Skip to content

alfi0812/talos

Repository files navigation

🧊 Personal Talos Kubernetes Cluster

A self-hosted, GitOps-driven Kubernetes cluster built on Talos Linux, focused on reliability, observability, and clean automation.

Truenas   Talos   Kubernetes   Flux  

Home-Internet   Status-Page   Alertmanager

Age-Days   Uptime-Days   Node-Count   Pod-Count   CPU-Usage   Memory-Usage   Alerts  


📌 Overview

This repository contains the full GitOps-managed configuration for my personal Kubernetes cluster. The cluster runs on Talos Linux and is fully declarative: every component, application, and configuration is defined in Git and continuously reconciled using FluxCD.

Key goals of this setup:

  • 🔁 Reproducibility – rebuild the entire cluster from Git
  • 🔒 Immutability & Security – minimal OS, no SSH, API-driven management
  • 📈 Observability – metrics, alerts, and public status visibility
  • 🤖 Automation-first – updates, deployments, and testing without manual intervention

🧠 Design Decisions

Why Talos Linux?

  • Immutable, minimal OS reduces attack surface
  • No SSH or package manager
  • Fully API-driven, ideal for GitOps-based Kubernetes clusters

Why FluxCD?

  • Continuous reconciliation instead of one-shot deployments
  • Native Kubernetes integration
  • Works seamlessly with SOPS for encrypted secrets

Why a Single-Node Cluster?

  • Simplifies operations and reduces complexity
  • Ideal for homelab and learning environments
  • Focuses on reproducibility rather than high availability

📡 Networking Assumptions

This cluster assumes a simple and reliable home network environment.

  • The Talos VM relies on the Fritzbox router for primary network connectivity
  • No advanced routing, BGP, or multi-homing is assumed
  • Networking is optimized for simplicity and stability rather than redundancy
  • External access is handled via managed ingress and tunnels where required

🧩 Core Components

Component Description
Kubernetes Container orchestration platform for running and managing workloads
Talos Linux Immutable, API-driven Linux distribution purpose-built for Kubernetes
FluxCD GitOps operator used for continuous reconciliation of cluster state
Mend Renovate Automatically tracks and updates container images and dependencies
GitHub Actions CI pipelines for validation, linting, and testing of cluster configs
SOPS Encryption of all secrets and credentials stored in Git, integrated with FluxCD
Clustertool Bootstrap tool from TrueForge used to build the basic Cluster Structure and Setup

🗂 Directory Structure

clusters/
└── main/
    ├── components/   # Common components applied to multiple parts of the cluster
    ├── kubernetes/   # Applications and Kubernetes workloads
    └── talos/        # Talos Linux machine and cluster configuration

repositories/
├── entries/           # Repository entry definitions
├── git/               # Flux GitRepository sources
├── helm/              # Flux HelmRepository sources
└── oci/               # Flux OCIRepository sources

🔐 Secrets Management

All secrets and credentials are stored in this repository encrypted with SOPS.

  • Secrets are committed to Git in encrypted form
  • Decryption happens inside the cluster via FluxCD
  • Decryption keys are managed externally and are never stored in Git
  • This enables full GitOps workflows without exposing sensitive data

☁️ Cloud & External Dependencies

Service Usage
Cloudflare DNS management, tunnels, and S3-compatible object storage
GitHub Source control, CI, and GitOps reconciliation source

🖥 Hardware

TrueNAS Storage Server

Component Specification
CPU AMD Ryzen 7 5700G
RAM 64 GB DDR4 @ 3200 MHz
SAS Controller LSI SAS 9300-16i
Boot Drive 1× Crucial P310 500 GB NVMe
Metadata VDEV 2× Samsung 870 EVO 1 TB (Mirror)
Data VDEV 6× Seagate Exos X24 16 TB HDD
Remote Management NanoKVM PCIe Edition

Talos Kubernetes Node

Component Specification
CPU AMD Ryzen 9 9950X
RAM 128 GB DDR5 @ 5600 MHz
Storage 2 TB Crucial P3 Plus NVMe
GPU Sparkle Intel Arc A770 (16 GB)
Remote Management NanoKVM PCIe Edition

📊 Monitoring & Status

  • 📈 Metrics & Dashboards via Prometheus-compatible tooling
  • 🚨 Alerting with Alertmanager
  • 🌍 Public Status Page for service and connectivity visibility
  • 🧮 Cluster Statistics exposed via Kromgo and Shields.io

🙏 Acknowledgements

This cluster is heavily inspired by and built upon the excellent work of:

Their open-source contributions and documentation made this setup possible.


⚠️ Note This repository is public for transparency and learning purposes. Secrets and credentials are stored in Git in encrypted form using SOPS. Decryption keys are managed externally and are not committed to the repository, ensuring sensitive values remain protected.

🧪 This cluster is used as a learning, testing, and long-running homelab environment.
Configurations may evolve as new Kubernetes, Talos, or GitOps features are evaluated.

Contributors 2

  •  
  •  

Languages