Skip to content

Commit 20bfaff

Browse files
Merge branch 'master' into dependabot/npm_and_yarn/master/typescript-eslint/eslint-plugin-8.51.0
2 parents 3008965 + ab2f261 commit 20bfaff

File tree

10 files changed

+6018
-20988
lines changed

10 files changed

+6018
-20988
lines changed

.github/workflows/screenshot_capture.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ jobs:
115115
uses: Wandalen/wretry.action@v3
116116
with:
117117
attempt_limit: 3
118-
action: actions/download-artifact@v6
118+
action: actions/download-artifact@v7
119119
with: |
120120
name: build
121121
path: build
@@ -141,7 +141,7 @@ jobs:
141141
steps:
142142

143143
- name: Download blob reports from GitHub Actions Artifacts
144-
uses: actions/download-artifact@v6
144+
uses: actions/download-artifact@v7
145145
with:
146146
path: screenshots
147147
pattern: screenshots-*

.github/workflows/visual-comparison.yaml

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -145,7 +145,7 @@ jobs:
145145
uses: Wandalen/wretry.action@v3
146146
with:
147147
attempt_limit: 3
148-
action: actions/download-artifact@v6
148+
action: actions/download-artifact@v7
149149
with: |
150150
name: build
151151
path: build
@@ -187,7 +187,7 @@ jobs:
187187
attempt_delay: 60000 # 1 minute
188188

189189
- name: Download blob reports from GitHub Actions Artifacts
190-
uses: actions/download-artifact@v6
190+
uses: actions/download-artifact@v7
191191
with:
192192
path: all-blob-reports
193193
pattern: blob-report-*
@@ -232,7 +232,7 @@ jobs:
232232
echo "HTML_REPORT_URL_PATH=reports/$BRANCH_SAFE/${{ github.run_id }}/${{ github.run_attempt }}" >> $GITHUB_ENV
233233
234234
- name: Download zipped HTML report
235-
uses: actions/download-artifact@v6
235+
uses: actions/download-artifact@v7
236236
with:
237237
name: report
238238
path: ${{ env.HTML_REPORT_URL_PATH }}

docs/docs-content/clusters/cluster-management/ssh/ssh-keys.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ you need a public SSH key registered in Palette.
1818

1919
## Limitations
2020

21-
- Only RSA SSH keys are supported when deploying [Azure AKS clusters](../../public-cloud/azure/aks.md).
21+
- Only RSA and ED25519 SSH keys are supported when deploying [Azure AKS clusters](../../public-cloud/azure/aks.md).
2222

2323
## Prerequisites
2424

docs/docs-content/clusters/edge/edgeforge-workflow/palette-canvos/build-maas-image.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ your Edge deployment.
4242
- [Docker Engine](https://docs.docker.com/engine/install/)
4343
- (Optional) [Earthly](https://earthly.dev/)
4444
- [Git](https://git-scm.com/book/en/v2/Getting-Started-Installing-Git)
45-
- [`qemu-utils`](https://installati.one/install-qemu-utils-ubuntu-20-04/)
45+
- [`qemu-utils`](https://www.qemu.org/download/)
4646

4747
## Build MAAS Images
4848

docs/docs-content/clusters/public-cloud/azure/aks.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ explains how you can create an Azure AKS cluster managed by Palette.
2626
- An active Azure cloud account integrated with Palette. Review
2727
[Register and Manage Azure Cloud Account](./azure-cloud.md) for guidance.
2828

29-
- A Secure Shell (SSH) key that you have pre-configured in your Azure environment. Only RSA SSH keys are supported when
30-
deploying Azure AKS clusters. Refer to the [SSH Keys](../../cluster-management/ssh/ssh-keys.md) guide for more
31-
information about creating and managing SSH keys in Palette.
29+
- A Secure Shell (SSH) key that you have pre-configured in your Azure environment. Only RSA and ED25519 SSH keys are
30+
supported when deploying Azure AKS clusters. Refer to the [SSH Keys](../../cluster-management/ssh/ssh-keys.md) guide
31+
for more information about creating and managing SSH keys in Palette.
3232

3333
- An infrastructure cluster profile for Azure. Review
3434
[Create an Infrastructure Profile](../../../profiles/cluster-profiles/create-cluster-profiles/create-infrastructure-profile.md)
@@ -256,7 +256,7 @@ to learn more about the ports used for communication.
256256
| **Resource Group** | Select the name of the resource group that contains the Azure resources you will be accessing. |
257257
| **Storage Account** | Optionally, if you have a custom storage account available, you can use the **drop-down Menu** to select the storage account name. For information about use cases for custom storage, review [Azure Storage](../azure/architecture.md#azure-storage). |
258258
| **Storage Container** | Optionally, if you are using a custom storage container, use the **drop-down Menu** to select it. For information about use cases for custom storage, review [Azure Storage](../azure/architecture.md#azure-storage). |
259-
| **SSH Key** | The public SSH key for connecting to the nodes. SSH key pairs must be pre-configured in your Azure environment. Only RSA SSH keys are supported when deploying Azure AKS clusters. The key you select is inserted into the provisioned VMs. For more information, review Microsoft's [Supported SSH key formats](https://learn.microsoft.com/en-us/azure/virtual-machines/linux/mac-create-ssh-keys#supported-ssh-key-formats). |
259+
| **SSH Key** | The public SSH key for connecting to the nodes. SSH key pairs must be pre-configured in your Azure environment. Only RSA and ED25519 SSH keys are supported when deploying Azure AKS clusters. The key you select is inserted into the provisioned VMs. For more information, review Microsoft's [Supported SSH key formats](https://learn.microsoft.com/en-us/azure/virtual-machines/linux/mac-create-ssh-keys#supported-ssh-key-formats). |
260260
| **Enable Private Cluster** | Whether the control plane or API server should have internal IP addresses. Refer to the [Create a private AKS cluster](https://learn.microsoft.com/en-us/azure/aks/private-clusters?tabs=azure-portal) guide for more information. |
261261
| **Static Placement** | By default, Palette uses dynamic placement. This creates a new VNet for clusters with two subnets in different availability zones. Palette places resources in these clusters, manages the resources, and deletes them when the corresponding cluster is deleted.<br /><br />If you want to place resources into a pre-existing VNet, enable the **Static Placement** option and fill out the input values listed in the [Static Placement](#static-placement-settings) table below. <br /> <br /> Select **Static Placement** for clusters where you want to use your network proxy configurations. To learn more about proxy configurations, check out [Proxy Configuration](./architecture.md#proxy-configuration). |
262262

docs/docs-content/release-notes/known-issues.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -16,6 +16,7 @@ The following table lists all known issues that are currently active and affecti
1616

1717
| Description | Workaround | Publish Date | Product Component |
1818
| ------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------ | ---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------- | ------------------ | ---------------------------- |
19+
| <!-- https://spectrocloud.atlassian.net/browse/DOC-2430 --> <!-- prettier-ignore-start --> [Palette Management Appliance](../enterprise-version/install-palette/palette-management-appliance.md) and [VerteX Management Appliance](../vertex/install-palette-vertex/vertex-management-appliance.md) installations may become stuck due to `ErrImagePull` errors on the <VersionedLink text="Calico" url="/integrations/packs/?pack=cni-calico" /> pods. This affects all Palette versions later than 4.8.0. <!-- prettier-ignore-end --> | Restart the node on which the pod is scheduled and wait for the pod to recover. | January 27, 2025 | Clusters, Packs |
1920
| <!-- PAC-3584 --> AWS EKS clusters using <VersionedLink text="Kubernetes (EKS)" url="/integrations/packs/?pack=kubernetes-eks" /> version 1.33 with Palette as an Identity Provider (IdP) fail to deploy. This is due to `IdentityProviderConfigName` not being automatically injected into the `values.yaml` file. | In the `managedControlPlane.oidcIdentityProvider` section of your cluster profile's Kubernetes layer, add the value `identityProviderConfigName: "eks-oidc"`. | December 30, 2025 | Packs |
2021
| Velero backups may fail with errors `Timed out awaiting reconciliation of volumesnapshot hipster-app/velero-data-redis-cart-2-zctck`. This occurs because the CloudStack CSI Helm chart is missing the required csi-snapshotter sidecar container in the controller deployment, preventing CSI snapshot operations from executing. As a result, all CSI-based snapshots and any Velero backups that rely on them time out and fail. | No workaround available. | December 17, 2025 | Packs |
2122
| Edge hosts using encrypted persistent partitions may fail to complete a reset. A limitation in Kairos version 3.5.3 prevents these partitions from being reinitialized during the reset workflow, resulting in the operation stopping prematurely. | Refer to [Troubleshooting - Edge](../troubleshooting/edge/edge.md#scenario---edge-host-reset-fails-with-encrypted-persistent-partition) for the workaround. | December 17, 2025 | Edge |

docs/docs-content/release-notes/release-notes.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -465,8 +465,8 @@ The [CanvOS](https://github.com/spectrocloud/CanvOS) version corresponding to th
465465

466466
<!-- https://spectrocloud.atlassian.net//browse/PEM-8306 -->
467467

468-
- The Virtual Machine Orchestrator (VMO) now supports the persistent EFI parameter, enhancing support for airgapped
469-
usecases. Previously, VM creation only supported Secure Boot under bootloader.efi and omitted persistent.
468+
- The Virtual Machine Orchestrator (VMO) now supports the persistent EFI parameter, enhancing support for airgapped use
469+
cases. Previously, VM creation only supported Secure Boot under bootloader.efi and omitted persistent.
470470

471471
#### Bug Fixes
472472

docs/docs-content/tutorials/getting-started/palette/azure/setup.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -72,7 +72,8 @@ the [Cluster Management with Terraform](./deploy-manage-k8s-cluster-tf.md) tutor
7272

7373
:::warning
7474

75-
Only RSA SSH keys are supported when deploying [Azure AKS clusters](../../../../clusters/public-cloud/azure/aks.md).
75+
Only RSA and ED25519 SSH keys are supported when deploying
76+
[Azure AKS clusters](../../../../clusters/public-cloud/azure/aks.md).
7677

7778
:::
7879

0 commit comments

Comments
 (0)