Skip to main content
BYOC allows you to run Suga on your own Kubernetes infrastructure while using the Suga dashboard for management. You get full control over where applications run while maintaining Suga’s simplicity.
Pro and Enterprise Feature: BYOC is available on Pro and Enterprise plans.

BYOC vs Suga Cloud

AspectSuga CloudBYOC
SetupZero infrastructureYou manage K8s cluster
ControlSuga managesFull control
Data LocationSuga’s infrastructureYour infrastructure
RegionsUS, Europe, AustraliaAny region/cloud/on-prem
Best ForMost usersEnterprise, compliance, existing K8s

Prerequisites

  • Kubernetes 1.24+ with cluster-admin access
  • LoadBalancer support - Cloud provider integration or MetalLB for bare metal
  • Default storage class - Must support ReadWriteOnce access mode for volumes
  • Outbound internet access - To pull container images and connect to Suga API
Suga automatically installs Envoy Gateway (Gateway API) and manages TLS certificates and DNS records during cluster initialization. You don’t need to set these up.

Supported Platforms

GKE, EKS, AKS, self-managed, on-premises, DigitalOcean, Linode, Civo, and other K8s providers.

Architecture

  • Direct API Connection - Suga connects directly to your Kubernetes API server (no agent installed)
  • Encrypted Credentials - Your cluster credentials are stored encrypted in Suga’s database
  • Standard K8s API - All operations use the Kubernetes REST API
  • Your Infrastructure - Workloads and data run entirely in your cluster

Setup

1

Add BYOC Cluster

In Suga dashboard: Org Settings → Cluster → Connect BYOC ClusterFollow the guided setup to provide your cluster credentials. The UI will walk you through entering your API server URL and authentication details.
2

Verify Connection

After adding, the dashboard should show “Connected” with a green indicator. Suga will automatically initialize the cluster with Envoy Gateway and required components.
Need help connecting your cluster? Contact support for assistance.

Namespaces

Suga creates namespaces for each environment:
  • suga-production
  • suga-staging
  • suga-dev

Direct Cluster Access

With BYOC, you have full kubectl access:
# List pods
kubectl get pods -n suga-production

# View logs directly
kubectl logs my-api-xxxxx -n suga-production

# Execute commands in pod
kubectl exec -it my-api-xxxxx -n suga-production -- /bin/sh

# Port forward for debugging
kubectl port-forward svc/postgres 5432:5432 -n suga-production

Security Considerations

  • Use a dedicated ServiceAccount with least-privilege permissions where possible
  • Rotate credentials periodically
  • Suga stores credentials encrypted at rest (AES-256-GCM)
  • All API communication is TLS-encrypted
Implement network policies to restrict traffic between namespaces. See Kubernetes documentation for examples.
Apply Pod Security Standards to Suga namespaces:
kubectl label namespace suga-production \
  pod-security.kubernetes.io/enforce=baseline
Suga stores secrets as Kubernetes Secrets. For enhanced security, use External Secrets Operator with your vault solution or enable Kubernetes encryption at rest.

Cost

Suga Platform: Pro plan $20/user/month (no service markup) Your Infrastructure: Kubernetes cluster costs depend on your cloud provider. Typical range: $100-1500+/month depending on size.