3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
4.3 Agent Health
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Agent Health summarizes readiness of the execution plane.
What this block is for:
- Detect infrastructure capacity/routing issues early.
- Confirm whether pipeline delays are caused by queue logic or agent availability.
- Observe runtime pressure signals (CPU/memory/disk where reported).
Typical indicators:
- online/offline/inactive state,
- last heartbeat age,
- runner version and update state,
- tags and OS profile,
- optional runtime metrics trends.
How to interpret quickly:
- Online + fresh heartbeat: agent is likely claim-capable.
- Stale heartbeat: connectivity/service issue likely.
- No matching tags: jobs remain queued even if agents are online.
- High pressure metrics: expect slower execution or instability.
Operational best practice:
- Keep at least one fallback agent per critical tag class.
- Standardize tags and avoid ambiguous routing labels.