3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
6.4 Agent Update Mechanism
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Orbnetes supports controlled server-driven updates.
Typical update flow:
- Upload new runner package (binary/archive).
- Set update target for agent.
- Agent receives update instruction on heartbeat/poll cycle.
- Agent downloads package, installs binary, and restarts as required.
- New version appears in runtime metadata.
Operational safeguards:
- Use trusted release pipeline for update packages.
- Keep one canary agent before broad rollout.
- Validate version reporting after restart.
- Maintain rollback path for runner binary updates.
Important operational detail: service manager restart behavior must be correct (systemd/launchd/Windows Service) to avoid update loops.