Cycle offers a refreshing take on container orchestration, enabling teams to spend more time building and less time managing. Deploy applications seamlessly, gain enhanced visibility, and maintain effortless control, all while reducing complexity and technical debt.
Every component of Cycle has been developed in a way that allows automatic updates. With over seven years of building Cycle, and deliverying bi-weekly updates, we've gotten this down to a science. Gone are the days of 6-month release iterations!
From the kernel and operating system, and up the stack to your containers, Cycle ensures all hosts operate in a standardize manner. This approach enables teams to have peace of mind when deploying applications across different providers and hardware setups.
Most container orchestrators require either deep technical knowledge of networking or extra dependencies to support multi-host deployments. With Cycle, everything needed to build global networks is, not only included, but, fully automated and secured from the start.
We understand that being the right partner for our customers requires more than just building great technology. Our team takes a customer-first approach in everything we do, leading to an average response time of just under 3 minutes over the last 4 years.
The first step is building something! Once your application is ready to go, containerize it and push it to an image registry (like Docker Hub) or a git repo. Cycle can work with existing container images, or build them directly from your code.
Utilize Docker, Buildpacks, Buildah, or any other tool that generates OCI-complaint container images. If your application can run on Linux, it can run on Cycle!
Cycle can import images from Docker Hub, any private Docker registry, and OCI-complaint registries such as AWS ECR. Cycle can even build your images directly from your source code by connecting your git repos.
Have many containers that make up your application/service? Use Cycle's stack file to template out everything it needs to run. Cycle stacks are like Helm charts or Docker compose files that describe environments, networks, applications, and more.
Containers are deployed into
environments - globally encrypted
networks that spans one or more providers and/or
on-prem infrastructure (read more). Utilize stacks
and pipelines to fully automate
your workflows, from git push
to dev,
staging, and beyond.
Cycle handles the plumbing for you. Deploy your containers into an environment to seamlessly build globe-spanning networks, with the platform managing ingress and discovery behind the scenes.
Keep as many versions of your application around as you want. Cycle integrates DNS with deployment tags, so switching between versions of your application is a breeze. (read more)
Build robust workflows that can be triggered with a simple POST request. Pipelines automate the 'continuous delivery' portion of CI/CD. Kick the process off from your CI system, and let Cycle build/import images, reimage or redeploy containers, and roll dev (or any other) environment forward to the bleeding edge.
Ready to go to prod? Kick off a production-geared pipeline and let the platform handle the rest.
Use Cycle's sensible defaults, or customize your containers to run exactly how you need. The platform comes with all the knobs and levers to fine tune your application's runtime and resources.
Achieve high-density infrastructure utilization with clusters. Environments in the same cluster utilize the same underlying infrastructure, but are completely isolated on a network level, achieving secure, isolated workloads without wasting resources. Need more density? Adjust the overcommit ratio to pack more onto every node.
Environment-level scoped variables give containers access to shared configurations and secrets. Go a step further and integrate with Cycle's Internal API for extremely secure access to sensitive data.
Cycle fully supports stateful workloads. Easily configure host volumes, set up remote access with SFTP, and automate offsite backups from a single pane of glass. Even sync data between instances with shared host directories.
With fully customized role-based access controls and per-resource ACLs, you define who can see and change critical pieces of your system.
You own it, Cycle manages it. Deploy infrastructure via Cycle to your accounts at AWS, GCP, etc, or connect on-prem servers with Cycle's Infrastructure Abstraction Layer (IAL). Scale up and down automatically based on container-defined criteria.
Define scale criteria on a per-container basis with CPU, memory, and network thresholds. When containers hit the thresholds, Cycle will scale container instances up until more infrastructure is needed. At that point, Cycle will pull from 'auto-scale groups' - predefined infrastructure that can be deployed during heavy load.
Utilize function containers for on-demand processing as requests pour in. Function containers operate along-side your existing applications on the same network, giving you ultimate flexibility in how your applications are built. Pre-provision any number of instances so they start in a fraction of a second. (read more)
If you don't know about it, you can't fix it. Cycle natively collects detailed telemetry, so that when something goes wrong, you know exactly what happened. The platform also provides an integrated security suite, with 24/7 vigilance against bad actors.
Cycle goes the extra mile on telemetry data. Of course basics like container CPU, memory, and networking are covered. However, the platform also collects telemetry on overall cluster health, per-environment network traffic, and with Cycle's native load balancer, detailed metrics on what URLs are being hit, where traffic is being routed, and tons more.
Need more granular data? Instruct Cycle to send the raw data off-site using outbound webhooks for ultimate control. Cycle even gives the ability to mount the host /proc directory, so you can utilize third-party monitoring agents.
In addition to activity logs, custom ACLs and role-based access controls, Cycle monitors networks for suspicious activity. Unauthorized SSH attempts? High priority security alert. Someone attempting to brute-force their way into an SFTP-enabled volume? Cycle will lock it down temporarily to protect your data. All this and more are built in and enabled for you by default.
Say goodbye to complexity and technical debt, and welcome a future where container orchestration is no longer an added stress.
Far too many companies have been falsely convinced they have the same technical requirements as Google and Amazon. Instead of utilizing solutions that solve the issues that matter most, companies are adopting evergrowing technical stacks that delay progress more than accelerate it.
Instead of chasing hype and trying to solve an infinite number of problems, we at Cycle have doubled-down on building a solid foundation that addresses the problems that really matter.