Elasticsearch & Audit

It is possible to deploy Immuta without the use of cloud provided managed services by using enterprise-ready tools for Kubernetes.

This article describes deploying an Elasticsearch cluster in the Immuta installation namespace and pointing the Immuta application at this cluster for deployment.

Deploying ECK

This section relies heavily on the Elasticsearch official guides found at the link below

Install CRDs and Operator

circle-info

If you are upgrading an existing ECK installation, use kubectl replace instead of kubectl create for the CRDs, as create will fail on resources that already exist:

Deploy an Elasticsearch cluster

circle-info

Elasticsearch requires the kernel setting vm.max_map_count to be at least 262144. Most Kubernetes distributions (including AKS) default to 65530. The manifest below includes a privileged init container that sets this value before Elasticsearch starts. If your nodes already have this configured (e.g., via a DaemonSet or node pool setting), you can remove the podTemplate section.

Verifying cluster health

Validate Connectivity

Forward the port in a separate terminal

In the original terminal with the password set curl the endpoint

Immuta Helm Values

Use the following audit configuration in your Immuta Helm values to connect to the in-cluster ECK deployment. The elastic user password is stored in the secret created automatically by ECK.

Last updated