Page cover

Deployment Architecture

Acceso runs as a distributed, cloud-native system. It is designed for high availability and predictable performance. It supports controlled evolution without risky releases.

At a glance

  • Independent, stateless services.

  • Environment separation (dev, staging, prod).

  • Horizontal scaling at the service level.

  • Zero-downtime deployments for API-facing services.

  • Automated, versioned deployments to reduce operational risk.

Deployment model (how the platform is shipped)

Acceso follows an immutable, versioned release approach. Deployments are automated and repeatable across environments.

Core properties:

  • Versioned service artifacts per deployment.

  • Consistent rollout mechanics across services.

  • Separation between deploy artifacts and runtime configuration.

Service topology (blast radius by default)

Services are independently deployable. They can scale, update, or recover without blocking others.

Operational implications:

  • Independent scaling and restart behavior.

  • Service-scoped capacity planning.

  • Domain-scoped rollouts and rollbacks.

Stateless-by-default keeps rollbacks simple. State changes should be explicit and isolated.

Environments (separation and safety)

Acceso is operated with environment separation:

  • Development

  • Staging

  • Production

Environment separation supports:

  • Safer rollout validation.

  • Controlled experimentation.

  • Reduced configuration drift and accidental coupling.

Scaling and capacity behavior

Scaling happens at the service level. This supports horizontal scalability without global coordination.

Typical scaling levers:

  • Add replicas for concurrency.

  • Scale the hottest services first.

  • Keep upstream pressure bounded with rate limits and caching.

Stateless services

  • Easier horizontal scaling.

  • Safer restarts and reschedules.

  • Lower coupling during deploys.

Stateful components

  • Isolate behind stable interfaces.

  • Treat schema and retention as contracts.

  • Change slowly with explicit safety checks.

Rollout strategy (keeping the API online)

API-facing services support zero-downtime deployments. Rollouts should preserve:

  • Backward compatibility at the request boundary.

  • Deterministic health checks for readiness.

  • Fast rollback paths when error rates rise.

Operator notes (deep dive)

Common release risks to guard against:

  • Backward-incompatible request/response changes.

  • Cold-start latency spikes from cache warmup.

  • Hidden coupling via shared dependencies or config.

Operational mitigations often include:

  • Strict health/readiness checks.

  • Controlled rollout cadence.

  • Version pinning where contracts must not drift.

Last updated