Platform Architecture
This document provides a high-level overview of the Quazzar Space platform architecture. It is intended for authorized team members, enterprise customers evaluating the platform, and partners integrating with the system.
Architecture Overview
Quazzar Space follows a multi-tier architecture designed for reliability, scalability, and security.
┌─────────────────────────────────────────────────────────────┐
│ Clients │
│ Dashboard Admin Panel API Consumers │
└────────┬──────────────────┬──────────────────┬──────────────┘
│ │ │
▼ ▼ ▼
┌─────────────────────────────────────────────────────────────┐
│ API Gateway / CDN │
│ (TLS termination, WAF, caching) │
└────────────────────────┬────────────────────────────────────┘
│
┌────────────────────────▼────────────────────────────────────┐
│ Application Layer │
│ │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────────┐ │
│ │ Auth │ │ Projects │ │ Billing │ │ Integrations │ │
│ │ Module │ │ Module │ │ Module │ │ Module │ │
│ └──────────┘ └──────────┘ └──────────┘ └──────────────┘ │
│ ┌──────────┐ ┌──────────┐ ┌──────────┐ ┌──────────────┐ │
│ │ Services │ │ Monitoring│ │Scheduler │ │ AI/Agents │ │
│ │ Module │ │ Module │ │ Module │ │ Module │ │
│ └──────────┘ └──────────┘ └──────────┘ └──────────────┘ │
│ │
│ Service Layer (business logic) │
└───────┬───────────────────────────────────────┬──────────────┘
│ │
▼ ▼
┌─────────────────┐ ┌─────────────────────┐
│ Database │ │ Message Broker │
│ (primary + │ │ (clustered) │
│ replicas) │ └──────────┬──────────┘
└─────────────────┘ │
┌──────────▼──────────┐
│ Background Workers │
│ │
│ Email delivery │
│ Billing sync │
│ Integration sync │
│ Import/Export │
│ Cost calculations │
└──────────────────────┘Layer Descriptions
API Gateway
The API gateway handles TLS termination, request routing, rate limiting, and Web Application Firewall (WAF) protections. Static assets are served through a CDN for optimal global performance.
Application Layer
The application layer exposes a RESTful API organized into domain modules. Each module handles a specific area of functionality (authentication, projects, billing, etc.) and delegates to the service layer for business logic.
Key characteristics:
- Stateless request handling for horizontal scalability
- JWT-based authentication with per-request validation
- Role-based access control at project, environment, and resource levels
- Input validation on all endpoints
Service Layer
The service layer contains all business logic, including subscription limit enforcement, permission checks, cost calculations, and integration orchestration. This layer is the boundary between the API and the data layer.
Database Layer
The platform uses a relational database with:
- Primary instance for all write operations
- Read replicas for query distribution
- Encrypted storage for sensitive data (credentials, API tokens, SSH keys)
- Automatic schema migrations managed as part of the deployment process
Message Broker and Workers
Long-running and scheduled operations are processed asynchronously through a message broker and worker pool:
| Job Category | Description | Scheduling |
|---|---|---|
| Email delivery | Transactional emails (invitations, password resets, alerts) | On-demand |
| Billing synchronization | Payment and invoice data sync with Stripe | Every 15 minutes |
| Integration sync | Jira, monitoring, and cloud provider synchronization | 5-30 minutes |
| Cloud discovery | Auto-discovery of cloud resources from connected accounts | On-demand |
| Import/Export | Asynchronous processing of bulk data operations | On-demand |
| Cost calculations | Provider pricing updates and cost estimation | Periodic |
Workers are independently scalable to handle varying workloads without impacting API response times.
Security Architecture
Encryption
| Layer | Protection |
|---|---|
| Transport | TLS 1.3 for all HTTP traffic |
| Database | AES-256 encryption at rest |
| Secrets | Dedicated encryption for stored credentials (SSH keys, API tokens, integration secrets) |
| Passwords | One-way hashing with industry-standard algorithms |
| Sessions | Cryptographically signed JWT tokens with configurable expiration |
Access Control
The platform implements multi-level access control:
- Authentication: JWT tokens or API keys required for all API access
- Project-level: Owner and Member roles determine project-wide permissions
- Environment-level: Administrator, Manager, and Viewer roles for granular environment access
- Resource-level: Per-service access grants for project-local users
- Admin-level: Separate authentication layer for administrative operations
Audit Trail
All significant actions are recorded in a tamper-resistant audit log, including:
- Authentication events (login, logout, failed attempts, 2FA changes)
- Resource lifecycle events (create, update, delete)
- Permission and role changes
- Data export and import operations
Deployment Topology
Hosted (SaaS)
The hosted platform runs on a high-availability infrastructure:
- Multiple availability zones for resilience against datacenter failures
- Auto-scaling application instances based on request volume
- Clustered message broker with mirrored queues for job reliability
- Database replication with automated failover
- CDN for global static asset delivery
- Automated backups with point-in-time recovery
On-Premise (Enterprise+)
Enterprise+ customers can deploy the full platform on their own infrastructure. The on-premise deployment mirrors the hosted topology with customer-managed components. See the Enterprise Deployment guide for details.
Regional Deployments
Enterprise customers can specify data residency requirements:
- US region (default)
- EU region for GDPR compliance
- Custom region for specific regulatory needs (Enterprise+)
Monitoring and Observability
The platform exposes health and metrics endpoints:
- Health check: Quick liveness and readiness verification
- Detailed health: Component-level status (database, message broker, integrations)
- Metrics: Request rates, latencies, error rates, and queue depths
These endpoints support integration with your existing monitoring stack (Prometheus, Datadog, etc.).
Next Steps
- Troubleshooting — Common issues and solutions
- Enterprise Deployment — On-premise setup guide
- Custom Integrations — Build integrations with the platform