SUSE Rancher (RKE2) Deployment
This is a generic guide that demonstrates how to deploy Immuta into RKE2 (i.e., Rancher Government) without dependencies on any particular cloud provider. Advanced Kubernetes expertise is required; therefore, it is not suitable for beginners.
For the official Immuta self-managed deployment documentation, see Install Immuta.
Considerations
This guide deploys PostgreSQL and Elasticsearch in-cluster using enterprise-ready operators:
CloudNativePG (PostgreSQL)
Elastic Cloud on Kubernetes (ECK) (Elasticsearch)
Running stateful workloads in Kubernetes requires operational investment in backups, monitoring, and high availability. Where available, cloud-managed databases can reduce this overhead.
Prerequisites
Checklist
This checklist outlines the necessary prerequisites for successfully deploying Immuta.
Credentials
Ingress controller
RKE2 v1.28.12+ supports Traefik as a built-in ingress controller. To enable it, set ingress-controller: traefik in your RKE2 server configuration. This guide uses Traefik rather than the legacy ingress-nginx controller, which is being retired in March 2026.
Setup
Helm
Authenticate with OCI registry
Kubernetes
Creating a dedicated namespace ensures a logically isolated environment for your Immuta deployment, preventing resource conflicts with other applications.
Create namespace
Create a Kubernetes namespace named
immuta.Switch to namespace
immuta. All subsequentkubectlcommands will default to this namespace.
Create registry secret
Create a container registry pull secret using your ocir.immuta.com credentials.
Elasticsearch
PostgreSQL
Configure databases
After the CNPG cluster is healthy, configure the temporal and temporal_visibility databases:
Grant schema permissions on the
temporaldatabase.Grant schema permissions and create the
btree_ginextension on thetemporal_visibilitydatabase.
Retrieve database credentials
The immuta user password is auto-generated by CloudNativePG and stored in a Kubernetes secret.
Similarly, retrieve the Elasticsearch elastic user password:
Install Immuta
This section demonstrates how to deploy Immuta using the Immuta Enterprise Helm chart once the prerequisite services are configured.
Create a file named
immuta-values.yamlwith the above content, replacing<password-from-cnpg-secret>and<password-from-eck-secret>with the values retrieved in the previous step.Deploy Immuta.
Wait for all pods to become ready.
Validation
This section helps you validate your Immuta installation by temporarily accessing the application locally. However, this access is limited to your own computer. To enable access for other devices, you must configure Ingress for your environment.
Determine the name of the Secure service.
Listen on local port
8080, forwarding TCP traffic to the Secure service's port namedhttp.In a web browser, navigate to localhost:8080, to ensure the Immuta application loads.
Press
Control+Cto stop port forwarding.
Next step
Configure TLS certificates for RKE2.
Last updated

