Access Graph (TAG) Setup in Self-Hosted Kubernetes with TLS #56140
pnrao1983
started this conversation in
Show and tell
Replies: 0 comments
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Run Teleport Identity Security with Access Graph on Self-Hosted Clusters with Helm
Here is the official public doc: https://goteleport.com/docs/identity-security/access-graph/self-hosted-helm/
📦 Directory Layout
🛠️ Certificate Generation (
cert_gen.sh
)Here is the postgres.yaml and tag.yaml files
📋 Postgres Deployment (
postgres.yaml
)Includes:
PersistentVolumeClaim with
gp2
Postgres Deployment with
init.sql
from ConfigMapInternal ClusterIP Service
Ensure:
EKS Node IAM role has
ec2:CreateVolume
Use
subPath: pgdata
involumeMounts
to avoid initdb directory conflict🔐 Kubernetes Secrets
🧩
tag-values.yaml
for Access Graph|
-----BEGIN CERTIFICATE-----
MIIC...your-host-CA-cert...==
-----END CERTIFICATE-----
🚀 Deploy Access Graph
Here is the output for PostGres DB pod and tag service for access-graph:
🔧 Teleport Cluster Integration (
aws-values.yaml
)✅ Final Teleport Helm Upgrade
🖼️ Screenshots of successful db connection, access Graph started log from the auth pod, and we can see the identity Security Icon in the WebUI
🧪 Troubleshooting
🏁 Conclusion
Let us know if you'd like a
README.md
copy or to publish this to GitHub Discussions!Beta Was this translation helpful? Give feedback.
All reactions