Skip to content

Architecture

Naburis is a product-agnostic infrastructure foundation built on a modular architecture. It provides shared services that any number of product applications can integrate with — without the platform depending on the specifics of what those products do.


PrincipleDescription
Product AgnosticThe platform is independent of product-specific logic
Modular ProductsProducts are self-contained units with declared contracts
Convention over ConfigurationStandard interfaces and paths reduce boilerplate
Observability FirstEvery component is monitored, logged, and alertable by default
Security by DefaultTLS everywhere, OIDC for authentication, and deny-by-default authorization
Efficient FootprintOptimized for high-density deployments

Naburis provides shared infrastructure organized into three layers:

CapabilityDescription
Relational StorageShared database with geospatial and vector search extensions
Identity ProviderCentralized OIDC authentication with per-organization tenant isolation
Caching & QueuingIn-memory caching, rate limiting, and event streaming with per-product isolation
Object StorageS3-compatible storage for archives, backups, and application data
Reverse ProxyAutomatic TLS, edge rate limiting, security headers, and request routing
CapabilityDescription
MetricsCollection, recording rules, and threshold alerting
DashboardsVisualization with SSO integration
Log AggregationCentralized log collection and querying
Alert RoutingGrouping, deduplication, and notification delivery

Each product provides its own services and integrates with the platform via declared contracts. Products remain independently deployable while sharing platform infrastructure.


All traffic enters through the edge layer with automatic TLS and rate limiting. Platform services handle identity, billing, metering, and observability. Products integrate with shared infrastructure while maintaining isolated internal topologies.


Products integrate with the platform through a standard contract:

  1. Network attachment — Access shared storage, caching, and identity services
  2. Manifest declaration — Register pricing tiers, health checks, domains, and resource requirements
  3. Route configuration — Define public-facing endpoints
  4. Usage reporting — Expose metrics for per-customer metering and billing

This ensures each product remains independently deployable while sharing authentication, billing, observability, and data infrastructure.


LayerControl
TLSAutomatic certificate management for all endpoints
AuthenticationOIDC-based authentication for all UIs and APIs
AuthorizationPer-product scopes and roles with deny-by-default policy
SecretsEncrypted at rest, not stored in version control
ScanningContainer images scanned for vulnerabilities before deployment
PolicyInfrastructure-as-code with policy-gated deployments

See Security & Trust for the full security posture.