Skip to content

Commit b44ccce

Browse files
authored
Update helm-requirements.md
1 parent f278dbb commit b44ccce

File tree

1 file changed

+11
-12
lines changed

1 file changed

+11
-12
lines changed

articles/operator-service-manager/helm-requirements.md

Lines changed: 11 additions & 12 deletions
Original file line numberDiff line numberDiff line change
@@ -11,14 +11,14 @@ ms.service: azure-operator-service-manager
1111
# Helm Requirements Overview
1212
Helm is a package manager for Kubernetes that helps to simplify application lifecycle management. Helm packages are called charts and consist of YAML configuration and template files. Upon execution of a Helm operation, the charts are rendered into Kubernetes manifest files to trigger the appropriate application lifecycle action. For most efficient integration with Azure Operator Service Manager (AOSM), publisher should consider certain best-practice considerations when developing Helm charts.
1313

14-
## Critical Considerations for registryUrl and imagePullSecrets
14+
## Requirements for registryUrl and imagePullSecrets
1515
Every Helm chart generally requires a declared registryUrl and imagePullSecrets. Best practice recommends that the publisher define these two parameters consistently as variables in the values.yaml. At first, AOSM depended upon the publisher exposing these values in a strict manner, so they could be ingested and then injected during deployment. This approach is known as the legacy method. Overtime, many complications arose as not all publishers charts complied with the strict definition of registryUrl and imagePullSecrets required by AOSM.
1616
* Some charts don't expose registryUrl and/or imagePullSecrets correctly, hiding them behind conditionals, or other values restrictions, which were not always met.
1717
* Some charts don't expose registryUrl and/or imagePullSecrets as the expected named string, instead as an array.
1818

1919
To reduce the strict compliance requirements on publishers for registryUrl and imagePullSecrets, AOSM later introduced two improved methods of handling these values. First injectArtifactStoreDetail and finally Cluster Registry. These two methods do not depend upon the registryUrl or imagePullSecrets appearing in the Helm package, instead AOSM derives and injects these values on behalf of the network function.
2020

21-
### Summary of approach options for registryUrl and imagePullSecrets
21+
## Approach for registryUrl and imagePullSecrets
2222
**Legacy.**
2323
* Required publisher to parameterize registryUrl & imagePullSecrets correctly in helm values and templates for substitution.
2424
* Images hosted in publisher Azure Container Registry (ACR).
@@ -33,10 +33,10 @@ To reduce the strict compliance requirements on publishers for registryUrl and i
3333
> [!NOTE]
3434
> In all three cases, AOSM is substituting AOSM derived secrets with whatever secrets a publisher exposes in templates. The only difference is Legacy and InjectArtifactStoreDetail, the secret is bound to publisher ACR, while in Cluster Registry, the secret is bound to cluster registry.
3535
36-
### Legacy approach for registryUrl and imagePullSecrets
36+
## Legacy approach for registryUrl and imagePullSecrets
3737
Azure Operator Service Manager (AOSM) uses the Network Function Manager (NFM) service to deploy Containerized Network Function (CNF). The Network Function Manager (NFM) contains features to inject container registryUrl and imagePullSecrets dynamically into the helm values during Network Function (NF) deployment.
3838

39-
#### How to enable
39+
### How to enable
4040
The following helm deployment template shows an example of how a publisher should expose registryPath and imagePullSecrets for compatibility with AOSM legacy approach.
4141

4242
```json
@@ -111,10 +111,10 @@ global:
111111
> * The registryPath is set without any prefix such as `https://` or `oci://`. If needed, publisher must defined a prefix in the helm package.
112112
> * imagePullSecrets and registryPath must be provided in the create NFDVersion onboarding step.
113113
114-
### injectArtifactStoreDetails approach for registryUrl and imagePullSecrets
114+
## injectArtifactStoreDetails approach for registryUrl and imagePullSecrets
115115
In some cases, third-party helm charts may not be fully compliant with AOSM requirements for registryURL. In this case, the injectArtifactStoreDetails feature can be used to avoid making changes to helm packages.
116116

117-
#### How to enable
117+
### How to enable
118118
To use injectArtifactStoreDetails, set the installOptions parameter in the NF resource roleOverrides section to true, then use whatever registryURL value is needed to keep the registry URL valid. See following example of injectArtifactStoreDetails parameter enabled.
119119

120120
```bash
@@ -139,7 +139,7 @@ resource networkFunction 'Microsoft.HybridNetwork/networkFunctions@2023-09-01' =
139139
}
140140
```
141141

142-
### Cluster Registry approach for registryUrl and imagePullSecrets
142+
## Cluster Registry approach for registryUrl and imagePullSecrets
143143
TBD
144144

145145
## Immutability restrictions
@@ -159,14 +159,12 @@ Users should avoid using references to an external registry. For example, if dep
159159
image: http://myURL/{{ .Values.image.repository }}:{{ .Values.image.tag}}
160160
```
161161

162-
## Other Recommendations
163-
Splitting the Custom Resource Definitions (CRDs) declaration and usage plus using manual validations are recommended practices. Each is described in the following sections.
164162

165-
### Split CRD declaration and usage
163+
## Split CRD declaration and usage
166164
We recommend splitting the declaration and usage of CRDs into separate helm charts to support
167165
updates. For detailed information see: [method-2-separate-charts](https://helm.sh/docs/chart_best_practices/custom_resource_definitions/#method-2-separate-charts)
168166

169-
### Manual validations
167+
## Manual validations
170168
Review the images and container specs created to ensure the images have prefix of registryURL and the imagePullSecrets are populated with secretName.
171169

172170
```shell
@@ -179,7 +177,8 @@ OR
179177
helm install --set "global.imagePullSecrets[0].name=<secretName>" --set "global.registry.url=<registryURL>" <release-name> <chart-name> --dry-run
180178
kubectl create secret <secretName> regcred --docker-server=<registryURL> --dockerusername=<regusername> --docker-password=<regpassword>
181179
```
182-
### Static image repository and tags
180+
181+
## Static image repository and tags
183182
Each helm chart should contain static image repository and tags. Users should set the image repository and tag to static values. The static values are set as follows:
184183
- Setting them in the image line or,
185184
- Setting the Values in values.yaml and not exposing these values in the Network Function Design Version (NFDV).

0 commit comments

Comments
 (0)