Bring Zero Trust to Your Existing Workflows with the Twingate Kubernetes Operator

Eran Kampf

Jun 24, 2025

At Twingate, we believe security tooling should enhance—not hinder—developer productivity. That's why we built the Twingate Kubernetes Operator to work exactly how engineering teams already operate: with familiar manifests, GitOps practices, and automated deployments. Today we're excited to announce that the Twingate Kubernetes Operator is now generally available! 

The Twingate Operator makes it easy for engineering teams to implement zero trust security principles directly within their Kubernetes workflows.

Why Operators Make Everything Better

Kubernetes operators extend the platform's native capabilities by automating complex operational tasks using the same declarative patterns you already know. Instead of requiring separate tools or manual processes, operators let you manage sophisticated functionality through familiar Kubernetes manifests and GitOps workflows.

The Twingate Kubernetes Operator brings this automation to network security, allowing you to configure secure access to your services as part of your existing deployment processes, no separate tools or workflows required.

This is especially important given the popularity and continued growth of Kubernetes. It’s become the backbone of modern infrastructure, powering everything from microservices architectures to AI workloads. As organizations increasingly rely on Kubernetes for critical applications, the need for seamless, secure access management becomes paramount.

We’re heavy Kubernetes users ourselves here at Twingate. We initially built the Twingate Operator for ourselves with the thinking that if our own engineering team found it valuable, others would too. By solving our own problems first, we ensured that the Twingate Operator was not just theoretically useful but battle-tested in real-world engineering workflows from day one.

What the Twingate Kubernetes Operator Does

The operator integrates directly with your Kubernetes environment to automate three key areas:

1. Automated Connector Deployment

Deploy and manage Twingate Connectors using familiar Kubernetes manifests. The operator handles the entire lifecycle—from initial provisioning to automatic updates—ensuring your network access infrastructure stays current without manual intervention.

apiVersion: twingate.com/v1beta1
kind: TwingateConnector
metadata:
  name: my-connector
spec:
  imagePolicy:
    schedule: "0 2 * * 0"  # Auto-update Sundays at 2 AM

2. Declarative Resource Management

Define network resources using Kubernetes-native objects or simple service annotations. Whether you prefer explicit resource definitions or want to automatically expose existing services, the Twingate Operator adapts to your workflow.

# Option 1: Dedicated resource object
apiVersion: twingate.com/v1beta1
kind: TwingateResource
metadata:
  name: my-api-service
spec:
  name: "Internal API"
  address: "my-api-service.default.svc.cluster.local"
  alias: "my-api-service.int"

  

# Option 2: Service annotation
apiVersion: v1
kind: Service
metadata:
  name: my-api-service
  annotations:
    resource.twingate.com/enabled: "true"
spec:
  selector:
    app.kubernetes.io/name: MyAPI
  ports:
    - protocol: TCP
      port: 80
      targetPort: 9376

3. Programmatic Access Control

Configure who can access what using Kubernetes objects, enabling GitOps-style access management that integrates seamlessly with your existing CI/CD pipelines.

apiVersion: twingate.com/v1beta1
kind: TwingateResourceAccess
metadata:
  name: api-access
spec:
  resourceRef:
    name: my-api-service
  groups

Engineering-First Security

At Twingate, we believe security tooling should enhance, not hinder, developer productivity. The Twingate Kubernetes Operator embodies this philosophy by:

  • Integrating with existing workflows: No need to learn new tools or switch contexts

  • Supporting GitOps practices: All configuration lives in version control alongside your application code

  • Enabling automation: Resources and access policies deploy automatically with your applications

  • Maintaining zero trust principles: Services remain hidden from the internet while being accessible to authorized users

Getting Started

The Twingate Kubernetes Operator is available now on GitHub and can be deployed using Helm or standard Kubernetes manifests.

Quick start:

  1. Install the operator in your cluster using our Helm chart

  2. Deploy a connector by applying a TwingateConnector manifest

  3. Expose services by adding annotations to existing services or creating TwingateResource objects

  4. Configure access using TwingateResourceAccess objects

What's Next

While the Twingate Operator delivers immediate value for network-level access control, it also serves as the foundation for more advanced capabilities we're developing. By adopting the operator now, you'll be positioned to take advantage of enhanced features as they become available.

We're actively working on additional capabilities that will extend zero trust principles deeper into cluster operations, providing even more comprehensive security and observability.

We're excited to see how teams use the Twingate Operator to streamline their security workflows. As always, we'd love to hear about your experience and any feedback you have as you integrate it into your environments.

Ready to get started? Check out our Kubernetes Operator documentation or join our community discussions on GitHub.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

/

Twingate Kubernetes Operator

Bring Zero Trust to Your Existing Workflows with the Twingate Kubernetes Operator

Eran Kampf

Jun 24, 2025

At Twingate, we believe security tooling should enhance—not hinder—developer productivity. That's why we built the Twingate Kubernetes Operator to work exactly how engineering teams already operate: with familiar manifests, GitOps practices, and automated deployments. Today we're excited to announce that the Twingate Kubernetes Operator is now generally available! 

The Twingate Operator makes it easy for engineering teams to implement zero trust security principles directly within their Kubernetes workflows.

Why Operators Make Everything Better

Kubernetes operators extend the platform's native capabilities by automating complex operational tasks using the same declarative patterns you already know. Instead of requiring separate tools or manual processes, operators let you manage sophisticated functionality through familiar Kubernetes manifests and GitOps workflows.

The Twingate Kubernetes Operator brings this automation to network security, allowing you to configure secure access to your services as part of your existing deployment processes, no separate tools or workflows required.

This is especially important given the popularity and continued growth of Kubernetes. It’s become the backbone of modern infrastructure, powering everything from microservices architectures to AI workloads. As organizations increasingly rely on Kubernetes for critical applications, the need for seamless, secure access management becomes paramount.

We’re heavy Kubernetes users ourselves here at Twingate. We initially built the Twingate Operator for ourselves with the thinking that if our own engineering team found it valuable, others would too. By solving our own problems first, we ensured that the Twingate Operator was not just theoretically useful but battle-tested in real-world engineering workflows from day one.

What the Twingate Kubernetes Operator Does

The operator integrates directly with your Kubernetes environment to automate three key areas:

1. Automated Connector Deployment

Deploy and manage Twingate Connectors using familiar Kubernetes manifests. The operator handles the entire lifecycle—from initial provisioning to automatic updates—ensuring your network access infrastructure stays current without manual intervention.

apiVersion: twingate.com/v1beta1
kind: TwingateConnector
metadata:
  name: my-connector
spec:
  imagePolicy:
    schedule: "0 2 * * 0"  # Auto-update Sundays at 2 AM

2. Declarative Resource Management

Define network resources using Kubernetes-native objects or simple service annotations. Whether you prefer explicit resource definitions or want to automatically expose existing services, the Twingate Operator adapts to your workflow.

# Option 1: Dedicated resource object
apiVersion: twingate.com/v1beta1
kind: TwingateResource
metadata:
  name: my-api-service
spec:
  name: "Internal API"
  address: "my-api-service.default.svc.cluster.local"
  alias: "my-api-service.int"

  

# Option 2: Service annotation
apiVersion: v1
kind: Service
metadata:
  name: my-api-service
  annotations:
    resource.twingate.com/enabled: "true"
spec:
  selector:
    app.kubernetes.io/name: MyAPI
  ports:
    - protocol: TCP
      port: 80
      targetPort: 9376

3. Programmatic Access Control

Configure who can access what using Kubernetes objects, enabling GitOps-style access management that integrates seamlessly with your existing CI/CD pipelines.

apiVersion: twingate.com/v1beta1
kind: TwingateResourceAccess
metadata:
  name: api-access
spec:
  resourceRef:
    name: my-api-service
  groups

Engineering-First Security

At Twingate, we believe security tooling should enhance, not hinder, developer productivity. The Twingate Kubernetes Operator embodies this philosophy by:

  • Integrating with existing workflows: No need to learn new tools or switch contexts

  • Supporting GitOps practices: All configuration lives in version control alongside your application code

  • Enabling automation: Resources and access policies deploy automatically with your applications

  • Maintaining zero trust principles: Services remain hidden from the internet while being accessible to authorized users

Getting Started

The Twingate Kubernetes Operator is available now on GitHub and can be deployed using Helm or standard Kubernetes manifests.

Quick start:

  1. Install the operator in your cluster using our Helm chart

  2. Deploy a connector by applying a TwingateConnector manifest

  3. Expose services by adding annotations to existing services or creating TwingateResource objects

  4. Configure access using TwingateResourceAccess objects

What's Next

While the Twingate Operator delivers immediate value for network-level access control, it also serves as the foundation for more advanced capabilities we're developing. By adopting the operator now, you'll be positioned to take advantage of enhanced features as they become available.

We're actively working on additional capabilities that will extend zero trust principles deeper into cluster operations, providing even more comprehensive security and observability.

We're excited to see how teams use the Twingate Operator to streamline their security workflows. As always, we'd love to hear about your experience and any feedback you have as you integrate it into your environments.

Ready to get started? Check out our Kubernetes Operator documentation or join our community discussions on GitHub.

Rapidly implement a modern Zero Trust network that is more secure and maintainable than VPNs.

Bring Zero Trust to Your Existing Workflows with the Twingate Kubernetes Operator

Eran Kampf

Jun 24, 2025

At Twingate, we believe security tooling should enhance—not hinder—developer productivity. That's why we built the Twingate Kubernetes Operator to work exactly how engineering teams already operate: with familiar manifests, GitOps practices, and automated deployments. Today we're excited to announce that the Twingate Kubernetes Operator is now generally available! 

The Twingate Operator makes it easy for engineering teams to implement zero trust security principles directly within their Kubernetes workflows.

Why Operators Make Everything Better

Kubernetes operators extend the platform's native capabilities by automating complex operational tasks using the same declarative patterns you already know. Instead of requiring separate tools or manual processes, operators let you manage sophisticated functionality through familiar Kubernetes manifests and GitOps workflows.

The Twingate Kubernetes Operator brings this automation to network security, allowing you to configure secure access to your services as part of your existing deployment processes, no separate tools or workflows required.

This is especially important given the popularity and continued growth of Kubernetes. It’s become the backbone of modern infrastructure, powering everything from microservices architectures to AI workloads. As organizations increasingly rely on Kubernetes for critical applications, the need for seamless, secure access management becomes paramount.

We’re heavy Kubernetes users ourselves here at Twingate. We initially built the Twingate Operator for ourselves with the thinking that if our own engineering team found it valuable, others would too. By solving our own problems first, we ensured that the Twingate Operator was not just theoretically useful but battle-tested in real-world engineering workflows from day one.

What the Twingate Kubernetes Operator Does

The operator integrates directly with your Kubernetes environment to automate three key areas:

1. Automated Connector Deployment

Deploy and manage Twingate Connectors using familiar Kubernetes manifests. The operator handles the entire lifecycle—from initial provisioning to automatic updates—ensuring your network access infrastructure stays current without manual intervention.

apiVersion: twingate.com/v1beta1
kind: TwingateConnector
metadata:
  name: my-connector
spec:
  imagePolicy:
    schedule: "0 2 * * 0"  # Auto-update Sundays at 2 AM

2. Declarative Resource Management

Define network resources using Kubernetes-native objects or simple service annotations. Whether you prefer explicit resource definitions or want to automatically expose existing services, the Twingate Operator adapts to your workflow.

# Option 1: Dedicated resource object
apiVersion: twingate.com/v1beta1
kind: TwingateResource
metadata:
  name: my-api-service
spec:
  name: "Internal API"
  address: "my-api-service.default.svc.cluster.local"
  alias: "my-api-service.int"

  

# Option 2: Service annotation
apiVersion: v1
kind: Service
metadata:
  name: my-api-service
  annotations:
    resource.twingate.com/enabled: "true"
spec:
  selector:
    app.kubernetes.io/name: MyAPI
  ports:
    - protocol: TCP
      port: 80
      targetPort: 9376

3. Programmatic Access Control

Configure who can access what using Kubernetes objects, enabling GitOps-style access management that integrates seamlessly with your existing CI/CD pipelines.

apiVersion: twingate.com/v1beta1
kind: TwingateResourceAccess
metadata:
  name: api-access
spec:
  resourceRef:
    name: my-api-service
  groups

Engineering-First Security

At Twingate, we believe security tooling should enhance, not hinder, developer productivity. The Twingate Kubernetes Operator embodies this philosophy by:

  • Integrating with existing workflows: No need to learn new tools or switch contexts

  • Supporting GitOps practices: All configuration lives in version control alongside your application code

  • Enabling automation: Resources and access policies deploy automatically with your applications

  • Maintaining zero trust principles: Services remain hidden from the internet while being accessible to authorized users

Getting Started

The Twingate Kubernetes Operator is available now on GitHub and can be deployed using Helm or standard Kubernetes manifests.

Quick start:

  1. Install the operator in your cluster using our Helm chart

  2. Deploy a connector by applying a TwingateConnector manifest

  3. Expose services by adding annotations to existing services or creating TwingateResource objects

  4. Configure access using TwingateResourceAccess objects

What's Next

While the Twingate Operator delivers immediate value for network-level access control, it also serves as the foundation for more advanced capabilities we're developing. By adopting the operator now, you'll be positioned to take advantage of enhanced features as they become available.

We're actively working on additional capabilities that will extend zero trust principles deeper into cluster operations, providing even more comprehensive security and observability.

We're excited to see how teams use the Twingate Operator to streamline their security workflows. As always, we'd love to hear about your experience and any feedback you have as you integrate it into your environments.

Ready to get started? Check out our Kubernetes Operator documentation or join our community discussions on GitHub.