Anywhere you'd run Docker or Podman, you can now run Kubernetes. Ultra-lightweight, OCI-compliant, single-node Kubernetes, under 200 MB RAM. No etcd. No clustering overhead.
Standard Kubernetes is built for multi-node clusters, and a lot of the real world runs on single nodes. Edge devices. Factory gateways. Developer laptops. Remote site hardware. IoT controllers. The millions of machines that have been running Docker or Podman because standing up a full cluster was overhead that couldn't be justified for a single workload host.
That creates a gap. You either run Docker and give up the Kubernetes ecosystem entirely, or you run K3s or MicroK8s and accept that you're carrying clustering machinery you'll never use. KubeSolo closes the gap by taking a different starting position: remove the clustering code rather than disable it.
The result is full Kubernetes, complete API, full control loop, full ecosystem compatibility, with a RAM footprint under 200 MB, optimized for flash storage, and an install that takes under 60 seconds on hardware from a Raspberry Pi to an industrial gateway.
KubeSolo takes Kubernetes and removes everything that only makes sense when there's more than one node: etcd quorum logic, leader election, multi-node networking overlays, control plane distribution. None of it is present, not disabled, removed.
What remains is a full Kubernetes control loop running in a single process. The API server, controller manager, and kubelet all run together. Your existing manifests, Helm charts, and CRDs work without modification.
The design target is anywhere you would have previously reached for Docker or Podman: edge devices, factory hardware, developer laptops, remote sites, IoT gateways, kiosk machines. Same OCI images, better runtime, full ecosystem.
KubeSolo bundles the following technologies together into a single cohesive distribution:
- containerd & crun for container runtime
- CoreDNS for DNS resolution
- Kine for SQLite-based storage (replacing etcd)
It is packaged as a single binary with minimal OS dependencies (a sane kernel and cgroup mounts), secure defaults tuned for lightweight environments, and all required components bundled for offline operation.
KubeSolo's footprint sits under 200 MB RAM because clustering machinery is absent, not dormant. Most lightweight Kubernetes distributions slim down a full distribution; the multi-node code is still there, just inactive. KubeSolo starts from the other end: everything that requires more than one node has been removed.
Three specific design decisions contribute to the smaller footprint:
- No etcd; SQLite (via Kine) replaces it as the state store
- No Kubernetes Scheduler; replaced by a lightweight custom webhook called
NodeSetterthat handles single-node scheduling without the full scheduling machinery - All components run inside a single process rather than as separate binaries
The practical result is a full Kubernetes control loop that runs comfortably on devices with 512 MB of RAM, on flash storage, and in air-gapped environments.
KubeSolo ships in two variants to suit different deployment environments:
| Variant | Binary size | Internet required | Use when |
|---|---|---|---|
| Online (default) | Smaller | Yes | Devices with reliable internet access where binary size matters more than offline capability |
| Offline | Larger | No | Air-gapped environments, factory floors, edge devices with intermittent or no connectivity |
The offline variant bundles all required container images, CNI plugins, and runtime dependencies directly in the binary. Nothing needs to be fetched from the internet at install or runtime. The online variant pulls container images from public registries at startup, keeping the binary smaller at the cost of requiring internet access.
The default installer downloads the online variant. If your devices are air-gapped or have unreliable internet access, use the offline variant.
Warning
Ensure that no container engine (e.g., Docker, Podman, containerd) is installed or active on the target system prior to proceeding. This includes any background services or residual installations that could interfere with KubeSolo networking.
Supported platforms: ARM · ARM64 · x86_64 · RISC-V 64
Step 1, Install: Run the install script with sudo. KubeSolo starts as a systemd service.
The installer detects your architecture and libc automatically. Choose the variant that matches your environment:
Online (default, smaller binary, pulls container images from registries at startup):
curl -sfL https://get.kubesolo.io | sudo sh -Offline (larger binary with all images bundled, no internet required at runtime):
curl -sfL https://get.kubesolo.io | KUBESOLO_OFFLINE=true sudo -E sh -Air-gapped (no internet on the target machine at all):
# On a connected machine, download the bundle
curl -sfL https://get.kubesolo.io | KUBESOLO_OFFLINE=true sh - --download-only=/tmp/kubesolo-bundle
# Transfer the files to the target machine, then install
sudo sh install.sh --offline-install=<archive.tar.gz>The installer also detects your libc variant:
- glibc systems (Ubuntu, CentOS, Debian, etc.): Downloads standard binary
- musl systems (Alpine Linux): Downloads musl-compatible binary
Step 2, Set up kubectl: Copy the admin kubeconfig from /var/lib/kubesolo/pki/admin/admin.kubeconfig to the machine where kubectl is installed, then set the context:
kubectl config use-context kubernetes-admin@kubesolo
kubectl get nodes
# You should see a single node in Ready stateStep 3, Deploy your first workload:
kubectl apply -f https://raw.githubusercontent.com/portainer/kubesolo/develop/examples/mosquitto.yaml
kubectl get all -n mosquittoNote: If you're running KubeSolo on a device with less than 512 MB of RAM, interact with the cluster using an externally installed kubectl.
For detailed installation instructions including support for industrial devices, embedded systems, different init systems, and custom configurations, see the Installation Guide.
The installation guide covers:
- Universal installer with automatic init system detection
- Minimal installer for constrained environments
- Service management across different platforms
- Industrial device considerations (read-only filesystems, limited storage, air-gapped installations)
- Corporate proxy support for environments behind firewalls
- Architecture-specific installations
KubeSolo supports the following command-line flags:
| Flag | Environment Variable | Description | Default |
|---|---|---|---|
--version |
N/A |
Show the version and exit | N/A |
--path |
KUBESOLO_PATH |
Path to the directory containing the kubesolo configuration files | /var/lib/kubesolo |
--apiserver-extra-sans |
KUBESOLO_APISERVER_EXTRA_SANS |
A comma-separated list of additional Subject Alternative Names (SANs) to include in the API server's TLS certificate. These SANs can be IP addresses or DNS names (e.g., 10.0.0.4,kubesolo.local) | "" |
--portainer-edge-id |
KUBESOLO_PORTAINER_EDGE_ID |
Portainer Edge ID | "" |
--portainer-edge-key |
KUBESOLO_PORTAINER_EDGE_KEY |
Portainer Edge Key | "" |
--portainer-edge-async |
KUBESOLO_PORTAINER_EDGE_ASYNC |
Enable Portainer Edge Async Mode | false |
--load-balancer |
KUBESOLO_LOAD_BALANCER |
Enable load balancer. With this enabled, kubesolo will update a newly deployed service with the load balancer type so that the EXTERNAL-IP is set to the node IP | true |
--local-storage |
KUBESOLO_LOCAL_STORAGE |
Enable local storage | true |
--local-storage-shared-path |
KUBESOLO_LOCAL_STORAGE_SHARED_PATH |
Path to the shared file system for the local storage | "" |
--debug |
KUBESOLO_DEBUG |
Enable debug logging | false |
--pprof-server |
KUBESOLO_PPROF_SERVER |
Enable pprof server for profiling | false |
--full |
KUBESOLO_FULL |
Disable memory-saving overrides and use upstream Kubernetes defaults (recommended for CI and development) | false |
--db-wal-repair |
KUBESOLO_DB_WAL_REPAIR |
Run SQLite integrity checks on startup and repair WAL/SHM artifacts if corruption is detected | false |
--disable-ipv6 |
KUBESOLO_DISABLE_IPV6 |
Disable IPv6 support for CoreDNS reverse zones and kubelet node address registration | false |
Example:
To config KubeSolo to use Portainer Edge, you can use the following command:
curl -sfL https://get.kubesolo.io | KUBESOLO_PORTAINER_EDGE_ID=your-portainer-edge-id KUBESOLO_PORTAINER_EDGE_KEY=your-portainer-edge-key sudo -E shPlease see the documentation for complete documentation.
- Go 1.24 or later
- Docker (for ARM builds and dependency management)
- Cross-compilation toolchains (optional, for cross-platform builds)
To build for multiple architectures, install the required cross-compilation toolchains:
sudo make install-cross-compilersThis installs:
gcc-aarch64-linux-gnu(for ARM64)gcc-x86-64-linux-gnu(for AMD64)gcc-arm-linux-gnueabihf(for ARM/ARMHF)riscv64-linux-gnu-gcc(for RISCV64)
Build for your current platform (outputs to ./dist/kubesolo):
make buildBuild for specific architectures using environment variables:
# Build for ARM64
make build GOARCH=arm64
# Build for AMD64
make build GOARCH=amd64
# Build for ARM (ARMHF)
make build GOARCH=arm
# Build for RISCV64
make build GOARCH=riscv64For Alpine Linux compatibility, build musl-compatible static binaries:
# Install musl cross-compilers (one-time setup)
sudo make install-musl-cross-compilers
# Build musl binary for specific architecture
make build-musl GOARCH=amd64
make build-musl GOARCH=arm64
# Build all supported musl architectures
make build-all-muslNote: musl builds are currently supported for amd64 and arm64 architectures only.
Specify a custom output path using the OUTPUT variable:
# Custom filename
make build OUTPUT=./kubesolo-custom
# Platform-specific naming
make build GOARCH=arm OUTPUT=./dist/kubesolo-arm
# Different directory
make build OUTPUT=./bin/kubesolo# Build ARM binary with custom name
make build GOARCH=arm OUTPUT=./dist/kubesolo-linux-arm
# Build AMD64 binary for CI/CD
make build GOARCH=amd64 OUTPUT=./artifacts/kubesolo-linux-amd64For development and testing, you can run KubeSolo directly without building:
# Download dependencies first (only needed once)
make deps
# Run KubeSolo in development mode
make dev- ARM builds: For ARM architecture, containerd binaries are built using Docker cross-compilation for optimal compatibility
- Dependencies: The build process automatically downloads required dependencies (containerd, runc, CNI plugins) for the target architecture
- CGO: All builds use CGO for better performance and compatibility with system libraries
GitHub Issues, submit issues and feature requests.
GitHub, browse source, open pull requests, and contribute.
Security issues in KubeSolo can be reported by sending an email to security@portainer.io.
KubeSolo and the KubeSolo logo are trademarks of Portainer.io Limited. Released under the MIT license.
