Right when my homelab was finally humming โ€” three Raspberry Pis running a fully functional Kubernetes cluster โ€” I had to pack up and leave town for Thanksgiving.

A full week away meant Iโ€™d lose access to everything.
No cluster. No dashboard. No quick kubectl sessions.

Thatโ€™s when I turned to Twingate.


The Challenge: Secure Remote Access ๐Ÿงณ

Like most homelabs, my cluster sits on a private subnet with no public ingress โ€” exactly how I want it.
But that makes remote access tricky.
I didnโ€™t want to punch a hole in my firewall or expose the Kubernetes API directly to the internet.

What I needed was something that let me connect as if I were home โ€” securely, without reconfiguring my network.


The Fix: Building a Private Network with Twingate โš™๏ธ

Twingate makes private network access almost too easy.
You define a network, deploy one or more connectors inside your environment, and connect your devices through the Twingate client.

Once connected, you can access internal resources as if they were on your local LAN โ€” but without maintaining a VPN gateway or juggling IP tables.

Their Terraform provider sealed the deal for me.
I could manage everything declaratively, just like the rest of Cloudhaven.


My Setup: Connectors on Kubernetes ๐Ÿš€

For Cloudhaven, I went one step further and built a reusable Terraform module to deploy Twingate connectors directly into Kubernetes โ€” optimized for physical hosts like my Raspberry Pis.

๐Ÿ“ฆ Check it out here:
Cloudhaven-IDP Infrastructure โ€” Twingate Connector (K8s Physical)

This module:

  • Registers the connector with my Twingate network
  • Deploys it as a lightweight Kubernetes workload
  • Keeps everything self-contained and easy to redeploy on new nodes

Once applied, the connector establishes a secure outbound tunnel โ€” no need to open inbound ports.


Going Further: Accessing the Kubernetes API ๐Ÿงฉ

With the connector live, I registered my Kubernetes API server as a resource in Twingate.
That single step made it possible to run kubectl from anywhere โ€” without exposing the control plane to the public internet.

From my laptop, I just connect through Twingate and work like Iโ€™m sitting right next to the cluster.
Itโ€™s seamless, and the latency is barely noticeable.


Why Iโ€™m Keeping It ๐Ÿง 

Twingate solved a problem I didnโ€™t want to over-engineer.
Itโ€™s private, secure, and fits cleanly into my Terraform workflow.
And the best part โ€” I can keep building Cloudhaven from anywhere.

No more worrying about IPs, firewalls, or whether my home router decided to restart itself.
Just me, my cluster, and a secure tunnel between them.


This was one of those small wins that feels bigger than it looks on paper โ€”
because it means Cloudhaven keeps running, no matter where I am.