Public GitOps repository for showing how I run my services on k3s
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
Renovate Bot c03d0d92c2 Update renovate/renovate Docker tag to v31.38.3 3 hours ago
_apps install mealie 3 weeks ago
_test only warn for some policies 2 years ago
acmedns disable registration 2 months ago
argocd Update Docker tag to v2.2.2 3 weeks ago
cert-manager Merge pull request 'Update Docker tag to v1.6.1' (#567) from renovate/ into master 2 months ago
docspell reconfigure docspell to be compatible again 3 weeks ago
drone Update Docker tag to v2.7.3 3 weeks ago
familydb allways pull image 9 months ago
graphs enable new grafana alerting 6 days ago
healthcheck correct ns for hc 5 months ago
influxdb upgrade influxdb2 2 months ago
ioteer traccar env var 3 months ago
ipapi fix ingresses 1 month ago
k8up install k8up crds 1 month ago
kube-cleanup-operator Update Docker tag to v0.8.2 7 months ago
kube-system new config for externalTrafficPolicy 2 weeks ago
mealie mealie is running on port 80 - why 3 weeks ago
miniflux Update Docker tag to v2.0.34 1 month ago
mosquitto uninstall Cedalo Management Center 2 weeks ago
mqttwarn move to correct place 2 months ago
owntracks Update Docker tag to v7.2.1 4 weeks ago
pylokid install pylokid 2 years ago
renovate Update renovate/renovate Docker tag to v31.38.3 3 hours ago
sealed-secrets correct ns 2 weeks ago
stakater-reloader upgrade reloader manifests 2 weeks ago
system-upgrade-controller Update rancher/system-upgrade-controller Docker tag to v0.8.1 1 month ago
tobru-ch Update ghost Docker tag to v4.32.3 3 hours ago
traccar Update Docker tag to v10.7 2 months ago
.drone.yml use kubernetes for drone build 5 months ago rshared info 5 months ago
renovate.json statping is gone 4 months ago

GitOps for tbrnt k3s hosting

Build Status

Repo structure

  • Each subdirectory is a namespace
  • _apps is the meta directory for Argo CD apps
  • Another private repo contains stuff in a more approachable format, f.e. for dealing with updating sealed-secrets: gitops-tbrnt-private
  • _tests contains some Open Policy Agent rego files which are used in the Drone CI pipeline to validate configuration.


Argo CD



sudo -E kubefwd svc -n argocd and then https://argocd-server/


kubectl port-forward svc/argocd-server -n argocd 8080:443 and then https://localhost:8080/


  • argocd login argocd-server
  • argocd app list
  • argocd app sync <name>

Kubeseal (Sealed Secrets)

See README of apps. Basically:

kubeseal --controller-namespace sealed-secrets -o yaml -n MYNS < ../../gitops-tbrnt-private/MYNS/MYSECRET.yaml > MYSECRET-secret.yaml

Bootstrap GitOps

After installing k3s, do:

# install Argo CD
kubectl create ns argocd
kubectl apply -n argocd -f
kubectl get pods -n argocd -l -o name | cut -d'/' -f 2
argocd login argocd-server

# Restore Sealed Secrets secret key
kubectl create ns sealed-secrets
kubectl apply -f ../gitops-tbrnt-private/sealed-secrets/master-key.yaml

# Instantiate Argo Root App
kubectl apply -f _apps/apps.yaml

# Let Argo CD do it's job
argocd app sync apps
argocd app sync sealed-secrets
argocd app sync -l


  • Restore PVCs via K8up

k3s on Alpine

Installing: Alpine

Basically follow the Alpine wiki.

Then install prerequisites and some essential packages:

apk add \
  vim \
  iptables \
  wireguard-virt \
  bash \

Needs community repo enabled in /etc/apk/repositories.

Tweak Sysctl in /etc/sysctl.conf:

fs.inotify.max_user_instances = 8192
fs.inotify.max_user_watches = 524288

Add rshared mount option to root filesystem for node-exporter to work correctly.

Installing: k3s

Via k3sup:

k3sup install \
  --ip= \
  --user=root \
  --local-path=~/.kube/config_knurrli2 \
  --sudo=false \
  --k3s-extra-args='--tls-san --cluster-cidr --flannel-backend wireguard'

Helpful infos


  • Volumes: /var/lib/rancher/k3s/storage/
  • Config: /etc/rancher/k3s/
  • Manifests: /var/lib/rancher/k3s/server/manifests/


Configure Wireguard


auto wg0
iface wg0 inet static
    pre-up ip link add dev wg0 type wireguard
    pre-up wg setconf wg0 /etc/wireguard/wg0.conf
    post-up ip route add dev wg0
    post-down ip link delete dev wg0