3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
7.1 Global Configuration Overview
Orbnetes deployment and release orchestration documentation for operators and platform teams.
The Configuration area defines global platform behavior shared across projects. Use it to set authentication, notification transport, and baseline operational policies.
Configuration principles:
- Keep global settings minimal and intentional.
- Prefer project-level overrides where behavior should differ per team/service.
- Treat config changes as production changes (auditable, reviewed, and tested).
Global Configuration controls platform-wide defaults and integrations.
Typical categories:
- Notifications provider and delivery transport.
- OAuth authentication providers (GitHub/GitLab).
- Security-sensitive integration credentials.
- System defaults that influence user and project behavior indirectly.
What belongs in global config:
- Cross-project integrations (SMTP, OAuth provider client credentials).
- Shared platform switches that should be uniform.
What should not be global:
- Service-specific deployment secrets.
- Environment-specific runtime values.
- Team-specific operational toggles better handled in project scope.
Operational recommendation:
- Keep global config stable and version-tracked internally.
- Maintain a change log for global config updates for incident correlation.