f3s: Kubernetes with FreeBSD - Part 2: Hardware and base installation
Published at 2024-12-02T23:48:21+02:00, last updated Sun 11 Jan 10:30:00 EET 2026
This is the second blog post about my f3s series for my self-hosting demands in my home lab. f3s? The "f" stands for FreeBSD, and the "3s" stands for k3s, the Kubernetes distribution I will use on FreeBSD-based physical machines.
We set the stage last time; this time, we will set up the hardware for this project.
These are all the posts so far:
2024-11-17 f3s: Kubernetes with FreeBSD - Part 1: Setting the stage
2025-02-01 f3s: Kubernetes with FreeBSD - Part 3: Protecting from power cuts
2025-04-05 f3s: Kubernetes with FreeBSD - Part 4: Rocky Linux Bhyve VMs
2025-05-11 f3s: Kubernetes with FreeBSD - Part 5: WireGuard mesh network
2025-07-14 f3s: Kubernetes with FreeBSD - Part 6: Storage
2025-10-02 f3s: Kubernetes with FreeBSD - Part 7: k3s and first pod deployments
2025-12-07 f3s: Kubernetes with FreeBSD - Part 8: Observability
2025-12-14 f3s: Kubernetes with FreeBSD - Part 8b: Distributed Tracing with Tempo
2026-04-02 f3s: Kubernetes with FreeBSD - Part 9: GitOps with ArgoCD
ChatGPT generated logo..
Let's continue...
Table of Contents
- ⇢ f3s: Kubernetes with FreeBSD - Part 2: Hardware and base installation
- ⇢ Deciding on the hardware
- ⇢ ⇢ Not ARM but Intel N100
- ⇢ ⇢ Beelink unboxing
- ⇢ ⇢ Network switch
- ⇢ Installing FreeBSD
- ⇢ ⇢ Base install
- ⇢ ⇢ Latest patch level and customizing `/etc/hosts`
- ⇢ ⇢ After install
- ⇢ ⇢ ⇢ Helix editor
- ⇢ ⇢ ⇢ `doas`
- ⇢ ⇢ ⇢ Periodic ZFS snapshotting
- ⇢ ⇢ ⇢ Uptime tracking
- ⇢ Hardware check
- ⇢ ⇢ Ethernet
- ⇢ ⇢ RAM
- ⇢ ⇢ CPUs
- ⇢ ⇢ CPU throttling
- ⇢ Wake-on-LAN Setup
- ⇢ ⇢ Setting up WoL on the laptop
- ⇢ ⇢ Testing WoL and Shutdown
- ⇢ ⇢ BIOS Configuration
- ⇢ Conclusion
Deciding on the hardware
Note that the OpenBSD VMs included in the f3s setup (which will be used later in this blog series for internet ingress - as you know from the first part of this blog series) are already there. These are virtual machines that I rent at OpenBSD Amsterdam and Hetzner.
This means that the FreeBSD boxes need to be covered, which will later be running k3s in Linux VMs via bhyve hypervisor.
I've been considering whether to use Raspberry Pis or look for alternatives. It turns out that complete N100-based mini-computers aren't much more expensive than Raspberry Pi 5s, and they don't require assembly. Furthermore, I like that they are AMD64 and not ARM-based, which increases compatibility with some applications (e.g., I might want to virtualize Windows (via bhyve) on one of those, though that's out of scope for this blog series).
Not ARM but Intel N100
I needed something compact, efficient, and capable enough to handle the demands of a small-scale Kubernetes cluster and preferably something I don't have to assemble a lot. After researching, I decided on the Beelink S12 Pro with Intel N100 CPUs.
Beelink Mini S12 Pro N100 official page
The Intel N100 CPUs are built on the "Alder Lake-N" architecture. These chips are designed to balance performance and energy efficiency well. With four cores, they're more than capable of running multiple containers, even with moderate workloads. Plus, they consume only around 8W of power (ok, that's more than the Pis...), keeping the electricity bill low enough and the setup quiet - perfect for 24/7 operation.
The Beelink comes with the following specs:
- 12th Gen Intel N100 processor, with four cores and four threads, and a maximum frequency of up to 3.4 GHz.
- 16 GB of DDR4 RAM, with a maximum (official) size of 16 GB (but people could install 32 GB on it).
- 500 GB M.2 SSD, with the option to install a 2nd 2.5 SSD drive (which I want to make use of later in this blog series).
- GBit ethernet
- Four USB 3.2 Gen2 ports (maybe I want to mount something externally at some point)
- Dimensions and weight: 115*102*39mm, 280g
- Silent cooling system.
- HDMI output (needed only for the initial installation and maybe for troubleshooting later)
- Auto power on via WoL (may make use of it)
- Wi-Fi (not going to use it)
I bought three (3) of them for the cluster I intend to build.
Beelink unboxing
Unboxing was uneventful. Every Beelink PC came with:
- An AC power adapter
- An HDMI cable
- A VESA mount with screws (not using it as of now)
- Some manuals
- The pre-assembled Beelink PC itself.
- A "Hello" post card (??)
Overall, I love the small form factor.
Network switch
I went with the tp-link mini 5-port switch, as I had a spare one available. That switch will be plugged into my wall ethernet port, which connects directly to my fiber internet router with 100 Mbit/s down and 50 Mbit/s upload speed.
Installing FreeBSD
Base install
First, I downloaded the boot-only ISO of the latest FreeBSD release and dumped it on a USB stick via my Fedora laptop:
Next, I plugged the Beelinks (one after another) into my monitor via HDMI (the resolution of the FreeBSD text console seems strangely stretched, as I am using the LG Dual Up monitor), connected Ethernet, an external USB keyboard, and the FreeBSD USB stick, and booted the devices up. With F7, I entered the boot menu and selected the USB stick for the FreeBSD installation.
The installation was uneventful. I selected:
- Guided ZFS on root (pool `zroot`)
- Unencrypted ZFS (I will encrypt separate datasets later; I want it to be able to boot without manual interaction)
- Static IP configuration (to ensure that the boxes always have the same IPs, even after switching the router/DHCP server)
- I decided to enable the SSH daemon, NTP server, and NTP time synchronization at boot, and I also enabled `powerd` for automatic CPU frequency scaling.
- In addition to `root,` I added a personal user, `paul,` whom I placed in the `wheel` group.
After doing all that three times (once for each Beelink PC), I had three ready-to-use FreeBSD boxes! Their hostnames are `f0`, `f1` and `f2`!
Latest patch level and customizing `/etc/hosts`
After the first boot, I upgraded to the latest FreeBSD patch level as follows:
I also added the following entries for the three FreeBSD boxes to the `/etc/hosts` file:
You might wonder why bother using the hosts file? Why not use DNS properly? The reason is simplicity. I don't manage 100 hosts, only a few here and there. Having an OpenWRT router in my home, I could also configure everything there, but maybe I'll do that later. For now, keep it simple and straightforward.
After install
After that, I installed the following additional packages:
Helix editor
Helix? It's my favourite text editor. I have nothing against `vi` but like `hx` (Helix) more!
`doas`
`doas`? It's a pretty neat (and KISS) replacement for `sudo`. It has far fewer features than `sudo`, which is supposed to make it more secure. Its origin is the OpenBSD project. For `doas`, I accepted the default configuration (where users in the `wheel` group are allowed to run commands as `root`):
Periodic ZFS snapshotting
`zfs-periodic` is a nifty tool for automatically creating ZFS snapshots. I decided to go with the following configuration here:
https://github.com/ross/zfs-periodic
Note: We have not added `zdata` to the list of snapshot pools. Currently, this pool does not exist yet, but it will be created later in this blog series. `zrepl`, which we will use for replication, later in this blog series will manage the `zdata` snapshots.
Uptime tracking
`uptimed`? I like to track my uptimes. This is how I configured the daemon:
In the Helix editor session, I changed `LOG_MAXIMUM_ENTRIES` to `0` to keep all uptime entries forever and not cut off at 50 (the default config). After that, I enabled and started `uptimed`:
To check the current uptime stats, I can now run `uprecords`:
This is how I track the uptimes for all of my host:
Unveiling `guprecords.raku`: Global Uptime Records with Raku-
https://github.com/rpodgorny/uptimed
Hardware check
Ethernet
Works. Nothing eventful, really. It's a cheap Realtek chip, but it will do what it is supposed to do.
RAM
All there:
CPUs
They work:
CPU throttling
With `powerd` running, CPU freq is dowthrottled when the box isn't jam-packed. To stress it a bit, I run `ubench` to see the frequencies being unthrottled again:
Idle, all three Beelinks plus the switch consumed 26.2W. But with `ubench` stressing all the CPUs, it went up to 38.8W.
Wake-on-LAN Setup
Updated Sun 11 Jan 10:30:00 EET 2026
As mentioned in the hardware specs above, the Beelink S12 Pro supports Wake-on-LAN (WoL), which allows me to remotely power on the machines over the network. This is particularly useful since I don't need all three machines running 24/7, and I can save power by shutting them down when not needed and waking them up on demand.
The good news is that FreeBSD already has WoL support enabled by default on the Realtek network interface, as evidenced by the `WOL_MAGIC` option shown in the `ifconfig re0` output above (line 215).
Setting up WoL on the laptop
To wake the Beelinks from my Fedora laptop (`earth`), I installed the `wol` package:
Next, I created a simple script (`~/bin/wol-f3s`) to wake and shutdown the machines:
After making the script executable with `chmod +x ~/bin/wol-f3s`, I can now control the machines with simple commands:
Testing WoL and Shutdown
To test the setup, I shutdown all three machines using the script's shutdown function:
After waiting for them to fully power down (about 1 minute), I sent the WoL magic packets:
Within 30-50 seconds, all three machines successfully booted up and became accessible via SSH!
This also works fine over WiFi, by the way — as long as the laptop and the Beelinks are on the same local network, the router bridges everything. And `wol-f3s shutdown` does the reverse (SSH + `doas poweroff`), so I can spin the whole cluster up and down pretty quickly.
BIOS Configuration
For WoL to work reliably, make sure to check the BIOS settings on each Beelink:
- Enable "Wake on LAN" (usually under Power Management)
- Disable "ERP Support" or "ErP Ready" (this can prevent WoL from working)
- Enable "Power on by PCI-E" or "Wake on PCI-E"
The exact menu names vary, but these settings are typically found in the Power Management or Advanced sections of the BIOS.
Conclusion
Honestly, the Beelink S12 Pro with the N100 is kind of perfect for this — tiny, cheap, sips power, and runs both Linux and FreeBSD without drama. I'm pretty happy with it.
To ease cable management, I need to get shorter ethernet cables. I will place the tower on my shelf, where most of the cables will be hidden (together with a UPS, which will also be added to the setup).
Read the next post of this series:
f3s: Kubernetes with FreeBSD - Part 3: Protecting from power cuts
Other *BSD-related posts:
2026-04-02 f3s: Kubernetes with FreeBSD - Part 9: GitOps with ArgoCD
2025-12-14 f3s: Kubernetes with FreeBSD - Part 8b: Distributed Tracing with Tempo
2025-12-07 f3s: Kubernetes with FreeBSD - Part 8: Observability
2025-10-02 f3s: Kubernetes with FreeBSD - Part 7: k3s and first pod deployments
2025-07-14 f3s: Kubernetes with FreeBSD - Part 6: Storage
2025-05-11 f3s: Kubernetes with FreeBSD - Part 5: WireGuard mesh network
2025-04-05 f3s: Kubernetes with FreeBSD - Part 4: Rocky Linux Bhyve VMs
2025-02-01 f3s: Kubernetes with FreeBSD - Part 3: Protecting from power cuts
2024-11-17 f3s: Kubernetes with FreeBSD - Part 1: Setting the stage
2024-04-01 KISS high-availability with OpenBSD
2024-01-13 One reason why I love OpenBSD
2022-10-30 Installing DTail on OpenBSD
2022-07-30 Let's Encrypt with OpenBSD and Rex
2016-04-09 Jails and ZFS with Puppet on FreeBSD
E-Mail your comments to `paul@nospam.buetow.org` :-)