Core Architecture
AnomalyArmor operates on a simple principle: metadata only, never your data. We query your database’s information schema to understand structure, not content.What We Access
| We Access | We Never Access |
|---|---|
| Table and view names | Row data |
| Column names and types | Actual values |
| Schema metadata | PII or sensitive content |
| Timestamp columns (for freshness) | Business data |
| Index and constraint definitions | Query results |
The Data Flow
AnomalyArmor follows a six-stage pipeline from connection to notification:Stage 1: Discovery
When you connect a database, AnomalyArmor runs a discovery job that:- Connects securely using your provided credentials
- Queries the information schema (
pg_catalog,information_schema, etc.) - Catalogs all tables, views, columns, and their data types
- Records the current state as a baseline
Stage 2: Asset Catalog
Discovered assets are stored in your Asset Catalog, a searchable inventory of everything in your data infrastructure:- Tables and Views: With column details, data types, and relationships
- Metadata: Last updated timestamps, row counts (if available), descriptions
- History: Full audit trail of every change detected
Stage 3: Change Detection
On each discovery run, AnomalyArmor compares the current state against the previous state to detect:- Schema drift: Columns added, removed, renamed, or type-changed
- New assets: Tables or views that didn’t exist before
- Removed assets: Tables or views that no longer exist
- Freshness violations: Data not updated within expected SLA
Stage 4: Data Quality Metrics
Beyond schema monitoring, AnomalyArmor tracks statistical properties of your data:| Metric | What It Measures |
|---|---|
| Row count | Total rows in a table |
| Null percentage | Missing values in a column |
| Distinct count | Unique values |
| Min/max/avg | Numeric column statistics |
Stage 5: Intelligence
AnomalyArmor uses AI to help you understand your data catalog:- Natural language search: Ask “where is customer data?” instead of clicking through schemas
- Auto-generated descriptions: Get human-readable documentation for tables and columns
- Pattern detection: Identify PII, relationships, and naming conventions
Stage 6: Alerting
When changes match your configured alert rules, notifications are sent to your chosen destinations:- Slack: Channel messages with rich formatting
- Email: Detailed reports to individuals or distribution lists
- PagerDuty: Incidents for on-call escalation
- Microsoft Teams: Channel notifications
- Webhooks: Custom integrations with any system
Security Model
AnomalyArmor uses enterprise-grade security controls:Query Security
Every SQL query is validated by our open-source Query Gateway before execution:- Fail-closed validation: Queries that can’t be parsed are blocked
- Access level enforcement: Only metadata and aggregate queries are allowed
- Open source: Audit the code yourself at github.com/anomalyarmor/anomalyarmor-query-gateway
Credential Storage
- All credentials encrypted at rest with AES-256
- Encryption keys managed via AWS KMS
- Credentials never logged or exposed in UI
Network Security
- All connections use TLS 1.3 encryption
- Static IP addresses available for firewall allowlisting
- Support for VPC peering and Private Link (Enterprise)
Access Control
- Role-based access control (RBAC) for team members
- Audit logs for all administrative actions
- SSO integration (SAML 2.0) available
For detailed security information, see our Security Overview.
Deployment Architecture
AnomalyArmor is a fully managed SaaS platform. There’s nothing to install in your infrastructure.What Runs Where
| Component | Location | Details |
|---|---|---|
| Discovery jobs | AnomalyArmor Cloud | Scheduled or on-demand |
| Asset catalog | AnomalyArmor Cloud | Your metadata stored securely |
| Metrics engine | AnomalyArmor Cloud | Scheduled metric capture and anomaly detection |
| Intelligence | AnomalyArmor Cloud | AI-powered search and documentation |
| Alert rules | AnomalyArmor Cloud | Configured via web UI |
| Database credentials | AnomalyArmor Cloud | Encrypted at rest |
| Your database | Your infrastructure | We connect outbound to you |
Performance Impact
AnomalyArmor is designed for minimal performance impact on your databases:- Read-only queries: We only run SELECT on system tables
- Lightweight queries: Information schema queries, not table scans
- Configurable scheduling: Run discovery during off-peak hours
- Connection pooling: Efficient connection management
Next Steps
Now that you understand how AnomalyArmor works, you’re ready to get started:Quickstart Guide
Connect your first database in under 15 minutes
Core Concepts
Deep dive into assets, discovery, and monitoring
