Aquarium
Highly-opinionated Linux-centric scaffold for local multi-node Kubernetes development. Ages like fine milk - locally alive, but elegantly tying a bow on this mess while keeping it wholistically up to date is a circus performance to do.
Install / Use
/learn @zer0def/AquariumREADME
Aquarium - highly-opinionated Linux-centric scaffold for local multi-node Kubernetes development
Summary
Aquarium's design goal is to leverage Docker (using k3s/k3d) or LXD (using proper Kubernetes through Kubedee) to provide a comparatively lightweight scaffold for launching multi-node Kubernetes development environments on your local machine, while trying to address some of a pain points of doing so.
Most notably, this project tries really hard to avoid using operators where they're not necessary, as they usually serve as means to upsell the user on a product, while funnelling away from otherwise perfectly available configuration options and into each respective party's walled garden to gauge for.
Usage
aquarium - Linux-centric scaffold for local K8S development
Usage: aquarium.sh [options] <up|down>
Options:
--no-*, --with-* disable/enable installation of selected
component (choice of: registry-proxy,
monitoring, serverless, service-mesh,
storage, local-registry,
env: non-zero value on INSTALL_*)
-N <name>, --name <name> cluster name (default: k3s-default,
env: CLUSTER_NAME)
-n <num>, --num <num> number of workers (default: `nproc`/4,
env: NUM_WORKERS)
-r <runtime>, --runtime <runtime> runtime choice (default: k3d,
choice of: k3d, kubedee,
env: K8S_RUNTIME)
-t <tag>, --tag <tag> set runtime version (env: RUNTIME_TAG)
-s <pool>, --storage-pool <pool> LXD storage pool to use with Kubedee
(default: default,
env: LXD_STORAGE_POOL)
--vm launch cluster in LXD VMs, instead of LXD
containers (requires `-r kubedee`)
-c <mem>, --controller-mem <mem> memory to allocate towards K8S controller
(requires `--vm`, default: 2GiB,
env: CONTROLLER_MEMORY_SIZE)
-w <mem>, --worker-mem <mem> memory to allocate per K8S worker
(requires `--vm`, default: 4GiB,
env: WORKER_MEMORY_SIZE)
-R <size>, --rootfs-size <size> build rootfs image of provided size
(requires `--vm`, default: 20GiB,
env: ROOTFS_SIZE)
Environment variables:
Registry proxy (ref: https://github.com/rpardini/docker-registry-proxy#usage ):
PROXY_REGISTRIES space-delimited string listing registry domains to cache
OCI image layers from
AUTH_REGISTRIES space-delimited string listing "domain:username:password"
information for the proxy to authenticate to registries
Project status
Highly bug-riddled alpha, YMMV. You probably should skim through, before using. You have been warned.
Project rationale
Resource usage
Other solutions targeted for Kubernetes development (taking Minikube & friends as an example) can be resource-taxing due to hypervisor overhead, which this avoids through usage of OCI/system containers. For Windows and MacOS X users, in terms of memory, that potentially means packing more into their Hyper-V/xhyve Docker VM or WSL-based VM, than Minikube or Docker-packaged Kubernetes might, though at possible cost of added CPU overhead, since those are still hypervised.
Don't fight your tools when you don't need to
Even with constant various improvements in upstream projects, over the years there has been a number of barely-addressed crippling corner cases, solutions to some of which have rotten away in experimental branches before eventually getting upstreamed after everyone has abandoned them by virtue of not wanting to endlessly fight the tools they need.
Emulate your target environment without development/provider-specific cruft
There's also an issue of developing (and, perhaps more importantly, adequately testing) Kubernetes manifests for things like solution resilience or scalability, which you cannot properly do on a single-node environment without making development-specific additions/exceptions to your manifests. This allows you to focus on your goal, not how to make it work within artificial constraints, most of the time.
Dependencies
Binaries/scripts (but not OCI images or Helm charts) listed below are expected to be in your system's PATH.
Hard dependencies
Optional dependencies (enabled by default!)
- docker-volume-loopback (when Docker root is running on a filesystem not supporting overlays)
- docker-registry-proxy (transparent proxy for caching OCI image layers)
- Kata Containers
Charts/software used, depending on component selection
Logical components are split into namespaces according to the following logic:
- storage:
- network/service mesh: Istio
- monitoring:
- Loki
- OpenSearch
- Prometheus-Operator with Thanos or Cortex
- serverless: OpenFAAS, possibly Fission
- development:
Known issues
- Kata's available only through Kubedee
- Kubedee: Registry proxy not deployed as an LXD container, making Docker a harder dependency than it genuinely needs to be
- most likely inconsistent whitespace handling, deal with it
Legalese
Reality says "put it under WTFPL", but sure, let's try LGPL3.
Related Skills
node-connect
349.2kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
prose
349.2kOpenProse VM skill pack. Activate on any `prose` command, .prose files, or OpenProse mentions; orchestrates multi-agent workflows.
frontend-design
109.5kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
349.2kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
