Show HN: Octelium – FOSS Alternative to Teleport, Cloudflare, Tailscale, Ngrok

What Octelium Is (per the thread)

  • Described as a self-hosted, FOSS “zero trust secure access platform” rather than a simple VPN.
  • Core ideas:
    • WireGuard/QUIC-based tunnels plus layer‑7, identity-aware proxies.
    • Fine‑grained, context-aware ABAC policies at the application layer (HTTP, SSH, DB, etc.).
    • Acts as ZTNA/BeyondCorp system, remote access VPN, API/AI/MCP gateway, and self‑hosted ngrok‑style tunnel.
    • Built as a distributed platform running on Kubernetes; Octelium manages identity-aware proxies somewhat like Kubernetes manages containers.

Confusion Over Scope and Messaging

  • Many readers say the README and HN description are dense, repetitive, and heavy with jargon/buzzwords (“zero trust”, “secretless”, “next‑gen”, etc.).
  • Multiple people report they still don’t know “what it does” after scanning the README.
  • Suggestions:
    • Start with 1–2 plain sentences explaining the core problem it solves (e.g., “centralized access control to all internal services”) and defer details to docs.
    • Explain concrete use cases from simple → advanced, with minimal acronyms.
    • Define all terms and compare to concrete things like VPNs, API gateways, Pomerium, Teleport, Cloudflare Access.
  • Others counter that the terminology is accurate for ZTNA; the real issue is layering and audience fit, not “marketing speak.”

Architecture vs Tailscale / Mesh VPNs

  • Clarified that Octelium is not a peer‑to‑peer mesh like Tailscale/ZeroTier; it’s more akin to Cloudflare Access/Teleport/StrongDM.
  • Focus is not exposing subnets or devices, but mediating access to specific resources and even sub-resources (e.g., HTTP paths) through L7 policies.
  • Uses Kubernetes nodes as gateways and service hosts; services are represented by identity-aware proxies with stable IPs/hostnames.
  • Some question performance/complexity vs simple WireGuard meshes; others see it as addressing a different (enterprise ZTNA) problem.

Kubernetes Dependency & Operational Model

  • Requires Kubernetes (or k3s) today; Octelium treats the cluster as its substrate but stores its own resources in Postgres, not as CRDs.
  • Some see Kubernetes as an overheavy dependency for “just” secure access or homelabs and would prefer a lighter deployment (e.g., single Docker container).
  • Others are concerned that Octelium appears to partially “replace” conventional Kubernetes workflows, raising questions about compatibility with existing CI/CD, RBAC, and monitoring.

Security, Trust, and Solo‑Dev Concerns

  • Skepticism about trusting a broad, security‑critical system from a solo developer with a short public history and “does everything” marketing.
  • Concern over secrets being stored in plaintext by default; author says this is deliberate (like Kubernetes) and provides gRPC hooks for plugging in external secret backends (Vault, KMS, etc.).
  • Some commenters go as far as raising “state actor/scam” vibes; others push back, arguing the code is fully open source and such accusations are unhelpful.

Feedback on Positioning and Product Strategy

  • Strong advice to:
    • Emphasize problems solved (centralizing authZ/audit, replacing fragmented VPN + per‑app auth stacks) instead of listing competing products.
    • Pick a primary audience (enterprise security vs HN/homelab crowd) and tune language accordingly.
    • Provide before/after architecture diagrams and migration stories for a realistic company.
    • Consider an easier “homelab edition” and/or a SaaS offering built on the toolkit.

Overall Reception

  • Mixed but engaged:
    • Enthusiastic interest from people seeking a FOSS alternative to Teleport/Cloudflare/StrongDM and from those who read the deeper docs, which some call “extremely detailed and well‑organized.”
    • Significant pushback on buzzwordy framing, breadth of scope, Kubernetes requirement, and the difficulty of understanding the value at a glance.