Skip to content

Databases & External Services

TL;DR — Every data store, external tool, and service URL used at Securitize. This page is the SSOT for endpoint URLs — other pages link here instead of repeating them.

Overview

Securitize's stack combines: - Managed data stores (Redis, MongoDB Atlas, MySQL RDS, Kafka Confluent Cloud). - Self-hosted tools running on EKS (Jenkins). - SaaS monitoring / security (Logz.io, Wiz, SendSafely).

Each service has a single authoritative URL or access method, documented below.

Data stores

Service Provider / Location Access
Redis AWS (ElastiCache) K8s secret aws-secret (endpoint + creds)
MongoDB MongoDB Atlas (cloud) K8s secret mongodb-secret
MySQL AWS RDS K8s secret mysql-secret
Kafka Confluent Cloud (see clusters below) K8s secret kafka-secret

For K8s secret names and the NPM token, see secrets.md.

Kafka clusters (Confluent Cloud)

Cluster Purpose
sec_cluster Prod US
sec_apac Prod Japan — full prod replica for the Japanese market
sec_sandbox_cluster Sandbox
sec_rc_cluster RC
sec_dev_cluster Dev

Access via CLI:

brew install confluentinc/tap/cli
confluent login   # opens browser auth

Internal tools (self-hosted)

Tool URL Purpose Auth
Jenkins https://jenkins-ops.rc.securitize.io/ CI/CD deployments (triggered on branch merges) SSO

External / SaaS services

Service URL Purpose
Logz.io (per-account URL) Monitoring, error/log management, alerts. See observability.md.
Wiz (per-account URL) Cloud security / vulnerability scanning.
SendSafely securitize.sendsafely.com Secure sharing of sensitive files (tokens, secrets).

Source control platforms (Bitbucket, GitHub) are documented in teams.md.

See also

Tags

databases #services #urls #kafka #mongodb #mysql #redis #jenkins #logz-io