Skip to main content
This is Step 1 - You need a cluster before deploying applications. This takes about 30 minutes and only needs to be done once.

Why Create a Cluster First?

Your Kubernetes cluster is the foundation where all your applications, databases, and services will run. Qovery handles all the complexity:

Infrastructure Management

Kubernetes installation, configuration, and upgrades

Networking & Security

Load balancing, SSL/TLS certificates, and secure networking

Auto-Scaling

Automatic scaling based on traffic and resource usage

Monitoring & Logging

Built-in observability and log aggregation
After creating your cluster, return to your use case guide:

Choose Your Cloud Provider

Select where you want Qovery to create your managed Kubernetes cluster:

What You’ll Get

Your cluster will be created using your cloud provider’s managed Kubernetes service:
  • AWS: Elastic Kubernetes Service (EKS)
  • GCP: Google Kubernetes Engine (GKE)
  • Azure: Azure Kubernetes Service (AKS)
  • Scaleway: Kapsule Kubernetes
Qovery automatically configures:
  • Latest stable Kubernetes version
  • Multi-node setup for high availability
  • Automatic updates and patches
  • Optimized configurations for production
Complete networking infrastructure:
  • VPC/VNet: Isolated network for your resources
  • Load Balancers: Automatic traffic distribution
  • NAT Gateways: Secure outbound connectivity
  • Security Groups: Firewall rules and access control
  • SSL/TLS Certificates: Automatic HTTPS encryption
  • Custom Domains: Support for your own domains
Built-in scalability and reliability:
  • Node Auto-Scaling: Automatically add/remove cluster nodes based on demand
  • Multi-Availability Zones: Resources distributed across multiple data centers
  • Pod Auto-Scaling: Scale applications based on CPU/memory usage
  • Health Checks: Automatic failure detection and recovery
  • Zero-Downtime Updates: Deploy without service interruption
Enterprise-grade security:
  • Private Container Registry: Secure image storage
  • Secrets Management: Encrypted environment variables
  • Network Isolation: Private subnets and security groups
  • Role-Based Access Control (RBAC): Team permissions management
  • Audit Logs: Track all infrastructure changes
  • Encryption: Data encrypted at rest and in transit
Complete observability:
  • Real-Time Logs: Application and infrastructure logs
  • Metrics & Dashboards: CPU, memory, network usage
  • Deployment History: Track all changes and rollbacks
  • Build Logs: Complete CI/CD pipeline visibility
  • Alerting: Optional integration with Datadog, Grafana

What’s Next?

Important: Cluster creation is just Step 1. After your cluster is ready, you must return to your use case guide to complete the setup.