A database security story at a scale most tools weren't built for
The numbers are almost beside the point. What Razorpay's security team actually needed wasn't more data — it was meaning behind the data. An IP address tells you something happened. A service account name tells you which system. Neither tells you whether it was a DBA doing routine work, a compromised application, or an AI agent accessing customer PII it was never meant to touch. At this scale, that ambiguity isn't a gap in reporting. It's a breach waiting to happen.

1 Bn+
Daily access requests processed.
Auto
Compliance reporting and workflows
99.99%
Uptime requirement
< 2%
False positive rate
Razorpay, India's leading payment gateway, needed visibility into data exfiltration risks and database access patterns across their infrastructure.
Traditional monitoring solutions couldn't provide 100% visibility into database operations and network connections without impacting performance.
After deploying Aurva's eBPF-based monitoring, Razorpay achieved:
About Company:
Razorpay is India's leading payment solutions provider, powering payments for over 5 million businesses. Processing 7 billion+ transactions annually , Razorpay operates as one of Asia's largest payment infrastructures.
Industry:
Fintech (Payments & Banking)
Company Size:
1,000–5,000 employees (approx.)
Region:
Primarily India & international expansion
Environment:
& more...
Product:
Data Activity Monitoring
AI Security
Data Security Posture Management
Data Flow Management
External Threat Monitoring
Integrations:
Razorpay's security team faced three interconnected problems:
Gap
What they couldn't see
Business Impact
Network Egress
Which apps connected to external domains, data sent to third parties
Incidents took days to investigate, risky migrations
Data Access Context
Who accessed what data, when, and whether human or application
DBA activities unmonitored, no unauthorized access detection
Sensitive Data Access
Who accessed PII/PCI data and whether it was exfiltrated
Compliance gaps, data governance unenforceable
Traditional solutions didn't work:
The Requirement: Full visibility with no performance impact, no application changes, and 100% coverage.
eBPF (extended Berkeley Packet Filter) runs in the Linux kernel and observes network traffic and system calls after they happen, outside the application's path.
Out-of-Line Architecture:
Application → Database (zero latency)
↓
[eBPF in Kernel] (observes asynchronously)
↓
Processing Pipeline → ElasticsearchBenefits for Razorpay:
Aurva provided kernel-level visibility into every outbound connection:
Suspicious Domain Detection: Real-time alerts when applications connect to unexpected external domains, enabling investigation of potential data exfiltration or supply chain attacks.
Third-Party Migration: During Redshift endpoint migration, Aurva identified all applications making connections, enabling safe cutover with zero downtime.
NAT Analysis: Visibility into which applications used which NAT gateways enabled cost optimization.
50 million
network connections monitored per day.
Migration
risk reduced.
Cost Optimized
via NAT analysis.
Time Reduced
for security investigation.
Aurva captured every database query with full identity context:
DBA Activity Monitoring: Track every DBA operation in production who ran what, when, and on which database. Used for insider threat detection and compliance.
Application Behavior Baseline: Understand normal query patterns per application, detect when applications behave differently (potential compromise or bugs).
User + Critical Application Monitoring: Monitoring policies for privileged users accessing sensitive databases, with alerting on unusual patterns.
~1 billion
queries monitored per day.
<1% CPU overhead
used to monitor queries.
No Impact
on Application Performance.
DBA
investigations are more effective.
Aurva connected sensitive data discovery with real-time access tracking:
Compliance Reporting: Automated reports showing which applications access PII/PCI data, frequency and patterns of access, and any unusual access ready for audit.
Data Onboarding: When new applications or datasets are deployed, Aurva automatically discovers sensitive data, baselines normal access patterns, and sets up monitoring policies.
Exfiltration Detection: Correlate sensitive data access with network egress in real-time: "Application X queried customer PII and made an outbound connection to unknown domain"—triggers investigation.
261749 columns
identified with PII/PCI data
80%
of sensitive data access now monitored
Automated
compliance reporting
Scaling to Billions: One Challenge, Three Battlegrounds
Moving from pilot to production exposed a single unified challenge: sustaining real-time monitoring guarantees across a pipeline processing 1 billion database queries and 50 million network connections per day. What looked like four separate symptoms: memory exhaustion, indexing lag, runaway cost, degraded alert latency; were the same problem expressed across three layers of the HILL architecture.
┌─────────────────────────────────────────────────┐
│ Razorpay Infrastructure │
│ (20 K8s clusters, 14000+ services, 300+ DBs) │
└──────────────┬──────────────────────────────────┘
│
[eBPF Collectors]
(DaemonSet on each node)
- <2% CPU overhead
- Kernel-level capture
- Smart filtering
- Zero-copy transfer
│
↓ (gRPC, aggregated)
│
┌─────────┴─────────┐
│ │
│ [Processor] │ [Processor]
│ (Auto-scaling) │ (Multi-region)
│ │
└─────────┬─────────┘
│
↓
┌─────────────────────┐
│ Storage Tiering │
│ │
│ Hot: Elasticsearch│
│ (7 days) │
│ Warm: ES + S3 │
│ (8-90 days) │
│ Cold: S3 │
│ (90+ days) │
└─────────────────────┘
│
↓
┌─────────────────────┐
│ Alert Engine │
│ + Compliance UI │
└─────────────────────┘eBPF Collectors → [ Processor ] → [ Storage ] → [ Alert Engine ]
The three layers are tightly coupled—a struggling Processor backs up Storage; lagging Storage stales the Alert Engine. The pipeline fails or succeeds as a system.
Layer
Problem
Impact
Processor
10K queue × 75KB/event; 2–4 DB lookups per log; unbounded PII buffers
8GB memory, OOM kills, silent coverage gaps
Storage
Individual writes; monolithic index; full fidelity = $50K/month
2-hour indexing lag, unsustainable cost
Alert Engine
Stale data from lagging storage; no deduplication
Undefined latency, alert storms
What Changed When the Scale Hit Billions
How We Solved It
Three fixes in concert: expanded the worker pool (10 → 50 workers) while cutting queue depth (10K → 1K) with upstream backpressure, so the system slows gracefully instead of accumulating silently; replaced per-event synchronous permission lookups (2–4 DB round-trips each) with a TTL-refreshed in-memory cache; and added TTL-based cleanup for PII log buffers that had been growing indefinitely.
Switched from individual writes to bulk indexing—5,000 events per _bulk call—which alone collapsed the 2-hour indexing lag to under 30 seconds. Partitioned data into daily indices to isolate query scope and simplify retention. Applied risk-weighted sampling: routine queries are sampled, but PII/PCI-touching queries, all write operations, and DBA commands are captured at 100% fidelity regardless of tier. Result: 80% cost reduction with zero blind spots where they matter.
Pre-compiled policies into efficient pattern-matching automata (eliminating runtime interpretation); cached evaluation results keyed on normalized query fingerprints so identical queries bypass the engine entirely; ran multiple load-balanced instances for horizontal throughput; and added a deduplication layer that groups high-frequency similar events into a single aggregated alert. Alert latency dropped to under 1 minute; the false positive rate held below 2%.
Key Design Decisions:
Coverage and Scale
Daily Monitoring:
Performance:
The Ongoing Partnership
Current Focus:
Future Roadmap:
USA
AURVA INC. 1241 Cortez Drive, Sunnyvale, CA, USA - 94086
India
Aurva, 4th Floor, 2316, 16th Cross, 27th Main Road, HSR Layout, Bengaluru – 560102, Karnataka, India
PLATFORM
Access Monitoring
AI Security
AI Observability
Solutions
Integrations
USA
AURVA INC. 1241 Cortez Drive, Sunnyvale, CA, USA - 94086
India
Aurva, 4th Floor, 2316, 16th Cross, 27th Main Road, HSR Layout, Bengaluru – 560102, Karnataka, India
PLATFORM
Access Monitoring
AI Security
AI Observability
Integrations
USA
AURVA INC. 1241 Cortez Drive, Sunnyvale, CA, USA - 94086
India
Aurva, 4th Floor, 2316, 16th Cross, 27th Main Road, HSR Layout, Bengaluru – 560102, Karnataka, India
PLATFORM
Access Monitoring
AI Security
AI Observability
Integrations