3.1 Control Plane vs Agent Execution Plane
3.2 Project Scope Model
3.3 Data Flow: Source -> Release -> Pipeline -> Logs/Artifacts
3.4 Runtime Configuration Layers (global / project / environment)
3.5 Pipeline Execution Semantics
3.6 Release Governance Path
3.7 Rollback Architecture (Policy-driven)
3.8 Security and Trust Boundaries
3.9 State and Persistence Model
3.10 Scalability Model
3.11 Failure Modes and Recovery Patterns
3.12 Why This Architecture Works in Practice
9.5 Checksum / Integrity Considerations
Orbnetes deployment and release orchestration documentation for operators and platform teams.
Artifact integrity is critical for reliable deployment.
Recommended integrity controls:
- store and display checksum (for example SHA-256) per artifact.
- verify checksum consistency between producer and deploy consumer.
- avoid mutable artifact replacement under same version label.
Operational guidance:
- treat artifact as immutable once released.
- if artifact content changes, publish a new version/tag.
- keep source of truth for checksums in CI release output.
- when using internal storage, capture checksum at upload and display it in UI.
Why integrity controls matter:
- prevent accidental file mismatch,
- reduce risk of tampering/supply-chain drift,
- improve confidence during rollback and incident response.
Practical Operator Checklist
Before launching a production release:
- Confirm correct source type is selected.
- Confirm expected tag/version is selected.
- Confirm release file name matches deploy intent.
- Confirm checksum (if available) matches CI/release record.
- Confirm pipeline blueprint expects and uses
ORBN_RELEASE_FILEcorrectly.
This checklist prevents most source-selection deployment mistakes.