9.4 KiB
Executable File
Architecture Overview (High-Level)
This document is the 10-minute tour for Stella Ops Suite: what components exist, how they fit together, and what "release control plane + security gates + evidence-linked decisions" means in practice.
For the full reference map (services, boundaries, detailed flows), see docs/ARCHITECTURE_REFERENCE.md.
What Stella Ops Suite Is
Stella Ops Suite is a centralized, auditable release control plane for non-Kubernetes container estates.
It sits between your CI and your runtime targets, governs promotion across environments, enforces security and policy gates, and produces verifiable evidence for every release decision.
CI Build → Registry → Stella (Scan + Release + Promote + Gate + Deploy) → Targets → Evidence
Guiding Principles
- Digest-first releases: a release is an immutable set of OCI digests, never mutable tags.
- Deterministic replay: the same inputs yield the same outputs (stable ordering, canonical hashing, UTC timestamps).
- Evidence-linked decisions: every release decision links to concrete evidence artifacts (scan verdicts, approvals, policy evaluations).
- Pluggable everything: integrations are plugins; the core orchestration engine is stable.
- Offline-first: all core operations work in air-gapped environments.
- No feature gating: all plans include all features; limits are environments + new digests/day.
System Map
Release-Centric Flow
Build → Scan → Create Release → Request Promotion → Gate Evaluation → Deploy → Evidence
↑ ↓
└── Re-evaluate on CVE Updates ┘
Platform Themes
Stella Ops Suite organizes capabilities into themes (functional areas):
Existing Themes (Operational)
| Theme | Purpose | Key Modules |
|---|---|---|
| INGEST | Advisory ingestion | Concelier, Advisory-AI |
| VEXOPS | VEX document handling | Excititor, VEX Lens, VEX Hub |
| REASON | Policy and decisioning | Policy Engine, OPA Runtime |
| SCANENG | Scanning and SBOM | Scanner, SBOM Service, Reachability |
| EVIDENCE | Evidence and attestation | Evidence Locker, Attestor, Export Center |
| RUNTIME | Runtime signals | Signals, Graph, Zastava |
| JOBCTRL | Job orchestration | Scheduler, Orchestrator, TaskRunner |
| OBSERVE | Observability | Notifier, Telemetry |
| REPLAY | Deterministic replay | Replay Engine |
| DEVEXP | Developer experience | CLI, Web UI, SDK |
Planned Themes (Release Orchestration)
| Theme | Purpose | Key Modules |
|---|---|---|
| INTHUB | Integration hub | Integration Manager, Connection Profiles, Connector Runtime, Doctor Checks |
| ENVMGR | Environment management | Environment Manager, Target Registry, Agent Manager, Inventory Sync |
| RELMAN | Release management | Component Registry, Version Manager, Release Manager, Release Catalog |
| WORKFL | Workflow engine | Workflow Designer, Workflow Engine, Step Executor, Step Registry |
| PROMOT | Promotion and approval | Promotion Manager, Approval Gateway, Decision Engine, Gate Registry |
| DEPLOY | Deployment execution | Deploy Orchestrator, Target Executor, Runner Executor, Artifact Generator, Rollback Manager |
| AGENTS | Deployment agents | Agent Core, Agent Docker, Agent Compose, Agent SSH, Agent WinRM, Agent ECS, Agent Nomad |
| PROGDL | Progressive delivery | A/B Manager, Traffic Router, Canary Controller, Rollout Strategy |
| RELEVI | Release evidence | Evidence Collector, Evidence Signer, Sticker Writer, Audit Exporter |
| PLUGIN | Plugin infrastructure | Plugin Registry, Plugin Loader, Plugin Sandbox, Plugin SDK |
Service Tiers
| Tier | Services | Key Responsibilities |
|---|---|---|
| Edge / Identity | StellaOps.Authority |
Issues short-lived tokens (DPoP + mTLS), exposes OIDC flows, rotates JWKS |
| Release Control | StellaOps.ReleaseManager, StellaOps.PromotionManager, StellaOps.WorkflowEngine |
Release bundles, promotion workflows, gate evaluation (planned) |
| Integration Hub | StellaOps.IntegrationManager, StellaOps.ConnectorRuntime |
SCM/CI/Registry/Vault connectors (planned) |
| Scan & Attest | StellaOps.Scanner, StellaOps.Signer, StellaOps.Attestor |
Accept SBOMs/images, produce DSSE bundles, transparency logging |
| Evidence Graph | StellaOps.Concelier, StellaOps.Excititor, StellaOps.Policy.Engine |
Advisories/VEX, linksets, lattice policy |
| Deployment | StellaOps.DeployOrchestrator, StellaOps.Agent.* |
Deployment execution to Docker/Compose/ECS/Nomad (planned) |
| Experience | StellaOps.Web, StellaOps.Cli, StellaOps.Notify, StellaOps.ExportCenter |
Operator UX, automation, notifications |
| Data Plane | PostgreSQL, Valkey, RustFS/object storage | Canonical store, queues, artifact storage |
Infrastructure (What Is Required)
Required
- PostgreSQL: canonical persistent store for module schemas.
- Valkey: Redis-compatible cache/streams and DPoP nonce store.
- RustFS (or equivalent S3-compatible store): object storage for artifacts, bundles, and evidence.
Optional (deployment-dependent)
- NATS JetStream: optional messaging transport in some deployments.
- Transparency log services: Rekor mirror (and CA services) when transparency is enabled.
End-to-End Flows
Current: Vulnerability Scanning Flow
- Evidence enters via Concelier and Excititor connectors (Aggregation-Only Contract).
- SBOM arrives from CLI/CI; Scanner deduplicates layers and enqueues work.
- Analyzer bundle runs inside the Worker and stores evidence in content-addressed caches.
- Policy Engine merges advisories, VEX, and inventory/usage facts; emits explain traces and stable dispositions.
- Signer + Attestor wrap outputs into DSSE bundles and (optionally) anchor them in a Rekor mirror.
- Console/CLI/Export surface findings and package verifiable evidence; Notify emits digests/incidents.
Planned: Release Orchestration Flow
- CI pushes image to registry by digest; triggers webhook to Stella.
- Stella scans the new digest and stores the verdict.
- Release created bundling component digests with semantic version.
- Promotion requested to move release from Dev → Stage → Prod.
- Gate evaluation checks: security verdict, approval count, freeze windows, custom policies.
- Decision record produced with evidence refs and signed.
- Deployment executed via agent to target (Docker/Compose/ECS/Nomad).
- Version sticker written to target for drift detection.
- Evidence packet sealed and stored.
Extension Points
Current Extension Points
- Scanner analyzers (restart-time plug-ins) for ecosystem-specific parsing and facts extraction.
- Concelier connectors for new advisory sources (preserving aggregation-only guardrails).
- Policy packs for organization-specific gating and waivers/justifications.
- AI code guard evidence for AI-assisted code changes (Scanner evidence + Policy overrides).
- Export profiles for output formats and offline bundle shapes.
Planned Extension Points (Three-Surface Plugin Model)
Plugins contribute through three surfaces:
- Manifest (static declaration): What the plugin provides (integrations, steps, agents, gates)
- Connector Runtime (dynamic execution): gRPC interface for runtime operations
- Step Provider (execution contract): Execution characteristics for workflow steps
Plugin types:
- Integration connectors: SCM, CI, Registry, Vault, Target, Router
- Step providers: Custom workflow steps
- Agent types: New deployment target types
- Gate providers: Custom gate evaluations
Offline & Sovereign Notes
- Offline Kit carries vulnerability feeds, container images, signatures, and verification material so the workflow stays identical when air-gapped.
- Authority + token verification remain local; quota enforcement is verifiable offline.
- Attestor can cache transparency proofs for offline verification.
- Evidence packets are exportable for external audit in air-gapped environments.
- All release decisions can be replayed with frozen inputs.
Key Architectural Decisions
| Decision | Rationale |
|---|---|
| Digest-first release identity | Tags are mutable; digests provide immutable release identity for audit |
| 3-surface plugin model | Enables extensibility without core code changes |
| Compiled C# scripts + sandboxed bash | C# for complex orchestration; bash for simple hooks |
| Agent + agentless execution | Agent-based preferred for reliability; agentless for adoption |
| Evidence packets for every decision | Enables deterministic replay and audit-grade compliance |
References
docs/ARCHITECTURE_REFERENCE.md— Full reference mapdocs/modules/release-orchestrator/architecture.md— Release orchestrator design (planned)docs/OFFLINE_KIT.md— Air-gap operationsdocs/API_CLI_REFERENCE.md— API and CLI contractsdocs/modules/platform/architecture-overview.md— Platform service designdocs/modules/scanner/operations/ai-code-guard.md— AI code guard operationsdocs/product/advisories/09-Jan-2026 - Stella Ops Orchestrator Architecture.md— Full orchestrator specificationdocs-archived/product/advisories/13-Jan-2026 - Controlled Conversational Interface.md- Controlled conversational interface guardrails and audit log