SettleMint
ArchitectureOverview

Deployment topology

Client-facing deployment topology for DALP, covering runtime zones, network responsibility lines, EVM access, custody and data dependencies, operator ownership, and the recovery points used for HA and DR planning.

DALP deployments separate operator access, backend execution, durable workflow state, data storage, custody integration, and EVM network access. This page helps infrastructure, security, and operations teams decide where DALP fits in their environment.

For installation steps, use Self-hosting. This page is the architecture view.

Deployment terms

TermMeaning in DALP architecture
SaaSSettleMint operates the DALP application runtime and shared platform services for the client under the agreed service model.
Managed deploymentSettleMint operates a client-specific DALP environment while the client still governs business roles, custody, and networks.
Customer-hostedThe client operates the DALP runtime in its own cloud, Kubernetes, OpenShift, or data-centre environment.
Air-gappedA customer-hosted environment with no routine public internet path; external dependencies must be mirrored or brokered.
HybridDALP runs in one controlled environment while selected dependencies, such as custody, RPC, storage, or monitoring, sit elsewhere.
Private chainAn EVM-compatible network operated for a restricted participant set rather than a public network.
Public-chain connectivityDALP reaches a public EVM network through a configured RPC endpoint or node and inherits that network's visibility model.

Runtime topology

Rendering diagram...

Common deployment scenarios

These diagrams show where the main responsibility line sits. They do not prescribe a vendor or hosting product.

Rendering diagram...
Rendering diagram...
Rendering diagram...
Rendering diagram...

Runtime zones

ZoneContainsExposure model
Public or controlled access zoneAsset Console, API ingressReached by operators, administrators, and approved integrations
Backend services zoneUnified API, Execution Engine workers, Chain Indexer, Chain Gateway, feedsInternal service network with only intentional ingress and egress
Data and durable state zonePostgreSQL and Durable Execution Engine, with backup or restore paths where the deployment uses themInternal-only data plane
External or separately governed systemsCustody provider, EVM RPC endpoint or node, secrets backend, object storage, backup storage, observability stackGoverned by client, platform operator, or third-party provider contracts

The exact infrastructure can vary by deployment, but these responsibility lines should remain visible in the design. Combining zones for a small environment changes the risk profile; it does not remove the responsibility line.

Component deployment responsibilities

ComponentRuns asState profilePrimary operator concern
Asset ConsoleWeb applicationStateless application runtimeAvailability, TLS, routing, session-safe access
Unified APIBackend serviceUses PostgreSQL and Durable Execution EngineAuthentication, rate limiting, API health, database connectivity
Execution EngineDurable worker servicesDurable Execution Engine journals and workflow stateWorkflow registration, worker health, transaction progress
Chain IndexerBackground servicePostgreSQL indexer schema/checkpointsRPC access, catch-up progress, schema/version health
Chain GatewayNetwork access serviceHealth and routing stateRPC endpoint availability, failover behavior, network configuration
Feeds servicesBackend servicesPostgreSQL feed recordsProvider credentials, update cadence, stale data handling
PostgreSQLManaged or self-hosted databasePersistent application and read dataBackup, restore, retention, access control, capacity
Durable Execution EngineDurable execution runtimePersistent workflow journalsPersistence, registration, recovery, capacity
Signer/custody backendLocal signer, DFNS, Fireblocks, or HSM-backed path depending on configurationProvider-owned signing and approval stateKey governance, approval policy, provider availability
EVM RPC/nodeManaged provider or operated nodeChain access and event historyNetwork selection, archive/history needs, rate limits, incident routing

Private or permissioned chain provisioning

A private or permissioned DALP deployment still follows the same topology: DALP runs the application runtime, workflow workers, indexer, data plane, and gateway services in the selected environment, then connects those services to an EVM-compatible network selected for the asset programme. The network can be a client-operated private EVM network, a SettleMint-managed network, or a separately governed node/RPC endpoint.

Provisioning areaDALP providesClient, operator, or third party provides
Runtime platformContainers, Helm chart inputs, service entry points, and environment valuesKubernetes or OpenShift cluster, namespaces, storage classes, ingress, DNS, TLS, and RBAC
Support servicesIntegration points for PostgreSQL, Redis, object storage, telemetry, backupsManaged services or approved in-cluster alternatives, credentials, retention, and backup policy
EVM network accessChain Gateway and Chain Indexer connectivity to the configured EVM endpointPrivate EVM network or node/RPC operation, validator membership, archive/history policy, and incident route
Contract setupPost-deployment contract wiring, address recording, and indexer sync checksDeployment approval window, environment access, network parameters, and promotion approval
Signing and custody pathSigner integration boundary for transaction construction, approval, and statusHSM, custody provider, approval policy, key ceremony, maker-checker rules, and recovery process

Provisioning normally starts with the self-hosting prerequisites, then platform deployment, post-deployment setup, verification, and handoff. A private-chain deployment adds explicit network decisions before installation: who operates validator and RPC nodes, which endpoints DALP may reach, how chain membership changes are approved, how archive or event history is retained for the indexer, and who owns RPC/node failover during incidents.

Out of the box, DALP supplies the product runtime, charts, services, EVM connectivity surfaces, contract deployment process, and indexer model. The institution or its infrastructure provider supplies the hosting environment, network operation model, custody/key governance, backup targets, recovery evidence, and any chain-specific controls that sit outside the DALP application runtime.

Bank IT review view

Bank architecture and security teams usually need the same deployment facts in a control-review format. Use this view to split the DALP runtime from the systems the institution must govern directly.

Review areaScope coverageDALP component responsibilityInstitution or operator decision
Runtime placementCovered by DALPAsset Console, Unified API, Execution Engine, Chain Indexer, Chain Gateway, and feeds run in the selected DALP deployment environment.Choose managed, customer-hosted, air-gapped, or hybrid placement and approve the network paths between zones.
Durable stateCovered by DALPPostgreSQL stores application and indexed operating data. The Durable Execution Engine stores workflow journals.Define backup, restore, retention, access review, and RTO/RPO targets for the party operating the data plane.
Chain accessStandard integrationChain Gateway and Chain Indexer use the configured EVM RPC endpoint or operated node.Select the EVM network, RPC provider or node operator, archive/history requirements, rate limits, and incident escalation path.
Signing and custodyStandard integrationDALP calls the configured signer or custody path for transaction signing and approval-dependent actions.Govern keys, approval policy, signer availability, provider onboarding, and custody operations outside the DALP application runtime.
ObservabilityStandard integrationDALP services emit logs, metrics, and traces to the configured telemetry sink.Decide log retention, sensitive-data handling, dashboard ownership, alert routing, and incident-command process.
Secrets and storageStandard integrationDALP reads configured secrets and object-storage locations where the deployment uses them.Approve the secrets backend, rotation process, storage location, encryption controls, and administrative access.
Custody policyExternally governedDALP consumes the approved signer or custody path.Define wallet ownership, maker-checker policy, key ceremony, approval requirements, and custody operating procedures outside DALP.

Use the scope coverage column when reusing this material in architecture questionnaires. It gives reviewers a stable answer pattern: DALP covers the application runtime and durable workflow model, standard integrations cover the connected enterprise systems, and custody policy remains outside DALP unless the institution separately defines that operating model.

Recovery posture by topology

Use this page to draw the runtime choice. Use the high-availability pages to choose the recovery pattern.

The topology shows which component owns state. The recovery plan sets the restore target for each stateful surface, the acceptable data-loss window, and the team or provider that owns drill evidence.

Recovery surfaceWhat the topology must showRecovery planning note
Application runtimeIngress, Asset Console, Unified API, workers, Chain Gateway, Chain Indexer, and feedsPlace runtime services across the selected Kubernetes or OpenShift availability zones when the deployment uses the cloud-native baseline.
Durable data planePostgreSQL, Durable Execution Engine journals, backup storage, restore access, and retention ownerSet RTO and RPO with the party operating the data plane. Treat restore tests and measured recovery time as the evidence, not the target itself.
EVM access and indexingRPC endpoint or node, Chain Gateway, Chain Indexer, and indexer catch-up pathKeep RPC failover and indexer replay separate from database restore. Chain state remains the source of truth when the indexer catches up after an outage.
Custody and signingSigner or custody provider responsibility, approval policy, provider availability, and escalation pathAlign signer recovery with the custody owner. DALP can keep workflow state, but transaction signing waits for the configured signer path.
Monitoring and incident responseLogs, metrics, traces, alert routes, dashboard owner, and incident commanderAlerting must cover the service, data plane, queues, RPC access, indexer lag, and custody reachability. The incident process remains an operating responsibility.

DALP does not publish one universal RTO or RPO from this topology page. Those targets depend on the selected availability pattern, provider contracts, capacity, backup design, and restore drill results.

Use High availability to choose a pattern and Backup and recovery to plan restore evidence before making an external commitment.

What runs where

ComponentSaaS or managed deploymentCustomer-hosted or air-gapped deploymentHybrid note
Asset ConsoleRuns in the managed DALP application environmentRuns in the client runtime environmentExpose only through the client's approved ingress pattern.
Unified APIRuns in the managed DALP backend environmentRuns in the client backend services zoneKeep API ingress and service-to-service paths explicit.
Execution EngineRuns with the managed backend workers and Durable Execution Engine integrationRuns with the client backend workers and local Durable Execution Engine runtimeSigning, RPC, and workflow recovery depend on the connected providers.
Chain IndexerRuns in the managed backend and writes to the managed data planeRuns in the client backend and writes to the client data planePublic-chain indexing still depends on the selected RPC or operated node.
Chain GatewayRuns in the managed backend services zoneRuns in the client backend services zoneTreat every external RPC endpoint as a separate network trust decision.
PostgreSQLOperated under the managed service modelOperated by the client or its infrastructure providerBackup, retention, and access review follow the party operating the data plane.
Durable Execution EngineOperated under the managed service modelOperated by the client or its infrastructure providerRecovery targets must match the workflow durability requirement.
Signer/custody backendConnected as a separately governed provider or client-owned pathConnected to the client's HSM, signer, or custody provider pathApproval policy and key administration remain with the custody owner.
EVM RPC/nodeConnected through managed RPC configuration or agreed node accessOperated or selected by the clientPublic-chain RPC and private-chain nodes can coexist when both are configured.

Network responsibility lines

Responsibility lineTraffic crossing itControl to review
User to console/APIBrowser sessions, API requestsTLS, authentication, session policy, API keys, WAF/rate limiting
Console to Unified APIAuthenticated application callsSame-origin or controlled API routing, cookie/session behavior
API to backend workersWorkflow submissions and service callsInternal service authentication, health checks, retry behavior
Backend to data planePostgreSQL and Durable Execution Engine trafficNetwork isolation, credentials, encryption in transit where configured
Backend to custody providerSigning requests, approval status, broadcast delegationProvider credentials, approval policy, operational escalation path
Backend/indexer to EVM networkRPC calls, transaction broadcast, log/event ingestionChain ID, RPC endpoint trust, rate limits, reorg handling, confirmation policy
Backend to observabilityLogs, metrics, tracesData classification, retention, access control

Failure domains and isolation points

Failure domainIsolated byWhat fails firstRTO/RPO expectationWhat should remain reviewable
Console or ingress outagePublic access zone separated from backend stateOperator UI or external API entrySet RTO for operator access restoration; RPO is normally not affected because durable state stays outside the zone.Backend state, workflow journals, chain state, and audit logs
Backend worker outageDurable workflow state in Durable Execution EngineNew or resumed execution stepsSet RTO for worker capacity restoration; RPO follows the Durable Execution Engine journal target for in-flight workflows.Submitted workflow state and prior transaction outcomes
PostgreSQL or data-plane outageData zone isolated from application ingressAPI reads, dashboards, and indexed operating viewsSet database RTO and backup RPO with the party operating PostgreSQL.Chain source of truth and recovery backups
Durable Execution Engine outageWorkflow runtime separated from API ingressLong-running action progress and retriesSet Durable Execution Engine RTO and journal RPO to match the workflow durability requirement.API request logs and chain transactions already submitted
Custody provider outageCustody provider outside the backend services zoneTransaction signing and approval-dependent actionsSet RTO/RPO with the custody or signer provider because approval state and key operations sit outside DALP.Pending workflow state, provider status, and operator actions
RPC or node outageChain Gateway and indexer responsibilityTransaction broadcast, confirmations, and event ingestionSet RPC/node RTO with the provider or node operator; RPO follows the chain source of truth and indexer catch-up.Existing indexed data, pending workflow state, and alerts
Observability outageTelemetry sink separated from transactional stateDashboards, alerting, and trace searchSet telemetry RTO/RPO with the observability operator; transactional recovery must not depend on the telemetry sink.Application state, workflow journals, chain events, and retained local logs

Environment model

Environment typePurposeEVM network patternOperating note
DevelopmentLocal development and deterministic validationLocal EVM such as AnvilConvenience signing and local services are acceptable for development only
StagingIntegration testing and operational rehearsalTestnet or private test networkShould resemble production topology where the risk review depends on topology
ProductionLive regulated asset operationsSelected EVM-compatible production or private networkCustody, monitoring, backup, and incident routing must match the operating model

Configuration changes should be explicit. A staging environment that uses a different custody path, RPC provider, or data-retention model is not equivalent to production for those controls.

Deployment decisions to make

DecisionOptions to evaluateWhy it matters
EVM networkPublic EVM network, private EVM-compatible network, or testnet for non-production useDetermines finality, visibility, RPC requirements, and operational controls
Custody and signingLocal development signer, DFNS, Fireblocks, or HSM-backed setup where supported by deploymentDetermines approval flow, signer availability, and key governance
Database operationManaged PostgreSQL or self-hosted PostgreSQLDetermines backup, restore, encryption, capacity, and access model
Durable Execution Engine operationManaged runtime pattern or self-hosted runtime as supported by deploymentDetermines workflow durability and recovery responsibilities
RPC accessManaged RPC provider, operated node, or co-located nodeDetermines rate limits, reliability, event history, and escalation path
ObservabilityExisting enterprise stack or deployment-specific logging/metrics/tracingDetermines incident response, retention, and access review
Object storage and secretsProvider choices aligned with client controlsDetermines where sensitive configuration and files are governed

Ownership matrix

ResponsibilityDALP suppliesClient/operator must define
Application deploymentContainers, service entry points, configuration modelRuntime platform, ingress, secrets, certificates, environment separation
Workflow operationDurable execution services and status modelCapacity, alerting, recovery procedure, maintenance windows
Data persistenceSchema and application/indexer data modelBackup/restore policy, retention, access controls, disaster recovery
Chain connectivityRPC clients, gateway, indexer ingestionNetwork choice, RPC/node provider, rate limits, escalation path
SigningSigner integration responsibility lineCustody provider, approval policy, key administration
MonitoringHealth signals and telemetry hooksDashboards, paging, retention, incident command

Limits

LimitConsequence
No single prescribed topologyThe docs describe responsibility lines; the client deployment must map them to its infrastructure
EVM-only network accessNon-EVM networks require a separate architecture and are not part of this deployment topology
No implicit custody policyDALP can integrate with signer paths, but the institution owns key and approval governance
No availability claim hereAvailability depends on the deployed topology, providers, capacity, support model, and tested recovery evidence

Where to go next

On this page