Skip to main content
Version: 0.1.0-rc.5
Classification

Cloud reference architecture. This is the production-style Amazon EKS baseline validated by the project.

Decision matrix

Lane summary

Lane summary.
SurfaceChoiceWhy it matters
Seal pathAWS KMS via workload identityThe main workload uses a cloud-native unseal path instead of static or external secret material.
TLS modelspec.tls.mode: ACMEOpenBao remains the TLS endpoint and owns the public certificate lifecycle directly.
Edge modelDedicated public Gateway API passthroughThe hardened hostname stays isolated from the shared terminating admin edge and preserves tls-alpn-01 behavior.
Backup pathS3 with a separate backup identityThe lane proves that backup execution remains separate from KMS unseal and public-edge concerns.

Diagram

Validated lane topology

The hardened hostname lives on its own passthrough edge, OpenBao handles ACME itself, and the cluster still keeps backup and unseal identity surfaces separate.

Why this lane exists

Reference table

Key design choices

Key design choices.
ChoiceWhat it protectsWhy it stays in the lane
OpenBao-managed ACMECertificate issuance stays part of the OpenBao control surface.The lane is meant to prove the operator plus OpenBao certificate path, not an external certificate controller.
Shared ACME cacheMulti-replica certificate state remains consistent across Pods.The lane is not valid for HA ACME without an RWX-capable cache path.
Separate admin edgePublic ACME reachability does not force the rest of the platform onto the same public exposure contract.The hardened lane needs this separation to stay operationally realistic.

Stay on the validated path

  • keep the hardened hostname publicly reachable on port 443 for ACME validation
  • keep the public OpenBao hostname on a dedicated passthrough Gateway instead of the shared terminating edge
  • keep the ACME shared cache on RWX-capable storage for multi-replica safety
  • keep signed helper images and hardened verification enabled
  • keep backup and unseal IAM roles separate so the security model you validated is the one you actually operate
What this lane validated

The hardened EKS lane covered bootstrap, KMS auto-unseal, OpenBao-managed public ACME certificate issuance, Gateway passthrough, JWT bootstrap, human admin JWT login, and successful S3 backups.

What this lane is not

This is not the right lane if you need a source-restricted public hostname, externally managed TLS, or a terminating Gateway in front of OpenBao. Those choices are different contracts, not small tweaks to this one.

Use the lane

Prerelease documentation

This version tracks a prerelease build. Features and behavior may change before the next stable release.

Was this page helpful?

Use Needs work to open a structured GitHub issue for this page. The Yes button only acknowledges the signal locally.