Is Using Rootless k3s Worth the Extra Effort?

0
10
Asked By TechieNomad42 On

I'm setting up a home lab with k3s on Proxmox because I want to learn Kubernetes and improve my skills. I plan to scale my setup, even deploying some nodes at friends' and family's places. I'm also open-sourcing my Terraform, Ansible, and Helm charts to showcase my work for future job opportunities. I'm doing everything from scratch, relying only on documentation and online resources. My main question is: is it worth running k3s as a non-root user? I'm concerned about security since my nodes won't access other network resources. While I see the potential issue of container breakout attacks, my services aren't publicly accessible. What do you all think?

5 Answers

Answered By HomelabHustler23 On

For most homelab setups, rootless k3s creates way more headaches than it's worth. You can achieve better security and management through node isolation, network policies, and robust RBAC settings rather than going rootless. If your goal is to learn and boost your resume, you’ll gain much more by focusing on stable networking and security patterns than wrestling with rootless issues.

Answered By DevOpsDiva7 On

Rootless mode is typically used when you absolutely can't run as root. Unless it's your last resort, I wouldn't recommend it—it just complicates things unnecessarily.

Answered By CloudWizard1 On

Honestly, I don't think it's really worth it. You can easily restrict containers to non-root, but trying to make k3s run without root adds a lot of complexity for minimal advantages. It can be a hassle for limited gain.

Answered By HomeLabGuru88 On

From my experience, the rootless setup didn’t go as smoothly as I hoped. I ran into issues even with basic services like HomeAssistant and faced challenges with GPU support and other integrations. For my needs, regular k3s works perfectly. I think enterprises focus more on effective node isolation rather than running rootless configurations.

Answered By K8sExplorer99 On

Skip the rootless version if you can. It works, but only on a single node with lots of networking limitations due to strict isolation. Enterprises usually prioritize practical installations, often running multiple privileged pods for monitoring. It’s best to run k3s as it’s intended and just figure out your security policies from there.

K8sMaintainer44 -

As a maintainer, I'd say that 'normal' setups really depend on your use case. For on-prem clusters, something like Talos can be viable, but I think folks are still figuring out how dedicated distributions like that fit into broader deployments.

Related Questions

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.