Deploy turbopuffer into your Kubernetes cluster on AWS, GCP, or Azure with turbopuffer On-Prem.
The turbopuffer team is on-call for your cluster, and help you operate it through our secure control plane without direct access to your VPC. Handle billions of vectors without worrying about operations.
┌─Customer Account───────────────────────────┐ ┌─turbopuffer Account───┐
│┌───turbopuffer sub-account────────────────┐│ │ ┌───────────────────┐ │
││ ┌──Kubernetes──────────────┐││ │ │ Telemetry │ │
││ ┌─────────┐ │ ┌─────────┐ ┌─────────┐ │││ │ └───────────────────┘ │
││ │ Bucket │ │ │ Compute │ │ Control │ │││ │ ┌───────────────────┐ │
││ │ (AES) │──┼─│ │ │ Plane ├─┼┼TLS───▶│ │ Usage │ │
││ └─────────┘ │ └─────▲───┘ └─────────┘ │││ │ └───────────────────┘ │
││ └───────┼──────────────────┘││ │ ┌───────────────────┐ │
│└──────────────────────┼───────────────────┘│ │ │ Dashboard │ │
│ │ │ │ └───────────────────┘ │
│ │ │ │ ┌───────────────────┐ │
│┌──Customer sub-account┴───────────────────┐│ │ │ Control Plane │ │
││ ┌──────┐ ┌──────┐ ┌──────┐ ││ │ └───────────────────┘ │
││ │App 1 │ │App 2 │ │App 3 │ ││ │ ┌───────────────────┐ │
││ └──────┘ └──────┘ └──────┘ ││ │ │ Container Images │ │
│└──────────────────────────────────────────┘│ │ └───────────────────┘ │
└────────────────────────────────────────────┘ └───────────────────────┘
See more details in the Security page.
Customer receives an "onprem kit" that holds Terraform and Kubernetes configuration files and provisions the VPC and Kubernetes cluster. See Deployment. You can get a sense of the Terraform and Kubernetes configuration files with this scrubbed example.
The control plane has two components:
The types of operations the control plane can perform are:
The control plane is not required for the data plane to operate, i.e. turbopuffer can accept writes and queries if the control plane is down.
turbopuffer will provide support under the terms of the Service Level Agreement in your Master Subscription Agreement (MSA). The turbopuffer team is on-call for your cluster.
The turbopuffer team does not require access to your VPC. All operations are performed securely through the control plane with audit logs. You can choose two models for accepting operations:
Secure Operations (Push Model). The turbopuffer on-call is allowed to execute audit logged operations through the control plane at any time. This means we can uphold higher SLAs as we don't require working with your oncall.
Human Approved Operations (Pull Model). All operations must go through manual approval from the customer. The turbopuffer team requires access to the customer's on-call responsible for the turbopuffer cluster to grant access within SLAs. This access model affects pricing and the SLAs we can provide.
Operations are implemented as Kubernetes Custom Resource Definitions (CRDs). This allows you to use your existing tools to manage audit logs of cluster operations.
turbopuffer can be upgraded, scaled up, or scaled down without downtime by the control plane. Any node can accept traffic for any namespace at any time. Therefore, zero downtime upgrades can be performed with a simple rolling restart.
Container images can optionally be replicated into the customer sub-account.
This allows the customer to enable extra security features such as enabling
image tag immutability. All images are signed by cosign
and can be verified by
the customer.
turbopuffer does not require any external incoming connections through the firewall. The customer can choose to disable all incoming connections, and access turbopuffer through their private VPC networking.
turbopuffer does require outgoing connections for telemetry, usage data, and to receive commands from the control plane. By default, these connections are routed over the Internet. The external IPs can be allowlisted, see Deployment.
Telemetry is emitted to Datadog (traces, metrics, and logs) and Polarsignals (CPU and heap profiling) directly from the customer's account for turbopuffer to monitor. No customer data is ever emitted in the telemetry. This allows continous monitoring by the turbopuffer team. Telemetry includes:
The customer has access to a shared Datadog dashboard with Telemetry.
Aggregated usage metrics are reported to the turbopuffer usage database. These metrics are used for billing, and are displayed on the turbopuffer dashboard.
turbopuffer maintains System and Organization Controls (SOC) 2 Type 2 compliance, with continuous auditing by an AICPA certified auditor. To receive a copy of our latest report, please contact us. For healthcare customers, turbopuffer can also provide a HIPAA compliant BAA.