Secure, TLS-first, modular Kubernetes infra in a single command. For developers, builders, rebels, and the curious. Built in Bash. Runs on anything.
Helix is your own personal infrastructure butler β a fully-scripted, TLS-secure Kubernetes platform for devs who want real production features without real production cloud bills.
Spin up:
- π Keycloak Identity Hub (with custom themes + realm mounts)
- π§° Vault for secrets, sealed & auto-unsealed
- π οΈ CSI-based TLS cert injection
- βοΈ Modular add-ons like Portainer, N8N, MinIO, Istio, Kong, and more
- π§ Enterprise-grade validation (Popeye, Braille spinners, live dashboards)
- π¬ Interactive Whiptail menus β no YAML editing required
Perfect for DevOps engineers, indie hackers, security pros, and educators. Built for humans. Powered by trust. Scripted for the future.
git clone https://github.com/akenel/helix.git cd helix ./run.sh
β This will bootstrap a full TLS Kubernetes cluster in
k3d
, deploy Keycloak and Vault with secured certs, and offer a menu to extend the stack β all with zero manual YAML.
Component Purpose k3d
Ephemeral local Kubernetes (Docker-backed) mkcert
Dev-trusted TLS CA cert-manager
+ CSIAutomated TLS provisioning (pod-level) Vault
Secrets management with auto-unseal Keycloak
Identity provider (realm + theme ready) whiptail
Interactive CLI menus helm
,jq
,yq
Declarative, scriptable deployment logic
- β Keycloak with live theming + pre-loaded users (admin/dev/guest/popeye)
- β Vault sealed, unsealed, and mounted securely
- β TLS-first β every pod gets a valid cert from a local CA
- β Secrets-safe β no passwords in YAML or Git
- β Validation built-in β Popeye runs HTML reports and alerts
π§© Simply drop a script in
addons/
, and it will auto-load into the menu.# addons/install-n8n.sh PLUGIN_NAME="n8n" PLUGIN_DESC="Low-code workflow automation" run_plugin() { helm install n8n oci://ghcr.io/n8n-io/n8n --version 1.0.10 \ -n automation --create-namespace -f ./addons/n8n/n8n-values.yaml }Add plugins, install services, upgrade configs β all via Bash.
β TLS from the start (mkcert + cert-manager + CSI)
β Vault auto-unseal with root token management
β Declarative plugin YAMLs with full CLI validation
β Live CSI TLS injection to pods
β Per-service values, override logic, and full Helm dry-run testing
β TUI menus with whiptail and real-time feedback
β HTML reports and identity walkthroughs included
Service URL Notes Keycloak https://keycloak.helix Login: admin / set at bootstrap Vault https://vault.helix Token in vault-init.log
Portainer https://portainer.helix UI deployed, no ingress yet? Popeye HTML report in /reports/
View system health in-browser π‘ If
*.helix
domains return 404, check for missing ingress routes and ensure/etc/hosts
points them to127.0.0.1
.
brew install mkcert helm jq yq k3d mkcert -install
- π³ Ensure Docker is running
- π Run Chrome/Firefox once (for cert store setup)
- π Run
helm repo update
Helix supports self-discovery of add-ons by file name and plugin name.
- Create a folder in
bootstrap/addon-configs/<your-plugin>/
- Drop a
*-values.yaml
file inside- Run the add-on wizard or add to
services.yaml
- Deploy from the Whiptail menu or CLI
- name: portainer description: "Docker UI for Kubernetes" enabled: true namespace: portainer values_file: bootstrap/addon-configs/portainer/portainer-values.yaml helm_chart_repo: portainer helm_chart_name: portainer helm_chart_version: 1.0.69 helm_release_name_override: portainer
volumes: - name: tls csi: driver: csi.cert-manager.io readOnly: true volumeAttributes: csi.cert-manager.io/issuer-name: mkcert-ca-issuer csi.cert-manager.io/issuer-kind: ClusterIssuer csi.cert-manager.io/dns-names: keycloak.helix
- TLS cluster bootstrap
- Vault & Keycloak identity integration
- CSI TLS volume injection
- Add-on framework with YAML plugin discovery
- Popeye HTML validation output
- Realm & theme import automation
- GitHub CI bootstraps + nightly validations
- Plugin ecosystem + community gallery
We welcome plugins, docs, feedback, and ideas.
git checkout -b feature/my-addonSubmit a plugin or fix to
addons/
, and weβll review it. Letβs make beautiful infrastructure β together.
Licensed under the MIT License Contact for secure white-label enterprise builds or consulting:
π§ theSAPspecialist@gmail.com
π linkedin.com/in/theSAPspecialist
π₯ YouTube: @theSAPspecialist
Because real infrastructure:
- Should be secure by default.
- Should be readable and learnable.
- Should cost $0 to explore and understand.
- Should work offline, with no vendor lock-in.
Helix gives you identity, secrets, TLS, add-ons, themes, and validation β all without a control plane or cloud bill.
Quit going in cirlces, becasue no system is secure⦠until Chuck says so.
Helix: Modern infrastructure, bootstrapped from scratch, fully owned by you.