Architecture designed for proof, not just storage.
Every component exists for one reason: make critical events verifiable, tamper-evident, and defensible.
A request is not just stored. It is transformed into evidence.
When an event enters ImmutableLog, it goes through validation, idempotency, cryptographic sealing, ordering, consensus, and append-only persistence before becoming part of the ledger.
This is what turns a log into something that can be proven.
- Mandatory stages
- 11 None optional
- Consensus model
- PoA Proof of Authority
- Nodes in consensus
- N Qualified majority
- Destructive operations
- 0 No update, no delete
- 01
Client
Role: Event originYour application sends critical events through a secure API.
GuaranteesOrigin identified and authenticated by key and network address.
Without itWithout origin authentication, any external actor could inject forged events.
- 02
Ingestion API
Role: Entry pointThe API receives events, validates structure, authenticates the request, and prepares the payload for ledger processing.
GuaranteesEvery event enters with a server-side timestamp and a verified client identity.
Without itWithout a trusted server timestamp, chronological order would be controlled by the client — and tamperable.
- 03
Validation + Enrichment
Role: Ledger gatekeeperEvents are normalized, enriched with metadata, and checked before entering the ledger pipeline.
GuaranteesMalformed events are rejected before touching the ledger; the hash is computed from a single canonical representation.
Without itWithout canonicalization, two clients would serialize the same event differently and produce different hashes.
- 04
Idempotency
Role: Duplicate defenseRetries should not create duplicate truth. Idempotency ensures the same event is recorded only once, even across failures or repeated requests.
GuaranteesThe same operation produces a single record, regardless of network or client retries.
Without itWithout idempotency, network instability becomes duplicate events — and duplication corrupts history.
- 05
Mempool
Role: Ordered bufferValid events enter a temporary pool where they are ordered and prepared for consensus.
GuaranteesLoad spikes don't bring the system down; arrival order is preserved.
Without itWithout a mempool, you either process every event synchronously (slow) or drop them under load (lose history).
- 06
Gossip / Internal Propagation
Role: Cross-node distributionNodes exchange pending events internally so the network can converge on the same ledger state.
GuaranteesNo single node controls what is being proposed to the network.
Without itWithout gossip, a compromised node could hide events from the others before consensus.
- 07
PoA Consensus
Role: Collective agreementImmutableLog uses a permissioned Proof of Authority model between trusted nodes. Blocks are agreed upon, not assumed.
GuaranteesHistory is an auditable collective decision, not the opinion of a single process.
Without itWithout consensus, an administrator with access to one node could rewrite history alone.
- 08
Block Production
Role: Cryptographic chainingEvents are batched into blocks. Each block references the previous one, creating a cryptographic chain of history.
GuaranteesAltering any past event breaks the block hash and every block after it — tampering becomes mathematically detectable.
Without itWithout hash chaining, old events could be edited without leaving a verifiable trace.
- 09
Append-only Persistence
Role: Append-only storageOnce written, records are not updated or deleted. Immutability is enforced by architecture, not policy.
GuaranteesEvents cannot be edited or deleted, not even by database administrators.
Without itWithout append-only storage, any DBA with permissions can rewrite the past and the system becomes just another log.
- 10
Replication
Role: History redundancyThe ledger is replicated across nodes to preserve availability and prevent unilateral history manipulation.
GuaranteesHardware failure or disaster on one node does not erase history.
Without itWithout replication, losing one node's disk means losing evidence.
- 11
Independent Verification
Role: Verifiable final stateAny authorized party can verify that an event exists and that the chain remains intact without trusting the operator.
GuaranteesAny auditor querying any node gets the same answer — and can verify the proof locally, without depending on the operator.
Without itWithout consistency, two auditors would get different answers to the same question — and the evidence loses probative value.
Design principles
Five choices that define how the infrastructure is built — and why.
- 01
Proof
over
assumption
- 02
Immutability
over
convenience
- 03
Deterministic ordering
over
ambiguity
- 04
Independent verification
over
operator trust
- 05
Enterprise performance
over
public blockchain overhead
Not a public blockchain. Not observability. Not analytics.
ImmutableLog uses blockchain-grade cryptographic primitives, but it does not rely on public networks, tokens, mining, or external validators.
It is a private, permissioned ledger designed for enterprise auditability.
- ✕No token
- ✕No mining
- ✕No public network
- ✕No external validator
The proof lives in the data.
Verification does not require trusting ImmutableLog, your database administrators, or your application logs.
If the hashes validate and the chain is intact, the event history can be proven. If something was changed, the break becomes visible.
