Double-entry mutation core
Move value with atomic debit and credit updates, posted and pending balances, account limits, ordered mutation, and deterministic duplicate handling.
Private-preview ledger database for value exchange systems
TulaDB gives payment, wallet, treasury, and settlement teams a dedicated system for balances, holds, reversals, rejected transactions, and immutable financial history — without forcing those guarantees into a generic transaction table.
Private preview: available for architecture review, performance review, and controlled integration pilots. Production use still requires deployment-specific security review, operational drills, and validation.
tuladb review package
runtime = deterministic ledger engine
model = transfer, reserve, commit, rollback, reject
write path = validate → order → persist → project
visibility = balances, holds, rejected outcomes, history
recovery = WAL-backed restart and replay review
integration = SDK and gateway evaluation path
status = private preview
review focus:
- balanced financial state
- explicit hold lifecycle
- durable idempotency
- explainable recovery
- operational visibility What users get
TulaDB is designed for teams that need more than “insert a row and reconcile later.” It owns the balanced state transitions, durable operation identity, pending holds, rejected outcomes, and queryable history that value-movement systems depend on.
Move value with atomic debit and credit updates, posted and pending balances, account limits, ordered mutation, and deterministic duplicate handling.
Use reserve, commit, and rollback as first-class operations. A reserve holds the debit side; commit posts the credit; rollback releases the hold.
Model position and settlement flows together, so direct and indirect settlement patterns do not split correctness across separate services.
Failed business decisions remain visible as durable records for audit, duplicate protection, customer support, and operational reconciliation.
Private-preview evaluators can review integration patterns through SDK and gateway-oriented access surfaces.
Read balances, history, pending reservations, rejected records, and accounts through a read-only path that does not open the mutation surface.
Mental model
TulaDB treats financial activity as durable state transitions. A retry should return the same outcome. A rollback should leave an explainable trail. A rejected transaction should still be searchable when operations teams investigate what happened.
Write path
The write path stays narrow and explainable: validate the request, order the mutation, persist the outcome, and project it into queryable history.
Architecture preview
This static architecture flow maps the private-preview runtime at a high level: SDK ingress, deterministic account mutation, durability, query projection, and replication review.
Stable operation identity enters through SDKs, native access, or an authenticated adapter.
Validation, idempotency, reservation lifecycle, tiered transfer logic, and ordered mutation.
Persistent financial outcomes, recovery checkpoints, and immutable history projection.
Leader/follower behavior, quorum progression, and controlled recovery review.
Balances, transaction history, pending reservations, rejected records, and account search.
Architecture position
Fraud checks, routing, customer orchestration, compliance, and network adapters can remain outside the ledger. TulaDB owns the part those systems should not improvise: durable, idempotent, balanced financial state.
This keeps the ledger core small, deterministic, and reviewable while business workflows remain configurable above it.
Operations
Operators need to answer practical questions quickly: what was accepted, what was rejected, what is pending, what recovered, and which safety posture is running. TulaDB exposes those concerns as explicit runtime and validation surfaces.
Private-preview review separates conservative operating posture from performance-oriented evaluation modes.
Durability, recovery, and replay behavior are evaluated through concrete runtime artifacts and controlled drills.
TLS/mTLS support is part of the private-preview security envelope. Production deployments should still validate authentication policy, rate limits, audit logging, and network boundaries.
Private-preview evaluators can review the available operational surfaces for account state, transfers, reservations, rejected outcomes, and live runtime status.
Trust posture
Verification targets are part of the private-preview evaluation package. They exist to produce evidence for correctness, recovery, and operational review without exposing implementation detail on the public site.
Preview status: TulaDB is ready for architecture review, performance review, controlled integration experiments, and design-partner discussions. Production use should follow deployment-specific security review, operational drills, and validation.