Your CI pipeline hums along until someone says “let’s move it to Kubernetes.” Then come the YAML jungles, service accounts, and secret scoping nightmares. Drone on k3s promises a lighter path, but many engineers discover that “lightweight Kubernetes” still weighs plenty when automation meets access control.
Drone handles continuous integration and delivery. k3s is a trimmed-down Kubernetes distribution that runs anywhere, from an edge device to a Raspberry Pi cluster. Combine them and you get a self-hosted CI system running on Kubernetes without the heavy memory overhead. The pairing matters for teams that want the flexibility of containers with the control of local infrastructure.
A Drone k3s setup runs Drone’s server and runner pods inside your k3s cluster. The k3s controller schedules builds as Kubernetes jobs using the runner. Pull requests trigger Drone via webhooks from GitHub or GitLab, and each job spins up in an isolated pod. That isolation is real Kubernetes-level security, not just sandboxing. Secrets are injected through Kubernetes Secrets or a vault, avoiding plain-text config files.
A quick rule of thumb for integration:
- Keep the Drone server’s persistent volume small and resilient. k3s’ embedded database handles metadata, but logs can grow fast.
- Map your Kubernetes service account tokens carefully. RBAC misalignment will freeze builds faster than a bad TLS cert.
- Rotate tokens on a cron job or through your identity provider if you want SOC 2 auditors to smile.
Featured answer: Drone k3s is the combination of the Drone CI/CD server with a lightweight k3s Kubernetes cluster, allowing teams to run scalable, container-based pipelines on minimal infrastructure while keeping full control over secrets and security policies.