Skip to main content

🏛️ Infrastructure Architecture

This document provides a deep-dive into the "Engine Room" of the Adamondo ecosystem. It explains how our cloud-native infrastructure is provisioned, secured, and orchestrated.


🔄 Automated Lifecycle (CI/CD)

Our deployment pipeline is fully automated from the first git push to the final cluster rollout.


🛡️ Security & Secret Injection

We follow a "Zero-Secrets-in-Code" policy using Infisical.


🏗️ Request Lifecycle & Ingress

All external traffic passes through multiple layers of security before reaching our logic. We differentiate between Public Web Traffic (API/App) and Secure Internal Tools.

🌐 Public Web Application

The Adamondo webapp is a hybrid architecture:

  • Static Frontend: Hosted on Cloudflare Pages, providing globally distributed static content.
  • Backend API: Hosted on Kubernetes (K8s), protected by Cloudflare's proxy.

🔒 Secure Internal Tools

For internal tools (e.g., Grafana, Admin panels), we use a zero-trust model via Cloudflare Tunnels.


⛓️ Database Migrations (ArgoCD Hooks)

To prevent downtime and ensure schema compatibility, we use ArgoCD lifecycle hooks.


💾 Data & Storage Layer

ServiceProviderContext
Primary DBMySQLManaged as a replicated K8s service.
CachingRedisioredis clustered setup for high-speed lookups.
Object StoreCloudflare R2S3-compatible storage for assets and OTA.
SecretsInfisicalCentralized vault for all environments.

📊 Monitoring & Reliability

  • Prometheus/Grafana: Infrastructure health and error rates.
  • Sentry: Application-level tracing and crash reporting (Unified for Web/iOS/Android).
  • HPA: Automatic scaling from 1 to 100+ replicas based on real-time load.