Book Image

Learn Helm

By : Andrew Block, Austin Dewey
Book Image

Learn Helm

By: Andrew Block, Austin Dewey

Overview of this book

Containerization is currently known to be one of the best ways to implement DevOps. While Docker introduced containers and changed the DevOps era, Google developed an extensive container orchestration system, Kubernetes, which is now considered the frontrunner in container orchestration. With the help of this book, you’ll explore the efficiency of managing applications running on Kubernetes using Helm. Starting with a short introduction to Helm and how it can benefit the entire container environment, you’ll then delve into the architectural aspects, in addition to learning about Helm charts and its use cases. You’ll understand how to write Helm charts in order to automate application deployment on Kubernetes. Focused on providing enterprise-ready patterns relating to Helm and automation, the book covers best practices for application development, delivery, and lifecycle management with Helm. By the end of this Kubernetes book, you will have learned how to leverage Helm to develop an enterprise pattern for application delivery.
Table of Contents (15 chapters)
1
Section 1: Introduction and Setup
5
Section 2: Helm Chart Development
9
Section 3: Adanced Deployment Patterns
14
Other Books You May Enjoy

Questions

  1. What is data provenance and integrity? How are data provenance and data integrity different?
  2. Imagine you want to prove the data provenance and integrity of a Helm download. Besides the release archive, what file does a user need to download from Helm's GitHub release page to accomplish this?
  3. What commands can a user run to verify the data provenance and integrity of a Helm chart?
  4. As a Helm chart developer, what can you do to ensure that you are deploying a stable container image?
  5. Why is it important to set resource limits on your Helm chart? What other Kubernetes resources can be used to configure a pod and namespace's resource limits?
  6. What is the concept of least privilege access? Which Kubernetes resources allow you to configure authorization and help achieve least privilege access?
  7. What command and set of flags can be used to authenticate against a chart repository?