Skip to content

Latest commit

 

History

History
86 lines (55 loc) · 1.98 KB

File metadata and controls

86 lines (55 loc) · 1.98 KB

Deployment with Helm

This guide shows how to install Entropy Data to Kubernetes using a Helm chart.

Prerequisites

  • A managed postgres database (running Postgres in Kubernetes is not recommended) with pg_vector extension available
  • An SMTP server for transactional emails
  • kubectl and Helm installed

Installation

Clone this repository

git clone [email protected]:entropy-data/entropy-data-helm.git
cd entropy-data-helm

Create a namespace for entropy-data in Kubernetes:

kubectl create namespace entropy-data

Create a secret with the Postgres credentials:

kubectl create secret -n entropy-data generic entropy-data-database \
  --from-literal=username=<database-username> \
  --from-literal=password=<database-password>

Create a secret with the SMTP credentials:

kubectl create secret -n entropy-data generic entropy-data-smtp \
  --from-literal=username=<smtp-username> \
  --from-literal=password=<smtp-password>

If you want to enable Azure SSO authentication, create a secret with your application client secret:

kubectl create secret -n entropy-data generic entropy-data-azure-sso \
  --from-literal=client-id=<azure-client-id> \
  --from-literal=client-secret=<azure-client-secret>

Adjust the values.yaml to your needs.

Use Helm to install Entropy Data to Kubernetes:

helm install -n entropy-data --create-namespace entropy-data .

Upgrade

helm upgrade -n entropy-data entropy-data .

Uninstallation

helm uninstall -n entropy-data entropy-data

Access

The application is now accessible at the service endpoint under port 8080. Example: http://:8080

Ingress

It is highly recommended to add an ingress with TLS protection that routes to the service. This Helm chart does not include an ingress resource, as the ingress and TLS configuration depend on your hoster and cluster configuration.

Support

https://support.entropy-data.com