Fast, reliable, scalable, and easy to use open-source relational database system.










MySQL is one of the most popular database servers in the world. Notable users include Wikipedia, Facebook and Google.


This chart bootstraps a single node MySQL deployment on a Kubernetes cluster using the Helm package manager.


  • Kubernetes 1.6+ with Beta APIs enabled
  • PV provisioner support in the underlying infrastructure

Installing the Chart

To install the chart with the release name my-release:

$ helm install --name my-release stable/mysql

The command deploys MySQL on the Kubernetes cluster in the default configuration. The configuration section lists the parameters that can be configured during installation.

By default a random password will be generated for the root user. If you'd like to set your own password change the mysqlRootPasswordin the values.yaml.

You can retrieve your root password by running the following command. Make sure to replace [YOUR_RELEASE_NAME]:

printf $(printf '\%o' `kubectl get secret [YOUR_RELEASE_NAME]-mysql -o jsonpath="{.data.mysql-root-password[*]}"`)

Tip: List all releases using helm list

Uninstalling the Chart

To uninstall/delete the my-release deployment:

$ helm delete my-release

The command removes all the Kubernetes components associated with the chart and deletes the release.


The following table lists the configurable parameters of the MySQL chart and their default values.

imagemysql image repository.mysql
imageTagmysql image tag.5.7.14
imagePullPolicyImage pull policyIfNotPresent
existingSecretUse Existing secret for Password detailsnil
extraVolumesAdditional volumes as a string to be passed to the tpl function
extraVolumeMountsAdditional volumeMounts as a string to be passed to the tpl function
extraInitContainersAdditional init containers as a string to be passed to the tpl function
mysqlRootPasswordPassword for the root user. Ignored if existing secret is providedRandom 10 characters
mysqlUserUsername of new user to create.nil
mysqlPasswordPassword for the new user. Ignored if existing secret is providedRandom 10 characters
mysqlDatabaseName for new database to create.nil
livenessProbe.initialDelaySecondsDelay before liveness probe is initiated30
livenessProbe.periodSecondsHow often to perform the probe10
livenessProbe.timeoutSecondsWhen the probe times out5
livenessProbe.successThresholdMinimum consecutive successes for the probe to be considered successful after having failed.1
livenessProbe.failureThresholdMinimum consecutive failures for the probe to be considered failed after having succeeded.3
readinessProbe.initialDelaySecondsDelay before readiness probe is initiated5
readinessProbe.periodSecondsHow often to perform the probe10
readinessProbe.timeoutSecondsWhen the probe times out1
readinessProbe.successThresholdMinimum consecutive successes for the probe to be considered successful after having failed.1
readinessProbe.failureThresholdMinimum consecutive failures for the probe to be considered failed after having succeeded.3
persistence.enabledCreate a volume to store datatrue
persistence.sizeSize of persistent volume claim8Gi RW
persistence.storageClassType of persistent volume claimnil (uses alpha storage class annotation)
persistence.accessModeReadWriteOnce or ReadOnlyReadWriteOnce
persistence.existingClaimName of existing persistent volumenil
persistence.subPathSubdirectory of the volume to mountnil
persistence.annotationsPersistent Volume annotations{}
nodeSelectorNode labels for pod assignment{}
metrics.enabledStart a side-car prometheus exporterfalse
metrics.imageExporter imageprom/mysqld-exporter
metrics.imageTagExporter imagev0.10.0
metrics.imagePullPolicyExporter image pull policyIfNotPresent
metrics.resourcesExporter resource requests/limitnil
metrics.livenessProbe.initialDelaySecondsDelay before metrics liveness probe is initiated15
metrics.livenessProbe.timeoutSecondsWhen the probe times out5
metrics.readinessProbe.initialDelaySecondsDelay before metrics readiness probe is initiated5
metrics.readinessProbe.timeoutSecondsWhen the probe times out1
resourcesCPU/Memory resource requests/limitsMemory: 256Mi, CPU: 100m
configurationFilesList of mysql configuration filesnil
ssl.enabledSetup and use SSL for MySQL connectionsfalse
ssl.secretName of the secret containing the SSL certificatesmysql-ssl-certs
ssl.certificates[0].nameName of the secret containing the SSL certificatesnil
ssl.certificates[0].caCA certificatenil
ssl.certificates[0].certServer certificate (public key)nil
ssl.certificates[0].keyServer key (private key)nil
imagePullSecretsName of Secret resource containing private registry credentialsnil
initializationFilesList of SQL files which are run after the container startednil
timezoneContainer and mysqld timezone (TZ env)nil (UTC depending on image)
podAnnotationsMap of annotations to add to the pods{}

Some of the parameters above map to the env variables defined in the MySQL DockerHub image.

Specify each parameter using the --set key=value[,key=value] argument to helm install. For example,

$ helm install --name my-release   --set mysqlRootPassword=secretpassword,mysqlUser=my-user,mysqlPassword=my-password,mysqlDatabase=my-database     stable/mysql

The above command sets the MySQL root account password to secretpassword. Additionally it creates a standard database user named my-user, with the password my-password, who has access to a database named my-database.

Alternatively, a YAML file that specifies the values for the parameters can be provided while installing the chart. For example,

$ helm install --name my-release -f values.yaml stable/mysql

Tip: You can use the default values.yaml


The MySQL image stores the MySQL data and configurations at the /var/lib/mysql path of the container.

By default a PersistentVolumeClaim is created and mounted into that directory. In order to disable this functionalityyou can change the values.yaml to disable persistence and use an emptyDir instead.

"An emptyDir volume is first created when a Pod is assigned to a Node, and exists as long as that Pod is running on that node. When a Pod is removed from a node for any reason, the data in the emptyDir is deleted forever."

Custom MySQL configuration files

The MySQL image accepts custom configuration files at the path /etc/mysql/conf.d. If you want to use a customized MySQL configuration, you can create your alternative configuration files by passing the file contents on the configurationFiles attribute. Note that according to the MySQL documentation only files ending with .cnf are loaded.

configurationFiles:  mysql.cnf: |-    [mysqld]    skip-host-cache    skip-name-resolve    sql-mode=STRICT_TRANS_TABLES,NO_ZERO_IN_DATE,NO_ZERO_DATE,ERROR_FOR_DIVISION_BY_ZERO,NO_AUTO_CREATE_USER,NO_ENGINE_SUBSTITUTION  mysql_custom.cnf: |-    [mysqld]

MySQL initialization files

The MySQL image accepts .sh, .sql and *.sql.gz files at the path /docker-entrypoint-initdb.d.These files are being run exactly once for container initialization and ignored on following container restarts.If you want to use initialization scripts, you can create initialization files by passing the file contents on the initializationFiles attribute.

initializationFiles:  first-db.sql: |-    CREATE DATABASE IF NOT EXISTS first DEFAULT CHARACTER SET utf8 DEFAULT COLLATE utf8_general_ci;  second-db.sql: |-    CREATE DATABASE IF NOT EXISTS second DEFAULT CHARACTER SET utf8 DEFAULT COLLATE utf8_general_ci;


This chart supports configuring MySQL to use encrypted connections with TLS/SSL certificates provided by the user. This is accomplished by storing the required Certificate Authority file, the server public key certificate, and the server private key as a Kubernetes secret. The SSL options for this chart support the following use cases:

  • Manage certificate secrets with helm
  • Manage certificate secrets outside of helm

Manage certificate secrets with helm

Include your certificate data in the ssl.certificates section. For example:

ssl:  enabled: false  secret: mysql-ssl-certs  certificates:  - name: mysql-ssl-certs    ca: |-      -----BEGIN CERTIFICATE-----      ...      -----END CERTIFICATE-----    cert: |-      -----BEGIN CERTIFICATE-----      ...      -----END CERTIFICATE-----    key: |-      -----BEGIN RSA PRIVATE KEY-----      ...      -----END RSA PRIVATE KEY-----

Note: Make sure your certificate data has the correct formatting in the values file.

Manage certificate secrets outside of helm

  1. Ensure the certificate secret exist before installation of this chart.
  2. Set the name of the certificate secret in ssl.secret.
  3. Make sure there are no entries underneath ssl.certificates.

To manually create the certificate secret from local files you can execute:

kubectl create secret generic mysql-ssl-certs   --from-file=ca.pem=./ssl/certificate-authority.pem   --from-file=server-cert.pem=./ssl/server-public-key.pem   --from-file=server-key.pem=./ssl/server-private-key.pem

Note: ca.pem, server-cert.pem, and server-key.pem must be used as the key names in this generic secret.

If you are using a certificate your configurationFiles must include the three ssl lines under [mysqld]

[mysqld]    ssl-ca=/ssl/ca.pem    ssl-cert=/ssl/server-cert.pem    ssl-key=/ssl/server-key.pem