3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
5.1 Project Concept and Boundaries
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Projects are the main organizational and security boundary in Orbnetes. They group execution assets, release workflows, and team access into isolated operational spaces.
Use projects to separate:
- products/services,
- teams/domains,
- risk zones (for example internal tools vs production systems),
- delivery lifecycles.
A project defines where this release activity belongs.
What is typically project-scoped:
- blueprints,
- releases and deployments,
- runs/pipelines generated from those blueprints,
- project secrets and variables,
- project environments and related runtime configuration.
Why this boundary matters:
- Prevents accidental cross-service deployments.
- Enables project-specific permissions and governance.
- Keeps dashboard/activity/alerts relevant to one product context.
- Simplifies incident response by reducing noise from unrelated systems.
Practical modeling guidance:
- One project per deployable product or tightly-coupled service group.
- Avoid one giant project for everything; it weakens permission boundaries.
- Use consistent naming and slug conventions for clarity in API/integrations.