Infragate Internal Developer Platform for OKE on Oracle Cloud

Infragate by Solvia Lab turns OKE into a governed internal platform: self-service provisioning, scaling, Kubernetes upgrades, kubeconfig access, BYON networking, cost visibility, approval workflows, and durable Activity history through a single web portal. No Terraform to write, no CLI to learn, no OCI Console to navigate. Runs entirely in your tenancy.

Read the Docs
Live Terraform streaming Real-time cost preview Governed self-service 100% in-tenancy
Terraform output replay (sanitized)
Built by Solvia Lab on Oracle Cloud - native to OKE, IAM, VCN, and Object Storage
No markup on OCI resources - billed directly by Oracle
Platform capabilities

Complete cluster lifecycle
at your fingertips

Infragate is more than a provisioning UI: it combines OKE lifecycle automation, network ownership boundaries, access delivery, FinOps visibility, approval workflows, and audit-ready Activity history in one in-tenancy platform.

One-click deploy

Engineers provision fully managed OKE clusters from admin-approved templates or custom configs with automatic compartment, VCN, subnet, security list, and node pool creation - no manual steps.

Scaling + K8s upgrades

Add or remove node pools, scale to zero, adjust OCPU, RAM, and storage per pool from the UI. Dedicated Kubernetes upgrade flow filters OCI-compatible versions and renders Basic-tier worker refresh steps from live pool counts.

Live cost preview

Monthly and hourly estimates update live as you configure pools. Cost visible on deploy form, dashboard cards, detail page, and admin panels.

Approvals + Activity

Protected destroys, limit-increase requests, TTL warnings, lifecycle events, and admin limit changes all flow into durable Activity history with unread tracking, so users see what changed and admins keep control.

CIDR pool management

Admin-managed /24 ranges - each cluster consumes one on deploy and releases on destroy. No overlaps, automatic allocation.

Kubeconfig + SSH keys

Download kubectl-ready kubeconfig without OCI CLI or local OCI config. Admins can expose the OKE API only to runner and VPN/corporate CIDRs; future agent mode removes direct endpoint access.

Live Terraform streaming

Watch terraform init, plan, and apply output stream in real time via SSE during deploy, scale, upgrade, and destroy.

Bring your own infra

Supply existing VCN, compartment, or subnet OCIDs via the Advanced tab. Managed networks support a dedicated public API endpoint subnet restricted to VPN/runner CIDRs; BYO resources stay read-only.

Resource limits

Two-tier limit system: global defaults + per-user overrides for clusters, pools, nodes, OCPU, RAM, storage, and tier. Users can submit higher-limit requests from deploy/scale; admins approve granted values from Requests.

Cluster templates & RBAC

Golden paths with role-based gating

Admins define pre-approved templates (K8s version, shape, image, pools, TTL, destroy protection, and role access). Assign required Keycloak or Azure AD roles so users only see templates they're authorised for. Selecting a template pre-fills and locks resource fields - users can still set cluster name, CIDR, and advanced overrides. Template values can exceed user limits since they represent admin-approved configurations, and template shape/K8s choices are compatibility-checked before save.

Template: PROD - HA requires: production
Destroy protection TTL: 720h VM.Standard3.Flex 3 node pools

Users without the production role never see this template - clean UI, no error messages.

OIDC role mapping (Keycloak / Azure AD / Okta)
DEV - Small
No role required → all users
TEST - Medium
Role: testing → QA team
UAT - Large
Role: uat → release managers
PROD - HA
Role: production → SRE only
FinOps native

Cost visibility & governance

Real-time cost previews, cluster-level breakdowns, and global spend dashboards - no surprises. Both server-side and client-side cost engines produce identical results.

Deploy cost summary

Hourly & monthly cost updates live as you configure node pools, shape, and tier. Also shown in the deploy plan confirm modal.

$0.025/OCPU·hr + $0.0015/GB RAM

Cluster cost cards

Dashboard cards show estimated monthly cost per cluster. Detail page shows full breakdown: per-pool cost, control plane cost, total with hourly rate.

Admin spend overview

Total monthly spend across all active clusters in the admin stats bar. Shape-specific rate overrides supported for custom OCI enterprise contracts.

Identical server-side & client-side cost engine

OCI Pay-As-You-Go rates + admin overrides for custom enterprise contracts.

Basic CP: $0 · Enhanced CP: $0.10/hr
Admin & governance

6 dedicated admin panels

Global oversight, resource limits, configuration, templates, Requests, Activity-backed approvals, and audit logs - all changes take effect immediately.

All Clusters

Every cluster across all users with status, owner, CIDR, K8s version, tier, resources, cost, and age. Stats bar with total spend.

Users & Limits

Per-user overrides for any combination of limits and tier. Users can request higher limits; admins approve, adjust, deny, or reset to global defaults with Activity notifications.

Configuration

CIDR pool, OCI-synced VM shapes, refreshed K8s versions, node images, global resource limits, and fallback manual curation. No restart needed.

Cluster Templates

Template table with live cost preview in add/edit modal. Enable/disable toggle and permanent delete.

Requests

Shared approval queue for protected-cluster destroy requests and higher-limit requests. Live nav badges; destroy approval opens the Terraform plan before force-destroy, while limit approval writes granted overrides. Denials include user-visible notes.

Audit Log

Append-only record of every deploy, scale, upgrade, and destroy. Filterable by user, operation, status, and duration.

Deployment flexibility

Helm chart, OKE, or any Kubernetes

  • Existing OKE cluster - deploy into your Oracle Kubernetes Engine cluster via Helm in minutes. Pre-configured for OCI Block Volumes, nginx ingress, and OCI load balancer.
  • Helm chart - single chart with configurable values, ingress-nginx with OCI load balancer annotations. Supports imagePullSecrets for private registries.
  • Customer delivery model - read-only registry token, released images, and Helm values. Customers pull images into their own tenancy; no source access or build system required.
  • Single VM (k3s) on OCI Always Free - ARM-compatible, control-plane tolerations for single-node scheduling.
  • Any OIDC provider - bundled Keycloak, or connect Azure AD, Okta, Google Workspace. PKCE flow, no client secrets in frontend.
Customer Install Path
Receive registry token
Read-only PAT scoped to Infragate images
Create imagePullSecret
Kubernetes regcred uses the PAT
Configure Helm values
OCI, OIDC, ingress, storage, and limits
Helm install / upgrade
Pods pull released images in their cluster
Validate and operate
Login works; first cluster deploy proves readiness
Customers only receive released images and a Helm runbook; Infragate source and release automation stay private.
Identity & security

Enterprise-grade access control

Zero external dependencies. No data leaves your tenancy. No SaaS control plane.

Any OIDC Provider

Keycloak (bundled), Azure AD, Okta, Google Workspace - any OIDC-compliant IdP.

PKCE Auth Flow

Authorization Code + PKCE. No client secrets stored in the frontend. Auto token refresh.

Auto-provisioning

No user directory needed. Users auto-provisioned on first login from JWT sub claim.

Cached OIDC Discovery

Well-known config cached in sessionStorage + nginx proxy layer. Zero network round-trips on load.

OCI-First & Sovereign

Why Infragate - OCI-native operating model

Designed for teams that want faster platform delivery while keeping control-plane operations, governance, and secrets management within their OCI boundary.

Designed for OCI in-tenancy control planes External SaaS callbacks not required Secrets retained in customer boundary
Control plane location
DIYInside tenancy (self-managed)
RafayVendor SaaS (self-host optional)
QualiVendor SaaS
InfragateInside your OCI tenancy
Outbound egress to third-party control plane
DIYDepends on integrations
RafayCommonly required
QualiCommonly required
InfragateNot required by default
Governance guardrails and limits
DIYCustom policy workflows
RafayPlatform policy framework
QualiPlatform policy framework
InfragateLimits + requests
Day-2 ops effort
DIYHigh
RafayMedium
QualiMedium
InfragateLow for OCI ops
Comparison reflects publicly documented default architectures and common deployment patterns as of April 24, 2026. Validate against your internal security, compliance, and operating model.
12-20 min
Typical provisioning
138+
Automated tests
4/4
Lifecycle ops
100%
In-tenancy
Provisioning time depends on OCI region capacity, shape/image availability, and tenancy limits.
Product maturity

GA today vs roadmap next

Clear separation between production capabilities and planned capabilities. Roadmap items are phased, customer-validated, and release-gated.

GA today
  • Deploy, scale, Kubernetes upgrade, and destroy with live Terraform logs
  • Admin governance: limits, per-user override requests, templates, destroy approvals, Activity inbox, audit log, and OCI config sync
  • Shape-aware Kubernetes compatibility filtering, OCI shape/version sync, and node-image auto-selection to prevent invalid deploy combinations
  • VPN-first access: kubectl-ready kubeconfig plus OKE API endpoint allowlists for runner and corporate/VPN CIDRs
  • FinOps visibility: live estimates, cluster-level cost cards, and admin total spend
Roadmap next
  • AI-assisted troubleshooting advisor: explain Terraform, OCI, OKE, IAM, quota, and networking failures before full Gatekeeper automation
  • Cost watcher: idle-cluster detection, anomaly alerts, and right-sizing guidance
  • In-cluster access agent for private-by-default environments with no public OKE API endpoint after bootstrap
  • Policy guardrails: drift detection, Kubernetes lifecycle risk flags, and weekly compliance digests
  • Approval-gated remediation with full audit trail (suggest -> review -> apply)
Pricing

Simple, transparent pricing

Infragate is delivered as a private commercial product. Packaging scales with evaluation scope, production licensing, support response, and operating guarantees.

Prices are listed in EUR. USD invoicing is available on request using the exchange rate agreed at contracting.

Evaluation
€2,500 / 14 days
100% credited on conversion within 30 days

For qualified teams validating Infragate in their own OCI tenancy. Non-production scope, hard 14-day window.

  • Time-limited registry access (revokes at day 14)
  • Guided 60-minute deployment call in your tenancy
  • Email support during the evaluation window (business hours)
  • Evaluation runbook and onboarding checklist
  • Fee credited toward Founding, Business, or Enterprise if you convert within 30 days
  • No production use, redistribution, or managed-service use
Most popular
Business
€3,000 / month
Annual upfront - €36,000 / year

For teams running Infragate in production with self-managed day-2 operations.

  • Commercial & production license for internal and customer-facing environments
  • Email support with 48h response SLA (business hours)
  • Private registry access with versioned, pinned release channel
  • Versioned release channel with stable upgrade path
  • Security advisories - early private notice before public disclosure
  • Onboarding workshop and deployment review
Enterprise
€7,500 / month
6-month minimum - €45,000 upfront

For regulated or mission-critical organizations that require formal operating guarantees and shared responsibility.

  • Everything in Business
  • 6-month minimum contract for high-touch rollout and procurement support
  • 4h response SLA with named support engineer and shared Slack / Teams channel
  • Managed install plus upgrade planning and rollout assistance
  • Multi-tenancy and multiple OCI-tenancy organization scoping
  • Air-gapped / mirrored registry delivery - LTS pinning
  • Compliance support pack: SOC 2 / ISO questionnaires, DPA, and audit-evidence guidance
  • Production incident escalation support and change-advisory guidance
  • Quarterly architecture and FinOps governance reviews
Founding Customer Program - 5 spots - limited

Help shape Infragate. Get in before the rest.

A small group of production teams helping us build the first year of the roadmap. Early-access program with discounted pricing and direct product feedback.

€18,000 first 12 months · paid upfront before access · 5 spots

50% off Business

First-year discount on the €36,000 Business plan. Renewal returns to standard Business pricing.

Direct line to the team

Monthly roadmap calls, private Slack / email with engineering. Your feedback shapes what ships next.

Roadmap v1.1

AI advisor + Gatekeeper roadmap

Near-term scope: read-only troubleshooting explanations for Terraform, OCI, OKE, IAM, quota, and networking failures. Gatekeeper policy, drift, cost watcher, and approval-gated remediation stay on the roadmap for customer-shaped v1.1.

In exchange: monthly feedback calls and the right to publish a sanitized case study. That's it.

Not ready for a commitment? See standard pricing

Questions & answers

The buying questions answered upfront

Short answers for platform teams, security reviewers, and buyers. The deeper implementation details live in the documentation.

What is Infragate?

Infragate by Solvia Lab is an OCI-native Internal Developer Platform for Oracle Kubernetes Engine. It gives platform teams governed self-service provisioning, lifecycle automation, kubeconfig access, BYON networking, approvals, Activity history, and cost visibility inside the customer tenancy.

Where does Infragate run?

Inside your OCI tenancy or customer-managed Kubernetes environment. There is no external SaaS control plane; application services, credentials, logs, and operational data stay inside your boundary.

Does it require public internet access?

Production deployments are designed for VPN-first access. The Infragate runner and approved corporate/VPN CIDRs need network reachability to the OKE API endpoint; public access can stay restricted.

Do engineers need Terraform or OCI Console access?

No. Engineers use the portal for provisioning and day-2 actions. Platform administrators control templates, limits, OCI configuration, approvals, RBAC, protected destroy rules, and audit history.

Can users download kubeconfig?

Yes. Authorized users can download kubeconfig for clusters they are allowed to access. Network reachability still follows your cluster API endpoint design and VPN/private access model.

What does BYON mean?

BYON means bring your own network. Infragate can deploy OKE into existing customer VCN, subnet, route table, security list, and gateway patterns instead of always creating a new network.

Is Infragate production-ready today?

The core OKE lifecycle platform is available today: deploy, scale, upgrade, destroy, kubeconfig access, BYON networking, cost visibility, approvals, Activity history, and admin controls. AI advisor and Gatekeeper-style automation are roadmap items.

How is it delivered?

Customers receive released container images, registry access, Helm values, and deployment runbooks. Infragate is installed into the customer environment rather than consumed as a hosted SaaS service.

Do customers receive source code?

Standard delivery includes released images, Helm deployment assets, documentation, and support. Source code and release automation stay private unless a separate commercial agreement says otherwise.

Read technical docs