Standard architecture

Prev Next

Lobster Cloud Hosting Standard Editions run on a unified base architecture designed for an availability of 99.0%.

If your operations require fast response times and proactive monitoring, refer to the Premium Monitoring page for details. The architecture for high-availability systems is described on the High Availability architecture page.


Core principles

Every Lobster Cloud system is built on the same standardized architecture. The key principles are:

Principle

Description

Dedicated resources

Your system runs on dedicated virtual machines and a dedicated database. No resources are shared with other customers.

Network isolation

Each system is deployed in its AWS Virtual Private Cloud (VPC) with a private network range selected during the pre call.

Database protection

The database runs in a protected private subnet. No external access is possible, not via VPN and not via the internet. Only the corresponding Lobster web server has access.

Standardized design

The architecture cannot be customized on a per-customer basis. This ensures consistent security, reliability, and operational quality.


Architecture variants

The standard architecture is available in three configurations, depending on your requirements. See architecture diagrams below.

Base system (without DMZ)

This is the simplest configuration. It consists of a single Lobster Data Platform server and a dedicated database, both running within the same VPC. All information on size selection can be found under Editions and Sizing.

Component

Description

Lobster Data Platform Server

Processes all jobs, profiles, and data integrations. Accessible via Port 443 (HTTPS) for the web interface and Port 9000 for the admin console.

Database (RDS)

PostgreSQL database running in a private subnet. Stores all configuration data, job history, and platform metadata.

Security Group

Acts as a virtual firewall controlling all incoming and outgoing traffic. Only IP-based rules are supported (no DNS names).

Static IP

Provides a static public IP address for your system, ensuring it remains reachable even if underlying infrastructure changes.

Traffic from the internet enters the VPC through the AWS Internet Gateway, passes through the security group, and reaches the Lobster server. Port 80 is used exclusively for Let's Encrypt certificate automation and redirects all other traffic to Port 443 (HTTPS).


Base system with DMZ

Adding a DMZ server places a security layer between the public internet and your internal Lobster system. This is the recommended configuration for customers who exchange data with external partners. All information on size selection can be found under Editions and Sizing.

Component

Description

DMZ Server

Publicly accessible endpoint that receives all incoming traffic. Functions as a reverse proxy.

Lobster Data Platform Server

Located behind the DMZ in a protected network segment. Not directly accessible from the internet.

Database (RDS)

PostgreSQL database in a private subnet, accessible only by the OIS server.

Security Groups

Separate security groups for the DMZ and the OIS server, each with individual firewall rules.

For a detailed description of the DMZ server and its functions, see the DMZ Architecture page.


Base system with DMZ and DEV environment

This configuration adds a development environment alongside your production system. The DEV system is a separate, independent installation with its server and database. All information on size selection can be found under Editions and Sizing

Component

Description

Production DMZ

Publicly accessible endpoint for your production system.

Production Lobster Data Platform Server

Your production Lobster Data Platform, located behind the DMZ.

Production Database

Dedicated production database in a private subnet.

DEV Server

Separate Lobster Data Platform instance for development and testing.

DEV Database

Dedicated database for the DEV environment.

The DEV environment has its security group and can be configured with different firewall rules than your production system.


Network configuration

VPC and subnets

Each system is deployed in its AWS VPC. During the pre call, you select one of three private network ranges for your environment. You can find all the information you need at VPN Connections.

Important

The network range cannot be changed after your system has been provisioned. This is especially important if you require a VPN connection, as the selected range must not overlap with your on-premise network.

Internet connectivity

Your Lobster system communicates with the internet via a public subnet with a static Elastic IP address. The architecture uses the following flow:

Direction

Description

Incoming traffic

Internet traffic enters through the AWS Internet Gateway, passes through the Security Group, and reaches your DMZ (if configured) or Lobster DATA Platform Server.

Outgoing traffic

Outgoing connections from your system are open by default, allowing communication with external partner systems, APIs, and services.

Standard port configuration

You can find all the information you need at Ports and Protocols

Security groups (firewall)

Security groups function as virtual firewalls for your system. Each system component (LDP, DMZ, DEV) has its own dedicated security group. You can find all further information on this topic here: Firewall Rules.


SSL/TLS certificates

You can find all further information on this topic here: SSL/TLS Certificates.


DNS configuration

All information on this topic can be found here: DNS Configuration.


Architecture diagrams

Base system

The following diagram illustrates a standard Lobster Cloud LDP environment setup without a DMZ server.

The following diagram illustrates a standard Lobster Cloud LDP environment setup without a DMZ configuration.


Base System with DMZ

The following diagram illustrates a standard Lobster Cloud LDP environment setup with a DMZ server.


Base system with DMZ and DEV environment

The following diagram illustrates a standard Lobster Cloud LDP environment setup with a DMZ server and DEV environment.