PLATFORM ARCHITECTURE
Semantic Drift Intelligence™ Platform
A two-plane semantic observability platform — the SDI control plane in the On Point BI Azure tenant, a lightweight client agent deployed inside your Azure environment.
Semantic Drift Intelligence™ is deployed as a production-grade, AKS-based platform. The control plane hosts the multi-tenant drift engine, semantic registry, governance services, and reporting infrastructure. A lightweight agent is deployed inside each client’s Azure tenant to extract semantic artifacts from SQL warehouses, BI tools, documentation systems, and AI logs — and transmit only semantic units to the control plane for analysis. The agent never accesses raw data, communicates outbound-only over HTTPS, and requires no VPN.
The agent extracts meaning, not data. No raw data ever leaves your environment.
The SDI agent connects to data sources using read-only access, normalizes definitions into semantic units, and transmits those units to the control plane over outbound-only HTTPS authenticated with Entra ID Workload Identity Federation. No raw data, no query results, and no record-level information is ever transmitted outside the client Azure tenant.
ON POINT BI AZURE TENANT
SDI Control Plane
Multi-tenant API, drift engine, semantic registry, reporting service, and job runner. Powered by AKS clusters, Azure SQL, Service Bus, Storage, Key Vault, and Application Gateway with WAF. Manages drift detection, scoring, governance workflows, and continuous monitoring across all client deployments.
CLIENT AZURE TENANT
SDI Client Agent
Lightweight AKS-hosted agent deployed per client. Ingests SQL, BI logic, documentation, and AI logs. Extracts semantic artifacts only. Authenticates via Entra ID Workload Identity Federation. Outbound-only HTTPS. No inbound ports. No VPN required.
ON POINT BI AZURE TENANT
SDI Control Plane
The control plane is the multi-tenant intelligence layer that runs the drift engine, hosts the semantic registry, manages governance workflows, and delivers reporting across all client deployments. It operates exclusively on semantic artifacts and governance signals — no client data ever resides here.
The control plane never accesses client data directly. It operates on semantic units, governance signals, and platform telemetry only.
Core Azure Infrastructure
The control plane is deployed on enterprise-grade Azure infrastructure designed for multi-tenant operations, high availability, and regulatory compliance.
AKS Clusters
• System node pool (D4s_v5) for platform operations
• API node pool (D8s_v5) for multi-tenant API and drift engine workloads
• Jobs node pool (D4s_v5) for scheduled ingestion and analysis jobs
• No public AKS API server — private cluster configuration
Azure SQL
• Hosts the SDI control plane database (sdi_controlplane)
• Stores semantic registry, drift event records, governance state, and tenant configuration
• Private endpoint — not publicly accessible
Azure Service Bus
• Topics: agent-events, drift-alerts
• Queue: jobs-scheduled
• Manages asynchronous communication between client agents and control plane services
Azure Application Gateway with WAF
• Hosts api.sdi and app.sdi endpoints
• AGIC for ingress routing to AKS services
• WAF enabled for protection against web application attacks
Azure Key Vault
• Stores secrets for all control plane services and LLM provider credentials
• Secrets mounted into pods using CSI Secret Store Provider for Azure
• User Assigned Managed Identities scoped to platform operations
Azure Storage Account
• Containers: model-snapshots, config-exports, reports
• Stores semantic model snapshots, configuration exports, and generated reports
Control Plane Services
Semantic Registry
• Canonical repository for business definitions, metrics, and semantic metadata
• Full version history with lineage and ownership tracking
• Single reference point for all downstream drift comparison and governance operations
Drift Engine
• Combines deterministic rules, embedding-based comparison, and LLM reasoning to detect semantic inconsistencies
• Compares definitions across SQL, BI logic, documentation, and AI agent behavior
• Scores drift events by severity and business impact
• Generates recommended remediations with explanations
Multi-Tenant API
• Kubernetes namespace: sdi-api
• Handles all client agent communications and UI requests
• Enforces tenant isolation and per-client API scopes
• Authenticated via Entra ID OIDC tokens
Job Runner
• Kubernetes namespace: sdi-jobs
• Manages scheduled drift detection jobs, ingestion orchestration, and retry logic
• Consumes from Azure Service Bus jobs-scheduled queue
Reporting Service
• Generates drift reports, governance summaries, and registry exports
• Stores outputs to Azure Storage Account reports container
• Powers the UI drift viewer and governance dashboard
Governance Workflow Engine
• Manages ownership assignment, resolution tracking, and audit logging
• Routes drift alerts through approval workflows
• Produces auditable change records for every definition resolution
CLIENT AZURE TENANT
SDI Client Agent
The client agent is a lightweight AKS-hosted deployment inside the client’s Azure tenant. It extracts semantic artifacts from SQL warehouses, BI tools, documentation systems, and AI logs — normalizes them into semantic units — and transmits only those units to the control plane for analysis. No raw data leaves the client environment at any point.
The agent extracts semantic artifacts only. Your data stays in your environment.
Client Agent Infrastructure
AKS Cluster
• System node pool (D4s_v5) for agent platform operations
• Agent node pool (D4s_v5) for ingestion and normalization workloads
• Private cluster — no public AKS API server
Azure Key Vault
• Stores SQL connection strings, API tokens, and service credentials
• Secrets mounted into agent pods using CSI Secret Store Provider for Azure
• User Assigned Managed Identity scoped to agent operations only
Log Analytics Workspace
• Captures agent operational logs, ingestion run history, and error events
• Feeds into monitoring and alerting configuration
User Assigned Managed Identity
• uami-sdi-agent per client and environment
• Federated credential mapped to Control Plane Entra App
• Scoped to specific client tenant and subscription
Agent Workloads
Agent Core
• Ingests SQL warehouses, BI tool metadata, documentation sources, and AI agent logs using read-only access
• Normalizes semantic artifacts into a unified structure for drift comparison
• Transmits semantic units to the control plane API over outbound-only HTTPS
• Never transmits raw data, query results, or record-level information
Agent Scheduler
• Manages scheduled ingestion jobs on a configurable cadence
• Handles retry logic for failed ingestion runs
• Reports job status and errors to Log Analytics
Supported Ingestion Sources
Data and BI Sources
• SQL warehouses — Azure Synapse, Snowflake, Databricks, SQL Server, and equivalents via read-only access
• Power BI — semantic models, DAX measures, and report-level logic
• Other BI tools — metadata and logic extraction where API access is available
Documentation and AI Sources
• Documentation systems — Confluence, SharePoint, GitHub, Markdown repositories
• AI agent logs — behavior monitoring for semantic drift and hallucination pattern detection
• SSO integration — Azure AD, Okta, or equivalent for access control
SECURITY AND IDENTITY
A Zero-Trust, Data-Residency-Safe Security Architecture
The SDI security model is built on Azure-native identity and networking primitives that satisfy the access control, data residency, and audit requirements of regulated industries. Every design decision reinforces the same principle: the control plane never touches client data, and every cross-tenant operation is authenticated, scoped, and auditable.
Identity and Authentication
✓ All cross-tenant communication uses Entra ID Workload Identity Federation with OIDC tokens — no stored credentials or service account passwords
✓ Client agents authenticate to the control plane using their User Assigned Managed Identity with a federated credential mapped to the Control Plane Entra App
✓ Authentication is scoped to a specific client tenant and subscription — no cross-client access is possible
✓ All secrets stored in Azure Key Vault and mounted into pods via CSI Secret Store Provider — secrets never appear in environment variables or configuration files
Networking and Data Residency
✓ Client agent uses outbound-only HTTPS to the control plane — no inbound ports, no VPN required
✓ Control plane runs on private AKS with no public API server — public access only through Application Gateway with WAF
✓ All client data remains in the client Azure tenant — the agent transmits semantic artifacts only, never raw data
✓ Private subnets for AKS, SQL, and Service Bus in both control plane and client agent environments
✓ Optional Private DNS zone for internal SQL access in client agent environments
DEPLOYMENT
Two Deployment Sequences — Control Plane and Client Agent
SDI deployment follows two documented sequences. The control plane is deployed once as the shared multi-tenant infrastructure. The client agent is deployed per client, per environment — following a standardized sequence that ensures consistent, governed operations from day one.
Control Plane Deployment
1
Deploy VNet and subnets
private networking foundation for all control plane resources
2
Deploy Azure Key Vault
secrets infrastructure ready before any service deployment
3
Deploy Log Analytics Workspace
observability active from the first resource
4
Deploy AKS cluster
system, API, and jobs node pools with private configuration
5
Deploy Application Gateway with AGIC
WAF-protected ingress routing to AKS services
6
Deploy Azure SQL, Service Bus, and Storage Account
data persistence and messaging layer
7
Deploy User Assigned Managed Identities and federated credentials
identity layer before workload deployment
8
Deploy Kubernetes workloads
API, jobs, and system namespace services
9
Validate ingress and API availability
end-to-end connectivity confirmed before client agent deployment begins
Client Agent Deployment
1
Deploy VNet and subnets
private networking for agent AKS cluster
2
Deploy Azure Key Vault
agent secrets infrastructure
3
Deploy Log Analytics Workspace
agent operational logging active from deployment
4
Deploy AKS cluster
system and agent node pools with private configuration
5
Deploy User Assigned Managed Identity and federated credentials
Workload Identity Federation configured before workload deployment
6
Deploy ConfigMap
agent configuration injected before pod startup
7
Deploy agent core and scheduler
ingestion and normalization workloads active
8
Validate outbound connectivity to control plane API
authenticated connection confirmed
9
Run ingestion test job
end-to-end semantic artifact extraction and transmission validated
IMPLEMENTATION TIMELINE
Production-Ready in Four Weeks
The client agent deployment and initial drift detection configuration follow a four-week implementation timeline from environment provisioning to executive enablement and go-live.
WEEK 1
Environment Provisioning and Ingestion Setup
Client Azure environment provisioned using Infrastructure-as-Code. AKS cluster deployed and configured. SQL, BI, and documentation sources connected with read-only access. Agent core and scheduler deployed and validated.
WEEK 2
Drift Detectors and Registry Initialization
Semantic Registry initialized with priority metric definitions. SQL and documentation ingestion pipelines running. Drift detectors deployed and producing initial drift event data. Embedding and LLM comparison layers active.
WEEK 3
Validation and Governance Workflow Configuration
End-to-end drift detection validated across all connected sources. Governance workflows configured — ownership assigned, resolution tracking active, audit logging enabled. Drift Viewer accessible and populated.
WEEK 4
Executive Enablement and Go-Live
Executive briefing on drift findings and platform capabilities. Team enablement for Drift Viewer, governance workflows, and registry management. Platform live in production.
OPERATIONAL REQUIREMENTS
What You Need to Implement SDI
Technical Requirements
• Azure subscription with AKS provisioning permissions for client agent deployment
• Read-only SQL access to priority data warehouses
• BI workspace or metadata access for Power BI semantic model ingestion
• Documentation sources accessible via API — Confluence, SharePoint, GitHub, or Markdown repositories
• SSO integration via Azure AD, Okta, or equivalent
• Networking configuration for outbound HTTPS from client agent to control plane
• Optional: AI agent logs for AI drift monitoring
Organizational Requirements
• Metric owners identified for priority KPI families
• SQL, BI, and documentation contacts established for source connection approvals
• Governance contacts identified for workflow ownership and sign-off
• Agreed drift triage process — how drift events will be reviewed and resolved
• Access approvals completed prior to agent deployment
EXPLORE FURTHER
Continue Your Evaluation
Schedule a Strategy Session
Talk to our team about your organization’s semantic governance environment and whether SDI is the right fit.
