Skip to Content
Members OnlyInternalSystem Architecture

Platform Architecture

This document provides a high-level overview of the Quazzar Space platform architecture. It is intended for authorized team members, enterprise customers evaluating the platform, and partners integrating with the system.

Architecture Overview

Quazzar Space follows a multi-tier architecture designed for reliability, scalability, and security.

┌─────────────────────────────────────────────────────────────┐ │ Clients │ │ Dashboard Admin Panel API Consumers │ └────────┬──────────────────┬──────────────────┬──────────────┘ │ │ │ ▼ ▼ ▼ ┌─────────────────────────────────────────────────────────────┐ │ API Gateway / CDN │ │ (TLS termination, WAF, caching) │ └────────────────────────┬────────────────────────────────────┘ ┌────────────────────────▼────────────────────────────────────┐ │ Application Layer │ │ │ │ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────────┐ │ │ │ Auth │ │ Projects │ │ Billing │ │ Integrations │ │ │ │ Module │ │ Module │ │ Module │ │ Module │ │ │ └──────────┘ └──────────┘ └──────────┘ └──────────────┘ │ │ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────────┐ │ │ │ Services │ │ Monitoring│ │Scheduler │ │ AI/Agents │ │ │ │ Module │ │ Module │ │ Module │ │ Module │ │ │ └──────────┘ └──────────┘ └──────────┘ └──────────────┘ │ │ │ │ Service Layer (business logic) │ └───────┬───────────────────────────────────────┬──────────────┘ │ │ ▼ ▼ ┌─────────────────┐ ┌─────────────────────┐ │ Database │ │ Message Broker │ │ (primary + │ │ (clustered) │ │ replicas) │ └──────────┬──────────┘ └─────────────────┘ │ ┌──────────▼──────────┐ │ Background Workers │ │ │ │ Email delivery │ │ Billing sync │ │ Integration sync │ │ Import/Export │ │ Cost calculations │ └──────────────────────┘

Layer Descriptions

API Gateway

The API gateway handles TLS termination, request routing, rate limiting, and Web Application Firewall (WAF) protections. Static assets are served through a CDN for optimal global performance.

Application Layer

The application layer exposes a RESTful API organized into domain modules. Each module handles a specific area of functionality (authentication, projects, billing, etc.) and delegates to the service layer for business logic.

Key characteristics:

  • Stateless request handling for horizontal scalability
  • JWT-based authentication with per-request validation
  • Role-based access control at project, environment, and resource levels
  • Input validation on all endpoints

Service Layer

The service layer contains all business logic, including subscription limit enforcement, permission checks, cost calculations, and integration orchestration. This layer is the boundary between the API and the data layer.

Database Layer

The platform uses a relational database with:

  • Primary instance for all write operations
  • Read replicas for query distribution
  • Encrypted storage for sensitive data (credentials, API tokens, SSH keys)
  • Automatic schema migrations managed as part of the deployment process

Message Broker and Workers

Long-running and scheduled operations are processed asynchronously through a message broker and worker pool:

Job CategoryDescriptionScheduling
Email deliveryTransactional emails (invitations, password resets, alerts)On-demand
Billing synchronizationPayment and invoice data sync with StripeEvery 15 minutes
Integration syncJira, monitoring, and cloud provider synchronization5-30 minutes
Cloud discoveryAuto-discovery of cloud resources from connected accountsOn-demand
Import/ExportAsynchronous processing of bulk data operationsOn-demand
Cost calculationsProvider pricing updates and cost estimationPeriodic

Workers are independently scalable to handle varying workloads without impacting API response times.

Security Architecture

Encryption

LayerProtection
TransportTLS 1.3 for all HTTP traffic
DatabaseAES-256 encryption at rest
SecretsDedicated encryption for stored credentials (SSH keys, API tokens, integration secrets)
PasswordsOne-way hashing with industry-standard algorithms
SessionsCryptographically signed JWT tokens with configurable expiration

Access Control

The platform implements multi-level access control:

  1. Authentication: JWT tokens or API keys required for all API access
  2. Project-level: Owner and Member roles determine project-wide permissions
  3. Environment-level: Administrator, Manager, and Viewer roles for granular environment access
  4. Resource-level: Per-service access grants for project-local users
  5. Admin-level: Separate authentication layer for administrative operations

Audit Trail

All significant actions are recorded in a tamper-resistant audit log, including:

  • Authentication events (login, logout, failed attempts, 2FA changes)
  • Resource lifecycle events (create, update, delete)
  • Permission and role changes
  • Data export and import operations

Deployment Topology

Hosted (SaaS)

The hosted platform runs on a high-availability infrastructure:

  • Multiple availability zones for resilience against datacenter failures
  • Auto-scaling application instances based on request volume
  • Clustered message broker with mirrored queues for job reliability
  • Database replication with automated failover
  • CDN for global static asset delivery
  • Automated backups with point-in-time recovery

On-Premise (Enterprise+)

Enterprise+ customers can deploy the full platform on their own infrastructure. The on-premise deployment mirrors the hosted topology with customer-managed components. See the Enterprise Deployment guide for details.

Regional Deployments

Enterprise customers can specify data residency requirements:

  • US region (default)
  • EU region for GDPR compliance
  • Custom region for specific regulatory needs (Enterprise+)

Monitoring and Observability

The platform exposes health and metrics endpoints:

  • Health check: Quick liveness and readiness verification
  • Detailed health: Component-level status (database, message broker, integrations)
  • Metrics: Request rates, latencies, error rates, and queue depths

These endpoints support integration with your existing monitoring stack (Prometheus, Datadog, etc.).

Next Steps