@helm-charts/bitnami-kubeapps v1.6.1-0.1.0
@helm-charts/bitnami-kubeapps
Kubeapps is a dashboard for your Kubernetes cluster that makes it easy to deploy and manage applications in your cluster using Helm
Field | Value |
---|---|
Repository Name | bitnami |
Chart Name | kubeapps |
Chart Version | 1.6.1 |
NPM Package Version | 0.1.0 |
## Global Docker image parameters
## Please, note that this will override the image parameters, including dependencies, configured to use the global value
## Current available global Docker image parameters: imageRegistry and imagePullSecrets
##
# global:
# imageRegistry: myRegistryName
# imagePullSecrets:
# - myRegistryKeySecretName
# The frontend service is the main reverse proxy used to access the Kubeapps UI
# To expose Kubeapps externally either configure the ingress object below or
# set frontend.service.type=LoadBalancer in the frontend configuration.
# ref: http://kubernetes.io/docs/user-guide/ingress/
#
ingress:
# Set to true to enable ingress record generation
enabled: false
# Set this to true in order to add the corresponding annotations for cert-manager
certManager: false
# Ingress annotations done as key:value pairs
# For a full list of possible ingress annotations, please see
# ref: https://github.com/kubernetes/ingress-nginx/blob/master/docs/annotations.md
#
# If certManager is set to true, annotation kubernetes.io/tls-acme: "true" will automatically be set
annotations:
# kubernetes.io/ingress.class: nginx
# Keep the connection open with the API server even if idle (the default is 60 seconds)
# Setting it to 10 minutes which should be enough for our current use case of deploying/upgrading/deleting apps
nginx.ingress.kubernetes.io/proxy-read-timeout: '600'
# The list of hostnames to be covered with this ingress record.
# Most likely this will be just one host, but in the event more hosts are needed, this is an array
hosts:
- name: kubeapps.local
path: /
# Set this to true in order to enable TLS on the ingress record
tls: false
## If TLS is set to true, you must declare what secret will store the key/certificate for TLS
tlsSecret: kubeapps.local-tls
secrets:
# If you're providing your own certificates, please use this to add the certificates as secrets
# key and certificate should start with -----BEGIN CERTIFICATE----- or
# -----BEGIN RSA PRIVATE KEY-----
#
# name should line up with a tlsSecret set further up
# If you're using cert-manager, this is unneeded, as it will create the secret for you if it is not set
#
# It is also possible to create and manage the certificates outside of this helm chart
# Please see README.md for more information
# - name: kubeapps.local-tls
# key:
# certificate:
frontend:
replicaCount: 2
image:
registry: docker.io
repository: bitnami/nginx
tag: 1.14.0-r27
service:
port: 80
type: ClusterIP
annotations: {}
livenessProbe:
httpGet:
path: /healthz
port: 8080
initialDelaySeconds: 60
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /
port: 8080
initialDelaySeconds: 0
timeoutSeconds: 5
# https://github.com/kubeapps/kubeapps/issues/478#issuecomment-422979262
resources:
limits:
cpu: 250m
memory: 128Mi
requests:
cpu: 25m
memory: 32Mi
nodeSelector: {}
tolerations: []
affinity: {}
# AppRepository Controller is the controller used to manage the repositories to
# sync. Set apprepository.initialRepos to configure the initial set of
# repositories to use when first installing Kubeapps.
apprepository:
# Running a single controller replica to avoid sync job duplication
replicaCount: 1
image:
registry: docker.io
repository: bitnami/kubeapps-apprepository-controller
tag: 1.3.1
# Image used to perform chart repository syncs
syncImage:
registry: docker.io
repository: bitnami/kubeapps-chart-repo
tag: 1.4.0-r1
initialRepos:
- name: stable
url: https://kubernetes-charts.storage.googleapis.com
- name: incubator
url: https://kubernetes-charts-incubator.storage.googleapis.com
- name: svc-cat
url: https://svc-catalog-charts.storage.googleapis.com
- name: bitnami
url: https://charts.bitnami.com/bitnami
# Additional repositories
# - name: chartmuseum
# url: https://chartmuseum.default:8080
# # Specify an Authorization Header if you are using an authentication method.
# authorizationHeader: "Bearer xrxNC..."
# # If you're providing your own certificates, please use this to add the certificates as secrets.
# # It should start with -----BEGIN CERTIFICATE----- or
# # -----BEGIN RSA PRIVATE KEY-----
# caCert:
# https://github.com/kubeapps/kubeapps/issues/478#issuecomment-422979262
resources:
limits:
cpu: 250m
memory: 128Mi
requests:
cpu: 25m
memory: 32Mi
nodeSelector: {}
tolerations: []
affinity: {}
# Hooks are used to perform actions like populating apprepositories
# or creating required resources during installation or upgrade
hooks:
image:
registry: docker.io
repository: bitnami/kubectl
tag: 1.12.3-r13
nodeSelector: {}
tolerations: []
affinity: {}
# Tiller Proxy is a secure REST API on top of Helm's Tiller component used to
# manage Helm chart releases in the cluster from Kubeapps. Set tillerProxy.host
# to configure a different Tiller host to use.
tillerProxy:
replicaCount: 2
image:
registry: docker.io
repository: bitnami/kubeapps-tiller-proxy
tag: 1.3.1
service:
port: 8080
host: tiller-deploy.kube-system:44134
tls:
{}
# ca:
# cert:
# key:
# verify: false
# https://github.com/kubeapps/kubeapps/issues/478#issuecomment-422979262
resources:
limits:
cpu: 250m
memory: 128Mi
requests:
cpu: 25m
memory: 32Mi
nodeSelector: {}
tolerations: []
affinity: {}
# Chartsvc is used to serve chart metadata over a REST API.
chartsvc:
replicaCount: 2
image:
registry: docker.io
repository: bitnami/kubeapps-chartsvc
tag: 1.4.0
service:
port: 8080
# https://github.com/kubeapps/kubeapps/issues/478#issuecomment-422979262
resources:
limits:
cpu: 250m
memory: 128Mi
requests:
cpu: 25m
memory: 32Mi
livenessProbe:
httpGet:
path: /live
port: 8080
initialDelaySeconds: 60
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /ready
port: 8080
initialDelaySeconds: 0
timeoutSeconds: 5
nodeSelector: {}
tolerations: []
affinity: {}
# Dashboard serves the compiled static React frontend application. This is an
# internal service used by the main frontend reverse-proxy and should not be
# accessed directly.
dashboard:
replicaCount: 2
image:
registry: docker.io
repository: bitnami/kubeapps-dashboard
tag: 1.3.1
service:
port: 8080
livenessProbe:
httpGet:
path: /
port: 8080
initialDelaySeconds: 60
timeoutSeconds: 5
readinessProbe:
httpGet:
path: /
port: 8080
initialDelaySeconds: 0
timeoutSeconds: 5
# https://github.com/kubeapps/kubeapps/issues/478#issuecomment-422979262
resources:
limits:
cpu: 250m
memory: 128Mi
requests:
cpu: 25m
memory: 32Mi
nodeSelector: {}
tolerations: []
affinity: {}
##
## MongoDB chart configuration
##
## https://github.com/helm/charts/blob/master/stable/mongodb/values.yaml
##
mongodb:
# Kubeapps uses MongoDB as a cache and persistence is not required
persistence:
enabled: false
# MongoDB credentials are handled by kubeapps to facilitate upgrades
existingSecret: kubeapps-mongodb
# https://github.com/kubeapps/kubeapps/issues/478#issuecomment-422979262
resources:
limits:
cpu: 500m
memory: 512Mi
requests:
cpu: 50m
memory: 256Mi
nodeSelector: {}
tolerations: []
affinity: {}
# For RBAC support:
rbac:
# Perform creation of RBAC resources
create: true
## Pod Security Context
## ref: https://kubernetes.io/docs/tasks/configure-pod-container/security-context/
##
securityContext:
enabled: false
runAsUser: 1001
# fsGroup: 1001
testImage:
# Image used for the tests. The only requirement is to include curl
registry: docker.io
repository: bitnami/nginx
tag: 1.14.0-r27
# Auth Proxy for OIDC support
# ref: https://github.com/kubeapps/kubeapps/blob/master/docs/user/using-an-OIDC-provider.md
authProxy:
# Set to true to enable the OIDC proxy
enabled: false
# Image used for the proxy
image:
registry: docker.io
repository: bitnami/keycloak-gatekeeper
tag: 2.3.0-r1
# Mandatory parametes
discoveryURL:
clientID:
clientSecret:
# Additional flags for Keycloak-Gatekeeper
additionalFlags:
# - --skip-openid-provider-tls-verify
# - --secure-cookie=false
# https://github.com/kubeapps/kubeapps/issues/478#issuecomment-422979262
resources:
limits:
cpu: 250m
memory: 128Mi
requests:
cpu: 25m
memory: 32Mi
Kubeapps
Kubeapps is a web-based UI for deploying and managing applications in Kubernetes clusters. Kubeapps allows you to:
- Browse and deploy Helm charts from chart repositories
- Inspect, upgrade and delete Helm-based applications installed in the cluster
- Add custom and private chart repositories (supports ChartMuseum and JFrog Artifactory)
- Browse and provision external services from the Service Catalog and available Service Brokers
- Connect Helm-based applications to external services with Service Catalog Bindings
- Secure authentication and authorization based on Kubernetes Role-Based Access Control
TL;DR;
helm repo add bitnami https://charts.bitnami.com/bitnami
helm install --name kubeapps --namespace kubeapps bitnami/kubeapps
Introduction
This chart bootstraps a Kubeapps deployment on a Kubernetes cluster using the Helm package manager.
It also packages the Bitnami MongoDB chart which is required for bootstrapping a MongoDB deployment for the database requirements of the Kubeapps application.
Prerequisites
- Kubernetes 1.8+ (tested with Azure Kubernetes Service, Google Kubernetes Engine, minikube and Docker for Desktop Kubernetes)
- Helm 2.10.0+
- Administrative access to the cluster to create Custom Resource Definitions (CRDs)
Installing the Chart
To install the chart with the release name kubeapps
:
$ helm repo add bitnami https://charts.bitnami.com/bitnami
$ helm install --name kubeapps --namespace kubeapps bitnami/kubeapps
IMPORTANT This assumes an insecure Helm installation, which is not recommended in production. See the documentation to learn how to secure Helm and Kubeapps in production.
The command deploys Kubeapps on the Kubernetes cluster in the kubeapps
namespace. The configuration section lists the parameters that can be configured during installation.
Caveat: Only one Kubeapps installation is supported per namespace
Tip: List all releases using
helm list
Once you have installed Kubeapps follow the Getting Started Guide for additional information on how to access and use Kubeapps.
Upgrading Kubeapps
You can upgrade Kubeapps from the Kubeapps web interface. Select the namespace in which Kubeapps is installed (kubeapps
if you followed the instructions in this guide) and click on the "Upgrade" button. Select the new version and confirm.
NOTE: If the chart values were modified when deploying Kubeapps the first time, those values need to be set again when upgrading.
You can also use the Helm CLI to upgrade Kubeapps, first ensure you have updated your local chart repository cache:
$ helm repo update
Now upgrade Kubeapps:
$ export RELEASE_NAME=kubeapps
$ helm upgrade $RELEASE_NAME bitnami/kubeapps
If you find issues upgrading Kubeapps, check the troubleshooting section.
Uninstalling Kubeapps
To uninstall/delete the kubeapps
deployment:
$ helm delete --purge kubeapps
$ # Optional: Only if there are no more instances of Kubeapps
$ kubectl delete crd apprepositories.kubeapps.com
The first command removes most of the Kubernetes components associated with the chart and deletes the release. After that, if there are no more instances of Kubeapps in the cluster you can manually delete the apprepositories.kubeapps.com
CRD used by Kubeapps that is shared for the entire cluster.
NOTE: If you delete the CRD for
apprepositories.kubeapps.com
it will delete the repositories for all the installed instances ofkubeapps
. This will break existing installations ofkubeapps
if they exist.
If you have dedicated a namespace only for Kubeapps you can completely clean remaining completed/failed jobs or any stale resources by deleting the namespace
$ kubectl delete namespace kubeapps
Configuration
For a full list of configuration parameters of the Kubeapps chart, see the values.yaml file.
Specify each parameter using the --set key=value[,key=value]
argument to helm install
. For example,
$ helm install --name kubeapps --namespace kubeapps \
--set chartsvc.service.port=9090 \
bitnami/kubeapps
The above command sets the port for the chartsvc Service to 9090.
Alternatively, a YAML file that specifies the values for parameters can be provided while installing the chart. For example,
$ helm install --name kubeapps --namespace kubeapps -f custom-values.yaml bitnami/kubeapps
Configuring Initial Repositories
By default, Kubeapps will track the community Helm charts and the Kubernetes Service Catalog charts. To change these defaults, override the apprepository.initialRepos
object:
$ cat > custom-values.yaml <<EOF
apprepository:
initialRepos:
- name: example
url: https://charts.example.com
EOF
$ helm install --name kubeapps --namespace kubeapps bitnami/kubeapps -f custom-values.yaml
Configuring connection to a custom namespace Tiller instance
By default, Kubeapps connects to the Tiller Service in the kube-system
namespace, the default install location for Helm.
If your instance of Tiller is running in a different namespace or you want to have different instances of Kubeapps connected to different Tiller instances, you can achieve it by setting tillerProxy.host
:
helm install \
--set tillerProxy.host=tiller-deploy.my-custom-namespace:44134 \
bitnami/kubeapps
Configuring connection to a secure Tiller instance
In production, we strongly recommend setting up a secure installation of Tiller, the Helm server side component.
In this case, set the following values to configure TLS:
helm install \
--tls --tls-ca-cert ca.cert.pem --tls-cert helm.cert.pem --tls-key helm.key.pem \
--set tillerProxy.tls.verify=true \
--set tillerProxy.tls.ca="$(cat ca.cert.pem)" \
--set tillerProxy.tls.key="$(cat helm.key.pem)" \
--set tillerProxy.tls.cert="$(cat helm.cert.pem)" \
bitnami/kubeapps
Learn more about how to secure your Kubeapps installation here.
Exposing Externally
LoadBalancer Service
The simplest way to expose the Kubeapps Dashboard is to assign a LoadBalancer type to the Kubeapps frontend Service. For example:
$ helm install --name kubeapps --namespace kubeapps bitnami/kubeapps --set frontend.service.type=LoadBalancer
Wait for your cluster to assign a LoadBalancer IP or Hostname to the kubeapps
Service and access it on that address:
$ kubectl get services --namespace kubeapps --watch
Ingress
This chart provides support for ingress resources. If you have an ingress controller installed on your cluster, such as nginx-ingress or traefik you can utilize the ingress controller to expose Kubeapps.
To enable ingress integration, please set ingress.enabled
to true
Hosts
Most likely you will only want to have one hostname that maps to this Kubeapps installation, however, it is possible to have more than one host. To facilitate this, the ingress.hosts
object is an array.
Annotations
For annotations, please see this document. Not all annotations are supported by all ingress controllers, but this document does a good job of indicating which annotation is supported by many popular ingress controllers. Annotations can be set using ingress.annotations
.
TLS
TLS can be configured using setting the ingress.hosts[].tls
boolean of the corresponding hostname to true, then you can choose the TLS secret name setting ingress.hosts[].tlsSecret
. Please see this example for more information.
You can provide your own certificates using the ingress.secrets
object. If your cluster has a cert-manager add-on to automate the management and issuance of TLS certificates, set ingress.hosts[].certManager
boolean to true to enable the corresponding annotations for cert-manager as shown in the example below:
helm install --name kubeapps --namespace kubeapps bitnami/kubeapps \
--set ingress.enabled=true \
--set ingress.certManager=true \
--set ingress.hosts[0].name=kubeapps.custom.domain \
--set ingress.hosts[0].tls=true \
--set ingress.hosts[0].tlsSecret=kubeapps-tls
Troubleshooting
Forbidden error while installing the Chart
If during installation you run into an error similar to:
Error: release kubeapps failed: clusterroles.rbac.authorization.k8s.io "kubeapps-apprepository-controller" is forbidden: attempt to grant extra privileges: [{[get] [batch] [cronjobs] [] []...
Or:
Error: namespaces "kubeapps" is forbidden: User "system:serviceaccount:kube-system:default" cannot get namespaces in the namespace "kubeapps"
This usually is an indication that Tiller was not installed with enough permissions to create the resources by Kubeapps. In order to install Kubeapps, you will need to install Tiller with elevated permissions (e.g. as a cluster-admin). For example:
kubectl -n kube-system create sa tiller
kubectl create clusterrolebinding tiller --clusterrole cluster-admin --serviceaccount=kube-system:tiller
helm init --service-account tiller
It is also possible, though less common, that your cluster does not have Role Based Access Control (RBAC) enabled. To check if your cluster has RBAC you can execute:
$ kubectl api-versions
If the above command does not include entries for rbac.authorization.k8s.io
you should perform the chart installation by setting rbac.create=false
:
$ helm install --name kubeapps --namespace kubeapps bitnami/kubeapps --set rbac.create=false
Error while upgrading the Chart
It is possible that when upgrading Kubeapps an error appears. That can be caused by a breaking change in the new chart or because the current chart installation is in an inconsistent state. If you find issues upgrading Kubeapps you can follow these steps:
Note: This steps assume that you have installed Kubeapps in the namespace
kubeapps
using the namekubeapps
. If that is not the case replace the command with your namespace and/or name.
- (Optional) Backup your personal repositories (if you have any):
kubectl get apprepository --namespace kubeapps -o yaml <repo name> > <repo name>.yaml
- Delete Kubeapps:
helm del --purge kubeapps
- (Optional) Delete the App Repositories CRD:
Warning: Don't execute this step if you have more than one Kubeapps installation in your cluster.
kubectl delete crd apprepositories.kubeapps.com
- (Optional) Clean the Kubeapps namespace:
Warning: Don't execute this step if you have workloads other than Kubeapps in the
kubeapps
namespace.
kubectl delete namespace kubeapps
- Install the latest version of Kubeapps (using any custom modifications you need):
helm repo update
helm install --name kubeapps --namespace kubeapps bitnami/kubeapps
- (Optional) Restore any repositories you backed up in the first step:
kubectl apply -f <repo name>.yaml
After that you should be able to access the new version of Kubeapps. If the above doesn't work for you or you run into any other issues please open an issue.
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago
5 years ago