Skip to content

Popsink Deployment Options

Popsink supports multiple deployment models so that you can run the same core engine, with the same features and performance, in the mode that fits your organization’s requirements. The primary deployment models are:

  1. SaaS (fully managed)
  2. Bring Your Own Cloud (BYOC)
  3. On-Premises (on-prem)
  4. Air-Gapped / Isolated

Overview

Popsink’s deployment architecture is designed to adapt to different security postures, regulatory constraints, and operational preferences. Regardless of the model chosen, you benefit from the same core capabilities (e.g. data ingestion, replication, pipeline processing, observability). The choice of deployment impacts responsibilities for infrastructure, upgrades, connectivity, and control.

High level comparison:

Deployment Mode Infrastructure Ownership Connectivity Requirements Upgrade / Patching Responsibility Typical Use Cases
SaaS Popsink-managed cloud Outbound connectivity required Popsink handles Fast startup, low ops, non-restrictive environments
BYOC Customer’s cloud account Outbound/inbound as required Shared (Popsink + Customer) Organizations wanting control over data, keys, cost
On-Premises Customer-managed data center or private cloud Standard internal networking, limited external contact Customer (with Popsink guidance) Enterprises with strict internal hosting needs
Air-Gapped / Isolated Customer-managed, isolated network No outbound connectivity allowed Offline, signed update bundles Regulated environments, high-security zones

Deployment Models — Detailed Descriptions

Below are more detailed descriptions of each deployment model, including features, constraints, and prerequisites.

1. SaaS (Fully Managed)

Description

In this model, Popsink hosts and manages the full stack (compute, storage, networking, orchestration) in a cloud environment. The user interacts via APIs, consoles, or UI but does not need to provision or manage infrastructure.

Key Features & Benefits

  • Zero ops: Setup can be done in hours
  • Automatic upgrades and patches
  • Elastic scaling under predictable SLAs
  • Data boundary controls: region selection, private networking options

Responsibilities

  • Popsink: manage infrastructure, scaling, updates, high availability
  • Customer: data modeling, configuration, access controls, inbound/outbound integration

2. Bring Your Own Cloud (BYOC)

Description

This model installs Popsink within the customer’s own cloud account (e.g. AWS, GCP, Azure). All data, keys, and spend remain under the customer's control. The deployed components run within the customer’s VPC and use existing identity and key management systems.

Key Features & Benefits

  • Data stays inside your VPC
  • VPC-only traffic (internal networking)
  • Single-tenant cost visibility
  • More control over infrastructure and governance

Responsibilities

  • Customer: provide the target cloud account, networking setup, VPC connectivity
  • Popsink: deliver the deployment artifacts, containers, orchestration, guidance for upgrades, monitoring

3. On-Premises (On-Prem)

Description

Popsink can run within a customer’s data center or private cloud environment, in a Kubernetes cluster.

Key Features & Benefits

  • Supports Kubernetes or VM installations
  • Integrates with enterprise SSO
  • Minimal external dependencies

Responsibilities

  • Customer: provide the physical/virtual infrastructure, storage, networking, identity, monitoring
  • Popsink: provide the software, configuration, deployment instructions, integration with identity and observability systems

4. Air-Gapped / Isolated

Description

In environments that prohibit outbound connectivity (e.g. high-security, classified, regulatory environments), Popsink supports an air-gapped deployment. All operations, updates, and communications happen without external network connectivity. Updates are delivered via signed offline bundles, and the environment supports strict change control and auditing.

Key Features & Benefits

  • No outbound connectivity required
  • Offline, signed update bundles (auditable)
  • Controlled, auditable deployments
  • End-to-end policy enforcement

Responsibilities

  • Customer: maintain the isolated network, provide mechanisms for secure update transfer, ensure auditability
  • Popsink: provide offline deployment artifacts, signature verification, rollback and upgrade procedures