This chart installs Octopus Deploy into a Kubernetes cluster using the Helm package manager.
helm install octopus-deploy oci://registry-1.docker.io/octopusdeploy/octopusdeploy-helm --values values.yaml
Database
Octopus requires a SQL Server database.
SQL Server can be installed via Helm into your Kubernetes cluster.
Alternatively, there are many other installation options, or your cloud provider may offer a hosted option.
You will need the database connection string. This should look something like:
Server=tcp:octopus-deploy.database.windows.net,1433;Initial Catalog=OctopusDeploy;Persist Security Info=False;User ID=octopus-deploy;Password={your_password};Encrypt=True;Connection Timeout=30;
Master key
Octopus uses a master key to encrypt sensitive values.
You must generate a master key, and store it safely.
The master key can be generated with
openssl rand -base64 16
A minimal example of a values file for installing this chart:
octopus: acceptEula: "Y" # It is required to accept the Octopus EULA https://octopus.com/legal/customer-agreement masterKey: <generated master key - base64> databaseConnectionString: <your sql server database connection string> licenseKeyBase64: <your base64 encoded license key> username: <admin username> password: <admin password> packageRepositoryVolume: size: 1Gi storageClassName: "azure-file" storageAccessMode: ReadWriteOnce # The volume used for persisting deployment artifacts: https://octopus.com/docs/projects/deployment-process/artifacts artifactVolume: size: 1Gi storageClassName: "azure-file" storageAccessMode: ReadWriteOnce # Volume used for task logs: https://octopus.com/docs/support/get-the-raw-output-from-a-task taskLogVolume: size: 1Gi storageClassName: "azure-file" storageAccessMode: ReadWriteOnce
There are two types of traffic which you will typically want to allow from outside the cluster:
For the web portal, a common approach is to use a Kubernetes ingress resource. This requires an ingress controller to be running in your cluster.
An example of a values file which configures ingress for the web portal using https://kubernetes.github.io/ingress-nginx/ is shown below:
octopus: ingress: enabled: true annotations: kubernetes.io/ingress.class: nginx path: / hosts: - octopus.example.com
Polling Tentacles
Polling Tentacles are more complicated than web traffic, as polling tentacles must poll every Octopus server node.
For this reason, this Helm chart doesn't provision an ingress resource for polling tentacles.
If the chart is configured to create a single Octopus node (replicaCount: 1) then the polling tentacle port is exposed on the same service as the Octopus server. If a replica count of greater than 1 is specified, then a kubernetes service will be created for each node. When registering your polling tentacles, you will need to configure them to poll each node.
This chart requires persistent volumes to store:
These volumes are shared across Octopus nodes.
For each, an optional persistent volume claim class name can be supplied. This storage class must support ReadWriteMany access modes when the chart is configured to create more than one Octopus node (replicaCount > 0).
ReadWriteOnce or ReadWriteMany can be used for single node clusters.
A dash (i.e. "-") means use an empty string as the storageClass attribute. This effectively means there is no automatic provisioning of persistent volumes, and the volumes need to be created externally outside of this chart.
A falsy value means the storageClass attribute is not defined, and the default value may be used. Most cloud providers support automatic provisioning of ReadWriteOnce volumes.
An example of configuring the persistent volumes is shown below:
octopus: packageRepositoryVolume: size: 20Gi storageClassName: "azure-file" storageAccessMode: ReadWriteOnce artifactVolume: size: 1Gi storageClassName: "azure-file" storageAccessMode: ReadWriteOnce taskLogVolume: size: 1Gi storageClassName: "azure-file" storageAccessMode: ReadWriteOnce
您可以使用以下命令拉取该镜像。请将 <标签> 替换为具体的标签版本。如需查看所有可用标签版本,请访问 标签列表页面。

探索更多轩辕镜像的使用方法,找到最适合您系统的配置方式
通过 Docker 登录认证访问私有仓库
无需登录使用专属域名
Kubernetes 集群配置 Containerd
K3s 轻量级 Kubernetes 镜像加速
VS Code Dev Containers 配置
Podman 容器引擎配置
HPC 科学计算容器配置
ghcr、Quay、nvcr 等镜像仓库
Harbor Proxy Repository 对接专属域名
Portainer Registries 加速拉取
Nexus3 Docker Proxy 内网缓存
需要其他帮助?请查看我们的 常见问题Docker 镜像访问常见问题解答 或 提交工单
docker search 限制
站内搜不到镜像
离线 save/load
插件要用 plugin install
WSL 拉取慢
安全与 digest
新手拉取配置
镜像合规机制
不支持 push
manifest unknown
no matching manifest(架构)
invalid tar header(解压)
TLS 证书失败
DNS 超时
域名连通性排查
410 Gone 排查
402 与流量用尽
401 认证失败
429 限流
D-Bus 凭证提示
413 与超大单层
来自真实用户的反馈,见证轩辕镜像的优质服务