Skip to content

Architecture Overview

Layered Design

The platform uses a layered architecture to separate concerns and maintain clarity in responsibilities. Each layer provides defined services and exposes controlled interfaces. This allows components to evolve independently while ensuring governance and auditability across the system.


Execution Flow

The platform executes data processing in a sequence of controlled steps. Each step is defined through metadata and audited for traceability.

  1. Plan — Job, connector, model, and rule definitions are stored in the metadata service. These objects are versioned for reproducibility.
  2. Schedule — The scheduler emits run requests based on defined triggers or SLAs. The orchestrator builds execution DAGs, manages dependencies, and applies retry policies.
  3. Connect — Connector adapters load credentials from the secrets vault and establish secure links to source systems through VPN or private link.
  4. Ingest — Ingestion runners extract data into landing storage (bronze). Logs are collected through the observability stack, and run details are written to the audit service.
  5. Standardize — Standardization services apply typing, deduplication, and business key alignment. Outputs are stored as standardized datasets (silver).
  6. Model — The model builder generates Golden Data Point (GDP) schemas and star models (gold). Lineage is recorded in the catalogue.
  7. Quality — Data quality rules are applied. Failures trigger events on the message bus and are logged in the audit service.
  8. Anomaly — The anomaly engine computes statistical or rule-based signals. Results are available for consumption or further processing.
  9. Assemble Insights (optional) — Metadata-bound prompt templates are combined with anomaly results to generate controlled narratives.
  10. Serve — Dashboards, reports, APIs, and scheduled exports deliver outputs to consumers.
  11. Observe — Logs, metrics, and traces are aggregated in the observability stack for operations monitoring.
  12. Access Control — Authentication, authorization, and tenant isolation are enforced across all interactions.

This sequence ensures data flows from source systems to executive consumption in a repeatable, governed manner. Control flows and audit trails are embedded throughout the process.


Diagram D1 — Execution Flow (Sequence)