Get started
Set up Traceloop on your own infrastructure
Self-Hosting Overview
Traceloop’s self-hosting solution is designed to accommodate various deployment scenarios, from partial data sovereignty to complete platform control. We offer two flexible deployment options to meet your organization’s specific needs and security requirements.
Need help with self-hosting? Schedule a meeting with our team, and we’ll guide you through the process.
Deployment Options
Option 1: Self-Hosted Data Storage
Perfect for organizations that want to maintain data sovereignty while leveraging Traceloop’s managed platform.
With this option, you:
- Retain complete control over your data storage infrastructure
- Utilize Traceloop’s managed platform for the application layer
- Maintain compliance with data residency requirements
- Reduce operational overhead while maintaining data control
Option 2: Full Platform Self-Hosting
Ideal for organizations requiring complete control or operating in air-gapped environments.
This deployment provides:
- End-to-end control over the entire platform
- Full support for air-gapped environments
- Complete customization capabilities
- Maximum security and compliance adherence
Infrastructure Requirements
Core Components
1. ClickHouse Database
Your trace data storage engine, with flexible deployment options:
- ClickHouse Cloud for managed service
- Self-hosted ClickHouse for complete control
Traceloop creates dedicated tables in your ClickHouse instance, ensuring clean separation from existing data.
2. Kafka Message Queue
Your event streaming platform, supporting:
- Confluent Cloud for fully managed service
- Amazon MSK for AWS environments
- Apache Kafka for self-hosted deployments Traceloop maintains dedicated topics for operational data, keeping your existing Kafka setup unchanged.
3. PostgreSQL Database
Your metadata store, compatible with:
- Amazon Aurora PostgreSQL for AWS environments
- Azure Database for PostgreSQL for Azure deployments
- PostgreSQL for self-hosted scenarios Traceloop operates within its own schema, ensuring isolation from your existing data.
4. Kubernetes Cluster
Required for full platform deployment, supporting:
- Amazon EKS
- Google GKE
- Azure AKS
- Any Helm-compatible Kubernetes distribution
Security First: Ensure all infrastructure components follow your organization’s security standards. For air-gapped deployments, prepare by downloading required container images and dependencies in advance.
Infrastructure Access: When using existing infrastructure, ensure you have sufficient privileges to create schemas and topics. Traceloop is designed to work with minimal permissions and maintains strict isolation.
Deployment Process
1. Infrastructure Preparation
Ensure all required components are properly configured and accessible. Traceloop can integrate with your existing infrastructure, using dedicated schemas and topics to maintain separation.
2. Set Up Required Operators and Secrets
First, set up the Doppler operator for secrets management:
Next, create the Traceloop namespace and set up Docker Hub credentials:
3. Helm Repository Setup
Add the Traceloop Helm repository to your environment:
For air-gapped environments, clone the Helm repository and extract OCI dependencies:
4. Platform Installation
Deploy Traceloop using Helm:
The values.yaml
file contains your infrastructure connection details and platform configuration. Below is an example configuration with required values:
For air-gapped environments, ensure you’ve pulled all required container
images to your private registry and configure the imageRegistry
settings
accordingly.
Never commit sensitive values like passwords and API keys directly in your values.yaml file. Use Kubernetes secrets or a secure secrets management solution.
Minimal Configuration
For a basic setup, you can start with this minimal configuration:
Need assistance? We’re here to help: - Check our troubleshooting guide for common issues - Schedule a support call for personalized help - Join our community Slack for discussions and updates
Was this page helpful?