- OpenTaco umbrella chart:
self-hosting/kubernetes/helm-charts/opentaco - Platform reference chart (optional):
self-hosting/kubernetes/helm-charts/opentaco-platform-reference
Optional: Deploy the platform reference chart first
Use this if you want a working reference for platform-level dependencies outside OpenTaco itself. Run these commands fromself-hosting/kubernetes/.
Understand what this chart provides
The reference chart can provision:
- Traefik ingress controller
- MinIO for object storage
- CloudNativePG operator
- A single CloudNativePG PostgreSQL cluster with three databases (orchestrator, statesman, and token-service)
Deploy OpenTaco with the umbrella chart
Prepare your values file
Start from the chart defaults and configure your deployment-specific settings.If you deployed the platform reference chart, you can also start from:
Get ingress load balancer endpoint and create DNS
Capture the external endpoint from your ingress or Gateway API implementation.If you are using the platform reference chart (Traefik), you can check it with:If you are using a different ingress controller or gateway, use that implementation’s service or load balancer endpoint instead.Then create a DNS record for your OpenTaco domain that points to the endpoint (for example, an
A record for an IP or a CNAME record for a hostname), and use that domain in your OpenTaco public URL values.Choose secret strategy: pre-created secrets or inline values
Recommended: pre-create Kubernetes secrets and reference them from chart values with
useExistingSecret: true. Manage those secrets with your organization’s preferred process (for example, External Secrets Operator).helm-charts/secrets-example/ and can be used as the value reference for externally managed secrets.For non-production testing, you can set values inline in the chart values instead of pre-creating secrets.Configure required OpenTaco values
Set the required credentials and shared variables described in Configuration based on the strategy you selected:
- Existing secrets path: populate secret data and reference secret names in
values-opentaco.yaml - Inline path: set values directly in
values-opentaco.yaml
Create or sync Kubernetes secrets (existing-secret path)
If you are using existing secrets, create or sync them now, then ensure
useExistingSecret: true and existingSecretName entries in values-opentaco.yaml match.
