Skip to main content

Platform Operationalization

From prototype to internal platform

Builder Insights can only scale inside MongoDB if access, hosting, and operational visibility become first-class platform concerns. This page outlines the operating model needed to move the product from working software to a sustainable internal service.

Core operationalization streams

  • MongoDB Okta SSO and workforce identity
  • org-aware access and Builder Relations group truth
  • internal hosting in Kanopy
  • observability, telemetry, and analytics

Current state vs target state

AreaCurrent-state concernTarget-state expectation
Identityapp access is still evolving and not yet anchored in MongoDB workforce SSOOkta-backed identity becomes the enterprise entry point
Org awarenessteam membership can become ambiguous without an approved org sourceBuilder Relations membership and reporting scope become authoritative
Runtimehosting and deployment assumptions are still transitionalinternal runtime lives in Kanopy with explicit environment and operational discipline
Visibilitytelemetry and analytics are not yet the operating backbonereliability, audit, and usage visibility become built-in platform capabilities

Operationalization workstreams

Operating views by audience

Product And Program Package

Use these pages to coordinate dependencies, decisions, and working cadence.

Security Review Package

Use these pages to shape access, entitlements, privileged operations, and audit posture.

Platform Engineering Package

Use these pages for Kanopy, telemetry, deployment posture, and platform dependencies.

Operationalization workstreams

Decision

Default platform direction

Treat Builder Insights as an internal platform with four connected operating layers: enterprise identity, authoritative org-aware entitlements, Kanopy-hosted internal runtime, and measurable observability. Solving only one of these in isolation will leave important operational gaps behind.

Suggested sequencing

1. Identity foundation

Decide the Okta SSO path, claims model, and break-glass admin policy first.

2. Org and entitlement model

Define how Builder Relations membership and reporting structure enter the app and become roles.

3. Kanopy productionization

Move the internal web and service runtime into Kanopy with real environment discipline.

4. Observability maturity

Add the dashboards, alerts, analytics, and audit views needed to operate the platform confidently.

Decisions to make next

  • which internal system is authoritative for Builder Relations membership
  • which Okta groups or claims the app should trust
  • which services belong in Kanopy first
  • which observability stack and ownership model are approved internally
  • who owns access reviews, entitlement exceptions, and audit follow-up

Decision and ownership map

Identity

Okta SSO path and claims model still need a formal decision.

  • owner: Identity and Security
  • status: Needs decision
Org-aware access

Builder Relations source of truth still needs a confirmed operating answer.

  • owner: Builder Relations Ops and Org Systems
  • status: Needs decision
Hosting

The first Kanopy runtime boundary is shaped enough to discuss, but not yet fully settled.

  • owner: Platform Engineering and Application Engineering
  • status: Drafted
Observability

Telemetry stack and dashboard ownership still need explicit approval.

  • owner: Platform Engineering, Product, and Application Engineering
  • status: Needs decision

Stakeholder workstreams