SettleMint
ArchitectureSelf-Hosting

Overview

Deploy the Digital Asset Lifecycle Platform in your own Kubernetes or OpenShift infrastructure. Covers operating boundaries, required platform services, installation planning, and high availability choices for enterprise deployments.

Overview

Self-hosted DALP deployments place the Digital Asset Lifecycle Platform inside infrastructure controlled by your organization. DALP is packaged as Helm charts and container images for Kubernetes or OpenShift, with SettleMint support for installation and application-level configuration. Your platform team owns the cluster, data services, ingress, DNS, TLS, registry access, secrets, monitoring, backups, and production runbooks.

Self-hosting requires experienced Kubernetes or OpenShift operators. Organizations without dedicated platform engineering teams should consider SettleMint's managed deployment options.

Controlled-environment deployment model

DALP can run in a bank-controlled Kubernetes or OpenShift environment when the bank provides the cluster, registry access, data services, DNS, TLS, storage, network paths, and approved secret-management inputs. The DALP application chart packages the Asset Console, API, workflow service, indexer, chain gateway, and block explorer as containerized workloads. Optional support and observability charts can run in the same controlled environment when the bank does not use approved managed equivalents.

The DALP application runtime does not require a shared public SaaS control plane. Core application components are not cloud-only. Cloud or externally managed services appear only when the deployment enables them or when the bank chooses an approved managed service instead of an in-cluster equivalent. Treat each approved external endpoint as a deployment dependency with its own network, credential, residency, logging, and incident-response controls.

DependencyWhen it is usedSecurity implication
EVM RPC upstreams or custody and signing providersWhen the environment connects to an external network or external signer instead of an in-cluster network and local signing modelRestrict egress, isolate credentials, and review provider logs, key-control model, residency, and incident process before production
PostgreSQL, Redis, object storage, backup, or observability servicesWhen the bank uses managed data or monitoring services instead of bundled or in-cluster servicesTreat the service as a data processor. Review encryption, network path, retention, backup access, telemetry export, and administrator access
SMTP, identity providers, DNS, TLS issuance, and container registriesWhen the deployment integrates with the bank's mail, identity, certificate, DNS, or image-distribution controlsApprove domains and certificates, pin registry access, rotate credentials, and audit authentication and image-pull activity

For OpenShift, DALP charts include OpenShift-specific route and security-context values. Workloads run with non-root settings, privilege escalation disabled, dropped Linux capabilities, RuntimeDefault seccomp where configured, and OpenShift-assigned UIDs where the restricted Security Context Constraints profile requires dynamic IDs. SettleMint-built runtime containers use hardened minimal base images: compiled services run from distroless nonroot images, and web runtimes and migration tooling use pinned Alpine Bun images with a non-root application user. Third-party support images, such as block explorer and observability chart images, must pass the bank's registry admission, image-scanning, and patch-management controls before deployment.

Runtime credentials are injected at startup rather than baked into images or static configuration. DALP supports HashiCorp Vault as a secret-manager provider using the Vault address, token, mount path, and secret prefix configured for the environment. The Helm chart can also map environment variables to enterprise secret-store paths through the Conjur and summon integration before the application process starts. The bank owns Vault policy, token lifecycle, namespace access, audit logging, and rotation; DALP consumes only the runtime values approved for the deployment.

One-view topology

The deployment boundary is the bank-controlled Kubernetes or OpenShift estate. DALP application workloads run inside that boundary. The platform services, observability stack, ingress controls, and approved external endpoints sit around the workloads and must be reviewed as production dependencies before go-live.

Rendering diagram...

Read the diagram from left to right: traffic enters through the bank's ingress controls, reaches DALP workloads in the cluster, then uses approved platform, data, observability, and external endpoints. External endpoints are optional dependencies, not a shared DALP control plane.

Planning decisions

SettleMint delivers a tested, versioned Helm chart package. Your team provides the infrastructure and prerequisites. SettleMint engineers perform the initial installation and post-deployment configuration, including smart contract deployment and indexer validation.

Self-hosting has three decisions that shape the rest of the deployment:

DecisionDefault pathWhen to choose another path
Runtime platformKubernetes or OpenShift across multiple availability zonesUse OpenShift when your platform team standardizes on Routes, restricted security context constraints, and OpenShift operations.
Data servicesManaged PostgreSQL, Redis, object storage, backup, and observability services in hypercloud environmentsUse in-cluster PostgreSQL, Redis, RustFS, or observability only when managed services are unavailable or not approved. Object storage uses cloud-provider or S3-compatible storage.
Availability patternCloud-native multi-zone deploymentUse hot-warm, hot-cold, or hot-hot when recovery targets, geography, or consortium operations require a different operating model.

The platform team should make these decisions before installation planning. These choices determine the prerequisites, enabled chart groups, handoff checks, and recovery pattern that operators must test before production.

Documentation sections

SectionPurpose
PrerequisitesConfirm cluster, network, data service, secret, storage, registry, DNS, and TLS inputs
Installation processUnderstand installation phases, enabled chart groups, validation checks, and handoff
OpenShift installationCheck OpenShift route, security context, dynamic UID, and restricted workload behavior
High availabilityChoose and test the HA or disaster recovery pattern, including RTO, RPO, and runbooks
Hot-warm topologyReview standby-region operations when the active environment fails over to a warm region

Responsibility matrix

AreaSettleMintClient
Helm chartsDevelopment, testing, versioningDeployment, configuration
Container imagesBuilding, security scanningRegistry access, pulling
InstallationInitial deployment, verificationInfrastructure provisioning
Smart contractsDeployment, verificationNetwork access
Chain indexerDeployment, validation, readiness checksRuntime hosting and operations
Chain gatewayConfiguration guidance and chart defaultsRPC upstreams, exposure policy
Kubernetes/OpenShiftArchitecture guidanceProvisioning, maintenance
Managed servicesConfiguration recommendationsProvisioning, credentials
MonitoringDashboard templates, alert rulesGrafana hosting, alert routing
UpgradesChart updates, migration guidesExecution, testing
Incident responseApplication-level response (dependent on SLAs)Infrastructure-level response

SettleMint incident response is dependent on the contracted SLA tier.

Getting started

  1. Review the self-hosting prerequisites to confirm cluster, network, data service, storage, registry, DNS, TLS, and secret-management inputs.
  2. Choose the high availability pattern that matches your recovery targets and operating geography.
  3. Decide whether PostgreSQL, Redis, object storage, backup, and observability run as approved managed services or in-cluster equivalents.
  4. Prepare DNS entries, TLS certificates, image-pull access, and approved secret-store paths before scheduling installation with SettleMint.

Do not proceed with infrastructure provisioning until you have reviewed the complete prerequisites checklist. Missing requirements delay installation and may require re-provisioning.

See also

On this page