Kubernetes k3s lightweight distro

Smooth Operator

The End Is Nigh

I hope your appetite has been suitably whetted. I can't help but think k3s is going to change the way I test Kubernetes.

Being a Linux fan, I often find myself telling non-technical people that most of their televisions, broadband routers, and smartphones use Linux (never mind spacecraft and space stations), and I wonder how long it will be before I'm saying that about embedded versions of Kubernetes.

If you run into problems with k3s, detailed, well-presented docs can be found at the main website [6]. You can use the /usr/local/bin/k3s-uninstall.sh file to uninstall k3s after testing. The output from the script is nice and clear.

Lest you forget the venerable Docker, the docs state: "K3s includes and defaults to containerd …. If you want to use Docker instead of containerd then you simply need to run the agent with the --docker flag" [12].

You can see the Docker run time in action with:

$ k3s agent -u ${MASTER} --token ${TOKEN} --docker &

The next time you have your dog chipped or your washing machine does a software update to change the tune it plays after finishing a load of washing, consider where the IoT evolution is taking us and exactly what part you and the technology you use might play in it.


  1. "100,000 IoT sensors line canal in China's ambitious water diversion project" by Andrew Hobbs, Internet of Business , January 15, 2018: https://internetofbusiness.com/100000-iot-sensors-line-chinas-ambitious-water-diversion-project
  2. k3s: https://k3s.io
  3. Rancher website: https://rancher.com
  4. GitHub: https://github.com/rancher/k3s
  5. etcd: https://etcd.io
  6. k3s docs: https://rancher.com/docs/k3s/latest/en/
  7. containerd: https://containerd.io
  8. Cluster networking broken? https://github.com/rancher/k3s/issues/24
  9. AWS: https://aws.amazon.com/
  10. Terraform: https://www.terraform.io/
  11. Roles for Worker nodes: https://github.com/rancher/k3s/issues/878
  12. Docker as the container run time: https://rancher.com/docs/k3s/latest/en/advanced/

The Author

Chris Binnie's latest book, Linux Server Security: Hack and Defend, shows how hackers launch sophisticated attacks to compromise servers, steal data, and crack complex passwords, so you can learn how to defend against such attacks. In the book, he also shows you how to make your servers invisible, perform penetration testing, and mitigate unwelcome attacks. You can find out more about DevOps, DevSecOps, Containers, and Linux security on his website: https://www.devsecops.cc.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy ADMIN Magazine

Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs

Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>


		<div class=