3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
5.3 Allowed Agents
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Allowed Agents defines which global agents a project can use.
Why this exists:
- Agents are typically global inventory objects, but project access must be controlled.
- Not every project should be able to execute on every host class.
- This creates a clean security and routing boundary without duplicating agents.
How it works operationally:
- Project selects a subset of agents.
- Jobs still require tag match, but only within project-allowed agents.
- If no allowed agent can satisfy tags, jobs remain queued.
Common misconfiguration pattern:
- Agent is online, tag matches, but agent not assigned to project -> job never starts.
Best practices:
- Assign least required agent set per project.
- Segment sensitive runners (production) from shared utility runners.
- Keep tag taxonomy consistent across allowed agent pools.