Flexible Deployment Options
Enable streaming workloads quickly with our StreamNative managed offering.
StreamNative managed service
SLA: 99.95%, managed backups and upgrades
24/7 monitoring
StreamNative Serverless clusters hosted on StreamNative’s public cloud
Deploy instantly (within seconds) and get started on implementation instead of infrastructure and planning. Pay-as-you-go pricing with elastic scale allows for experimentation and flexible needs. Available on GCP. Learn more
Teams that are exploring Kafka, Pulsar or new use cases or who want to move quickly and focus on time to market instead of infrastructure management. StreamNative Serverless lets you start quickly without sizing exercises and grow without over-provisioning.
StreamNative Dedicated clusters hosted on StreamNative’s public cloud
Deploy in minutes and focus on implementation instead of infrastructure. Pay-as-you-go pricing allows for experimentation and flexible needs. Available on AWS and GCP. Learn more
Teams with predictable workloads who need a reliable, dedicated environment for Kafka, Pulsar, or specific use cases. With dedicated infrastructure, your team can focus on delivering features without the overhead of managing infrastructure, and ensure consistent performance.
StreamNative clusters hosted on your cloud, fully-managed by StreamNative
Scale Pulsar within your Kubernetes cluster efficiently and affordably. Reduced latency and no additional networking fees. Available on AWS, GCP, and Azure. Learn more
Organizations with predictable, large-scale workloads that require full control over their infrastructure. Ideal for teams that want to manage data retention, security, and compliance on their own cloud while offloading the complexity of running Pulsar or Kafka at scale.
Self-Managed StreamNative Clusters
Deployed and managed by your team
Customer managed on Kubernetes, on-premise or across hybrid environments
Enterprise-grade deployment of Pulsar that allows full control over existing security and data compliance. Learn more
Organizations with sensitive data or security protocols and can't allow access to outside vendors - or who have made an investment in on-prem infrastructure.