Free and open source

From fresh machine to working cluster.

GitOps, recovery, and security are built in from the start, so the path from bootstrap to day-2 operations stays repeatable, resilient, and easier to recover instead of drifting into one-off node state.

For homelabs: lower the experience barrier, cut the maintenance burden, and keep a distributed lab rebuildable across the hardware you already have.

For enterprise: govern the baseline, make capacity predictable, and push platform operations away from pets and toward reviewable cattle.

For homelabs

Make a lab easier to run.

Lower the experience burden, cut the babysitting, and turn spare hardware into a cluster that can survive node loss, fail over across friends' houses, and pull in AWS, Azure, or Google Cloud capacity when uptime matters more than purity.

For enterprise

Make production repeatable.

Governance, policy, secrets, recovery, and GitOps tied to one controlled path that turns pet infrastructure into something far closer to cattle, with HA and recovery posture that can span on-prem, off-site, and cloud-backed capacity.

$ task initialize
bootstrap: generated
delivery: published
cluster: awaiting first node

Day-0

Bootstrap

Day-1

Baseline

Day-2+

GitOps

Who it's for

Different starting points. The same need for a cleaner path.

Why they use it

Why it’s worth the effort.

You stop paying for every mistake twice

A repeatable bootstrap path plus Git-driven change means a bad experiment or dead machine does not have to become a full rediscovery project, and recovery stops depending on memory alone.

You get real resilience out of imperfect hardware

Longhorn-style replicated storage, clustered nodes, and remote reachability make it much easier to treat spare machines as capacity instead of as isolated boxes you hope never die, including hardware spread across homes and borrowed shelves.

You can keep building without losing control

Argo CD and Gitea give the lab a source of truth, so edits, experiments, and rollbacks can happen through commits instead of mystery changes on live nodes.

You can share the lab without turning it into a trust exercise

Tailscale, routed access, identity, and secrets management make it easier to share a pooled setup with other people without turning every admin surface into a trust exercise or every admin task into a one-person job.

You find problems before your users do

Prometheus, Grafana, Alertmanager, and notifications give you a way to see what is failing, what is degrading, and what needs attention before somebody else tells you first.

You can let other people help without losing the plot

Homepage, Headlamp, Authentik, and mesh access make it easier for more than one person to reach the right interfaces, understand what is running, and help maintain the setup even when they are not the most infrastructure-savvy person in the group.

You stop rebuilding process from scratch in every environment

A defined machine-to-cluster path makes it easier to recover environments, replace nodes, and avoid treating every outage, rebuild, or expansion as a custom project.

You can use cheaper capacity without giving up uptime

The same operating model can use on-prem hardware where it makes economic sense, then fail over or extend into cloud capacity when uptime, demand, or recovery conditions require it.

You get one place to prove how production is supposed to work

Gitea plus Argo CD give teams a more definitive way to prove intended state, review change, and reconcile production back to code.

You make audits less about storytelling and more about evidence

Identity, secrets, policy, and audit-oriented controls make it easier to show what should be running, why it is allowed, and how the platform is managed when compliance pressure arrives.

You reduce the gap between signal and response

Prometheus, Grafana, Alertmanager, and related tooling give teams a shared view of platform health, routed alerts, and a faster path from signal to response.

You can scale operations without scaling side channels

Routed portals, identity-aware access, and Kubernetes-facing UI tools make it easier for multiple operators to work inside one platform model without falling back to unmanaged side access.

Lifecycle

From first machine to a distributed homelab.

From first node to governed global failover.

Traditional Day-0

Bootstrap the first machine

Gather the API keys and config Adaetum needs, generate the custom ISO, and boot the first machine. The node setup itself is meant to be fully automatic once the image is in place.

Generate configuration and installer artifacts, activate the first node, and bring up the governed baseline services the platform will depend on from day one.

Traditional Day-1

Turn bootstrap into a working baseline

In the homelab case, day-1 is intentionally light. If you want to change how nodes or baseline apps come up automatically, this is where you edit the repo files that drive that provisioning.

Add nodes, verify health and routed access, and turn machine bring-up into a supportable baseline with fewer side channels and special cases.

Traditional Day-2+

Operate through source of truth

Once the cluster is up, you interact with it through the apps it deploys and make ongoing changes through Git. That keeps rollbacks fast, repeatable, and much easier than fixing drift node by node.

Use Gitea as the operational source of truth and let Argo CD reconcile the platform so production change flows through desired state instead of node-by-node intervention.

OS and host bootstrap layer

The host layer is about getting machines into the platform cleanly and keeping enforcement tied to the same automation path afterward.

Rocky Linux

The primary host operating system path Adaetum targets today for kickstart-driven installs and predictable first-machine bring-up.

Key capabilities

  • Enterprise Linux compatibility built from Red Hat Enterprise Linux sources.
  • Long-term stability and predictable maintenance for servers and platform hosts.
  • Community-governed distribution aimed at production infrastructure use.

Cluster foundation layer

The foundation layer is what turns first boot into a durable platform with cluster management, storage, and certificates already accounted for.

RKE2

The Kubernetes distribution at the center of Adaetum's cluster model from first-node activation through steady-state operations.

Key capabilities

  • CNCF-conformant Kubernetes distribution focused on security and compliance.
  • Packaged core services for networking, ingress, DNS, and metrics.
  • Hardened defaults and simplified installation for production clusters.

GitOps and source of truth layer

This layer is the steady-state core: commit changes, keep one source of truth, and let reconciliation do the routine platform work.

Argo CD

The reconciliation engine that applies desired state from Git into the cluster so day-2 operations stay declarative instead of manual.

Key capabilities

  • Declarative GitOps delivery that syncs cluster state from Git.
  • Automated drift detection with manual or automatic reconciliation.
  • Rollback, history, and application health visibility from one interface.

Secrets, identity, and policy layer

This layer is where Adaetum turns security from a checklist item into part of the normal operating model.

OpenBao

The secrets anchor for sensitive platform state, credentials, and bootstrap material that should not be scattered across ad hoc files.

Key capabilities

  • Secure storage, access, and lifecycle management for secrets.
  • Encryption as a service with fine-grained access controls.
  • Dynamic secrets and leasing models for short-lived credentials.

Networking and edge access layer

This layer is how nodes find each other, how services get exposed, and how the platform reaches beyond one flat local network.

Tailscale

The mesh connectivity and operator access layer that replaces the need for a flat traditional management network.

Key capabilities

  • Zero-config mesh networking built on WireGuard.
  • Secure access across devices, sites, and cloud environments.
  • Identity-aware connectivity with ACLs, sharing, and administration controls.

Observability, portal, and automation layer

This layer is how operators verify health, see posture, receive alerts, and automate the supporting work around the cluster.

Prometheus

The metrics backbone that tells you what the cluster is doing instead of making you infer health from vibes and shell prompts.

Key capabilities

  • Time-series metrics collection and storage for infrastructure and applications.
  • Powerful query language for alerting, dashboards, and analysis.
  • Service discovery and pull-based scraping built for dynamic environments.

No funnel. No signup wall.

A play on Adytum, the inner sanctuary of a Greek temple.

If infra and ops are "Greek to me," welcome to the Adaetum: the inner sanctum. Whisper to your AI oracle, ship the commit, watch Argo CD do the ritual.