Back to Integrations

Helm Integration

Deploy and manage TigerAccess on Kubernetes with official Helm charts. Streamlined installation, configuration, and lifecycle management for enterprise deployments.

Features

Enterprise-Ready Helm Deployment

Production-grade Helm charts with comprehensive configuration options and best practices built-in.

Helm Chart Repository

Access TigerAccess Helm charts from our official OCI registry with versioned releases and automated updates.

Values Configuration

Comprehensive values.yaml with sensible defaults and extensive customization options for enterprise deployments.

Release Management

Seamless upgrades, rollbacks, and version management with Helm's declarative release lifecycle.

Security Hardening

Built-in security best practices including Pod Security Standards, network policies, and RBAC configurations.

Capabilities

Comprehensive Helm Chart Features

Official Helm chart repository
Single-command deployment
High availability configuration
Auto-scaling support
Persistent volume management
TLS certificate automation
Service mesh integration
Multi-region deployments
Custom resource definitions
ConfigMap & Secret management
Rolling update strategies
Health check configuration
Setup

Get Started in Minutes

Deploy TigerAccess to your Kubernetes cluster with these simple steps.

1

Add Helm Repository

Add the TigerAccess Helm chart repository to your local Helm installation.

# Add the TigerAccess Helm repository
helm repo add tigeraccess https://charts.tigeraccess.io

# Update repository index
helm repo update

# Search for available charts
helm search repo tigeraccess
2

Create Values File

Create a custom values.yaml file with your deployment configuration including domain, storage, and authentication settings.

# values.yaml
clusterName: production
domain: access.company.com

auth:
  enabled: true
  replicas: 3

proxy:
  enabled: true
  replicas: 3

postgresql:
  enabled: true
  persistence:
    size: 100Gi

redis:
  enabled: true

ingress:
  enabled: true
  className: nginx
  tls:
    enabled: true
3

Deploy TigerAccess

Install TigerAccess to your Kubernetes cluster using Helm with your custom configuration.

# Install TigerAccess
helm install tigeraccess tigeraccess/tigeraccess \
  --namespace tigeraccess \
  --create-namespace \
  --values values.yaml \
  --version 1.0.0

# Check deployment status
kubectl get pods -n tigeraccess

# View services
kubectl get svc -n tigeraccess
4

Verify Installation

Verify that TigerAccess is running correctly and accessible through the configured ingress.

# Check all resources
helm status tigeraccess -n tigeraccess

# Test connectivity
curl https://access.company.com/health

# View logs
kubectl logs -n tigeraccess -l app=tigeraccess-auth

# Access the web UI
open https://access.company.com
Advanced

Advanced Configuration Examples

Production-ready configurations for common deployment scenarios.

High Availability Configuration

Configure TigerAccess for high availability with multiple replicas and pod anti-affinity.

# values.yaml - HA configuration
auth:
  replicas: 3
  affinity:
    podAntiAffinity:
      requiredDuringSchedulingIgnoredDuringExecution:
        - labelSelector:
            matchLabels:
              app: tigeraccess-auth
          topologyKey: kubernetes.io/hostname

proxy:
  replicas: 3
  affinity:
    podAntiAffinity:
      requiredDuringSchedulingIgnoredDuringExecution:
        - labelSelector:
            matchLabels:
              app: tigeraccess-proxy
          topologyKey: kubernetes.io/hostname

resources:
  auth:
    requests:
      cpu: 500m
      memory: 1Gi
    limits:
      cpu: 2000m
      memory: 4Gi

External Database Configuration

Connect TigerAccess to an external PostgreSQL database instead of deploying one in the cluster.

# values.yaml - External DB
postgresql:
  enabled: false

externalDatabase:
  host: postgres.example.com
  port: 5432
  database: tigeraccess
  username: tigeraccess
  existingSecret: tigeraccess-db-credentials
  existingSecretPasswordKey: password

# Create secret with database password
kubectl create secret generic tigeraccess-db-credentials \
  --namespace tigeraccess \
  --from-literal=password='your-secure-password'

Custom TLS Certificates

Use your own TLS certificates for secure communication instead of auto-generated certificates.

# Create TLS secret from your certificates
kubectl create secret tls tigeraccess-tls \
  --namespace tigeraccess \
  --cert=/path/to/tls.crt \
  --key=/path/to/tls.key

# values.yaml - Custom TLS
ingress:
  enabled: true
  className: nginx
  tls:
    enabled: true
    existingSecret: tigeraccess-tls
  annotations:
    cert-manager.io/cluster-issuer: letsencrypt-prod

Update and Rollback

Upgrade TigerAccess to a new version or rollback to a previous release if needed.

# Upgrade to new version
helm upgrade tigeraccess tigeraccess/tigeraccess \
  --namespace tigeraccess \
  --values values.yaml \
  --version 1.1.0

# Check upgrade status
helm history tigeraccess -n tigeraccess

# Rollback to previous version
helm rollback tigeraccess 1 -n tigeraccess

# Uninstall (with data preservation)
helm uninstall tigeraccess -n tigeraccess --keep-history
Use Cases

Real-World Deployment Scenarios

Production Kubernetes Deployment

Deploy TigerAccess to production Kubernetes clusters with HA configuration, persistent storage, and automated certificate management using our Helm chart.

GitOps Workflow Integration

Integrate TigerAccess Helm charts into your GitOps workflows with ArgoCD or Flux for declarative, version-controlled infrastructure deployments.

Multi-Cluster Management

Deploy and manage TigerAccess across multiple Kubernetes clusters with consistent configurations using Helm umbrella charts and values overrides.

Staging and Development Environments

Quickly spin up TigerAccess instances in development and staging environments with minimal configuration for testing and validation.

FAQ

Frequently Asked Questions

What Kubernetes versions are supported by the TigerAccess Helm chart?

The TigerAccess Helm chart supports Kubernetes 1.24+ and is tested on major cloud providers (EKS, GKE, AKS) as well as on-premises distributions like OpenShift and Rancher. We recommend using Kubernetes 1.26 or later for the best experience.

Can I use my own PostgreSQL and Redis instances?

Yes. The Helm chart allows you to disable the bundled PostgreSQL and Redis deployments and connect to external instances. Configure the externalDatabase and externalRedis sections in your values.yaml file with connection details.

How do I customize resource requests and limits?

Resource requests and limits can be customized in the values.yaml file under the resources section for each component (auth, proxy, agent). We provide sensible defaults for production deployments, but you should adjust based on your workload.

Does the Helm chart support automatic certificate management?

Yes. The chart integrates with cert-manager for automatic TLS certificate provisioning and renewal. You can also bring your own certificates by creating a TLS secret and referencing it in the ingress configuration.

How do I integrate the Helm deployment with my existing monitoring stack?

The chart includes ServiceMonitor resources for Prometheus integration and can export metrics in Prometheus format. Configure the metrics section in values.yaml to enable monitoring and set up dashboards in Grafana.

Can I deploy TigerAccess across multiple namespaces or clusters?

Yes. For multi-namespace deployments, you can install separate releases with different configurations. For multi-cluster deployments, use the same Helm chart in each cluster and configure cluster peering in the auth service configuration.

Ready to Secure Your Infrastructure?

Join thousands of security-conscious teams using TigerAccess to protect their critical infrastructure and AI agents.

No credit card required • 14-day free trial • Enterprise support available