What Is an Agentic Data Plane?
An agentic data plane is the execution layer for AI agents. It’s everything that actually does the work an agent is asked to do: routing prompts to models, executing tool calls, reading from databases, writing to APIs, and streaming results back. It’s distinct from the agentic control plane, which decides whether an action is allowed and records what happened. In production AI infrastructure, you need both.
The Short Version
In classical networking and cloud infrastructure, the “data plane” moves packets, processes queries, and handles real-time traffic. The “control plane” configures policy, distributes routing tables, and coordinates state. Both planes exist in every serious system because they’re load-bearing in different ways.
AI agent infrastructure is evolving into the same split:
- Agentic data plane → executes actions. LLM calls, tool invocations, context management, streaming responses, orchestration between agents.
- Agentic control plane → governs actions. Identity verification, policy enforcement, content safety, budget caps, audit emission.
If you’ve ever wondered why your “simple” agent deployment feels fragile — why governance is hard to enforce, why audit trails are incomplete, why different agents have inconsistent security — the reason is almost always that you’ve built both planes in the same codebase, tangled together.
What a Data Plane Does (Concretely)
The agentic data plane is responsible for:
LLM routing and model selection. Choosing which provider gets the prompt (OpenAI, Anthropic, Google, a local model), handling failover, optimizing for cost or latency, applying prompt templates. This is the work of products like LiteLLM, Portkey, OpenRouter, and LLM gateways.
Tool execution. When the model emits a tool_use block, something has to actually run the tool — make the HTTP request, execute the database query, read the file. MCP servers, agent frameworks (LangChain, LangGraph, CrewAI, AutoGen), and custom tool dispatchers all live here.
Context management. Building the prompt, retrieving relevant documents (RAG), maintaining conversation history, managing memory across turns. Vector databases, retrievers, and memory systems are data-plane components.
Response streaming. Delivering the model’s tokens to the end user or to the next agent in a chain, without buffering the full response.
Orchestration and workflow. Multi-step agent flows, chain-of-thought, sub-agent coordination, handoffs. A LangGraph supervisor-and-workers pattern, a CrewAI crew, an OpenAI Agents SDK handoff — these are all data-plane orchestration patterns.
What the data plane does not decide: whether the action should be allowed, who’s responsible, whether the data crossing it is sensitive, or whether the right user’s identity is attached. Those are control-plane questions.
Why the Split Matters
Three reasons.
1. Governance gets enforced inconsistently if every data-plane product owns its own policy.
If your LangChain deployment has its own allow-list, your MCP server has another one, and your custom workflow tool has a third, then you have three places to keep in sync. The moment an engineer adds a new integration, that integration either re-implements policy or skips it. That’s how production AI systems end up with “the Claude instance has audit but the Cursor instance doesn’t.”
A dedicated control plane solves this by living at the trust boundary between the data plane and your real backend systems. Every data-plane execution path — whether it’s LangGraph, CrewAI, Claude Desktop, or a hand-rolled Python script — flows through the same governance pipeline.
2. Audit evidence is useless if it’s per-tool and per-framework.
SOC 2 auditors, HIPAA compliance reviewers, and EU AI Act Article 14 assessors don’t want to log into five different observability tools. They want one evidence trail per user action, showing who did what, with what authorization, when, and whether any policy layer denied anything.
A data-plane-only architecture produces fragmented audit. A control-plane architecture produces unified AI agent audit trails.
3. Agent-to-agent delegation requires both planes to coordinate.
When agent A delegates to agent B, the data plane handles the transport (the MCP call, the handoff, the A2A protocol exchange). But “can agent B actually do this on behalf of the human who started agent A?” is a control-plane question — and a hard one. It requires delegation chain primitives with scope intersection, budget propagation, and cycle detection. See agent-to-agent governance for the ACP approach.
The Agentic Data Plane Ecosystem
Common Agentic Data Plane Products
| Category | Examples |
|---|---|
| LLM gateways | LiteLLM, Portkey, OpenRouter, Kong AI Gateway |
| Agent frameworks | LangChain, LangGraph, CrewAI, OpenAI Agents SDK, Anthropic Agent SDK, AutoGen |
| MCP servers / clients | Claude Desktop, Cursor, Claude Code, Cline, Codex CLI, custom MCP servers |
| Vector DBs / retrievers | Pinecone, Weaviate, Chroma, pgvector |
| Orchestration runtimes | Temporal, Airflow, custom state machines |
These are all valuable — and all data-plane. None of them is a substitute for control-plane governance. Agentic Control Plane is designed to govern any data plane without replacing it.
How the Two Planes Interact
Every action in a production AI system crosses the boundary between the two planes twice:
- Data plane decides to do something — e.g., the agent emits
tool_use: { name: "database.query", input: { sql: "..." } }. - Control plane evaluates — is the caller identified? Is this tool in scope? Is the SQL within policy? Is the user within budget? Does any PII need to be redacted?
- Control plane returns allow/deny/transform — with a reason.
- Data plane executes (if allowed) or surfaces the denial (if not).
- Control plane emits audit — the record of what happened, with full identity and policy context.
Think of the control plane as the clerk at the bank counter. The data plane is the parrot with the account number. The parrot repeats what it heard; the clerk verifies who actually asked before letting anything move. See the Three-Party Problem explainer for why this pattern is foundational.
Data Plane vs Control Plane — Side by Side
| Agentic Data Plane | Agentic Control Plane | |
|---|---|---|
| Primary job | Execute actions | Govern actions |
| Owns | Model calls, tool execution, streaming, orchestration | Identity, policy, audit, budget, safety |
| Examples | LangChain, CrewAI, Portkey, MCP servers | ACP, Astrix, Aembit-style NHI platforms |
| Failure mode if missing | Nothing happens | Everything happens unsafely |
| Auditable | Usually per-product | Unified across all data planes |
| Scales via | Horizontal replicas, caching, model-routing | Central policy + distributed enforcement |
When You Need a Dedicated Data Plane
Most teams start with an implicit data plane — whatever framework they picked. That’s fine for prototypes. The signals that you need to start treating the data plane as a first-class layer:
- You’re running more than one LLM provider and need failover or cost routing
- You have more than one MCP server or agent framework in production
- You need to swap models without code changes
- You want centralized observability across multiple orchestration products
- You need to scale the tool-execution layer independently of the governance layer
If any two of those apply, consider a dedicated LLM gateway or MCP proxy for the data plane. Then put a control plane in front of it so the governance layer is consistent regardless of which data-plane product you use.
Related Reading
- Agentic Data Plane vs Agentic Control Plane — the deeper comparison
- Why API Gateways Don’t Solve AI Governance — why a traditional data-plane tool isn’t enough
- MCP Gateway Comparison — the MCP-specific data-plane landscape
- What is an Agentic Control Plane? — the governance counterpart
- Reference Architecture — how GatewayStack sits at the data-plane/control-plane boundary
FAQ
Is an agentic data plane the same as an LLM gateway? Close but not identical. An LLM gateway is one component of the agentic data plane — the part that routes and manages model calls. The data plane also includes tool execution, context management, and orchestration, none of which an LLM gateway typically handles.
Can I have a control plane without a data plane? No. The data plane is where execution happens. A control plane alone has nothing to govern. What you can have is the data plane tangled into application code (most startups) vs a dedicated data-plane product (most scaled teams).
Is MCP a data plane or a control plane? MCP is a protocol specification that describes how clients and servers expose and invoke tools. Most MCP deployments are data-plane components — they execute tool calls. A control plane can sit in front of MCP servers (see MCP control plane and MCP audit gap) to enforce governance.
Is CrewAI a data plane? Yes. CrewAI is an agent framework — it orchestrates LLM calls, tool invocations, and multi-agent handoffs. It’s a data-plane component. Governance layers on top via the control plane.
Does my team need both planes from day one? No. Early-stage projects usually conflate them — the agent framework plays both roles. The moment you hit production scale, regulated industries, multi-framework deployments, or need for agent-to-agent governance, splitting them out becomes high-leverage.
What’s the difference between an agentic data plane and an AI gateway? “AI gateway” is a marketing term that usually refers to an LLM-routing product (Portkey, Kong AI Gateway, NeuralTrust, LiteLLM). AI gateways are a subset of data-plane capability — they handle model routing and some safety features, but don’t typically handle tool execution, agent orchestration, or agent-to-agent delegation. They also don’t handle identity attribution or delegation-chain governance.
How does this relate to the Forrester Agent Control Plane market evaluation? Forrester’s upcoming market evaluation is focused on the agent control plane — the governance layer, not the execution layer. Agentic data plane products (frameworks, LLM gateways, MCP runtimes) may be adjacent but aren’t the same category.