Deploy Immuta without Elasticsearch

The guides below outline how to deploy Immuta without Elasticsearch.

This is a guide on how to deploy Immuta on Kubernetes in the following managed public cloud providers:

  • Amazon Web Services (AWS)

  • Microsoft Azure

  • Google Cloud Platform (GCP)

Prerequisites

The following cloud-managed services must be provisioned before proceeding:

Validation

  1. The PostgreSQL instance's hostname/FQDN is resolvable from within the Kubernetes cluster.

  2. The PostgreSQL instance is accepting connections.

Authenticate with OCI registry

Copy the snippet below and replace the placeholder text with the credentials provided to you by your customer success manager:

echo <token> | helm registry login --password-stdin --username <username> ocir.immuta.com

Setup

  1. Create a Kubernetes namespace named immuta for Immuta.

  2. Switch to namespace immuta.

  3. Create a container registry pull secret. Your credentials to authenticate with ocir.immuta.com can be viewed in your user profile at support.immuta.com.

PostgreSQL

Connecting to the database

There are numerous ways to connect to a PostgreSQL database. This step demonstrates how to connect by creating an ephemeral Kubernetes pod.

  1. Connect to the database as superuser (postgres) by creating an ephemeral container inside the Kubernetes cluster. A shell prompt will not be displayed after executing the kubectl run command outlined below. Wait 5 seconds, and then proceed by entering a password.

  2. Create an immuta role and database.

  3. Revoke privileges from CURRENT_USER as they're no longer required.

  4. Enable the pgcrypto extension.

  5. Type \q, and then press Enter to exit.

Install Immuta

This section demonstrates how to deploy Immuta using the Immuta Enterprise Helm chart once the prerequisite cloud-managed services are configured.

  1. Create a Helm values file named immuta-values.yaml with the following content:

  2. Update all placeholder values in the immuta-values.yaml file.

  1. Deploy Immuta.

Validation

  1. Wait for all pods in the namespace to become ready.

  2. Determine the name of the Secure service.

  3. Listen on local port 8080, forwarding TCP traffic to the Secure service's port named http.

Next steps

Last updated

Was this helpful?