Home / Companies / Replicated / Blog / Post Details
Content Deep Dive

Helm Best Practices to Scale Your Self-Hosted Enterprise Software Distribution: Templating Essential Properties

Blog post from Replicated

Post Details
Company
Date Published
Author
Diamon Wiggins, Chuck D'Antonio, Kaylee McHugh
Word Count
987
Language
-
Hacker News Points
-
Summary

Helm's flexibility is invaluable for deploying applications in self-hosted environments, but its complexity can be challenging without experience. Diamon Wiggins, a Staff Engineer at Replicated, outlines best practices for Helm charts to assist Independent Software Vendors (ISVs) in deploying software into self-hosted customer environments. These practices include adding labels and annotations to integrate with Kubernetes tools, allowing configuration of image properties for registry adjustments, and making the security context adaptable to different cluster policies. Additionally, configuring scheduling and node affinity ensures applications run on appropriate nodes, while configurable Kubernetes services and ingress settings allow users to adjust service types and secure access. Lastly, referencing existing Kubernetes objects accommodates organizations with established infrastructure, aiding seamless integration in environments with stringent policies.