Table of Contents
K3s in Action
Author

Date

Book a call
K3s in Action: Why We Chose It First, and How It Scales with Us
Low Learning Curve for Devs and Infra Teams
- Bundled core Kubernetes binaries into a single binary under ~100MB.
- Uses SQLite or lightweight etcd for the datastore.
- Designed to run on minimal hardware (512MB RAM is sufficient for simple clusters).
- Built-in load balancer, local storage, and simplified TLS handling.
- Developers to run the same orchestrator locally as in staging or production.
- Teams to quickly boot up environments on edge VMs or low-cost cloud instances.
- The DevOps team to focus engineering efforts on security, CI/CD, and system design—without spending time debugging the Kubernetes control plane.
How We Use K3s Technically
Bootstrapping a Cluster
- We use Traefik (bundled) or nginx-ingress depending on team preference.
- cert-manager issues TLS certs via Let’s Encrypt.
- Internal DNS handled by CoreDNS.
CI/CD Integration
CI/CD Flow Overview
- Step 1: Build & Push Artifacts
- Step 2: Helm/Manifest Deployment
- Step 4: Health Checks & Rollbacks
Security and Observability
- TLS bootstrapping, rotation, and etcd encryption are handled automatically by K3s.
- We ship logs via Fluent Bit to a central Loki/Grafana stack.
- Prometheus scrapes metrics from pods and node exporters.
What Worked Well
Dev-Prod Parity
Speed + Simplicity
Lower Operational Burden
- No kubeadm complexities.
- Easier node recovery (just re-run the agent install).
- Control plane restarts or config reloads take seconds—not minutes.
Planning to Scale
- We move into multiple regions or AZs.
- RPS starts going above expected thresholds.
- We need tighter integrations with AWS-native services (like ALB Ingress or IRSA for IAM roles).
| Phase | Cluster Design | Notes |
|---|---|---|
| Now | K3s (HA clusters) | Lightweight, fast iterations, internal + some external services
|
| Mid | K3s + EFS/EBS + External DB
| Add managed storage, move DBs out of cluster
|
| Scale | Migrate to EKS | Keep manifest compatibility, adopt autoscaling, ALB, IAM roles, etc.
|
We’re designing our Helm charts, manifests, and secrets management to be cloud-agnostic, so EKS migration is mostly about bootstrapping infra—not rewriting workloads.

Why It’s Not Just a Dev-Test Cluster
- Handles read-heavy APIs under load.
- Hosts staging + internal sandbox environments.
- Developer bootstrapped clusters are used to test real IaC/CD flows.
End to End flow
TL;DR:
- K3s helped us deploy fast and stay production-ready for MVPs and internal tooling.
- Simple setup, dev-prod parity, and low ops overhead made it ideal.
- We're future-proofing with Helm/manifest reusability for EKS migration when scale hits.

Final Thoughts
- CI/CD automation
- Observability
- Multi-tenancy
- Secrets and security
Dive deep into our research and insights. In our articles and blogs, we explore topics on design, how it relates to development, and impact of various trends to businesses.





