Contact us!

Phone: 424.272.8920
Hours: 10am PST - 6pm PST
Thank you! Your submission has been received!
Looks like you didn't complete all of the required fields
Close

Technology

We do all the heavy lifting for you so you can focus on what brings value to your business.

Qluster is designed so non-engineers can do data ingestion, cleaning, and unification at scale.
You don't need to know about the internal workings of Qluster to use it.
The more your data is prone to human error, the more value Qluster will bring.

Qluster is Cloud Native

It runs on top of Kubernetes. Qluster does not have a dependency on any cloud provider. All it needs is Kubernetes and Postgres for storing its settings.

Qluster flow inside kubernetes

Qluster utilizes Kubernetes to scale up and down automatically based on the resources needed to handle your volume of data.

Data Security as a First Class Citizen

Qluster is committed to security and focused on keeping your data safe. We adhere to industry-leading standards while connecting, processing, and loading data from all of your data sources.

The entire data flow lifecycle stays within your virtual private cloud in the on-prem deployment.
In the hosted version, ephemeral data specific to a data source may be used by a process, i.e., in the form of logs. This data stream is essential to the ingestion process and is retained for debugging for up to a few days, depending on the client's requirements.
In the hosted version, we can let you host the settings and logs in your infrastructure. Then there will be absolutely no traces of your data in our infrastructure.

Encryption At Rest

The first thing Qluster does before processing a file, is to use GnuPG to encrypt the file and push it to the backup storage, i.e. AWS S3 or Google Cloud Storage. That way if anything fails we have a fallback. Nothing is ever lost!

Qluster uses industry standard Fernet (Secret Key) authenticated cryptography for securely storing secrets in the settings database.

Encryption In Transit

Data is encrypted when transmitted across networks to protect against eavesdropping of network traffic by unauthorized users.

Data Governance: Role Based Access Control (RBAC)

Each user is associated with one or more data sources and can only act on behalf of those data sources.

Users can resolve data issues associated with their own data, or decide to delete the erroneous rows instead.

Qluster Cloud

🚀 Qluster is officially a part of the Google for Startups Cloud Program, Amazon Web Services Startups Activate Program, and Microsoft for Startups Founders Hub! 🚀

The devil is in the details

Data ingestion pipelines are brittle. Things can go wrong in a million places. We take care of all the tiny details so you don't have to.

Your Data Safety is our number one commitment

Data Firewall

Observablity

Data Lineage

File Formats

AI Driven Data Cleaning

Cloud Independent

Highly Scalable

Extendable

Don't re-invent the wheel

We've got you covered for file data ingestion.
Want to hear more?

Request a demo