Hathora Platform
Hathora (huh•THOR•uh) is a compute aggregator. Instead of renting out our own hardware, Hathora provides a single interface to manage compute resources across many providers.
Hathora's compute aggregation
Different providers specialize in different areas. Hathora helps you combine them so you have access to broader options while the platform handles the complexity.
Varied node types
Access more instance types powered with the combined capacity of all providers.
Regional coverage
Reach users globally and meet regional compliance requirements.
Cost flexibility
Combine existing on-prem with on-demand. Bare metal with free egress and 70% discounts on compute.
How it works under the hood
Hathora generalizes many core cloud features to work across multiple vendors:
Vendor example
Vendor agnostic
Compute
CPUs and GPUs globally
AWS EC2
• Cost effective monthly reservations
• Elastic on demand compute
• On-prem hardware
Provisioning
Hardware enrollment
EC2 AMIs
• 80MB container native OS
• Boots in <10 seconds
• Self registers into Hathora's control plane
Scheduling
Orchestrating custom workloads
AWS EKS
• Container interface
• Modern runtime configuration
• Priority based scheduling
Regions
Data centers
E.g. us-east-1
• Unified regions mapping
• Global availability across 14+ region
• E.g. Chicago, Singapore, etc.
Instance families
Types of compute
E.g. c5g
• Unified instance family mapping
• AMD CPUs, Intel CPUs
• Varied GPU/Memory ratios
Private networking
Internal service communication
AWS VPC
• Peer-to-peer node networking mesh
• Automatic node discovery
• Private, encrypted traffic via WireGuard
Autoscaling
Demand driven VM (de)provisioning
AWS Karpenter
• Node groups via Fleets
• Workload-based resource requests
• Multi-provider provisioning API integration
Public networking
Layer 7 (HTTP) ingress
AWS ALB
• Multi region edge load balancers
• Automatic target (de)registration
• Latency optimized target routing
Storage
Persistent data access
S3
• S3 compatible interface
• Multi-region presence
• Free high throughput data transfer
Security
Access and permissions
AWS IAM
• Role-based access control 5 tokens
• Network firewalls and DDoS protection
• Zero-downtime key rotations
Observability
Metrics and monitoring
CloudWatch
• Unified metrics, events, and logs/metrics
• Prometheus-compatible export
• Node health and metrics
Join our community