Some checks failed
		
		
	
	Docs CI / lint-and-preview (push) Has been cancelled
				
			- Introduced guild charters for Scanner Deno, PHP, Ruby, Native, WebService, Java, Surface.Env, Surface.FS, Surface.Secrets, Surface.Validation, UI, Zastava Observer, Zastava Webhook, Zastava Core, and Plugin Platform. - Each charter outlines the mission, scope, required reading, and working agreements for the respective guilds. - Created task boards for Surface.Env, Surface.FS, Surface.Secrets, Surface.Validation, and Zastava components to track progress and dependencies. - Ensured all documents emphasize determinism, offline readiness, security, and integration with shared Surface libraries.
		
			
				
	
	
	
		
			1.9 KiB
		
	
	
	
	
	
	
	
			
		
		
	
	
			1.9 KiB
		
	
	
	
	
	
	
	
Zastava Deployment Runbook
Audience: DevOps, Zastava Guild
Purpose: Provide steps for deploying Zastava Observer + Webhook in connected and air-gapped clusters.
1. Prerequisites
- Kubernetes 1.26+ with admission registration permissions.
 - Access to StellaOps Container Registry or offline bundle with Zastava images.
 - Authority scopes and certificates configured for Zastava identities.
 - Surface.FS cache endpoint (RustFS/S3) reachable from nodes.
 
2. Installation Steps
- Prepare namespace & secrets
- Create Kubernetes namespace (default 
stellaops-runtime). - Provision secrets (
zastava-mtls,zastava-op-token,surface-secrets). 
 - Create Kubernetes namespace (default 
 - Deploy Observer
- Apply Helm chart 
helm/zastavawith values aligning to Surface.Env settings. - Confirm DaemonSet pods schedule on all nodes; check 
/healthzendpoints. 
 - Apply Helm chart 
 - Deploy Webhook
- Install ValidatingWebhookConfiguration with CA bundle and service reference.
 - Enable dry-run mode first, monitor logs, then switch 
enforce=trueonce validations pass. 
 - Configure policies
- Populate admission policies in Policy Engine; ensure tokens contain 
runtime:readscopes. - Update CLI/Console settings for runtime posture view.
 
 - Populate admission policies in Policy Engine; ensure tokens contain 
 - Observability
- Scrape metrics (
zastava_observer_*,zastava_webhook_*). - Stream logs to central collector.
 
 - Scrape metrics (
 
3. Air-Gapped Deployment Notes
- Use Offline Kit bundle (
offline/zastava/) to load images and configuration. - Validate Surface.FS bundles before enabling enforcement.
 - Replace webhook CA with offline authority; document rotation schedule.
 
4. Validation
- Run 
stella runtime policy testagainst sample workloads. - Trigger deployment denial for unsigned images; verify Notifier emits alerts.
 - Check timeline events for observer telemetry.
 
5. References
docs/modules/zastava/architecture.mddocs/modules/scanner/architecture.mddocs/airgap/airgap-mode.mddocs/forensics/timeline.md