The runtime that keeps your data where it belongs — on your infrastructure.
The tracebloc client deploys inside your Kubernetes cluster and executes all model training, fine-tuning, and inference locally. It connects to the tracebloc backend for orchestration only. No data, no model weights, no artifacts ever leave your environment.
Your infrastructure
┌─────────────────────────────────────────────────────────┐
│ │
│ ┌──────────────────┐ ┌───────────────────────┐ │
│ │ tracebloc │ │ Kubernetes cluster │ │
│ │ client │◄────►│ │ │
│ │ │ │ ● Training jobs │ │
│ │ Orchestrates │ │ ● Inference jobs │ │
│ │ training, │ │ ● Your datasets │ │
│ │ enforces budgets │ │ ● Fine-tuned weights │ │
│ └────────┬──────────┘ │ │ │
│ │ │ Everything stays here │ │
│ │ └───────────────────────┘ │
└────────────┼────────────────────────────────────────────┘
│
│ Encrypted (orchestration only — no data)
▼
┌─────────────────┐
│ tracebloc │
│ backend │
│ │
│ Coordinates │
│ experiments, │
│ serves web UI │
└─────────────────┘
- Training execution — runs vendor models in isolated, containerized sandboxes
- Compute budgets — enforces per-vendor FLOPs or runtime quotas
- Security boundaries — namespace isolation, encrypted communication, audit logging
- Multi-framework support — PyTorch, TensorFlow, custom containers
- Hardware scheduling — CPUs, GPUs, TPUs via Kubernetes-native orchestration
For the threat model, defense layers, per-platform caveats, operator responsibilities, and verification steps, see docs/SECURITY.md. The chart ships hardened defaults against untrusted user-submitted ML code; deployment still requires a CNI that enforces NetworkPolicy — that file explains exactly what to check.
This repo ships the tracebloc unified Helm chart (currently v1.3.1) — one chart for AKS, EKS, bare-metal, and OpenShift.
A single command provisions a Kubernetes cluster, auto-detects and installs GPU drivers (NVIDIA or AMD), and deploys the tracebloc client. Use this when you don't already have a cluster — the result is a full client install, not a demo.
macOS / Linux
bash <(curl -fsSL https://tracebloc.io/i.sh)Windows (PowerShell as Administrator)
irm https://tracebloc.io/i.ps1 | iexThe installer pulls helper scripts from this repo at runtime — see scripts/install-k8s.sh and scripts/install-k8s.ps1.
For existing Kubernetes clusters:
helm repo add tracebloc https://tracebloc.github.io/client
helm repo update
helm install my-tracebloc tracebloc/tracebloc \
--namespace tracebloc --create-namespace \
-f my-values.yamlFull deployment guide → docs/INSTALL.md (prerequisites, required values, upgrade & rollback, air-gapped install).
| Topic | Where to look |
|---|---|
| Production install + required values | docs/INSTALL.md |
| Threat model & operator responsibilities | docs/SECURITY.md |
Migrating from eks-1.0.x / aks-* charts to client-1.x |
docs/MIGRATIONS.md |
| Per-tenant migration runbook | docs/migration-tools/README.md |
| Per-platform value mapping | client/MIGRATION.md |
Platform-specific walkthroughs: Linux · macOS · EKS · Azure / AKS
NetworkPolicy required. The chart's training-pod egress lockdown only takes effect on a CNI that enforces NetworkPolicy. See SECURITY.md § Per-platform caveats.
Apache 2.0 — see LICENSE.
Deployment help? support@tracebloc.io or open an issue.