Silo deployment
Some customers — typically banks, healthcare, defence — have contractual or regulatory requirements that forbid sharing AWS accounts with other tenants. The silo plan tier provisions a dedicated AWS sub-account with its own RDS, OpenSearch Serverless, ECS service, ALB, and KMS key for a single workspace.
What you get
- Dedicated RDS Postgres instance — no shared database, no row-level security cohabitation.
- Dedicated OpenSearch Serverless collection for the vector index.
- Dedicated ECS Fargate service running the gigamcp API + MCP server containers.
- Dedicated ALB with your custom domain and a customer-managed KMS key.
- A cross-account IAM role giving the gigamcp on-call team read-only access (CloudWatch logs + describe APIs) so we can support you. No write access without your explicit approval.
What it does NOT change
- The control plane (signup, billing, identity broker) still runs in our shared account. Silo isolates the data plane.
- The product surface is identical — same UI, same MCP server, same connectors. Migrations and feature releases ship to the silo on the same cadence as shared.
- Auth (WorkOS) is still our identity broker; the silo does not change the SSO setup steps.
Cost & pricing
Silo carries a fixed AWS infrastructure premium plus a managed-service fee. Talk to your CSM for current numbers; the AWS bill alone runs ~ $1.5k–4k / month depending on active-user count. We charge a single all-in monthly fee.
Process
- Sign the silo addendum to your MSA.
- Send us your preferred AWS region (eu-west-1, eu-central-1, us-east-1 supported by default; other regions on request).
- Our SRE team:
- Bootstraps a new AWS sub-account under the gigamcp organisation.
- Applies the
silo-tenantTerraform module (~25 minutes for first apply). - Migrates your data from the shared pool using
scripts/silo-data-migration.sh— about 60 minutes of read-only maintenance window for a typical 10-GB Postgres. - Cuts the custom domain DNS over to the silo ALB (5 minutes propagation).
- Flips your tenant's
deployment_tiercolumn fromsharedtosilo; from this point all reads / writes hit the silo.
- Verification window — we run smoke tests on the new deployment and you confirm the data parity sample. Total downtime: usually under 90 minutes.
Operations runbook
Internal-only. See docs/15-SILO-UPGRADE.mdin the gigamcp repo for the full procedure including rollback steps. Customers don't need to read this; it's the SRE's reference.
Audit + observability
- CloudWatch logs + metrics live in your sub-account. We publish to your account and forward a copy to our central observability stack via cross-account read.
- The audit-stream feature continues to work; events from a silo deployment are tagged with
deploymentTier: silofor downstream filtering.
Rollback
Silo migrations are reversible up to 7 days post-cutover; we keep a paused replica of the shared-pool snapshot for that window. After 7 days the shared rows are purged. Talk to your CSM before T+7 if you need to roll back.