Set Up Self-Hosted
Opal fully supports deployment on your own infrastructure.
Opal fully supports deployment on your own infrastructure and is built to support the most complex environments and regulatory requirements.
We recommend that you deploy Opal Self-Hosted on a managed Kubernetes service:
Prerequisites
Obtaining a license
An Opal team member will provide you with a license.
DNS configuration
Set up a DNS record with your DNS provider that will be used for Opal. You'll also need a TLS certificate that's valid for the configured DNS record.
Example: opal.acme.com is an A record pointing to the public IP address of the on-premise instance.
Networking configuration
Inbound ports (required)
Port range | Protocol | Source | Description |
---|---|---|---|
22 | TCP | Internet or VPC | SSH to connect to instance |
80 | TCP | Internet or VPC | Redirect to HTTPS |
443 | TCP | Internet or VPC | HTTPS to access Opal |
8800 | TCP | Internet or VPC | Opal On-Premise setup dashboard |
Outbound hosts (required)
Port | Hostname | Description |
---|---|---|
443 | app.opal.dev | Opal platform |
443 | proxy.replicated.com | Docker image registry |
443 | k8s.kurl.sh | Repository for pulling installer bundle |
443 | endpoint6.collection.us2.sumologic.com | Log forwarding for debugging purposes |
443 | stream.launchdarkly.com events.launchdarkly.com clientstream.launchdarkly.com | Feature flag management, critical to how Opal safely deploys new features |
443 | auth.opal.dev | Auth0 tenant, required for authentication |
If you restrict outbound traffic to specific IPs, you'll also need to whitelist IPs for the following services:
Outbound hosts (optional based on integrations)
Port | Hostname | Description |
---|---|---|
443 | iam.<REGION>.amazonaws.com ec2.<REGION>.amazonaws.com rds.<REGION>.amazonaws.com eks.<REGION>.amazonaws.com | AWS |
443 | cloudresourcemanager.googleapis.com | Google Cloud Platform |
443 | api.github.com | Github |
443 | api.pagerduty.com | PagerDuty |
Updated 3 months ago
What’s Next