Infrastructure Topology heading-link-icon

This topic shows topology diagrams for both Corda in Amazon Web Services (AWS) and Corda in Azure.

The size of the Kubernetes A powerful tool for managing containerized applications at scale, making it easier for teams to deploy and manage their applications with high reliability and efficiency. cluster required is dependent on the workload that the Corda cluster needs to handle. The Deploying topic gives some guidance on initial resource requests/limits to apply to the Corda workers which, when combined with the number of replicas for each worker JVM processes that run in a cluster and perform a specific task. The processes required to form a cluster depend on the deployment topology. Workers increase or scale back their capacity depending on the number of available tasks. type, can be used to estimate the total resources required in the Kubernetes cluster. The number of nodes in the cluster, and their distribution across availability zones, should take into account requirements for the availability of the solution.

Performance testing of your CorDapps Corda Distributed Application. A Java (or any JVM targeting language) application built using the Corda build toolchain and CorDapp API to solve some problem that is best solved in a decentralized manner. under expected loads is required to determine the values that you will require in a production deployment.

The following diagram shows the topology used if hosting on AWS:

AWS Example
AWS Example

The following diagram shows the topology used if hosting on Azure:

Azure Example
Azure Example
  1. External Network:
    • Represents either the Internet, or a known peered network.
  2. Load Balancer Firewall:
    • Represents the network rules used to limit which networks are allowed to access the load balancer.
    • AWS resource provided by “EC2/Security Groups”.
    • Azure resource provided by “Load balancing/Load Balancers”, or “Network security groups”.
    • Create your own, or use ones created at stage 5.
  3. Load Balancer:
    • Represents a load balancer that manages ingress traffic.
    • AWS resource provided by “EC2/Load Balancers”.
    • Azure resource provided by “Load balancing/Load Balancers”.
    • Create your own, or use one created at stage 5.
  4. Application Ingress Firewall:
    • Represents the network rules used to limit which networks are allowed to access the application network ingress.
    • AWS resource provided by “EC2/Security Groups”.
    • Azure resource provided by “Network security groups”.
    • Create your own, or use ones created at stage 5.
  5. Application Ingress:
    • Represents the Kubernetes Ingress Controller, or Kubernetes Service that exposes the cluster applications to the outside network.
    • Usually accompanied with a cloud-native load balancer with the ability to configure further.
    • Kubernetes resources provided by, but not limited to, “Ingress-Nginx”, “Traefik Proxy”, and the Kubernetes resource kind “Service” (type: LoadBalancer).
  6. Corda.
  7. Database Firewall:
    • Represents the network rules used to limit which networks are allowed to access the database.
    • AWS resource provided by “EC2/Security Groups”.
    • Azure resource provided by “Network security groups”.
  8. Database:
    • Represents the datastore used by Corda.
    • Supported database engine is “PostgreSQL” (version 14.4).
    • AWS resource provided by “RDS”.
    • Azure resource provided by “Azure Database for PostgreSQL flexible servers”.
  9. Egress Firewall (optional limitation):
    • Represents the network rules used to limit egress network access to external networks.
    • AWS resource provided by “EC2/Security Groups”.
    • Azure resource provided by “Load balancing/Load Balancers”, or “Network security groups”.
  10. Egress:
    • Represents the route external egress network traffic takes from the application network.
    • In AWS it is routed (from Subnet: Private) via a NAT gateway, and, if the destination is on the Internet, an Internet gateway.
    • In Azure it is routed (from Kubernetes: A) via the same Load Balancer resource, acting as a NAT gateway, from stage 2, 3 and 5.

Was this page helpful?

Thanks for your feedback!

Chat with us

Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.

Propose documentation improvements directly

Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.

We're sorry this page wasn't helpful. Let us know how we can make it better!

Chat with us

Chat with us on our #docs channel on slack. You can also join a lot of other slack channels there and have access to 1-on-1 communication with members of the R3 team and the online community.

Create an issue

Create a new GitHub issue in this repository - submit technical feedback, draw attention to a potential documentation bug, or share ideas for improvement and general feedback.

Propose documentation improvements directly

Help us to improve the docs by contributing directly. It's simple - just fork this repository and raise a PR of your own - R3's Technical Writers will review it and apply the relevant suggestions.