This project manages a home laboratory environment: infrastructure provisioning on Proxmox, Kubernetes cluster setup using K3s, application deployment via Helm, GitOps with ArgoCD, and secrets management with HashiCorp Vault + External Secrets Operator.
Network note: both clusters now use Cilium for the local data plane and Gateway API ingress, while inter-cluster connectivity still rides on Tailscale. After rebuilding either cluster, re-run just connect-clustermesh <homelab-ts-ip>:32379 <oracle-ts-ip>:32379 from k8s/helm/ or cloud/oracle/ so ClusterMesh refreshes the remote config and CA bundle over the Tailscale NodePort path.
- Project Conventions & AI Guide: System design, tech stack, and development rules.
- Infrastructure (Proxmox/Terraform): VM provisioning and host preparation.
- Kubernetes (K3s/Ansible): Cluster setup and node configuration.
- Applications (Helm/Manifests): Deploying the monitoring stack, databases, and personal services.
- External Access (Cloudflare/Terraform): Tunnel and DNS management.
- GitOps (ArgoCD): Application manifests and AppProject definitions.
- Project Roadmap: Current status and future plans.
- Infrastructure:
cd proxmox/terraform && just init && just apply - Kubernetes:
cd k8s/ansible && just setup-k8s && just fetch-kubeconfig - Observability stack:
cd k8s/helm && just init && just deploy-all - Secrets:
cd k8s/helm && just deploy-vault && just vault-init && just vault-unseal && just deploy-eso - GitOps:
cd k8s/helm && just deploy-argocd— ArgoCD then auto-deploys all managed apps from Git - External Access:
cd cloudflare/terraform && just init && just apply
For AI assistant context, this project uses docs/CONVENTIONS.md (linked as CLAUDE.md and GEMINI.md in root).