Deploy scalable and secure applications using Helm charts
Provide a comprehensive example Helm chart configuration to deploy applications to Kubernetes (EKS) with the following features:
Helm Chart Requirements:
- Values.yaml structured clearly for easy configuration and overrides
- Kubernetes resources: Deployments, Services, Ingress, ConfigMaps, Secrets
- Resource allocation, limits, and autoscaling parameters
- Security best practices, including RBAC definitions and Pod Security Context
- Recommended methods for handling application secrets securely
Documentation & Validation:
- Chart README with deployment instructions and example usage
- Inline comments explaining templating and customization points
- Helm best practices for maintainability and upgrades
- Instructions for validating and linting the chart (`helm lint`)
The user has provided the following details: