Resource Hierarchy
Control Plane uses a hierarchical structure where resources are scoped to provide isolation and governance:Organization
Org
Isolated environment and top-level container for all resources. Configure external logging, threat detection, tracing, and organization-wide settings.
Access Control
Resources that control who can access what within your organization.Policy
Grant permissions to principals (users, groups, service accounts, identities) for resources in your organization.
Group
Collections of users and service accounts. Supports dynamic membership via tag-based queries.
User
Organization members who access Control Plane via the Console, CLI, API, Terraform, or Pulumi.
Service Account
Programmatic access for CI/CD pipelines, automation, and API integrations.
Quota
Resource limits for your organization including agents, domains, and workloads.
Compute & Storage
Core resources for running and managing your applications.GVC
Global Virtual Cloud - container for workloads deployed across multiple cloud locations with shared configuration.
Workload
Your applications running as standard, stateful, cron, or serverless deployments with autoscaling and load balancing.
Location
Geographic regions across AWS, GCP, and Azure where your workloads can be deployed.
Volume Set
Persistent storage for workloads with snapshots, autoscaling, and encryption.
Networking & Domains
Resources for routing traffic and connecting your services.Domain
Custom domain mapping with TLS certificates, CORS configuration, and path-based routing to workloads.
IP Set
Reserve static public IPs per location for DNS configuration and firewall rules.
Agent
Secure tunneling to private networks, on-premises systems, and cloud VPCs without exposing them to the internet.
Cloud Integration
Resources that connect Control Plane to your cloud providers and private networks.Cloud Account
Bridge to AWS, GCP, Azure, or NATS for identity-based access to cloud services.
Identity
Credential-free access to cloud resources and private networks via workload identity federation with AWS, GCP, Azure, and NGS.
Secrets, Images & Audit
Resources for managing credentials, container images, and audit trails.Secret
Encrypted storage for credentials including AWS keys, Docker registries, TLS certificates, and more.
Image
Container images in Control Plane’s private registry or references to external registries.
Audit Context
Tamper-proof audit trails for Control Plane actions and custom external events from your workloads.
Workload Configuration
The Workload resource has extensive configuration options documented across multiple pages:General
Endpoints, environment variables, and debug mode
Types
Standard, stateful, cron, and serverless workloads
Containers
Image references, ports, CPU, memory, and GPU
Autoscaling
Metric-based scaling, scale-to-zero, and KEDA event-driven scaling
Capacity
Capacity AI and resource optimization
Load Balancing
Direct load balancer and IP Sets
Firewall
Ingress and egress rules
Security
mTLS and external authorization
JWT Auth
Token-based authentication
Volumes
Mount secrets, cloud storage, and volume sets
Custom Metrics
Prometheus-based metrics for advanced scaling
Termination
Grace periods and shutdown behavior
Key Concepts
Permission Model
Permission Model
Control Plane uses a role-based access control model where Policies grant specific permissions to Principals (users, groups, service accounts, identities) for target resources. Permissions follow hierarchical “implies” relationships - for example,
manage implies create, delete, and edit.Multi-Cloud Deployment
Multi-Cloud Deployment
A single GVC can deploy workloads across multiple Locations spanning AWS, GCP, and Azure regions simultaneously. Traffic is automatically routed to the nearest healthy instance.
Workload Identity
Workload Identity
Identities provide credential-free access to cloud resources and private networks. Instead of embedding secrets in your code, workloads assume cloud-native identities (AWS IAM roles, GCP service accounts, Azure managed identities) at runtime.
Private Network Access
Private Network Access
Agents create secure tunnels to private networks without exposing them to the internet. Combined with Identities, workloads can access databases, APIs, and services in your VPCs.