Skip to main content
Customer-VPC Deployment

G8KEPR runs in your infrastructure, not ours.

G8KEPR sensors deploy inside your own VPC alongside your applications. Threats are detected locally before any telemetry crosses your boundary. Your API traffic, request bodies, and customer data never leave your environment.

How It Works

Sensors run inside your perimeter. Only scrubbed telemetry crosses the mTLS boundary to the G8KEPR Control Plane.

G8KEPR Customer-VPC Architecture DiagramThe diagram shows two zones separated by an mTLS-secured channel. Left zone: Customer VPC (dashed border) contains Your Application and the G8KEPR Sensor running side-by-side. Right zone: G8KEPR Control Plane (solid border) contains the Collector and the Dashboard. Two labeled arrows connect the zones — Telemetry and Findings flows from Sensor to Collector, and Signed Pattern Packs flows from Collector back to Sensor. Data never leaves the Customer VPC in raw form.Customer VPCYourApplicationAPI · AgentsLLM trafficData stays hereG8KEPRSensorThreat detectionPII scrubbingLocal audit log24h offline spoolSig. verificationRuns in your VPCTelemetry & FindingsSigned Pattern PacksmTLS · Ed25519 · TLS 1.3G8KEPR Control PlaneCollectorSchema validateSig. verifyDedup + storePattern dispatchDashboardThreat alertsCompliance viewFleet statusPosture scoring1,800+ Threat PatternsWeekly refresh · Cosign-signed bundlesSensor verifies signature before applying
Your infrastructure boundary
Telemetry flow (outbound)
Pattern pack flow (inbound)

Why Customer-VPC?

Most security vendors route your traffic through their cloud. We don't.

Your data never leaves your environment

Findings are detected locally inside your VPC. Only scrubbed telemetry — not raw payloads — is sent to the control plane. Your API traffic, request bodies, and customer data stay on your infrastructure.

Data residency and regulatory compliance

Run sensors in any region or cloud. Comply with GDPR data residency requirements, US government on-prem mandates, or HIPAA data handling rules without routing sensitive traffic through a third party.

Detection at wire speed, next to your apps

The sensor runs inside your network boundary. No egress round-trip for every request. Threat detection adds ~5ms overhead on the cached path — not 30–100ms from an out-of-band cloud inspection hop.

Lower egress cost, no lock-in

Sensors use bandwidth for aggregated telemetry, not mirrored traffic. No dependency on G8KEPR being reachable for detection to work — sensors spool findings locally for up to 24h during control plane outages.

Deploy in Under 10 Minutes

No agents to install. No code changes. No firewall rules to open. One docker compose up command.

01

Sign Up

Create your G8KEPR account and choose your plan. No credit card required for the 30-day trial.

02

Download Sensor

Pull your pre-configured docker-compose.yml and .env template. Your tenant token is embedded — no manual config.

03

Run in Your VPC

Run docker compose up in your environment. The sensor starts monitoring immediately and registers with the control plane over mTLS.

04

First Findings in 10 Minutes

Open the G8KEPR dashboard. Your first threat detections appear as your services receive traffic — no tuning required.

terminal
# Pull your pre-configured compose file
$ curl -fsSL https://api.g8kepr.com/deploy/sensor | bash

# Start the sensor
$ docker compose up -d

 Sensor registered — first findings in seconds

Security of the Deployment Model

Every data flow across the boundary is authenticated, signed, and scrubbed.

Cosign-signed pattern packs

Every threat pattern update is signed with Sigstore Cosign (Ed25519). Sensors verify the signature before applying any update. An invalid signature causes the sensor to reject the pack and continue running its last verified version.

mTLS between sensor and control plane

All telemetry travels over mutual TLS with a customer-private certificate authority. The sensor and collector authenticate each other — no unauthenticated inbound connections from G8KEPR to your VPC.

PII scrubbing at the boundary

Before any finding leaves your VPC, the sensor scrubs known PII fields (email addresses, SSNs, credit card patterns) from evidence payloads. You control which fields are redacted via sensor configuration.

Local audit before egress

Every finding is written to the sensor's local tamper-proof audit log before it is submitted to the collector. You can inspect, export, or retain local findings independently of G8KEPR.

Offline-resilient spooling

If the control plane is unreachable, the sensor spools findings to local disk (up to 500 MB / 24 h). When connectivity is restored, the sensor replays at a throttled rate (100 events/s default) to prevent collector overload.

Architecture FAQ

Questions a security or infrastructure buyer typically asks before approving a deployment.

What data crosses the boundary between my VPC and G8KEPR?

Scrubbed finding metadata: threat category, confidence score, timestamp, endpoint path, and correlation ID. Raw request/response bodies do not leave your VPC. The exact fields are documented in our wire format spec (ADR-003).

How do you update sensors without needing admin access to my VPC?

We don't need access to your VPC. Sensor updates are delivered as a new container image via your own registry pull — the same Kubernetes rolling update or docker compose pull workflow you use for your own services. Pattern pack updates are pushed as cosign-signed bundles over the existing mTLS channel the sensor already uses for telemetry.

What happens if my VPC or the control plane is compromised?

Sensor compromise: sensors have no credentials beyond their mTLS certificate and tenant token — neither grants access to other tenants or to G8KEPR internal infrastructure. Control plane compromise: sensors reject any pattern pack that does not validate against the pinned public key, so a compromised control plane cannot push malicious patterns. We publish our DR runbook for key compromise at /trust.

Can G8KEPR scale across multiple regions or cloud providers?

Yes. Deploy one sensor instance per cluster or region. Each sensor registers independently with the control plane. Findings from all sensors are correlated in a single dashboard view. Multi-region compound detection — catching attacks that spread across regions — is available on Pro and Enterprise tiers.

Can I run G8KEPR in an air-gapped environment?

Partial support today. Sensors spool locally for 24h and can be configured to disable the telemetry upload path entirely if you need full air-gap. You lose the G8KEPR dashboard and pattern updates but keep local detection and audit logs. Full air-gap with a self-hosted collector is on the roadmap for Enterprise. Contact sales@g8kepr.com to discuss.

Deploy in your infrastructure today

30-day free trial. Full access. Your data never leaves your VPC.

Questions about your specific environment? Contact our engineering team