3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
13.2 Approver Selection Rules
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Approvers are selected from eligible users according to platform permission policy.
Typical eligibility model:
- users with global super-admin authority, or
- users with required project permissions (for example deploy approval + release run authority).
Selection constraints:
- approvers should belong to relevant project scope,
- duplicates are removed,
- only valid active users should be selectable.
Practical recommendations:
- keep approver list minimal but sufficient (avoid oversized groups).
- map approvers to real ownership boundaries (service owner, ops lead, security gate where needed).
- avoid selecting users who are unavailable in deployment windows.
Governance best practice:
- define team-level approval policy (who approves which release class).
- keep policy consistent across similar projects to reduce confusion.