Helm Integration
Deploy and manage TigerAccess on Kubernetes with official Helm charts. Streamlined installation, configuration, and lifecycle management for enterprise deployments.
Enterprise-Ready Helm Deployment
Production-grade Helm charts with comprehensive configuration options and best practices built-in.
Helm Chart Repository
Access TigerAccess Helm charts from our official OCI registry with versioned releases and automated updates.
Values Configuration
Comprehensive values.yaml with sensible defaults and extensive customization options for enterprise deployments.
Release Management
Seamless upgrades, rollbacks, and version management with Helm's declarative release lifecycle.
Security Hardening
Built-in security best practices including Pod Security Standards, network policies, and RBAC configurations.
Comprehensive Helm Chart Features
Get Started in Minutes
Deploy TigerAccess to your Kubernetes cluster with these simple steps.
Add Helm Repository
Add the TigerAccess Helm chart repository to your local Helm installation.
# Add the TigerAccess Helm repository
helm repo add tigeraccess https://charts.tigeraccess.io
# Update repository index
helm repo update
# Search for available charts
helm search repo tigeraccessCreate Values File
Create a custom values.yaml file with your deployment configuration including domain, storage, and authentication settings.
# values.yaml
clusterName: production
domain: access.company.com
auth:
enabled: true
replicas: 3
proxy:
enabled: true
replicas: 3
postgresql:
enabled: true
persistence:
size: 100Gi
redis:
enabled: true
ingress:
enabled: true
className: nginx
tls:
enabled: trueDeploy TigerAccess
Install TigerAccess to your Kubernetes cluster using Helm with your custom configuration.
# Install TigerAccess
helm install tigeraccess tigeraccess/tigeraccess \
--namespace tigeraccess \
--create-namespace \
--values values.yaml \
--version 1.0.0
# Check deployment status
kubectl get pods -n tigeraccess
# View services
kubectl get svc -n tigeraccessVerify Installation
Verify that TigerAccess is running correctly and accessible through the configured ingress.
# Check all resources
helm status tigeraccess -n tigeraccess
# Test connectivity
curl https://access.company.com/health
# View logs
kubectl logs -n tigeraccess -l app=tigeraccess-auth
# Access the web UI
open https://access.company.comAdvanced Configuration Examples
Production-ready configurations for common deployment scenarios.
High Availability Configuration
Configure TigerAccess for high availability with multiple replicas and pod anti-affinity.
# values.yaml - HA configuration
auth:
replicas: 3
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
app: tigeraccess-auth
topologyKey: kubernetes.io/hostname
proxy:
replicas: 3
affinity:
podAntiAffinity:
requiredDuringSchedulingIgnoredDuringExecution:
- labelSelector:
matchLabels:
app: tigeraccess-proxy
topologyKey: kubernetes.io/hostname
resources:
auth:
requests:
cpu: 500m
memory: 1Gi
limits:
cpu: 2000m
memory: 4GiExternal Database Configuration
Connect TigerAccess to an external PostgreSQL database instead of deploying one in the cluster.
# values.yaml - External DB
postgresql:
enabled: false
externalDatabase:
host: postgres.example.com
port: 5432
database: tigeraccess
username: tigeraccess
existingSecret: tigeraccess-db-credentials
existingSecretPasswordKey: password
# Create secret with database password
kubectl create secret generic tigeraccess-db-credentials \
--namespace tigeraccess \
--from-literal=password='your-secure-password'Custom TLS Certificates
Use your own TLS certificates for secure communication instead of auto-generated certificates.
# Create TLS secret from your certificates
kubectl create secret tls tigeraccess-tls \
--namespace tigeraccess \
--cert=/path/to/tls.crt \
--key=/path/to/tls.key
# values.yaml - Custom TLS
ingress:
enabled: true
className: nginx
tls:
enabled: true
existingSecret: tigeraccess-tls
annotations:
cert-manager.io/cluster-issuer: letsencrypt-prodUpdate and Rollback
Upgrade TigerAccess to a new version or rollback to a previous release if needed.
# Upgrade to new version
helm upgrade tigeraccess tigeraccess/tigeraccess \
--namespace tigeraccess \
--values values.yaml \
--version 1.1.0
# Check upgrade status
helm history tigeraccess -n tigeraccess
# Rollback to previous version
helm rollback tigeraccess 1 -n tigeraccess
# Uninstall (with data preservation)
helm uninstall tigeraccess -n tigeraccess --keep-historyReal-World Deployment Scenarios
Production Kubernetes Deployment
Deploy TigerAccess to production Kubernetes clusters with HA configuration, persistent storage, and automated certificate management using our Helm chart.
GitOps Workflow Integration
Integrate TigerAccess Helm charts into your GitOps workflows with ArgoCD or Flux for declarative, version-controlled infrastructure deployments.
Multi-Cluster Management
Deploy and manage TigerAccess across multiple Kubernetes clusters with consistent configurations using Helm umbrella charts and values overrides.
Staging and Development Environments
Quickly spin up TigerAccess instances in development and staging environments with minimal configuration for testing and validation.
Frequently Asked Questions
What Kubernetes versions are supported by the TigerAccess Helm chart?
The TigerAccess Helm chart supports Kubernetes 1.24+ and is tested on major cloud providers (EKS, GKE, AKS) as well as on-premises distributions like OpenShift and Rancher. We recommend using Kubernetes 1.26 or later for the best experience.
Can I use my own PostgreSQL and Redis instances?
Yes. The Helm chart allows you to disable the bundled PostgreSQL and Redis deployments and connect to external instances. Configure the externalDatabase and externalRedis sections in your values.yaml file with connection details.
How do I customize resource requests and limits?
Resource requests and limits can be customized in the values.yaml file under the resources section for each component (auth, proxy, agent). We provide sensible defaults for production deployments, but you should adjust based on your workload.
Does the Helm chart support automatic certificate management?
Yes. The chart integrates with cert-manager for automatic TLS certificate provisioning and renewal. You can also bring your own certificates by creating a TLS secret and referencing it in the ingress configuration.
How do I integrate the Helm deployment with my existing monitoring stack?
The chart includes ServiceMonitor resources for Prometheus integration and can export metrics in Prometheus format. Configure the metrics section in values.yaml to enable monitoring and set up dashboards in Grafana.
Can I deploy TigerAccess across multiple namespaces or clusters?
Yes. For multi-namespace deployments, you can install separate releases with different configurations. For multi-cluster deployments, use the same Helm chart in each cluster and configure cluster peering in the auth service configuration.
Ready to Secure Your Infrastructure?
Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.
No credit card required • 14-day free trial • Enterprise support available