Popsink Deployment Options
Popsink supports multiple deployment models so that you can run the same core engine, with the same features and performance, in the mode that fits your organization’s requirements. The primary deployment models are:
- SaaS (fully managed)
- Bring Your Own Cloud (BYOC)
- On-Premises (on-prem)
- Air-Gapped / Isolated
Overview
Popsink’s deployment architecture is designed to adapt to different security postures, regulatory constraints, and operational preferences. Regardless of the model chosen, you benefit from the same core capabilities (e.g. data ingestion, replication, pipeline processing, observability). The choice of deployment impacts responsibilities for infrastructure, upgrades, connectivity, and control.
High level comparison:
Deployment Mode | Infrastructure Ownership | Connectivity Requirements | Upgrade / Patching Responsibility | Typical Use Cases |
---|---|---|---|---|
SaaS | Popsink-managed cloud | Outbound connectivity required | Popsink handles | Fast startup, low ops, non-restrictive environments |
BYOC | Customer’s cloud account | Outbound/inbound as required | Shared (Popsink + Customer) | Organizations wanting control over data, keys, cost |
On-Premises | Customer-managed data center or private cloud | Standard internal networking, limited external contact | Customer (with Popsink guidance) | Enterprises with strict internal hosting needs |
Air-Gapped / Isolated | Customer-managed, isolated network | No outbound connectivity allowed | Offline, signed update bundles | Regulated environments, high-security zones |
Deployment Models — Detailed Descriptions
Below are more detailed descriptions of each deployment model, including features, constraints, and prerequisites.
1. SaaS (Fully Managed)
Description
In this model, Popsink hosts and manages the full stack (compute, storage, networking, orchestration) in a cloud environment. The user interacts via APIs, consoles, or UI but does not need to provision or manage infrastructure.
Key Features & Benefits
- Zero ops: Setup can be done in hours
- Automatic upgrades and patches
- Elastic scaling under predictable SLAs
- Data boundary controls: region selection, private networking options
Responsibilities
- Popsink: manage infrastructure, scaling, updates, high availability
- Customer: data modeling, configuration, access controls, inbound/outbound integration
2. Bring Your Own Cloud (BYOC)
Description
This model installs Popsink within the customer’s own cloud account (e.g. AWS, GCP, Azure). All data, keys, and spend remain under the customer's control. The deployed components run within the customer’s VPC and use existing identity and key management systems.
Key Features & Benefits
- Data stays inside your VPC
- VPC-only traffic (internal networking)
- Single-tenant cost visibility
- More control over infrastructure and governance
Responsibilities
- Customer: provide the target cloud account, networking setup, VPC connectivity
- Popsink: deliver the deployment artifacts, containers, orchestration, guidance for upgrades, monitoring
3. On-Premises (On-Prem)
Description
Popsink can run within a customer’s data center or private cloud environment, in a Kubernetes cluster.
Key Features & Benefits
- Supports Kubernetes or VM installations
- Integrates with enterprise SSO
- Minimal external dependencies
Responsibilities
- Customer: provide the physical/virtual infrastructure, storage, networking, identity, monitoring
- Popsink: provide the software, configuration, deployment instructions, integration with identity and observability systems
4. Air-Gapped / Isolated
Description
In environments that prohibit outbound connectivity (e.g. high-security, classified, regulatory environments), Popsink supports an air-gapped deployment. All operations, updates, and communications happen without external network connectivity. Updates are delivered via signed offline bundles, and the environment supports strict change control and auditing.
Key Features & Benefits
- No outbound connectivity required
- Offline, signed update bundles (auditable)
- Controlled, auditable deployments
- End-to-end policy enforcement
Responsibilities
- Customer: maintain the isolated network, provide mechanisms for secure update transfer, ensure auditability
- Popsink: provide offline deployment artifacts, signature verification, rollback and upgrade procedures