Standardized Software Logistics: OCI, Helm, Kubernetes API
TL;DR The Cloud-Native community has established a comprehensive “software logistics” …
Diese Serie erklärt systematisch, wie moderne Software compliant entwickelt und betrieben wird – von EU-Regulierungen bis zur technischen Umsetzung.
values.yaml.Helm has become the de facto standard for packaging applications on /kubernetes/. However, in practice, many teams see two opposing realities:
For engineering leads with compliance responsibilities, this is a dilemma: they are responsible for stability, security, and regulatory compliance without being able to review every line of template code themselves. This is where ohMyHelm comes in – as an abstraction layer that encapsulates the Kubernetes infrastructure while providing standardized, auditable structures.
ohMyHelm is not another “application chart” but a universal Helm chart wrapper. Instead of writing individual templates for each application, you bind ohMyHelm once as a dependency and describe your application solely through configuration values.
values.yamlThe basic idea is simple:
values.yaml.For you as the responsible person, this means:
ohMyHelm deliberately targets production-ready, multi-stage environments – with standards that prove themselves in audits and 24/7 operations.
ohMyHelm supports both classic stateless deployments and StatefulSets, which are necessary for databases or stateful services. Through your configuration, you determine:
Teams do not need to create their own YAML manifests for this, but only declare what the desired end state should look like.
ohMyHelm comes with integrated mechanisms for configuration and secrets:
This gives you a clear separation:
Additionally, you can define ServiceAccounts and RBAC roles per application. This prevents the widespread “default-ServiceAccount” anti-pattern and enables least-privilege approaches without having to write individual, manually maintained roles for each service.
Modern cloud-native architectures cannot be operated sensibly without observability. ohMyHelm offers standardized hooks for this:
This makes observability no longer a “tacked-on” topic but part of the standard deployment model.
The original 12-Factor and further developed 15-Factor principles are the blueprint for many teams’ cloud-native strategies. ohMyHelm is explicitly designed to technically map these principles.
values.yamlInstead of baking configuration into containers or using different templating in different environments, everything is controlled via values.yaml:
This allows you to achieve:
15-Factor apps treat backing services – databases, queues, caches, external APIs – as interchangeable resources. In the Helm world, this means:
values.yaml.For example, you define:
All these resources remain decoupled from each other while the deployment model remains consistent.
In the 15-Factor model, logs are understood as a continuous event stream, not as local files. In a /kubernetes/ environment, this means:
ohMyHelm ensures that your workloads provide the necessary labels, ports, and endpoints so that logging, metrics, and tracing stacks can capture this data. Combined with tools like /apps/grafana/, this creates a consistent observability picture across all applications.
With increasing regulatory requirements – from the European Data Act to industry-specific standards – it is becoming increasingly important for platform managers to establish clear technical guardrails. ohMyHelm supports exactly this task.
Missing or inconsistent resource limits are a common finding in audits. In ohMyHelm, they are part of the basic equipment:
This avoids “noisy neighbors” and unplanned costs – while also meeting common /compliance/ requirements for capacity planning and risk management.
Network segmentation is an important building block for secure platforms. In combination with a CNI like /apps/cilium/, you can:
ohMyHelm helps to anchor these policies as a recurring pattern in your charts instead of defining them anew for each service.
Security contexts are essential for hardening container runtime environments:
ohMyHelm provides parametric configurations for this, which can be defined once in accordance with your security policies and then reused for all applications. This reduces the risk that individual services are operated “under the radar” with overly extensive rights.
On January 11, 2024, the European Data Act came into force; central obligations for data portability and interoperability will take effect from September 12, 2025. This is supplemented by further initiatives around cloud sovereignty and standardization.
ohMyHelm fits into this picture by:
What does this look like in practice? Instead of showing a complete manifest or chart, we focus on the structure you should keep in mind as the responsible person.
Imagine a classic Django application that:
SECRET_KEY, database passwords) in /apps/hashicorp-vault/.In an ohMyHelm-based values.yaml, you would find the following logical blocks at a high level of abstraction:
Base Workload
Definition of the container (image, tag, ports), replica count, probes, requests/limits. Here you also specify whether a Deployment or StatefulSet is used.
Configuration and Secrets
SECRET_KEY).Backing Services
Declaration of whether the PostgreSQL database is provided in the same cluster or operated externally, including the necessary connection information.
Ingress and TLS
Observability
Security & Compliance
TL;DR The Cloud-Native community has established a comprehensive “software logistics” …
TL;DR Factors 7–12 of the 15-Factor-App primarily address operations, scaling, and …
TL;DR Polycrate is an Ansible-based framework for deployment automation that containerizes all …