Pro and Enterprise Feature: BYOC is available on Pro and Enterprise plans.
BYOC vs Suga Cloud
| Aspect | Suga Cloud | BYOC |
|---|---|---|
| Setup | Zero infrastructure | You manage K8s cluster |
| Control | Suga manages | Full control |
| Data Location | Suga’s infrastructure | Your infrastructure |
| Regions | US, Europe, Australia | Any region/cloud/on-prem |
| Best For | Most users | Enterprise, compliance, existing K8s |
Prerequisites
- Kubernetes 1.24+ with cluster-admin access
- LoadBalancer support - Cloud provider integration or MetalLB for bare metal
- Default storage class - Must support
ReadWriteOnceaccess mode for volumes - Outbound internet access - To pull container images and connect to Suga API
Suga automatically installs Envoy Gateway (Gateway API) and manages TLS certificates and DNS records during cluster initialization. You don’t need to set these up.
Supported Platforms
GKE, EKS, AKS, self-managed, on-premises, DigitalOcean, Linode, Civo, and other K8s providers.Architecture
- Direct API Connection - Suga connects directly to your Kubernetes API server (no agent installed)
- Encrypted Credentials - Your cluster credentials are stored encrypted in Suga’s database
- Standard K8s API - All operations use the Kubernetes REST API
- Your Infrastructure - Workloads and data run entirely in your cluster
Setup
Add BYOC Cluster
In Suga dashboard: Org Settings → Cluster → Connect BYOC ClusterFollow the guided setup to provide your cluster credentials. The UI will walk you through entering your API server URL and authentication details.
Namespaces
Suga creates namespaces for each environment:suga-productionsuga-stagingsuga-dev
Direct Cluster Access
With BYOC, you have full kubectl access:Security Considerations
Credential Security
Credential Security
- Use a dedicated ServiceAccount with least-privilege permissions where possible
- Rotate credentials periodically
- Suga stores credentials encrypted at rest (AES-256-GCM)
- All API communication is TLS-encrypted
Network Policies
Network Policies
Implement network policies to restrict traffic between namespaces. See Kubernetes documentation for examples.
Pod Security
Pod Security
Apply Pod Security Standards to Suga namespaces:
Secrets
Secrets
Suga stores secrets as Kubernetes Secrets. For enhanced security, use External Secrets Operator with your vault solution or enable Kubernetes encryption at rest.