Using Helm with PKS
Page last updated:
Warning: Pivotal Container Service (PKS)
v1.3 is no longer supported because it has reached the End
of General Support (EOGS) phase as defined by the
Support Lifecycle Policy.
To stay up to date with the latest software and security updates, upgrade to a supported version.
This topic describes how to use the package manager Helm for your Kubernetes apps running on Pivotal Container Service (PKS).
Helm includes the following components:
||Client||Runs on your local workstation|
||Server||Runs inside your Kubernetes cluster|
Helm packages are called charts. For more information, see Charts in the Helm documentation.
Examples of charts:
For more charts, see the Helm Charts repository on GitHub.
If you want to use Helm with PKS, you must configure Tiller.
Tiller runs inside the Kubernetes cluster and requires access to the Kubernetes API.
If you use role-based access control (RBAC) in PKS, perform the steps in this section to grant Tiller permission to access the API.
Create a file named
rbac-config.yamlwith the following configuration:
apiVersion: v1 kind: ServiceAccount metadata: name: tiller namespace: kube-system --- apiVersion: rbac.authorization.k8s.io/v1beta1 kind: ClusterRoleBinding metadata: name: tiller roleRef: apiGroup: rbac.authorization.k8s.io kind: ClusterRole name: cluster-admin subjects: - kind: ServiceAccount name: tiller namespace: kube-system
Create the service account and role by running the following command:
kubectl create -f rbac-config.yaml
Download and install the Helm CLI.
Deploy Helm using the service account by running the following command:
helm init --service-account tiller
Verify that the permissions are configured by running the following command:
There should be no output from the above command.
To apply more granular permissions to the Tiller service account, see the Helm RBAC documentation.
Please send any feedback you have to firstname.lastname@example.org.