Obsfly

Deployment · BYOC

BYOC database monitoring. Your data, your cloud.

Run the Obsfly data plane inside your VPC. Telemetry — including raw query text and execution plans — never crosses the boundary. The Obsfly control plane talks to a single proxy in your cluster, mTLS-authenticated, every call audited.

PII / query text never leaves your VPC

Raw query text is the most sensitive thing in your stack. With BYOC, it stays inside the cloud you already trust.

Same UX as our SaaS

Same Next.js dashboard, same alert rules, same AI insights. The data plane just lives in your cloud.

Compliance unblock

SOC2 / HIPAA / PCI / GDPR data residency requirements stop being your blocker.

Audit every read

The data-plane proxy logs every query the control plane sends. You see what we see.

What runs where

agent
Inside your VPC. Scrapes Postgres / MySQL / Mongo / etc.
receiver
Inside your VPC. Stateless ingestion → Kafka.
consumer
Inside your VPC. Kafka → ClickHouse.
data-plane proxy
Inside your VPC. The only door the Obsfly control plane can knock on. mTLS + JWT, every call audited.
ClickHouse, Kafka, Redis, S3
Inside your VPC.
frontend, backend (control), detector, billing
Obsfly-hosted. Talks ONLY to the data-plane proxy.

Provisioning

1. Helm or Terraform

One helm install or one Terraform module. AWS, GCP, Azure references.

2. Pin the cert

Issue an mTLS cert. Paste the public half into the Obsfly console. Done.

3. Point the agent

Agent ships envelopes to ingest.<you>.internal. Green in 5 minutes.

· · ·

Talk to us about BYOC.

$5k/mo platform + per-DB. We'll show you the architecture, audit logs, and a working install.

BYOC database monitoring — data plane in your VPC · Obsfly