Ingress Configuration

This guide demonstrates how to configure Ingress. Ingress can be configured in numerous ways. Configurations for the most popular controllers are outlined below.

Kubernetes namespace

The following section(s) presume the Immuta Enterprise Helm chart was deployed into namespace immuta and that the current namespace is immuta.

The Immuta web service listens on the following ports:

Port
Protocol
Description
Optional

443

TCP

HTTPS

False

80

TCP

HTTP (redirects to HTTPS)

True

Ingress hostname

This is the fully qualified domain name (FQDN) as defined by RFC 3986 used to access the Immuta UI. If a FQDN has yet to be determined set Secure's ingress hostname to immuta.local.

  1. Edit the immuta-values.yaml file to include the following Helm values.

    secure:
      ingress:
        enabled: true
        hostname: <immuta-fqdn>
        ingressClassName: nginx
        annotations:
          nginx.ingress.kubernetes.io/proxy-body-size: '64m'
  2. Perform a Helm upgrade to apply the changes made to immuta-values.yaml.

    helm upgrade <release-name> oci://ocir.immuta.com/stable/immuta-enterprise --values immuta-values.yaml --version 2025.1.8

Refer to the Ingress-Nginx Controller documentation for further assistance.

  1. Edit immuta-values.yaml to include the following Helm values.

  2. Create a file named frontendconfig.yaml with the following content.

  3. Apply the FrontendConfig CRD.

  4. Perform a Helm upgrade to apply the changes made to immuta-values.yaml.

Refer to the Google Cloud documentation for further assistance.

  1. Edit immuta-values.yaml to include the following Helm values.

  2. Perform a Helm upgrade to apply the changes made to immuta-values.yaml.

Refer to the AWS Load Balancer Controller documentation for further assistance.

  1. Edit immuta-values.yaml to include the following Helm values.

  2. Perform a Helm upgrade to apply the changes made to immuta-values.yaml.

Refer to the Application Gateway Ingress Controller documentation for further assistance.

  1. Edit immuta-values.yaml to include the following Helm values.

  2. Create a file named middleware.yaml with the following content.

  3. Apply the Middleware CRD.

  4. Perform a Helm upgrade to apply the changes made to immuta-values.yaml.

Refer to the Traefik documentation for further assistance.

  1. Edit immuta-values.yaml to include the following Helm values. Because the Ingress resource will be managed by the OpenShift route you create and not the Immuta Enterprise Helm chart, ingress is set to false below.

  2. Get the service name for Secure.

  3. Create a file named route.yaml with the following content. Update all placeholder values with your own values.

  4. Apply the Route CRD.

  5. Perform a Helm upgrade to apply the changes made to immuta-values.yaml.

Refer to the Red Hat OpenShift documentation for further assistance.

Last updated