How to Configure your Custom Application Catalog

With Okteto Cloud you can deploy Helm 3 applications with one click. A default list of applications is provided to get you and your team up and running.

You can add your own Helm repositories to Okteto Cloud to extend this list. This gives you the same one-click deployment experience with the applications that you and your team uses. You can use this to simplify onboarding, and standarize your dependencies.

In order to add your Helm charts you'll need a Helm chart repository index with at least one published chart. Follow this guide to learn how to do it.

Add your repository to Okteto Cloud

On the left side of the Okteto Cloud UI click the Settings option. On the new window, click the Repositories tab. The Okteto Cloud UI will show you the Helm repositories you have configured in Okteto Cloud. Put the address of your repository, and press the Save Changes button:

The applications from your repo will now be included in the Deploy dialog.

Suggest default values

The values.yaml file of your Helm chart contains all the configuration values of your application. This file can be too complex for anyone who is not familiar with your application. Place a values-okteto.yaml file side by side with your values.yaml file to show the recommended options to the users. Okteto will automatically load the values-okteto.yaml file and show it in the Deploy dialog.

Make your chart multi-tenant friendly.

Okteto Cloud is a multi-tenant environment. It gives you access to a Kubernetes namespaces with a few restrictions in place to make it safer and easier to use for everyone.

Your Helm chart will need to comply with these restrictions to function properly in Okteto Cloud:

  • Your chart cannot create ClusterRole or ClusterRoleBinding objects.
  • NodePort and LoadBalancer service types are not supported. Okteto Cloud automatically translates NodePort or LoadBalancer services into ingress rules. More information is available here.
  • The following Pod options are not allowed: privileged, hostNetwork, allowPrivilegeEscalation, hostPID, hostIPC. Volume host paths are not allowed either.

More information about our multi-tenant policies is available here.