Technical Architecture¶
This section outlines the major components and flows that power HybridOps.Studio. Detailed diagrams live in Diagrams & Guides; proofs for each assertion live under the Proof Archive.
Core Components¶
- Zero-Touch Bootstrap (
ctrl-01): The initial control node automates environment provisioning using Ansible and Packer. It performs Day-0/1 setup — network validation, RKE2 cluster bring-up, Jenkins installation, and GitOps enrollment — entirely hands-off. Evidence: Run artefacts & logs: ctrl-01 Zero-Touch - Control plane (on-prem): RKE2 (Kubernetes) with GitOps (ArgoCD/Flux). Rancher optional for fleet access.
- Data layer: PostgreSQL primary remains on-prem; WAL-G handles offsite backups and restores for DR.
Evidence: Run artefacts & logs: SQL RO & RPO - Networking: Google NCC provides hub-and-spoke connectivity across sites/clouds.
Evidence: Run artefacts & logs: NCC - Observability: Prometheus Federation aggregates metrics; Grafana provides DR panels and autoscale traces.
Evidence: Run artefacts & logs: observability - Decision Service: Policy engine that selects Azure/GCP using federation metrics, cloud monitoring, and credits.
Evidence: Run artefacts & logs: decision service - Images & CI/CD: Packer builds base images; Jenkins primary CI with GitHub Actions fallback.
Evidence: Run artefacts & logs: runtime images
DR & Bursting Flow (high level)¶
- Detect: Federation alerts trigger a DR/burst evaluation.
- Decide: Decision Service evaluates SLOs and credits, picks a target (Azure/GCP).
- Prepare: Terraform attaches/expands the chosen cluster (AKS/GKE) and networking.
- Promote/Restore: PostgreSQL promoted/restored via WAL-G; NetBox points to the active DB.
- Sync: GitOps reconciles workloads in the target; DNS cutover finalizes traffic.
- Verify: Grafana dashboards confirm RTO/RPO; evidence artifacts are exported.
Secrets management¶
HybridOps.Studio treats secrets as code-governed and provider-integrated:
- Kubernetes secrets workflow: GitOps-compatible (Sealed Secrets or External Secrets) with decryption at deploy time.
- Key management: Cloud KMS (Azure Key Vault / GCP KMS) or on-prem HSM, per environment.
- RBAC & lease-based access: Least privilege for controllers; rotation via CI hooks or vault policies.
- Auditability: Secret changes tracked via Git history and GitOps events; runtime access logged.
See also: Evidence Map → Observability / Decision Service topics for audit screenshots and CI logs.
Security & Operations¶
- RBAC, secrets, and change management tracked in the SecOps Roadmap — see SecOps Roadmap.
- All runs emit artifacts to
output/for auditability; curated proofs live in the Proof Archive.
Diagrams¶
- High-level and sequence views are maintained under Diagrams & Guides. Mermaid fallbacks exist where helpful.
Related¶
- Showcases: see the Showcase Catalog for focused demos and runbooks.
Last updated: 2025-10-05