Get Started on Kubernetes
The OpenShell Helm chart is experimental and under active development. Templates, values, and defaults may change between releases. Do not use it in production.
Use the Kubernetes deployment when the gateway should run on a shared cluster, in a cloud environment, or as part of team infrastructure. The Helm chart deploys the gateway as a StatefulSet and handles PKI bootstrap, RBAC, and sandbox namespace setup automatically.
Prerequisites
Make sure the following are in place before you install.
Install Agent Sandbox
OpenShell uses the Agent Sandbox Kubernetes SIG project to provision sandbox pods. Install the Agent Sandbox controller and its CRDs on your cluster before installing the OpenShell Helm chart.
Fetch the latest release tag and apply the manifest:
This creates the agent-sandbox-system namespace, installs the CRDs, and starts the controller.
Confirm the controller pod is running before proceeding:
The controller pod should reach Running status within a few seconds. For cluster-specific setup instructions, including KinD and GKE walkthroughs, refer to the Agent Sandbox getting started guide.
Install OpenShell
Install the chart
Install from the OCI registry on GHCR. Replace <version> with the chart version you want to install.
To use the latest development build instead of a stable release:
The chart automatically generates PKI secrets and an SSH handshake secret on first install using pre-install Helm hooks. No manual secret creation is required.
Connect to the gateway
For local evaluation, use a port-forward:
The port-forward is for local evaluation only. For shared environments, expose the gateway through your ingress controller or access proxy. See Ingress for an external access option.
Install the client mTLS certificate
The default installation runs with mTLS enabled by default. The CLI needs the client certificate, key, and CA that the chart’s PKI hook generated. Extract them from the openshell-client-tls secret and place them where the CLI expects them for a gateway named k8s:
The server certificate SANs include localhost and 127.0.0.1, so hostname verification passes over the port-forward without extra flags.
Configure Chart Values
The most commonly changed values are:
Use a values file for repeatable deployments:
Next Steps
- To enable automatic certificate rotation with cert-manager, see Managing Certificates.
- To expose the gateway externally without port-forwarding, see Ingress.
- To configure OIDC or reverse-proxy authentication, see Access Control.
- To create your first sandbox, see Manage Sandboxes.