
Architecture & Design
Infrastructure designed around your requirements, built entirely on open source components you fully control.
Your server, your rules
Dedicated infrastructure, designed for independence
Every component chosen for reliability, transparency and long-term independence.
Taking control of your IT infrastructure is a strategic decision that comes with real responsibility. The architecture you choose today determines the security, reliability and flexibility of everything that runs on it, from email and collaboration to business-critical applications.
Innoframe designs the foundation that makes all of this possible. Modular, container-based architectures built on open source, hosted on dedicated European servers. Every element can be inspected, replaced, or migrated independently. No proprietary layers, no hidden dependencies.
How we design
Built on open standards, engineered for independence
A clear, efficient engagement model designed to deliver maximum value with minimum overhead.
Dedicated, single-tenant servers
Your applications run on dedicated infrastructure: a virtual private server at a European cloud provider, a dedicated server at a colocation facility, or on-premises hardware. No resources are shared with other clients, no third party has access to your data. What runs on your server is yours alone.
Container-based architecture
Each application runs in its own isolated container with dedicated resources and strict boundaries. This means stronger security, simpler maintenance, and the ability to update, scale, or replace any component without affecting the rest of your environment. Containers can be snapshotted, backed up and migrated as single units.
Cloud-agnostic by design
Our architectures are designed to be fully portable between European cloud providers. Whether you start on Hetzner, Netcup, Scaleway, or OVH, your infrastructure can move without rebuilding. No provider-specific dependencies, no proprietary APIs, no migration penalties.
European jurisdiction, end to end
Every server, storage system, and backup destination operates from European datacenters under European law. Data sovereignty is not an afterthought or an add-on; it is a fundamental design requirement from the first conversation.
Proven technology
25 years of experience distilled into a reliable, transparent stack
Every component in our stack is chosen for production reliability, security, and long-term viability. No experimental tools, no trendy frameworks that disappear in two years. Just proven open source software that we have deployed and managed across hundreds of environments.
Core platform
Our standard foundation is Debian with Incus containers and Btrfs or ZFS storage, providing native snapshotting, replication, and seamless migration. Depending on your requirements, we also work with other Linux distributions, container platforms, and storage solutions. We match the platform to your needs, not the other way around.
Web and application layer
Our default stack includes Nginx, MariaDB, Valkey, and PHP-FPM with per-application isolation. That said, we have extensive experience with alternative web servers, database engines, and application frameworks. Every environment is tailored to the workload it needs to support.
Security layer
CrowdSec with AppSec integration forms the core of our security approach, combined with nftables for network filtering and automated TLS certificate management. We also work with other firewall solutions, intrusion detection systems, and monitoring tools. Security is always applied in layers so that no single point of failure can compromise your environment.
Backup architecture
Multiple independent backup layers are standard: local snapshots for instant rollback, remote replication for disaster recovery, and immutable off-site copies to European object storage. The specific tools and destinations are chosen based on your infrastructure and recovery requirements. The principle is always the same: backups that are tested, verified, and protected against tampering.
Deliverables.
A complete architecture, documented and ready for implementation
Everything documented, everything yours.
At the end of the design phase, you receive a complete architecture document: server specifications, container layout, application stack, networking, security layers, backup strategy and monitoring setup. Everything is documented, version-controlled, and transparent.
This document is the foundation on which everything else is built. Every application, security layer and backup strategy depends on a solid architecture. Getting this right from the start saves time and prevents costly mistakes down the road.
Is this for you
Designed for organizations that value control and transparency
Whether you are starting fresh, replacing legacy systems, or looking for validation, we help you make the right choices.
Moving away from shared hosting or SaaS
You have outgrown shared hosting or want to leave a SaaS platform where you have limited control. You need a dedicated environment that is truly yours, with full visibility into every component.
Planning new infrastructure from scratch
You are starting a new project or launching a new business unit and want to build on a solid, independent foundation from day one. No technical debt, no inherited dependencies.
Replacing proprietary systems
You are running on Microsoft, Google, or other proprietary platforms and want to understand what an open source alternative looks like in practice. Not a theoretical exercise, but a concrete, deployable architecture.
Needing independent architecture review
You have an existing infrastructure design or a proposal from a vendor and want independent validation from someone with no stake in the outcome. A second opinion based on production experience, not sales targets.
Ready to design your infrastructure?
Tell us what you need. We will propose an architecture that gives you full control without compromise.
