Skip to main content

Hybrid Self-Hosted

In the Hybrid delivery model, you run only the Serval worker inside your own infrastructure. Serval operates the rest of the platform — the backend application services, the control plane, the web app, and the application database — in Serval Cloud. Your worker is the only Serval component that ever touches your internal network or handles your integration credentials.
This is usually the right starting point. Hybrid has the smallest footprint, the fastest setup, and still gives you (a) integration-credential isolation and (b) the ability for Serval to automate against resources on your private network.

Why teams pick Hybrid

  • Smallest footprint of the three self-hosting options.
  • Fastest to stand up — usually hours, not days.
  • Integration credentials (OAuth secrets, API keys, service-account JSONs for your internal tools) live on the worker host and are never shared with Serval.
  • Reach private systems — the worker can talk to on-prem Active Directory, self-hosted GitLab, internal APIs, and internal databases without opening them to the public internet. See Private Network Access.
  • Minimal ops burden — Serval owns operations for the backend and control plane. Your team only owns the worker host.

What runs where

ComponentWhere it runsWho operates it
Serval workerA Linux host you provideYou (host and OS); Serval (the worker process itself, via auto-update)
Backend application servicesServal CloudServal
Web applicationServal CloudServal
Application database (users, workflows, tickets, knowledge base)Serval CloudServal
Integration credentialsYour worker hostYou

Where your data lives

  • Application data — users, tickets, workflow definitions, knowledge base content — lives in Serval Cloud. If you need application data in your own environment, pick Serval-Managed in Your AWS or Self-Managed on Your Kubernetes instead.
  • Integration credentials live on the worker host. Serval’s backend sends the worker a signed request describing “make this API call to this integration”; the worker substitutes the credential at call time and returns the result. The credential itself never leaves the worker.
  • Payloads returned from integration calls — for example, a user record read from your internal API — flow back through the worker to the Serval Cloud backend. If those payloads must also stay inside your network, pick a fully self-hosted model.

Prerequisites

  • A Linux host you control (x86_64). A VM or container host is fine; bare metal is fine.
  • 2 CPU cores, 4 GB RAM, 10 GB free disk at minimum.
  • Outbound HTTPS from the worker host to the Serval Cloud control plane (public.api.serval.com) and to the Serval image registry (public.ecr.aws).
  • Network access from the worker host to every internal system you want Serval to reach — AD, internal GitLab, internal APIs, internal databases. See Private Network Access for specifics.
  • Ability to run an install command on the host (the exact commands are in our password-protected deployment docs).

When to choose Hybrid vs. the fully self-hosted options

You care most about…Pick…
Smallest setup and fastest time-to-valueHybrid
Keeping integration credentials out of Serval CloudHybrid (also true for both fully self-hosted options)
Serval automating against resources on your private networkHybrid (also possible with either fully self-hosted option)
Keeping all application data — users, tickets, knowledge — in your own environmentServal-Managed in Your AWS or Self-Managed on Your Kubernetes
Not running anything in your own infrastructureServal Cloud (not self-hosted)

Next steps

Compare all three models

See Hybrid side-by-side with the two fully self-hosted options.

Private network access

How the worker reaches resources on your internal network.

Deployment instructions

Worker install, configuration, and operations — shared with customers during onboarding.

Talk to Sales

Start a Hybrid deployment.