Skip to main content
Ona uses a two-plane architecture that separates coordination from execution. This page explains what each plane does, why they’re separated, and what data flows between them.

Two planes

Management Plane

Hosted by Ona. Handles coordination, identity, and configuration:
  • Authentication and identity
  • Organization management
  • Guardrail enforcement
  • Runner coordination
  • Dashboard and API

Runners

Run on Ona Cloud or in your own infrastructure (AWS, GCP). Handle everything that touches your code:
  • Environment provisioning
  • Source code access
  • Secret injection
  • Agent execution
  • Build and test execution

Why the split

The separation exists for three reasons: Data sovereignty. Your source code and SCM credentials are handled by runners, not the management plane. With a self-hosted runner, all sensitive assets stay in your VPC. With Ona Cloud, code runs on Ona-managed infrastructure separate from the management plane. You choose the trade-off between convenience and control. Compliance. Audit logs track every action. Guardrails are defined centrally and enforced at the runner level. The management plane sets the rules; runners enforce them during execution. Flexibility. You can deploy runners in different regions and cloud providers. Each runner can have different environment classes with different compute specs. The management plane coordinates across all of them.

Data flow

The diagram below shows what stays in each plane: Data flow between planes

Next steps