Last modified November 16, 2018

Bring Your Own Cloud (BYOC)

The Giant Swarm architecture distinguishes between the control plane and tenant clusters, with the control plane enabling the creation and operation of tenant clusters and tenant clusters running your Kubernetes workloads.

What BYOC is good for

Both on AWS and Azure, tenant cluster resources usually exist in an account (or in Azure terms: a subscription) separate from the one hosting the control plane resources. We configure a default account to use for all tenant clusters in an installation. Both accounts, the one for the control plane and the default one for tenant clusters, are in the customer’s jurisdiction.

Note: Some customers use the same account/subscription for both control plane and tenant cluster. This choice does not affect the capabilities described here.

With BYOC you can have more fine-grained control over the accounts used by tenant clusters. Each Giant Swarm organization in an installation can have an individual configuration of which cloud provider account to use.

The following two schemas illustrate the difference:



This enables use cases such as

  • Several teams, business units, or profit centers sharing an installation, where many or all of them run tenant clusters in their own cloud provider account, separate from each other.

  • An ISV, being the Giant Swarm customer, creating and giving access to tenant clusters in the name of a third party, in the third party’s cloud provider account. The third party in this scenario has no relationship with Giant Swarm and needs no access to the Giant Swarm API or control plane.

In both cases, customers benefit from simpler usage and cost allocation, plus a higher level of security through isolation. It can also help to make use of credits available in certain accounts.

Provider-specific mechanisms

Details of the implementation differ between AWS and Azure.

Details you should know about

  • Cloud provider account/subscription credentials are specified on the (Giant Swarm) organization level.

  • Cloud provider credentials are immutable. Once specified on an organization, cloud provider credentials cannot be modified or deleted. In order to switch to new cloud provider credentials you’ll have to create a new organization and migrate to new clusters owned by that organization.

  • If an organization does not yet have provider credentials configured and already has tenant clusters, these clusters are running in the default tenant cluster account. Setting credentials for this organization does not affect the tenant clusters created already.

Get started

To create clusters in a new cloud provider account, you first need to provide the credentials to the organization you’d like to use for this purpose. You are free to create a new organization for this purpose if you like. Organizations can be created in the Giant Swarm web UI, also known as happa, or via the Giant Swarm API.

To prepare your credentials, either as AWS account roles or as an Azure service principle, please follow our specific guides:

You can then assign the credentials to your organization using several ways:

All tenant clusters created for that organization will then use the credentials provided to the organization and will reside in the account/subscription associated with them.

When inspecting details of such a cluster, or using the gsctl show cluster command, we display cloud provider details in the case the tenant cluster does not reside in the default account.

Further reading