Secure, cloud-native Helm chart repositories for Kubernetes teams
Cloudsmith gives you fully managed, private Helm chart repositories backed by a global CDN with 600+ edge points of presence. Push charts with the Helm CLI or Cloudsmith CLI, apply OPA policy controls, and serve charts to any cluster worldwide with consistent, low-latency delivery. No infrastructure to run, no index.yaml to manage.
One place for all your artifacts. Cloudsmith is a secure home for Helm charts alongside every other format your teams use.
- Use Helm + 30 other formats
- Store Docker images and Helm charts together in unified repositories
- Centralize raw files, ML models, and OS packages alongside your Kubernetes deployments
How we support Helm
helm repo add, helm install, and helm upgrade commands against your Cloudsmith repository. Entitlement token, HTTP Basic, and API key authentication are all supported for private repositories.helm install --verify. Where no provenance file is provided, Cloudsmith auto-generates one using the repository GPG signing key.Why teams choose Cloudsmith for Helm
Signs you're ready to switch to Cloudsmith for Helm
Get started with Helm on Cloudsmith
Frequently asked questions
Yes. Cloudsmith supports both the classic Helm chart repository protocol and OCI-based Helm chart storage. For the classic protocol, use standard helm repo add and helm install commands against your Cloudsmith repository URL. OCI support is currently in Early Access.
Package your chart with helm package, then push using the Cloudsmith CLI: cloudsmith push helm OWNER/REPOSITORY your-chart-1.0.0.tgz. You can also upload via the Cloudsmith web app. Full contextual setup instructions, including copy-and-paste snippets pre-configured with your namespace and repo, are available inside every repository.
Cloudsmith supports entitlement token authentication, HTTP Basic authentication with username and password, and HTTP Basic authentication with an API key. Private repositories require one of these methods. Credentials should be stored as secrets and never committed to source control or exposed in logs.
Yes. You can create and enforce governance policies governing which charts are permitted in your repositories. Block specific versions, require specific metadata fields, or quarantine charts that do not meet your criteria before any team member installs them. This gives your platform team a consistent enforcement layer across every environment.
Yes. Cloudsmith fully supports Helm provenance files for non-OCI Helm charts. You can upload signed charts packaged with helm package --sign, and verify them at install time with helm install --verify. If no provenance file is provided at upload, Cloudsmith automatically generates one using the repository GPG signing key.
Yes. Cloudsmith upstream proxying lets you configure public or third-party Helm repositories as upstreams. Charts not present in your Cloudsmith repository are fetched from the upstream on demand and optionally cached, giving your teams a single, reliable source for both private and public charts.
ChartMuseum requires you to provision, scale, patch, and maintain the server yourself. Cloudsmith is fully managed with no infrastructure overhead, automatic scaling, 99.9%+ availability, policy-driven governance, fine-grained access control, and global CDN delivery. You get all the Helm repository functionality with none of the operational burden.
Yes. Cloudsmith supports 30+ artifact formats in unified repositories. You can store Helm charts, Docker images, raw files, and other package formats together under a single repository, applying consistent access control and policies across all of them.
You can use the Cloudsmith CLI or web app to upload existing chart packages. Once uploaded, update your helm repo add command to point at your new Cloudsmith repository URL and run helm repo update. Cloudsmith's support team can assist with larger or more complex migrations.
Cloudsmith gives you fine-grained RBAC at workspace and repository level, entitlement tokens for scoped download access, OIDC for keyless authentication in CI pipelines, and SAML or SCIM for enterprise SSO and user provisioning. You control exactly who can push charts, who can pull them, and under what conditions.