Kubernetes¶
bijux-atlas-ops/kubernetes explains the Atlas Kubernetes operating model. The
section treats Kubernetes as a governed contract system rather than a loose set
of Helm templates.
Purpose¶
Use this section when you need to understand how Atlas turns Helm values and profile intent into rendered manifests, cluster installs, rollout decisions, security reviews, and conformance evidence.
Source of Truth¶
ops/k8s/charts/bijux-atlas/defines the chart structure, baseline values, and values schema.ops/k8s/values/defines install profiles, overlays, examples, and documentation mappings.ops/k8s/install-matrix.jsondefines supported install and upgrade paths.ops/k8s/rollout-safety-contract.jsondefines promotion and rollback invariants.ops/k8s/profile-security-contract.jsonandops/k8s/admin-endpoints-exceptions.jsondefine security expectations and explicit exceptions.ops/k8s/tests/manifest.json,ops/k8s/tests/suites.json, andops/k8s/tests/goldens/define conformance execution and evidence.
What Is Governed¶
The Kubernetes slice governs:
- chart ownership boundaries and generated output discipline
- valid values, profile intent, and high-risk value restrictions
- supported install, upgrade, rollback, offline, and air-gapped paths
- rollout readiness, drain, safety gates, and rollback triggers
- network policy expectations, security posture, and approved exceptions
- rendered manifest validation and conformance evidence
Kubernetes Control Model¶
Atlas uses a layered control model:
- Operators start with the chart baseline in
ops/k8s/charts/bijux-atlas/values.yaml. - A governed profile or overlay from
ops/k8s/values/*.yamlselects the intended environment shape. values.schema.jsonand related policies reject unsupported or risky input combinations before render.- Rendered manifests become the deployable contract and are checked for schema, Kubernetes validity, and suite coverage.
- Rollout safety and security review decide whether the rendered output may be promoted.
- Conformance reports and generated inventories become release evidence.
How to Validate¶
Use the pages in this section in the same order an operator would validate a cluster change:
- Confirm value ownership in Helm Values Model.
- Check supported deployment paths in Install Matrix.
- Follow the render pipeline in Render and Validate.
- Review promotion gates in Rollout Safety.
- Review security posture in Security Operations and Admin Endpoints Exceptions.
- Inspect evidence expectations in Conformance Suites and Debug Bundles.