Learn how Ryvn provisions and manages your infrastructure
Ryvn makes deploying applications to customer cloud environments seamless and secure. Our provisioning system handles
everything from initial setup to ongoing maintenance, letting you focus on building great software while we manage the
infrastructure.
Ryvn supports AWS, Google Cloud, and Azure, maintaining consistent workflows across all cloud providers.
Here’s an overview of how Ryvn works with your customer’s cloud infrastructure:
The provisioning process is designed to be secure and straightforward for both vendors and customers. Here’s how it
works:
1
Installation Link
You send your customer a secure link to install your application. This link contains all necessary instructions for the setup process.
2
Temporary Credentials
The customer follows the provided instructions to create temporary, limited-scope credentials specifically for provisioning their environment.
For customers who prefer to avoid granting provisioning permissions, the provisioning process can be run manually.
3
Automatic Connection
Ryvn automatically establishes a secure connection using these temporary credentials and begins the provisioning process.
4
Infrastructure Provisioning
Using the temporary credentials, Ryvn provisions the necessary infrastructure components using Terraform (VPC, subnets, security groups, Kubernetes cluster, load balancers).
5
Application Deployment
Finally, Ryvn deploys your application and configures monitoring with metrics collection and logging.
You can disable logging collection at your customer’s request.
Security is foundational to our provisioning system, with multiple layers of protection throughout the process:
Limited-Scope Credentials: During provisioning, we create a dedicated IAM role (AWS) or service account
(GCP/Azure) with the minimum permissions required to set up the Ryvn environment and deploy vendor resources.
Temporary Access: Provisioning credentials are temporary and automatically expire after successful deployment,
following the principle of least privilege.
Environment Isolation: Each customer environment has dedicated VPCs, Kubernetes namespaces, network policies, and
independent access controls.
Secure Communication: All communication between Ryvn and your customer’s cloud environment is secured using TLS
encryption, with mutual TLS authentication for service-to-service communication.
Ryvn handles all aspects of cluster maintenance and upgrades to ensure your infrastructure remains secure and
performant.
We handle Kubernetes version upgrades twice per year using blue-green deployments for zero downtime. All upgrades
are extensively tested and coordinated with cloud provider releases.