Blog
Product
Kubernetes
4
minutes

New Feature: Deploy Your Helm Charts With Ease

Today, I'm thrilled to announce a game-changing feature that's set to revolutionize how Platform Engineers and Developers interact with Kubernetes: the introduction of first-class support for Helm Charts within Qovery 🥳. This latest update, now generally available, empowers our users to deploy any Helm Chart with unparalleled ease, marking a significant leap forward in our mission to streamline application deployment for everyone.
September 26, 2025
Romaric Philogène
CEO & Co-founder
Summary
Twitter icon
linkedin icon

TLDR;

  • Deploy Helm Charts from the Qovery web console, CLI, and Terraform Provider (WIP).
  • Qovery Helm Charts deployments provide many additional features (cf below) over the Helm CLI.
  • The documentation is here.
  • Watch this example with Datadog Helm Chart

The Dual Benefit: For Platform Engineers and Developers

Helm has emerged as a cornerstone in Kubernetes management, widely recognized for its capability to streamline the deployment and management of applications. However, the complexity it brings can be a hurdle for many. Qovery's new feature is designed with both Platform Engineers and Developers in mind, simplifying these complexities and making Kubernetes more approachable and manageable.

Here is a list of what Qovery Helm Charts provide over the Helm CLI:

  • RBAC: ensure that only cluster admins can deploy cluster-wide resources (CRD, clusterRoles, etc... exhaustive list available in our documentation)
  • Discover services and configure ingress + assign domain and valid certificate to expose helm charts
  • Auto-deploy changes from Git
  • Reduce costs by stopping all your helm charts and their dependencies (replicas set to 0)
  • Get easy access to pod logs
  • Get easy access to pod status
  • Store values override on the Qovery side (with the nice view to display the default values.yaml) or in a separate git repository
  • Automatically replace vars in the overrides using the Qovery env vars (replace secrets safely, connect to other qovery services, etc...)
  • Attach custom domains to services (WIP for Q1 2024)

Our approach is straightforward: automate and simplify. By handling the intricate aspects of Helm Chart deployment, such as service discovery and network management, Qovery empowers users to focus on what they do best.

How Qovery turns Helm Chart deployment a breeze

This ease of use does not come at the expense of flexibility or power, making it a perfect fit for both quick deployments and complex, scalable applications.

Example with Datadog Helm Chart

Consider the deployment of essential tools like the Datadog Helm Chart. Previously, this required Qovery Lifecycle Jobs, demanding significant manual configuration. Or manually connecting to the cluster and using the helm command 🥱.

With our new update, platform engineers and developers can deploy Datadog charts (and any other) directly through a streamlined, automated process, saving time and reducing the potential for error.

FAQ

Should I deploy my apps using Helm Chart?

It's a fair question. If you already have all your apps configured with a Helm Chart, then yes it's the fastest way to benefit from Qovery; otherwise, we do recommend using the traditional way of deploying your apps with Qovery. Note: you can use both. They are not mutually exclusive.

Can I use Qovery env vars inside my values file?

Yes, by prefixing the env var with "qovery.env.YOUR_ENV_VAR". Read more..

What are Qovery Helm Charts macros?

Qovery reads your override values file and overwrites all variables prefixed by "qovery.env.", "qovery.labels.services" and "qovery.annotations.services" with the interpolated values. "qovery.env.YOUR_ENV_VAR" will be interpolated with your Qovery environment variable, while "qovery.labels.service" and "qovery.annotations.service" are interpolated with built-in Qovery values. The two latest are necessary to provide the following features:

  • display services logs
  • deploy/stop/clone/delete actions
  • display services statuses
  • and other capabilities...

Example with Datadog values.yaml:

datadog:
apiKey: qovery.env.DD_API_KEY
appKey: qovery.env.DD_APP_KEY
site: datadoghq.eu

commonLabels:
qovery.labels.service

clusterAgent:
deploymentAnnotations:
qovery.annotations.service
podAnnotations:
qovery.annotations.service
additionalLabels:
qovery.labels.service

agents:
daemonsetAnnotations:
qovery.annotations.service
podAnnotations:
qovery.annotations.service
additionalLabels:
qovery.labels.service

clusterChecksRunner:
deploymentAnnotations:
qovery.annotations.service
podAnnotations:
qovery.annotations.service
additionalLabels:
qovery.labels.service

Does this feature work with Qovery BYOK?

Yes, it works with all our Qovery options, including our BYOK (Bring Your Own Kubernetes) option.

Can I customize what this feature does automatically?

You can with Qovery BYOK, but not with the Qovery Managed Kubernetes option.

Next Step: Supporting OpenTofu (Terraform)

Our journey doesn't stop here. We're excited to hint at our next big venture: integrating OpenTofu as a first-class citizen to make Terraform module deployment as easy as with Helm for Platform Engineers and Developers. Stay tuned :)

Conclusion

You can now deploy your Helm Chart right from Qovery. This brings additional flavors and simplifies Helm Chart deployment for all your developers. You no longer need to use Lifecycle Job or directly connect to your Kubernetes cluster to do it.

Feedback appreciated

Please provide your feedback. We are eager to hear more about your usage and what you like/dislike. Our forum is the best place for sharing your input.

Share on :
Twitter icon
linkedin icon
Tired of fighting your Kubernetes platform?
Qovery provides a unified Kubernetes control plane for cluster provisioning, security, and deployments - giving you an enterprise-grade platform without the DIY overhead.
See it in action

Suggested articles

Kubernetes
8
 minutes
Kubernetes management in 2026: mastering Day-2 ops with agentic control

The cluster coming up is the easy part. What catches teams off guard is what happens six months later: certificates expire without a single alert, node pools run at 40% over-provisioned because nobody revisited the initial resource requests, and a manual kubectl patch applied during a 2am incident is now permanent state. Agentic control planes enforce declared state continuously. Monitoring tools just report the problem.

Mélanie Dallé
Senior Marketing Manager
Kubernetes
6
 minutes
Kubernetes observability at scale: how to cut APM costs without losing visibility

The instinct when setting up Kubernetes observability is to instrument everything and send it all to your APM vendor. That works fine at ten nodes. At a hundred, the bill becomes a board-level conversation. The less obvious problem is the fix most teams reach for: aggressive sampling. That is how intermittent failures affecting 1% of requests disappear from your monitoring entirely.

Mélanie Dallé
Senior Marketing Manager
Kubernetes
 minutes
How to automate environment sleeping and stop paying for idle Kubernetes resources

Scaling your deployments to zero is only half the battle. If your cluster autoscaler does not aggressively bin-pack and terminate the underlying worker nodes, you are still paying for idle metal. True environment sleeping requires tight integration between your ingress layer and your node provisioner to actually realize FinOps savings.

Mélanie Dallé
Senior Marketing Manager
Kubernetes
DevOps
6
 minutes
10 best Kubernetes management tools for enterprise fleets in 2026

The structure, table, tool list, and code blocks are all worth keeping. The main work is fixing AI-isms in the prose, updating the case study to real metrics, correcting the FAQ format, and replacing the CTAs with the proper HTML blocks. The tool descriptions need the "Core strengths / Potential weaknesses" headers made less template-y, and the intro needs a sharper human voice.

Mélanie Dallé
Senior Marketing Manager
DevOps
Kubernetes
Platform Engineering
6
 minutes
10 best Red Hat OpenShift alternatives to reduce licensing costs

For years, Red Hat OpenShift has been the safe choice for heavily regulated, on-premise environments. It operates as a secure fortress. But in the public cloud, that fortress acts as an expensive prison. Paying proprietary per-core licensing fees on top of your standard AWS or GCP compute bill is a redundant "middleware tax." Escaping OpenShift requires decoupling your infrastructure from your developer experience by running standard, vanilla Kubernetes paired with an agentic control plane.

Morgan Perry
Co-founder
AI
Product
3
 minutes
Qovery Skill for AI Agents: Deploy Apps in One Prompt

Use Qovery from Claude Code, OpenCode, Codex, and 20+ AI Coding agents

Romaric Philogène
CEO & Co-founder
Kubernetes
 minutes
Stopping Kubernetes cloud waste: agentic automation for enterprise fleets

Agentic Kubernetes resource reclamation is the practice of using an autonomous control plane to continuously identify, suspend, and delete idle infrastructure across a multi-cloud Kubernetes fleet. It replaces manual cleanup and reactive autoscaling with intent-based policies that act on business state, eliminating the configuration drift and cloud waste typical of unmanaged fleets.

Mélanie Dallé
Senior Marketing Manager
Platform Engineering
Kubernetes
DevOps
10
 minutes
What is Kubernetes? The reality of Day-2 enterprise fleet orchestration

Kubernetes focuses on container orchestration, but the reality on the ground is far less forgiving. Provisioning a single cluster is a trivial Day-1 exercise. The true operational nightmare begins on Day 2. Teams that treat multi-cloud fleets like isolated pets inevitably face crushing YAML configuration drift, runaway AWS bills, and severe scaling bottlenecks.

Morgan Perry
Co-founder

It’s time to change
the way you manage K8s

Turn Kubernetes into your strategic advantage with Qovery, automating the heavy lifting while you stay in control.