An honest look at the platform. Here's what's built, what works, and why we made the choices we did.
kcore runs on NixOS, which means system updates are transactional. If something goes wrong, you boot into the previous generation. No partial states, no manual cleanup.
VMs are resources in Terraform. You write HCL, run terraform apply,
and the provider talks to the kcore API over gRPC. Standard workflow, no special tooling.
# Infrastructure as Code
resource "kcore_vm" "web" {
count = 3
name = "web-${count.index}"
memory = 4096
vcpu = 2
disk {
size = "50GB"
storage_class = "ssd"
}
network {
name = "production"
}
}
resource "kcore_vm" "db" {
name = "postgres"
memory = 8192
vcpu = 4
disk {
size = "200GB"
storage_class = "nvme"
}
}
kcore includes an MCP (Model Context Protocol) server. Any MCP-compatible AI agent can list nodes, create VMs, check status, and generate Terraform configs through it.
✓ 3x web servers (4GB RAM each)
✓ 1x PostgreSQL (8GB RAM)
✓ Load balancer configured
✓ Network policies applied
| Feature | kcore | Traditional VMs | Container Orchestration |
|---|---|---|---|
| Atomic Updates | ✓ | ✗ | ✓ |
| Instant Rollback | ✓ | ✗ | ✓ |
| Infrastructure as Code | ✓ | Partial | ✓ |
| AI Integration | ✓ | ✗ | ✗ |
| Full OS Isolation | ✓ | ✓ | ✗ |
| Legacy App Support | ✓ | ✓ | Limited |
| Resource Efficiency | High | Medium | Very High |
| Learning Curve | Low | Low | High |
The docs walk you through building the ISO and booting your first node.