Skip to main content

🏗️ Architecture

📋 Table of Contents

  1. Overview
  2. Security and Data Concerns
  3. Stacktic Automation Overview
  4. Repository Structure
  5. Metadata and Logic
  6. Component Structure
  7. SaaS Deployment Options
  8. Security and Openness

Overview

The architecture and approach of Stacktic reflect a deep commitment to security, data privacy, and operational efficiency. This document provides a comprehensive breakdown of Stacktic's key architectural components and methodologies.

Key Principles

PrincipleDescriptionImplementation
Security FirstZero-trust model, minimal accessGenerator-only approach
Data PrivacyNo storage of personal/app dataMetadata-driven design
AutomationFull lifecycle automationDay 0-2 coverage
FlexibilityAdaptable to any requirementOpen platform architecture

🔒 Security and Data Concerns

Core Security Model

Stacktic is a stack generator, not an operator or deployment agent within your infrastructure.

What Stacktic Accesses

ComponentAccess TypePurposeData Retention
Git RepositoryWrite accessPush/merge generated codeNo retention
Container RegistryRead/WritePull base images, push buildsNo retention
Cluster (Optional)Read-only via agentHealth monitoringMetrics only

Security Guarantees

  • ✅ Credentials used only for initialization
  • No storage of personal information or application code
  • ✅ Provides application skeleton without touching your business logic
  • ✅ Optional lightweight agent for health monitoring only

Optional Agent Architecture

The optional agent communicates via API for health and stack layer information only:

  • Used for health checks, security validation, and scaling recommendations
  • Outbound communication only
  • No application data access

⚙️ Stacktic Automation Overview

Complete Lifecycle Automation

Stacktic automates every layer and step involved in delivering full-stack applications:

Automation Scope

The platform interprets metadata from your UI topology and automates:

  • Infrastructure configuration
  • API gateways and routing
  • Service connectors and dependencies
  • Security policies and RBAC
  • Operational tasks and monitoring

Important: Stacktic automates everything except your application logic and databases - maintaining clear separation of concerns.

Deployment Process

The generated automation is:

  • ✅ Committed to your Git repository
  • ✅ Installable with a single command
  • ✅ Compatible with existing tools (e.g., ArgoCD)
  • ✅ Deployable directly to Kubernetes

📁 Repository Structure

Design Philosophy

The repository structure combines Helm and Kustomize for maximum flexibility and maintainability:

Helm + Kustomize Integration

ToolPurposeBenefit
HelmTemplate generationParameterized YAML creation
KustomizeOverlay managementEnvironment-specific configs
  • Helm Chart Templating: Generates deployment YAML files that feed into Kustomize
  • Kustomize Control: Defines stack structure with pre-defined overlays
  • Single Command Deployment: Deploy entire stack on any Kubernetes cloud

Directory Organization

Deployment Structure

cat k8s/deploy/overlays/dev/kustomization.yaml
resources:
- fastapi
- stack-agent
- prod
- dev
- stage
- cert-manager
- minio
- apisix
- cnpg
- rabbitmq
- keycloak-operator.........

Base Components Layout

tree -d k8s/deploy/base/

k8s/deploy/base/
├── apisix
│ ├── crd
│ ├── patch
│ └── secret
├── cert-manager
│ └── issuer
├── cnpg
│ ├── backup
│ ├── jobs
│ ├── patch
│ └── secret
├── dev
│ ├── config
│ ├── files
│ ├── jobs
│ ├── patch
│ └── secret
│ └── cosign
├── fastapi
│ ├── files
│ ├── patch
│ └── secret
├── keycloak-operator
│ ├── crds
│ ├── jobs
│ ├── patch
│ └── secret
├── minio.............

Documentation and Source Code

Documentation Structure:

tree -d doc             
doc
├── apisix
├── cert-manager
├── cnpg
├── dev
├── fastapi
│ └── images
├── minio
├── prod
├── rabbitmq
├── stack-agent
├── stacktic
│ └── known-issues
└── stage

Source Code Organization:

tree -d fastapi 
fastapi
├── day2 # Operational scripts
├── dev_tools # Development utilities
├── src # Application source
│ ├── rabbitmq_module
│ └── stack_agent_api_module
└── tests # Test suites
└── integration

🧠 Metadata and Logic

Metadata-Driven Intelligence

Stacktic is a metadata-driven logic platform that interprets relationships and generates optimal configurations:

Pattern Recognition

From a single connection between services, Stacktic understands exactly what needs to happen:

Connection TypeAutomated Generation
Backend → Database• Secrets management
• Dependency resolution
• API connections
• ConfigMaps and environment variables
• Health checks and monitoring
• Backup configuration
• Documentation
Frontend → Backend• CORS configuration
• API gateway setup
• Authentication integration
• Rate limiting
• Client SDK generation
Service → Message Queue• Topic/queue creation
• Consumer configuration
• Dead letter queues
• Monitoring and alerts

Version Intelligence

The main variables affecting patterns are version differences, which influence:

  • Dependency compatibility
  • Configuration syntax
  • Feature availability
  • Security requirements

Stacktic automates the optimal pattern while adapting to version-specific dependencies.

image

🧩 Stacktic Structure: Components and Sub-Components

Hierarchical Component Model

Stacktic's structure is based on components (services) with sub-components (specific functionality):

Component Examples

Component TypeSub-ComponentsPurpose
KafkaTopics, Consumers, ProducersMessage streaming
MongoDBDatabases, Collections, UsersDocument storage
MinIOBuckets, Policies, UsersObject storage
PostgreSQLDatabases, Schemas, RolesRelational data

Connections and Relationships

Relationship Types

  • ComponentsSub-components (bi-directional)
  • ComponentsComponents
  • Sub-componentsComponents

Configuration Attributes

LevelAttribute TypesExamples
ComponentsVersioning, deploymentImage tags, replicas, resources
LinksConnection behaviorProtocols, authentication, routing
Sub-componentsElement-specificBucket policies, database secrets

This structure provides flexibility and precision while maintaining a clear hierarchy.

image

🏢 Stacktic SaaS Considerations

Multi-Tenant Architecture

Stacktic's public SaaS is built on multi-tenant principles with best security practices:

  • No storage of personal application data
  • Isolated tenant environments
  • Encrypted communications
  • Compliance ready (SOC 2, GDPR, HIPAA)

Flexible Deployment Options

For customers with specific security or compliance requirements:

1. 🌐 Private Public SaaS

  • Dedicated instance for your organization
  • Custom configurations to meet security requirements
  • IP whitelisting and firewall rules
  • Isolated backend management
  • Best for: Enhanced security needs

2. 🏢 Private SaaS for Highly Regulated Customers

  • Deploy within your own clusters
  • Compliant data centers or air-gapped environments
  • Stacktic provides remote updates only
  • Full control of sensitive environments
  • Best for: Maximum compliance requirements

Deployment Comparison

FeaturePublic SaaSPrivate Public SaaSPrivate On-Premises
ManagementFully managedManaged with customizationSelf-managed with support
IsolationMulti-tenantSingle-tenantComplete isolation
UpdatesAutomaticScheduledControlled
ComplianceStandardEnhancedCustom
Cost$$$$$$

🔐 Security and Openness

Open Platform Philosophy

Stacktic is an open platform, providing:

Customization Capabilities

  • Modify security measures and policies
  • Add custom configurations
  • Integrate with existing tools
  • Extend functionality as needed

Benefits

  • No vendor lock-in - Full control over generated code
  • Compliance alignment - Match internal security policies
  • Flexibility - Adapt to unique requirements
  • Transparency - All generated code is visible and modifiable

Note: When deploying as private SaaS or using the health-check agent, you retain full control to modify and enhance security measures according to your organization's policies.


📚 Summary

Key Architectural Highlights

AspectImplementationBenefit
Security ModelGenerator-only, no runtime accessMaximum data privacy
Automation ScopeDay 0-2 complete lifecycle90% reduction in manual work
Repository StructureHelm + Kustomize hybridFlexibility and maintainability
Metadata EnginePattern recognition and version intelligenceAutomated best practices
Component ModelHierarchical with relationshipsIntuitive and scalable
Deployment OptionsSaaS to air-gappedFits any requirement
Platform OpennessFully customizable outputNo vendor lock-in

Next Steps

  1. 📖 Review the Operational Guide for Day 0-2 workflow
  2. 🔒 Explore the Security Framework for hardening details
  3. 🚀 Start with a Quick Start Guide to build your first stack
  4. 💬 Join our Community for support

Stacktic - Automating everything except your business logic, so you can focus on what matters.