Deployment Shape
Crawbl is designed for self-hosted deployment. This page covers infrastructure requirements and deployment models.
Deployment Models
Self-Hosted (Recommended)
Deploy Crawbl in your own infrastructure:
| Aspect | Details |
|---|---|
| Control | Full ownership of data and configuration |
| Security | Data never leaves your environment |
| Compliance | Meet regional data residency requirements |
| Cost | Predictable infrastructure costs |
Supported Platforms
| Platform | Status | Notes |
|---|---|---|
| Any managed Kubernetes | ✅ Supported | Reference platform |
| AWS EKS | ✅ Supported | Requires minor config changes |
| Google GKE | 🔜 Planned | Similar to EKS |
| Azure AKS | 🔜 Planned | Similar to EKS |
| On-Premises | ✅ Supported | Any Kubernetes cluster |
Infrastructure Requirements
Minimum Specifications
For development/testing:
| Component | Specification |
|---|---|
| Kubernetes | 1.28+ |
| Worker Nodes | 2 nodes, 4 CPU, 8GB RAM each |
| Storage | 50GB SSD per node |
| Database | PostgreSQL 15+, 2GB RAM |
| Redis | 1GB RAM |
Production Specifications
For production workloads:
| Component | Specification |
|---|---|
| Kubernetes | 1.28+ with HA control plane |
| Worker Nodes | 3+ nodes, 8 CPU, 16GB RAM each |
| Storage | 200GB SSD per node, with PV provisioning |
| Database | PostgreSQL 15+, 8GB RAM, with replication |
| Redis | 4GB RAM, with persistence |
Architecture Components
Click diagram to zoom
Deployment Process
Bootstrap Sequence
Click diagram to zoom
Required Secrets
Before deployment, configure:
| Secret | Purpose |
|---|---|
anthropic-api-key | Claude access |
firebase-project-id | Mobile authentication |
database-url | PostgreSQL connection |
redis-url | Redis connection |
oauth-providers | OAuth app credentials |
Secrets are injected at runtime via the platform's secrets management layer. See the Security Model for details on how secrets are stored and rotated.
GitOps Workflow
Crawbl uses a GitOps continuous deployment model:
Click diagram to zoom
CI/CD Pipeline
- Code is pushed to the main branch
- CI builds container images
- CI updates image tags in the deployment repository
- GitOps controller auto-syncs changes to the cluster
Monitoring & Observability
Health Checks
All components expose:
/health- Liveness probe/ready- Readiness probe/metrics- Prometheus metrics
Logging
- Structured JSON logs
- Correlation IDs for request tracing
- Aggregated in cluster logging
Metrics
- Request latency (p50, p95, p99)
- Error rates by endpoint
- Resource utilization
- LLM token usage
Deep Dive
Detailed deployment guides and infrastructure references are available to platform operators.