Configuration Lifecycle

From policy definition to fleet deployment—every step versioned, validated, and verifiable.

Hexarch manages configuration as immutable artifacts. You create, validate, bundle, deploy, and (if needed) roll back. The lifecycle is explicit, audited, and cryptographically verified.

The lifecycle

Define → Validate → Snapshot → Deploy → Monitor → (Rollback)
  1. Define: Create or update policies, rules, and configurations
  2. Validate: Artifact passes automated and manual checks
  3. Snapshot: Bundle configuration into a named, immutable snapshot
  4. Deploy: Push snapshot to target clusters
  5. Monitor: Track fleet cohesion and drift
  6. Rollback: Revert to previous snapshot if needed

Configuration artifacts

Artifacts are the building blocks—binary packages containing policy definitions:

FieldDescription
VersionSemantic version (e.g., v2.4.1-8f2a)
HashCryptographic content verification
StatusValidated, Invalid, Pending
SizeBinary artifact size (typically 0.8-1.3MB)
SignatureUnsigned, Signed, or Revoked

Artifacts are immutable. You don’t edit artifacts—you create new versions.

Artifact validation

Before an artifact can be deployed, it must pass validation:

Automated validation (Hexarch-Scanner)

Manual audit (SecOps review)

Validation status is tracked:

Configuration snapshots

Snapshots bundle artifacts for deployment:

FieldDescription
NameHuman-readable identifier (e.g., “Spring Equinox Production”)
StatusActive, Staged, Rollback
Target clustersWhich clusters receive this snapshot
Version mapPer-API version assignments (a1→v1, a2→v3)
CreatorWho created the snapshot
ApproverWho approved deployment

Snapshots are named and versioned. You deploy snapshots, not raw artifacts.

Snapshot metadata

Each snapshot includes:

High-risk changes require explicit approval. The audit trail records who approved and when.

Fleet synchronization

When you deploy a snapshot:

  1. Control plane broadcasts the desired state
  2. Gateway nodes receive the snapshot
  3. Nodes apply the configuration (hot-swap, no restart)
  4. Nodes report their applied state
  5. Control plane verifies hash match

If verification fails, the node is flagged as divergent. You see exactly which nodes failed and why.

Drift detection

Drift occurs when a node’s applied state doesn’t match the authority:

Causes:

Detection:

Resolution:

Rollback

If a deployment causes issues:

  1. Select previous snapshot from history
  2. Initiate rollback (requires justification)
  3. Fleet syncs to the rollback snapshot
  4. Verify cohesion across nodes

Rollbacks are deployments—they follow the same lifecycle and audit trail.

Snapshot states

StateMeaning
ActiveCurrently deployed to target clusters
StagedReady for deployment, not yet active
RollbackPreviously active, available for reversion

Only one snapshot is Active per cluster at a time.

Why this matters

Without Configuration Lifecycle:

With Hexarch:

Next steps