- Truefoundry Managed SAAS
- Truefoundry Managed Gateway with data storage on your own infrastructure.
- Gateway Plane and Data Storage on your own infrastructure.
- Control Plane, Gateway Plane and Data Storage on your own infrastructure.
Option 1: Truefoundry Managed SAAS
This is a fully managed solution on Truefoundry’s secure cloud infrastructure with enterprise-grade features.
Truefoundry Managed SAAS
- Globally distributed gateway to minimize latency: Truefoundry gateway is deployed in multiple regions of the world across multiple zones and multiple cloud providers to provide low latency and high availability.

- Zero Overhead of maintenance: There is no overhead of maintaining infrastructure and you can get access to the latest features and improvements.
- Data is encrypted at rest and in transit.
- Truefoundry Infrastructure is SOC2, ISO27001, GDPR, and HIPAA compliant
Option 2: Truefoundry Managed Gateway with data storage on your own infrastructure.
In this case, the gateway and control-plane are managed by Truefoundry on its own infrastructure, but the LLM data is stored on your own infrastructure.
Truefoundry Managed Gateway with data storage on your own infrastructure
- No Infrastructure Management: In this case, the gateway is globally distributed, available and fully managed by Truefoundry. You just need to provide the blob storage(AWS S3 Bucket, or GCS Bucket or Azure Blob Storage or any other S3 compatible storage) and the control-plane will use it to store the LLM data.
- You retain data ownership: You retain full ownership of the request-response data since the its stored on a bucket on your end. The data are stored in parquet format - so you can use them for analytics, debugging and evaluation via Spark, DuckDB, Athena or any tool of your choice.
Option 3: Gateway Plane and Data Storage on your own infrastructure.
In this case, the gateway and the data storage are hosted on your own infrastructure. The gateway exports the request-response data to the ingestion server which then stores the data in your own blob storage. The control-plane stores the metrics and has access to the bucket containing the request-response data.
Gateway Plane and Data Storage on your own infrastructure
- LLM Traffic stays within your own premises: All LLM traffic stays within your own infrastructure and Truefoundry doesn’t come into the live path of a request to LLM.
- You retain full control over your data: You retain full ownership of the request-response data since the its stored on a bucket on your end. The data are stored in parquet format - so you can use them for analytics, debugging and evaluation via Spark, DuckDB, Athena or any tool of your choice.
- Management of Gateway and Ingestion Service: The gateway and ingestion service availability needs to be managed on your end. In case you are operating in multiple regions, you will need to deploy the gateway in multiple regions. (The Ingestion service doesn’t need to be deployed in all regions.)
- Truefoundry control plane has access to the bucket containing the data: This access helps you browse the request logs on the truefoundry dashboard.
Option 4: Control Plane, Gateway Plane and Data Storage on your own infrastructure.
In this case, everything except the authentication/licensing server, everything is hosted on your own infrastructure.
Control Plane, Gateway Plane and Data Storage on your own infrastructure
Frequently Asked Questions
What deployment modes are available?
What deployment modes are available?
Can I install only the LLM Gateway?
Can I install only the LLM Gateway?
Is there feature parity between SaaS and on-prem versions?
Is there feature parity between SaaS and on-prem versions?
What are the SLAs and support tiers?
What are the SLAs and support tiers?
Do you support only PostgreSQL or MySQL as well?
Do you support only PostgreSQL or MySQL as well?
Are upgrades zero downtime (canary or blue-green)?
Are upgrades zero downtime (canary or blue-green)?
How frequently are updates released?
How frequently are updates released?
What ports does Gateway use?
What ports does Gateway use?
Do customers need to configure NATS?
Do customers need to configure NATS?
Does the gateway enforce runtime hardening (signed containers, vulnerability scanning, mTLS)?
Does the gateway enforce runtime hardening (signed containers, vulnerability scanning, mTLS)?