Skip to content
Neruba
Usage pricing, credits, and subscriptions
OverviewWhat Neruba owns, who it fits, and what to inspect first.CapabilitiesInspect ingest, billing runs, balances, payments, and operator workflows.
Compare
Pricing
DocsJump to quickstart, examples, operations, and rollout guides.API examplesCopy auth, setup, ingest, credits, and billing-read request flows.ImplementationMap rollout sequencing, migration work, and launch readiness.Engineering NotesUse the technical lesson sequence when the team needs the patterns first.
Trust
Plan your rollout
Architecture

Neruba architecture

Neruba Billing Engine is designed to stay understandable under retries, load, and support intervention. Follow the flow from ingress to audited billing state.

Plan your rolloutCapabilitiesOperations
Boundary view
See the main seams before you read the modules
Review with context
Context
Step 1

Tenant and project scope stays explicit.

Ingress
Step 2

Events and commands cross clear entry points.

Domains
Step 3

Billing logic stays separated from transport.

Audit
Step 4

Financial state stays inspectable after writes land.

What reviewers look for
Review lens
Context, ingress, domain logic, audit state
Why it matters
Architecture reviews go faster when seams are visible
Review result
Teams can assess control without reading the whole codebase first
Architecture questions this resolves
1
Useful to
Architecture, platform, and security reviewers
2
Promise
A strong system can be explained with boundaries, not just features
On this page
Follow flow, boundaries, and audited billing state.
Quick scanOverviewFlow modelBoundary notes
Quick read

Use architecture when boundaries matter more than feature claims

Use architecture when the main question is how access, ingress, billing state, and auditability are partitioned.

Check fit, start in the right section, and open the next useful page.
Best for
  • Engineering needs a system map before approving the product for deeper review or rollout planning.
  • Security or finance reviewers need proof that access, audit, and money state are explicit architectural concerns.
  • You want the boundary story before opening denser runtime or implementation detail.
Read first
  1. 1Use the overview and boundary cues to get the ingress-to-audit story in one compact pass.
  2. 2Scan the flow model once you want to see the major layers that keep billing state explainable.
  3. 3Open the practical boundary notes when you need the implementation constraints that protect the architecture over time.
Also inspect
Operations

Open runtime detail when the system map now needs scheduler, recovery, and production-hardening answers.

Capabilities

Open shipped product surfaces when the review moves from architecture to concrete features and operator workflows.

Plan your rollout

Open the rollout path when the architecture conversation needs to be tied to your environment and migration plan.

Architecture

Understand the seams before the system grows around them

Domain boundaries, ingress rules, compute paths, and audit state stay separated so retries, reruns, and support work remain explainable.

Scope
tenant + project context
Ingress
events and commands
Domains
transport separated
Audit
persistent money story
Boundary review
The architecture questions that need to be answered together
1
Where requests enter

Ingress boundaries should stay explicit before domain logic fans out.

2
Where money state persists

Balances, credits, and financial state need one durable story the team can inspect.

3
Where retries resolve

Conflict-safe helpers, dedupe, and replay boundaries need to be visible early.

4
Where support steps in

The architecture should leave room for operators to explain and recover, not just process requests.

System boundaries

Start with the system shape, then inspect the rules

Neruba Billing Engine is easier to evaluate when the system shape is obvious first: scoped access, ingress, domain computation, persistence, and audit. The module and boundary details make more sense once that flow is clear.

Partition the state clearly

Keep project and tenant context explicit so teams can reason about customer boundaries before money movement.

Separate ingress from domain logic

Webhook handling, commands, and usage ingest stay cleaner when services consume stable outcomes rather than transport internals.

Keep dialect drift under control

Let shared helpers absorb database-specific differences so feature services stay focused on billing logic.

Make audit part of the architecture

Keep ledger and audit flows visible because support, finance, and recovery all depend on an explainable state story.

Datastore
MySQL/MariaDB
Flow
Ingress to audit
Focus
Boundary clarity
Open operationsPlan your rollout
Boundary review
The architecture questions that need to be answered together
1
Where requests enter

Ingress boundaries should stay explicit before domain logic fans out.

2
Where money state persists

Balances, credits, and financial state need one durable story the team can inspect.

3
Where retries resolve

Conflict-safe helpers, dedupe, and replay boundaries need to be visible early.

4
Where support steps in

The architecture should leave room for operators to explain and recover, not just process requests.

Boundary cues

Follow the state path before reviewing modules

Key product decisions, rollout checkpoints, and operating notes gathered for a quick review.
Partitioning
tenant + project scoped

Customer state stays inside explicit boundaries before billing logic even begins.

Ingress
commands + events

Webhook and usage paths remain dedicated entry points instead of bleeding into domain internals.

Computation
domain-service led

Billing rules, credits, and reconciliation stay testable away from controllers.

Persistence
ledger + audit

Money state and support history remain explainable after reruns and operator changes.

Access and identity

Auth, refresh flows, admin scopes, project membership, invites, and API keys define who can operate which billing surfaces.

Usage and billing

Ingest, billing, scheduler logic, reconciliation, and recovery stay connected so event-driven pricing can be rerun without losing the story of what happened.

Ledger and payments

Wallets, credits, transactions, payments, checkout, disputes, and refunds keep money movement explicit instead of hiding it inside invoice rendering.

Audit and operations

Audit writes, admin reads, support flows, and metrics show what changed, who changed it, and how operators recover from billing incidents.

Flow shape

From ingress to audited billing state

Billing architecture becomes fragile when these layers blur together. Keeping the flow explicit makes retries, recovery, support actions, and finance review easier to reason about.

Developer docsTrust Center

1) Tenant + project context

Every request is scoped through account, membership, project, or API-key boundaries so the billing state lives inside explicit customer partitions.

2) Event or command ingress

Usage, payments, admin adjustments, and webhook events enter through dedicated flows that can be validated, deduped, and traced.

3) Domain computation

Billing rules, credits, payment transitions, and reconciliation logic run in domain services that can be tested independently of controllers.

4) Persistence + audit

Ledger rows, wallet balances, event stores, and audit trails preserve the outcome so reruns, support work, and finance review remain explainable.

Practical architecture boundaries
Ingress boundaries

Keep webhook ingress as a dedicated entry point. Other domains should subscribe to outcomes instead of importing webhook internals directly.

Controller boundaries

Keep controllers request, DTO, and policy focused. Repository-heavy and orchestration logic should live in services and focused helpers.

Dialect boundaries

Push database-specific branching into shared helpers so feature services do not accumulate vendor-specific SQL drift.

Audit write boundaries

Emit audit intent through a port instead of depending on audit persistence internals everywhere. The write path stays cleaner and easier to evolve.

Why evaluators care
Engineering

Wants proof that retries, replays, and late events will not turn into silent revenue drift.

Security

Wants access control, webhook, audit, and docs-exposure boundaries to be explicit rather than implied.

Finance and operations

Wants invoices, credits, disputes, and support corrections to remain explainable after the system changes state.

Use architecture to improve rollout planning, not just impress engineers

Move into rollout planning once the architecture discussion needs to connect directly to your pricing model, deployment constraints, migration approach, and operational risk profile.

Plan your rolloutExplore solutions
Tie architecture to rollout

Use the architecture discussion to sharpen launch planning, not just impress engineers

Neruba architecture matters because it changes how teams think about late events, retries, deployment, migration, and support intervention under real operating conditions.

tenancyingressledgeraudit
Plan your rolloutExplore solutionsDeveloper docs
Boundary review
The architecture questions that need to be answered together
1
Where requests enter

Ingress boundaries should stay explicit before domain logic fans out.

2
Where money state persists

Balances, credits, and financial state need one durable story the team can inspect.

3
Where retries resolve

Conflict-safe helpers, dedupe, and replay boundaries need to be visible early.

4
Where support steps in

The architecture should leave room for operators to explain and recover, not just process requests.

Built for product, finance, and security teams

Ready to move from review into a concrete rollout conversation?

Use the platform, docs, trust, and implementation pages to get the right people aligned. When the project becomes active, share your pricing model, deployment posture, and migration constraints so the reply starts with your environment.

Plan your rolloutImplementation guide
Technical briefingsNeruba Engineering Notes
Neruba
Usage pricing, credits, and subscriptions

Usage ingest, ledger-backed billing, and operator-ready recovery for teams that need the money model to stay explainable.

© 2026 AspectSoft
Product
OverviewCapabilitiesSolutionsBuying paths
Developers
QuickstartImplementationDocsAPI examplesOperationsBlog
Trust
Trust CenterSecurityPrivacyStripe comparison