The Bring Your Own Kubernetes (BYOK) plan lets you run RisingWave in your own Kubernetes cluster while RisingWave manages the database workloads. Unlike BYOC where RisingWave manages the entire data plane infrastructure, BYOK gives you full control over the underlying cloud resources — networking, IAM, storage, and the Kubernetes cluster itself — while RisingWave handles the Kubernetes-level workloads and cluster operations.Documentation Index
Fetch the complete documentation index at: https://docs.risingwave.com/llms.txt
Use this file to discover all available pages before exploring further.
BYOC vs BYOK
| Aspect | BYOC | BYOK |
|---|---|---|
| Infrastructure (VPC, K8s, networking) | RisingWave manages | Customer manages |
| IAM roles and policies | RisingWave provisions | Customer provisions |
| Security groups and firewalls | RisingWave manages | Customer manages |
| K8s workloads (Agent, Proxy, Operator) | RisingWave manages | RisingWave manages |
| RisingWave clusters | RisingWave manages | RisingWave manages |
| Object storage | RisingWave provisions | Customer provisions |
| Observability | RisingWave provisions | RisingWave deploys telemetry stack; customer provisions storage (S3 buckets) |
Architecture overview
In a BYOK environment, RisingWave deploys and manages the following components in your Kubernetes cluster:- CloudAgent: Handles operations sent by the RisingWave control plane (cluster provisioning, scaling, upgrades).
- RWProxy: Routes PostgreSQL protocol traffic from the control plane and user clients to the appropriate RisingWave instances.
- RisingWave Operator: Manages RisingWave Custom Resource lifecycle in Kubernetes.
- Self-hosted telemetry stack: VictoriaMetrics (metrics), Loki (logs), and Grafana Alloy (collection) — deployed automatically inside the BYOK cluster. No external observability services are required.
Prerequisites
Before setting up a BYOK environment, you must provision the following resources in your cloud account.1. Kubernetes cluster
- AWS
- GCP
- Provider: Amazon EKS
- Version: Kubernetes 1.32 or higher
- Region: Must be in the same AWS region as the RisingWave Cloud control plane
2. Cluster dependencies
- AWS
- GCP
The following must be pre-installed on your EKS cluster:
| Component | Version | Purpose |
|---|---|---|
| cert-manager | v1.19.2+ | Internal certificate management |
| AWS Load Balancer Controller | v1.17.0+ | Provision NLBs and ALBs |
| Amazon EBS CSI Driver | v1.54.0+ | Persistent volumes for telemetry and compute cache |
3. Object storage
Provision two separate storage buckets in the same region as your Kubernetes cluster.| Bucket | Purpose |
|---|---|
| Data store | RisingWave state store (cluster data) |
| Log store | Loki log storage (self-hosted telemetry) |
We recommend separate buckets so that data and logs can have independent lifecycle policies, access controls, and retention. The data store typically contains sensitive cluster state, while the log store contains observability data with different access and retention requirements.
- AWS
- GCP
Provide the S3 bucket ARNs for both buckets.
4. Encryption at rest
- AWS
- GCP
Provide a KMS key ARN for EBS encryption. This is used by VictoriaMetrics and Loki persistent volumes, and RisingWave compute cache storage.
5. Identity and access management
- AWS
- GCP
You must create the following IAM roles:A. Setup IAM (user context)This role is used by the person or CI/CD pipeline running the BYOK setup commands. It is not used by any in-cluster workloads.C. Loki IAM (service context)This role is assumed by Loki via IRSA for reading and writing logs to S3. Minimum permissions:
- Must have
eks:DescribeClusterpermission on the target EKS cluster. - Must have an access entry in the EKS cluster.
6. Network connectivity
- AWS
- GCP
Provision two internal Network Load Balancers with VPC Endpoint Services for PrivateLink connectivity from the RisingWave control plane.CloudAgent NLB — one target group per port:
RWProxy NLB — one target group per port:
For each NLB, create a VPC Endpoint Service and allow the RisingWave control plane AWS account (
| Port | Protocol | Purpose |
|---|---|---|
| 40001 | TCP | Service port |
| 40090 | TCP | Metrics and status |
| Port | Protocol | Purpose |
|---|---|---|
| 4566 | TCP | PostgreSQL protocol |
| 4580 | TCP | Webhook |
| 9099 | TCP | Metrics and status |
600598779918) as an allowed principal.Terraform example for NLBs and VPC Endpoint Services
Terraform example for NLBs and VPC Endpoint Services
7. Terraform state backend
- AWS
- GCP
Provision an S3 bucket and a DynamoDB table for storing BYOK environment Terraform state and state locking.
Create a BYOK environment
BYOK uses therwc CLI to provision and manage environments. Before continuing, install and authenticate the CLI by following Install the RisingWave Cloud CLI.
Step 1: Prepare the configuration file
Create a YAML configuration file with your infrastructure details:- AWS
- GCP
Optional: pod scheduling and custom settings
Optional: pod scheduling and custom settings
You can optionally configure pod scheduling for different workload types and add custom tags:See Node pool resource requirements for sizing guidance on each workload category.
Step 2: Register the environment
Step 3: Deploy resources
Ready.
Create a RisingWave cluster
Creating a RisingWave cluster in a BYOK environment uses a two-phase provisioning flow. This is because the IRSA trust policy for the cluster’s IAM role requires the Kubernetes namespace and service account name, which are only allocated after the tenant is initially created.Phase 1: Create the tenant
Create the tenant via the RisingWave Cloud portal or CLI. The tenant starts inAwaitingConfig status. At this point, the control plane allocates the Kubernetes namespace and service account name.
Retrieve them with:
Resource Namespace and Service Account fields in the output. You will need these values for the IAM trust policy in the next step.
Phase 2: Provision IAM and metastore, then configure
- AWS
- GCP
-
Create an IAM role for the RisingWave cluster with an IRSA trust policy. Use the
Resource NamespaceandService Accountvalues from therwc cluster describeoutput in Phase 1:Grant S3 access to the data store bucket: - Provision a PostgreSQL database as the metadata store. We recommend using Amazon RDS. Ensure connectivity from the EKS cluster pods to the database.
-
Submit the configuration via CLI:
Config file format:
Creating status and triggers provisioning. The metastore password is encrypted at rest.Connect to a RisingWave cluster
There are two ways to connect to a RisingWave cluster running in a BYOK environment.Option 1: RisingWave Cloud Console (recommended)
Use the in-portal SQL console — no network setup is required. See Console overview for details.Option 2: Direct connection via RWProxy NLB
For programmatic access (e.g., from your own applications, BI tools, orpsql), connect to the RWProxy NLB you provisioned in the prerequisites.
The RWProxy NLB is internal-only. Clients must be inside the same VPC as the BYOK environment, or reach the NLB via VPC peering / Transit Gateway.
options field, the host (SNI), or the username. See Connection errors → Tenant identifier methods for all three methods. Example using the options field:
%3D is the URL-encoded form of =. If your client does not require URL encoding, use --tenant=<tenant-namespace> directly.
Where:
<rwproxy-nlb-dns>— DNS name of the RWProxy NLB (the load balancer behindrwproxy_target_group_arn)4566— RWProxy PostgreSQL port<database>— database name (default:dev)<tenant-namespace>— theResource Namespacefromrwc cluster describe<username>/<password>— credentials created viarwc cluster dbuser create
Node pool resource requirements
If you use dedicated node pools for different workload types (via thecustomized_settings.scheduling configuration), the following minimum resources are required:
| Category | Components | Minimum node pool resources |
|---|---|---|
system_workload | CloudAgent, RWProxy, Operator, high cardinality metrics suppressor | 3x m7g.large (or machines with equivalent combined resources) |
cluster_workload | RisingWave cluster pods (meta, frontend, compute, compactor) | Depends on your RisingWave cluster size |
telemetry_workload | VictoriaMetrics, Loki | 1x m7g.xlarge (or a machine with equivalent resources). The workload cannot be split across machines smaller than m7g.xlarge. |
update_workload | Terraform apply task pods | 1x m7g.2xlarge (or a machine with equivalent resources). Same constraint: m7g.2xlarge is the minimum individual machine size. |
DaemonSet scheduling (Grafana Alloy) is automatically derived from the union of all workload tolerations — no separate configuration is needed.
Manage a BYOK environment
List environments
View environment details
Update an environment
To update a BYOK environment (e.g., to apply a new version or change custom settings):Delete a BYOK environment
- Delete all RisingWave clusters running in the environment.
-
Terminate the environment (control plane side):
-
Delete the Kubernetes resources and control plane record:
- Clean up the cloud resources you provisioned (NLBs, VPC Endpoint Services, IAM roles, storage buckets, etc.).
Shared responsibility
BYOK is a shared responsibility model. The table below outlines what each party is responsible for.RisingWave responsibilities
- All cluster and project-level operations available on the RisingWave Cloud portal.
- 24/7 monitoring backed by the RisingWave support and on-call teams.
- Version and configuration management of all deployed workloads (CloudAgent, RWProxy, Operator, telemetry stack).
Customer responsibilities
- Kubernetes cluster and worker nodes (including upgrades to the minimum supported version).
- Firewall and security group rules.
- IAM roles / service accounts used by BYOK environments and clusters.
- Object storage buckets for data storage and log storage.
- Network connectivity resources (NLBs and VPC Endpoint Services on AWS).
- PostgreSQL databases serving as metadata stores.
- Terraform state backend.
- Encryption keys (KMS on AWS).
Features not available in BYOK
BYOK uses AWS PrivateLink for control plane connectivity (customer provisions the VPC Endpoint Services, control plane creates the VPC Endpoints). The features below refer to RisingWave-managed capabilities that are available in BYOC but not in BYOK.
| Feature | Reason |
|---|---|
| RisingWave-managed PrivateLink for data access | In BYOC, RisingWave can provision PrivateLink endpoints for connecting your applications to RisingWave clusters. In BYOK, you manage your own network connectivity. |
| Cluster IAM customization via portal | In BYOC, you can add or modify IAM roles for RisingWave clusters through the portal. In BYOK, you provision and manage all IAM roles directly. |