way CRI configuration is merged, and introduces a new location for custom CRI configuration.
The new location under
/etc/cri/conf.d will not be accepted by Talos 1.2 and earlier, so if CRI configuration overrides are critical to boot Talos, the following upgrade flow can be used:
- Update machine configuration before upgrade in
talosctl patch mcor
talosctl edit mc). The new machine configuration will be only applied after the reboot (upgrade).
- Perform an upgrade, after the upgrade Talos will pick up new CRI configuration.
Reboot after Upgrade
The new Talos 1.3.0 kernel has BTF debugging information, so
kexec support will be disabled on upgrade preventing a
After an upgrade
kexec support will work again (if not disabled).
To see a live demo of an upgrade of Talos Linux, see the video below:
After Upgrade to v1.3.7
There are no specific actions to be taken after an upgrade.
To upgrade a Talos node, specify the node’s IP address and the installer container image for the version of Talos to upgrade to.
For instance, if your Talos node has the IP address
10.20.30.40 and you want
to install the current version, you would enter a command such
$ talosctl upgrade --nodes 10.20.30.40 \ --image ghcr.io/siderolabs/installer:v1.3.7
There is an option to this command:
--preserve, which will explicitly tell Talos to keep ephemeral data intact.
In most cases, it is correct to let Talos perform its default action of erasing the ephemeral data.
However, for a single-node control-plane, make sure that
Rarely, an upgrade command will fail due to a process holding a file open on disk.
In these cases, you can use the
This puts the upgrade artifacts on disk, and adds some metadata to a disk partition that gets checked very early in the boot process, then reboots the node.
On the reboot, Talos sees that it needs to apply an upgrade, and will do so immediately.
Because this occurs in a just rebooted system, there will be no conflict with any files being held open.
After the upgrade is applied, the node will reboot again, in order to boot into the new version.
Note that because Talos Linux reboots via the
kexec syscall, the extra reboot adds very little time.
Machine Configuration Changes
All changes to Talos machine configuration are backwards compatible, so you can upgrade Talos and then optionally update the machine configuration to use new features.
.machine.nodeLabelscan be used to control user-defined Kubernetes node labels
.cluster.secretboxEncryptionSecretcan be set to encrypt Kubernetes secrets with
secretboxalgorithm (see What’s New for details)
.machine.kubelet.disableManifestsDirectorycan be enabled to disable kubelet static pods support from
mtusetting of the network route can be used to control route-specific MTU
overridePathcan be used on
machine.registries.endpointsto skip appending
/v2(see Pull-Through Cache)
.machine.features.apidCheckExtKeyUsagecan be enabled after an upgrade to 1.3 to perform more strict checks on node-to-node Talos apid communication (see CVE-2022-36103)
.machine.kubespanprovdes new settings for KubeSpan support
.machine.kernel.modulesprovides support to pass parameters to kernel modules on load
When a Talos node receives the upgrade command, it cordons itself in Kubernetes, to avoid receiving any new workload. It then starts to drain its existing workload.
NOTE: If any of your workloads are sensitive to being shut down ungracefully, be sure to use the
lifecycle.preStop Pod spec.
Once all of the workload Pods are drained, Talos will start shutting down its
If it is a control node, this will include etcd.
preserve is not enabled, Talos will leave etcd membership.
(Talos ensures the etcd cluster is healthy and will remain healthy after our node leaves the etcd cluster, before allowing a control plane node to be upgraded.)
Once all the processes are stopped and the services are shut down, the filesystems will be unmounted. This allows Talos to produce a very clean upgrade, as close as possible to a pristine system. We verify the disk and then perform the actual image upgrade. We set the bootloader to boot once with the new kernel and OS image, then we reboot.
After the node comes back up and Talos verifies itself, it will make the bootloader change permanent, rejoin the cluster, and finally uncordon itself to receive new workloads.
Q. What happens if an upgrade fails?
A. Talos Linux attempts to safely handle upgrade failures.
The most common failure is an invalid installer image reference. In this case, Talos will fail to download the upgraded image and will abort the upgrade.
Sometimes, Talos is unable to successfully kill off all of the disk access points, in which case it cannot safely unmount all filesystems to effect the upgrade.
In this case, it will abort the upgrade and reboot.
upgrade --stage can ensure that upgrades can occur even when the filesytems cannot be unmounted.)
It is possible (especially with test builds) that the upgraded Talos system will fail to start. In this case, the node will be rebooted, and the bootloader will automatically use the previous Talos kernel and image, thus effectively rolling back the upgrade.
Lastly, it is possible that Talos itself will upgrade successfully, start up, and rejoin the cluster but your workload will fail to run on it, for whatever reason.
This is when you would use the
talosctl rollback command to revert back to the previous Talos version.
Q. Can upgrades be scheduled?
A. Because the upgrade sequence is API-driven, you can easily tie it in to your own business logic to schedule and coordinate your upgrades.
Q. Can the upgrade process be observed?
A. Yes, using the
talosctl dmesg -f command.
You can also use
talosctl upgrade --wait, and optionally
talosctl upgrade --wait --debug to observe kernel logs
Q. Are worker node upgrades handled differently from control plane node upgrades?
A. Short answer: no.
Long answer: Both node types follow the same set procedure.
From the user’s standpoint, however, the processes are identical.
However, since control plane nodes run additional services, such as etcd, there are some extra steps and checks performed on them.
For instance, Talos will refuse to upgrade a control plane node if that upgrade would cause a loss of quorum for etcd.
If multiple control plane nodes are asked to upgrade at the same time, Talos will protect the Kubernetes cluster by ensuring only one control plane node actively upgrades at any time, via checking etcd quorum.
If running a single-node cluster, and you want to force an upgrade despite the loss of quorum, you can set
Q. Can I break my cluster by upgrading everything at once?
A. Possibly - it’s not recommended.
Nothing prevents the user from sending near-simultaneous upgrades to each node of the cluster - and while Talos Linux and Kubernetes can generally deal with this situation, other components of the cluster may not be able to recover from more than one node rebooting at a time. (e.g. any software that maintains a quorum or state across nodes, such as Rook/Ceph)