Operations

OperationsOperationsKubernetesMulti-Cloud

Cloud Ops

Cloud Ops is Planton's real-time operations gateway. It lets developers and operators inspect, debug, and manage deployed infrastructure across Kubernetes, AWS, GCP, and Azure β€” from the web console and CLI β€” without distributing credentials or opening firewall rules.

Why Cloud Ops Exists

Infra Hub provisions infrastructure. Service Hub deploys applications. But once everything is running, a fundamental question remains: how do you see what's happening?

Without a unified operations layer, teams face a fragmented reality:

  • Developers need kubectl access to view pods, read logs, and debug failures. This means distributing kubeconfig files, managing Kubernetes RBAC, and teaching every developer CLI commands for each cluster.
  • Operators need cloud console access to inspect EC2 instances, check storage buckets, or verify VM status. This means maintaining IAM credentials per operator per cloud account per environment.
  • Security teams worry about credential sprawl. Every developer with direct cluster access holds credentials that could be misused or leaked. Every operator with console access adds to the blast radius.
  • Visibility is fragmented across cloud provider consoles, terminal sessions, and monitoring tools. There is no single place to answer "what's running for this deployment?"

Cloud Ops solves this by routing all operational requests through Planton's secure tunnel infrastructure. Developers and operators interact with Cloud Ops through the web console or CLI. Cloud Ops resolves the correct credentials, routes the request to the appropriate Planton Runner deployed in customer infrastructure, and the runner executes the operation using local credentials. Cloud credentials never leave the customer's environment.

Two Ways to Access

Every Cloud Ops operation supports two access modes, designed for two different audiences.

Developer Mode

Developers think in terms of their deployments: "show me the pods for my API." They specify their cloud resource β€” the deployment they care about β€” and Cloud Ops resolves everything else.

When a developer targets a cloud resource, the system:

  1. Looks up the cloud resource in Infra Hub to find its cluster, namespace, and connection
  2. Verifies the developer has access to that specific cloud resource
  3. Routes the operation to the correct runner, scoped to the cloud resource's namespace

The developer never needs to know which cluster their deployment runs on, what namespace it lives in, or which credential connects to it. They also cannot access resources outside their deployment's scope β€” the namespace and connection are derived server-side and cannot be overridden.

In the CLI, developer mode uses the --resource flag:

planton kubectl get pods -r my-org/prod/KubernetesDeployment/payments-api

In the web console, developer mode is the default. Navigate to any cloud resource and open the Kubernetes tab to see its live state.

Admin Mode

Infrastructure administrators think in terms of clusters and accounts: "show me everything in the production namespace" or "list all EC2 instances in us-east-1." They specify a provider connection (credential) and supply provider-specific parameters directly.

Connection resolution follows a fallback chain:

  1. If a specific connection is provided, use it directly
  2. If only an environment is provided, use the environment-level default connection
  3. If neither is provided, use the organization-level default connection

For details on how default connections are configured, see Connections > Default Connections.

In the CLI, admin mode uses the --connection flag:

planton kubectl get pods --connection k8s-prod-cluster -n kube-system

How the Two Modes Compare

AspectDeveloper ModeAdmin Mode
Target audienceService developersInfrastructure administrators
Mental model"Show me pods for my deployment""Show me pods in kube-system"
ScopeSingle deployment's resourcesAny resources accessible via the connection
Namespace/regionDerived server-side (cannot override)Supplied by the caller
AuthorizationOn the cloud resourceOn the provider connection

Both modes use the same operations, the same tunnel infrastructure, and the same security model. The access mode determines how Cloud Ops resolves the target β€” not what operations are available.

Supported Providers

Kubernetes (Full Operations)

Kubernetes has the deepest Cloud Ops integration, covering the full spectrum of day-2 operations:

  • Pod management β€” Find pods by their managing resource (Deployment, StatefulSet, DaemonSet), view status, restart count, and container details
  • Log streaming β€” Stream logs in real time with filtering by container, time range, tail lines, and content search
  • Container exec β€” Open an interactive shell in any running container from the browser or CLI
  • Resource browsing β€” List, describe, and view YAML for any Kubernetes resource in a namespace
  • Resource editing β€” Modify Kubernetes resource YAML directly from the browser or CLI
  • Resource deletion β€” Delete resources with confirmation
  • Namespace graph β€” Visualize all resources in a namespace as a directed acyclic graph showing relationships

Both developer mode and admin mode are supported for all Kubernetes operations.

See Kubernetes Operations for the full reference.

AWS, GCP, and Azure (Resource Browsing)

Cloud Ops extends beyond Kubernetes with resource listing operations across three major cloud providers:

ProviderOperations
AWSList EC2 instances (with filters), list S3 buckets
GCPList Compute Engine instances, list Cloud Storage buckets
AzureList Virtual Machines, list Blob Storage containers

These operations currently support admin mode only. Developer mode for non-Kubernetes providers will be available as the cloud resource catalog expands to cover more resource kinds.

See Resource Browser for the full reference.

How It Works

Every Cloud Ops operation follows the same path, regardless of provider or access mode:

  1. Request arrives β€” The web console or CLI sends the operation request to the Cloud Ops service
  2. Context resolution β€” Cloud Ops determines the access mode and resolves the provider connection and any provider-specific parameters (namespace, region, project)
  3. Authorization β€” Cloud Ops verifies the caller has access (to the cloud resource in developer mode, or to the provider connection in admin mode)
  4. Tunnel routing β€” Cloud Ops routes the request through the secure tunnel to the Planton Runner bound to the resolved connection
  5. Runner execution β€” The runner executes the operation against the cloud provider API using local credentials
  6. Response β€” Results flow back through the tunnel to the caller

This architecture means:

  • Credentials stay in customer infrastructure. The runner handles all cloud API calls locally. Cloud Ops never sees, stores, or caches credentials.
  • No firewall rules needed. The runner establishes an outbound connection to the tunnel server. No inbound ports need to be opened in customer infrastructure.
  • Low latency. The tunnel adds approximately 1-5ms per request. For streaming operations (logs, exec), the overhead is negligible.
  • Kubernetes Operations β€” Pod management, log streaming, container exec, resource browsing
  • Resource Browser β€” Multi-cloud resource listing for AWS, GCP, and Azure
  • Runner β€” The secure execution agent that Cloud Ops routes operations through
  • Connections β€” Credential and integration management, including default connection resolution

Next article

Kubernetes Operations

Kubernetes has the deepest Cloud Ops integration β€” pod management, real-time log streaming, interactive container shells, resource browsing with visual graphs, inline YAML editing, and resource deletion. All operations work through both the web console and CLI, in both developer mode and admin mode. Pod viewing is the starting point for most Kubernetes operations. You can find pods by their managing resource (Deployment, StatefulSet, DaemonSet, Job, CronJob) and see their current state at a...
Read next article

Β©2026 Planton Cloud Inc. All Rights Reserved.