Reclaim the Stack
Project scope and goals
- Reclaim the Stack (RtS) is presented as an open-source, Kubernetes-based Heroku replacement, built after migrating a mature SaaS from Heroku to self‑hosted K8s.
- Reported results: ~90% infra cost reduction (e.g., ~$7.5k→$520/month, later claimed $400k+/year saved) and ~30% performance improvement, plus more control and GDPR compliance.
- Stack includes Talos Linux, HA Postgres/Redis/Elastic via operators, monitoring/logging, Cloudflare ingress, GitOps, and a custom CLI.
Kubernetes: power vs. complexity
- Supportive views:
- K8s is reasonable if a team already has K8s skills and wants a standardized, extensible platform with HA, observability, and DB operators.
- With a “minimal” setup (e.g., managed K8s, simple networking, standard operators) some report years of stable operation and modest maintenance.
- Critical views:
- Many argue most SMBs and simple SaaS apps don’t need K8s; a few VMs, Docker Compose, or simple PaaS can scale to millions of users.
- K8s ecosystem (Helm, CNIs, operators, CI/CD, service mesh) is seen as over‑engineered, fragile, and upgrade‑prone; several anecdotes of cluster upgrades breaking prod.
- Concern that “two willing developers” understates the long‑term operational burden, on‑call load, and skill requirements.
Cost vs. engineering time
- Pro‑RtS side: infra savings reportedly fund multiple hypothetical devops hires, yet platform work is claimed to be only a few days per month and shared by full‑stack devs.
- Skeptics:
- Stress that Heroku‑like platforms price in the hidden “infrastructure debt” (upgrades, DR, tuning); rebuilding this in‑house creates ongoing, not one‑time, work.
- Question ROI if you spend substantial engineer time and risk outages just to save a few thousand per month, especially for smaller teams.
Security posture
- RtS explicitly trusts developers and the internal cluster network; multiple commenters label this as outdated “soft perimeter” thinking.
- Zero‑trust approaches (mTLS, IPsec, strict VPC egress controls) are acknowledged as more complex and costly but considered necessary in many environments.
- Debate over how far to lock down outbound traffic: some DFIR/infosec voices say proper egress controls regularly stop attackers; others report serious productivity and reliability pain from over‑restrictive policies.
Alternatives and fit
- Numerous alternatives mentioned: Dokku, Coolify, Docker Swarm, Kamal, ECS/Fargate, Cloud Run, Fly.io, “deploy-to-your-cloud” PaaS, homegrown bash+systemd.
- Broad consensus: RtS/K8s is attractive for teams with K8s expertise, higher spend, and HA/observability needs; simpler PaaS or VM‑based setups remain better for many smaller or less ops‑heavy products.