Forum Stats

  • 3,826,560 Users
  • 2,260,666 Discussions


How-to: Install Helm package manager for on-premise Oracle Linux and Kubernetes

Jaap Romers-Oracle
Jaap Romers-Oracle Posts: 2 Employee
edited Jun 11, 2019 2:15PM in Containers and Orchestration

In this how-to guide I describe the configuration steps to install Helm from the Oracle Linux distribution. For generic information on Helm go to the Helm Documentation website.

Helm is a package-manager for Kubernetes, like yum is package-manager for Oracle Linux. Helm charts are packages of pre-configured Kubernetes resources and it makes deploying applications in Kubernetes very easy. Helm has additional features such as versioning, delete, upgrade or rollback deployments.

The Helm client is a program that you run as a developer or ops person. But there is also a second part to Helm and that is Tiller, this is the server side component of Helm and it runs in the Kubernetes cluster and handles the Helm packages.

Install Helm package

The version of Helm that is used at the moment of writing is available in the ol7_developer channel of Oracle Linux. First step is to install the Helm program in Oracle Linux:

# sudo yum-config-manager --enable ol7_developer <br/># sudo yum install helm

Create Kubernetes secret and service-account

We use the Oracle Linux version of Helm/Tiller and the Tiller component is hosted as container image on the Oracle Container Registry. Before installing Tiller make sure you have accepted Oracle Standard Terms and Restrictions in Container Services (Developer) section on the Oracle Container Registry.

A worker node in the Kubernetes cluster needs to authenticate against the registry with your Oracle SSO credentials to pull the Tiller image from the registry. You can do this by storing your Oracle SSO credentials in a Kubernetes secret object and use that secret when you deploy the container image:

# kubectl create secret docker-registry ora-registry --namespace kube-system \<br/> \ <br/>  --docker-username="[email protected]" \ <br/>  --docker-password="joe_sso_passwd" \ <br/>  --docker-email="[email protected]"

A Kubernetes service-account provides an identity to running processes in the cluster. A tiller service account is created and we add the ora-registry Kubernetes secret from the previous step to it:

# kubectl create -f - <<EOF <br/>apiVersion: v1 <br/>kind: ServiceAccount <br/>metadata: <br/>  name: tiller <br/>  namespace: kube-system <br/>imagePullSecrets: <br/>  - name: ora-registry <br/>EOF

Tiller needs to manage resources in all namespaces of the cluster, so we need to create a kind of super-user access for the tiller service-account. This is done by creating a ClusterRoleBinding:

# kubectl create clusterrolebinding tiller-cluster-rule \ <br/>  --clusterrole=cluster-admin \ <br/>  --serviceaccount=kube-system:tiller

Initialize Helm and install Tiller

Now it's time to initialize Helm in the local CLI and deploy the Tiller container image into the Kubernetes cluster. This could be done in a single step:

# helm init --service-account tiller \ <br/>  --tiller-image \ <br/> 

To test if the installation works, you can do this quick test:

# helm version <br/># helm repo update <br/># helm search mysql

Automated install script

The instructions in this How-to guide were provided by AmedeeBulle and he was so kind to provide the shell-script to automate the installation steps. Running this script (replace Oracle SSO username in the script with yours before running the script) is even more secure than providing CLI commands beacuse it hides your password from the command-line history.