ByteOr Enterprise Architecture Overview
Synced from repo docs
This page is synced from docs/architecture/overview.md via docs/public-docs.json. Edit the owning repo source instead of this generated copy. GitHub source: https://github.com/byteor-systems/byteor-enterprise/blob/master/docs/architecture/overview.md
byteor-enterprise is the product and operations layer that sits on top of the byteor OSS execution substrate.
At a high level, the stack is:
byteorOSS: spec types, validation, compilation, executor primitives, SHM backings, and the hot-path runtime model.byteor-enterprise: runtime packaging, policy gates, replay tooling, DataGuard, transport adapters, and product-specific binaries.- Optional cloud/control-plane layers: bundle authoring, fleet management, approvals issuance, and UI workflows. Those planning artifacts are archived here, but the authoritative cloud workspace lives outside this repo.
What this workspace owns
The enterprise workspace is organized around four operator-facing binaries and a set of support crates:
byteor-runtime: shared operator CLI for validation, execution, preflight checks, snapshots, incident bundles, and replay.byteor-edgeplane: transport-facing runtime for ingress and egress adapter loops.byteor-actiongraph: action-oriented runtime for side-effecting stages such ashttp_post:*andexec:*.byteor-dataguard: runtime for schema checks, redaction, and fused DataGuard stages.
Supporting crates provide the main enterprise value add:
byteor-policy: environment-aware side-effect gating and replay policy decisions.byteor-replay: offline replay and immutable replay audit generation.byteor-dataguard-coreandbyteor-redaction: schema-aware privacy and audit logic.byteor-adapters: ingress and egress integrations for transports such as HTTP, gRPC, Kafka, NATS, Redis Streams, RabbitMQ Streams, S3, PostgreSQL, and WebSocket.byteor-opsandbyteor-obs: host readiness, RT scheduling, memory-locking, pinning, and observability glue.
Execution flow
The common enterprise flow is:
- Author or receive a
spec.kvpipeline description. - Validate and describe it with
byteor-runtimeor the product binary. - Run it in SingleRing or LaneGraph form with an explicit tuning posture.
- Enforce environment and side-effect policy before live actions execute.
- Export artifacts such as incident bundles, snapshots, replay audits, and DataGuard reports for operator review.
Design boundary
This repo documents current enterprise behavior, not every historical design idea. If a document describes SaaS UI, control-plane APIs, or long-range planning instead of the current runtime and operator model, it belongs in ../archive/README.md rather than in the canonical sections above.