Opplet Master Architecture: Infrastructure Constitution (v7.7)

Document Status: RATIFIED (Kitchen Migration & Dwelling Analogy Update)
Classification: INTERNAL // COMMAND EYES ONLY
Effective Date: 2026-03-11

Preamble: The Doctrine of Sovereign Computation

We, the People of Opplet, in order to secure our digital sovereignty, ensure the integrity of our data, and cultivate a meritocratic forge for talent, do ordain and establish this Infrastructure Constitution.

This enclave exists to enforce a separation of powers between The Sovereign (who owns the infrastructure) and The Talent (who utilizes it). We reject the fragility of monolithic chaos and the tyranny of third-party dependence.

Our Four Pillars of Operation:

  1. Identity is Sovereign: Control of the root credential is the only true ownership. We delegate access, never authority.
  2. Code is Law: Policy is not written in memos; it is enforced by firewalls, pipelines, and automation.
  3. Automation is the Manager: Human intervention is a failure of design. The machine must govern the routine; the human governs the exception.
  4. Observation is Truth: Trust is a vulnerability. We do not trust; we verify through logs, metrics, and immutable audit trails.

Therefore, let this document serve as the supreme law for all hardware, software, and network protocols within the Opplet, KenyaX, and WiseNxt domains. Any configuration found in violation of these articles is null and void.


1. The Hemispheric Strategy (Physical Topology)

The enclave is strictly partitioned into three physical nodes to isolate high-risk “Talent” workloads from the “Sovereign” control plane.

  • The Citadel (Sovereign Core): High-Availability, Low-Power, Sovereign.
    • Role: The Brain. Identity (Alpha), Internal Automation, Capital Preservation, Observability.
  • The Gateway (Delivery Edge): High-Performance, High-Bandwidth.
    • Role: The Forge & Front Door. Source Code, Talent Lifecycle, CI/CD Compilation, Public Traffic Proxies.
  • The Range (Live Fire Sandbox): High-Density, Volatile.
    • Role: The Muscle. Physically isolated sandbox existing strictly for exploitation and target practice.

2. Infrastructure Zoning Strategy

ZoneDesignationIdentity ProviderHardware LocationRisk Profile
Zone 0The BasementLDAP-AlphaThe CitadelCritical
Zone 1BunkerAdmin OnlyThe CitadelSovereign
Zone 2The DeskLDAP-AlphaThe CitadelHigh
Zone 3Kitchen (Core)LDAP-BetaThe GatewayMedium
Zone 3Kitchen (Runners)CI TokensThe GatewayMedium
Zone 4ArenaMixed (OIDC)The GatewayLow
Zone 5The RangeLDAP-BetaThe RangeExtreme

The Alpha-Override Rule: Zone 4/5 apps use LDAP-Beta for talents but MUST map Administrative privileges to LDAP-Alpha to prevent Sovereign lockout during a “Talent Wipe.”


3. Hardware Allocation (The Metal)

The Citadel: The Command Post (Zones 0 - 2)

  • Nodes: 3x Xeon E3-1275v5 (64GB RAM).
  • Storage: Local ZFS Replication (15m Interval).
  • Mission: Run the “Sovereign Core” without public resource contention.
ComponentRoleZoneRAM
AuthentikGatekeeper. OIDC/SAML Hub.04 GB
LDAP-AlphaIdentity A. Sovereign Directory.02 GB
WatchtowerWazuh / Loki / Grafana / Matomo.08 GB
n8n-AlphaThe Butler. Internal Ops.14 GB
BunkerNextcloud / Vaultwarden. Private Data.18 GB
ERPNextThe Bursar. Finance/Inventory.216 GB

The Gateway: The Delivery Edge (Zones 3 - 4)

  • Node: 1x AMD Ryzen 9 7950X3D (AX102-U Target), 128 GB DDR5 ECC RAM.
  • Storage: 2x 1.92 TB Gen4 Datacenter NVMe SSDs (Local ZFS Mirror).
  • Mission: Handle heavy I/O, CI/CD compilation, source code management, and proxy all public/talent web traffic.
ComponentRoleZoneRAM
GitLab CoreThe Factory. Source Code & Registry.324 GB
LDAP-BetaIdentity B. Talent Directory.34 GB
Build FarmRunners. CI/CD Compilers.340 GB
MoodleLedger. Talent Database & Web UI.416 GB
Arena CommsJitsi / Discourse / HumHub.432 GB
Traefik/ProxiesIngress, Auth Outpost, Guacamole.412 GB

The Range: The Live Fire Sandbox (Zone 5)

  • Node: 1x AMD Ryzen 9 3900 (Auction) or similar, 128 GB DDR4 ECC RAM.
  • Storage: 2x 1+ TB U.2 Datacenter NVMe SSDs (Local ZFS Mirror).
  • Mission: Host defensible VMs and vulnerable targets in a physically air-gapped environment.
ComponentRoleZoneRAM
Range TargetsDefensible VMs & Payloads.5120 GB
TelemetryLocal Wazuh Forwarders.58 GB

4. Software Matrix (The Weapons Locker)

A. The Sovereign Core (The Citadel)

AppProduct RoleZoneTechIdentity Source
OpenLDAP-AIdentity Provider (Root)0NativeSelf (Alpha Root)
WireGuardSecure Sovereign Tunnel0KernelKey Pairs
WazuhSIEM / Security Monitoring0C++Local Admin
MatomoPrivacy-First Analytics0PHPLocal Admin
GrafanaObservability Dashboards0GoLDAP-Alpha
n8n-AlphaThe Butler (Sovereign Automation)1NodeLDAP-Alpha
BookStack-AThe Grimoire (Private SOPs)1PHPLDAP-Alpha
BunkerCredential & Private File Storage1MixedLocal Admin
ERPNextThe Bursar (Finance/Inventory)2PythonLDAP-Alpha

B. The Factory & Edge (The Gateway & The Range)

AppProduct RoleHardwareZoneIdentity Source
GitLab CEThe Forge (Opplet/KenyaX/WiseNxt)Gateway3Mixed (Alpha/Beta)
OpenLDAP-BTalent Identity (Directory B)Gateway3Self (Beta Root)
GitLab RunnerCI/CD Compiler (The Muscle)Gateway3Reg. Token
MoodleWiseNxt (Talent Ledger & LMS)Gateway4LDAP-Beta
Jitsi/DiscourseArena Comms (Community & Training)Gateway4Authentik (OIDC)
TraefikThe Gatekeeper (Public Ingress)Gateway4Local Config
GuacamoleThe Air-Lock (Remote Access Proxy)Gateway4Authentik (OIDC)
BookStack-BThe Common Library (Public Docs)Gateway4LDAP-Beta
Target VMsExploitation Targets (Training)Range5Local Accounts

C. Infrastructure OS & Dependencies

  • Hypervisor: Proxmox VE (Debian) across all nodes.
  • Edge Router: OPNsense (Hardened BSD) virtualized on The Citadel.
  • Storage: OpenZFS (Strictly local to each node).
  • SMTP Relay: Mailgun / SES for trusted outbound email.
  • Watchdog: External Uptime Kuma (Micro-VPS) for external uptime monitoring.

5. The CMS/Static Triad (Public Fronts)

Hosted on The Gateway (Zone 4) behind Traefik.

  • Opplet.com: Hugo (Static). Commercial / Infrastructure Brand.
  • KenyaX.com: Grav (Flat-File). Logistics & Impact.
  • WiseNxt.com: MkDocs (Static). Recruitment & Training.

6. Network Protocol (The Sovereign Gap)

A. The Janitor Rule (Traffic Flow)

  • The Citadel $\rightarrow$ Gateway/Range: ALLOWED. (Telemetry Pull, Admin Management).
  • Gateway/Range $\rightarrow$ The Citadel: DENIED.
    • Exception 1: OIDC calls to Authentik (HTTPS 443).
    • Exception 2: n8n-Alpha triggers (Encrypted Internal Webhooks via X-Internal-Token).
    • Exception 3: The Backup Bridge. The Gateway pushes state to PBS (Zone 1).

B. The Storage Isolation Mandate

Distributed storage protocols (including Ceph, GlusterFS, vSAN) are EXPLICITLY BANNED from spanning across physical nodes. Storage must remain strictly local (ZFS) to each hypervisor to preserve NVMe IOPS capabilities and enforce the Sovereign Gap. State transfer shall occur exclusively via the encrypted Backup Bridge.

C. The Talent Proxy

  • Direct Access: Talents log into access.wisenxt.com (Zone 4) on The Gateway.
  • Isolation: Apache Guacamole on The Gateway proxies the VNC/SSH connection directly to The Range via Hetzner’s vSwitch. The talent’s local hardware never touches the execution network layer.

D. The Backup Bridge

The Gateway pushes “State” (GitLab Artifacts, Moodle DB) to The Citadel nightly via Proxmox Backup Server.

  • Security: This is a “Drop-Only” permission. The Gateway cannot read or delete existing backups on The Citadel.

7. The Kill Switch Matrix

LevelTriggerActionMechanism
L1Moodle InactivitySuspend Usern8n-Alpha locks LDAP-Beta account.
L2Range BreachIsolate Zone 5OPNsense cuts VLAN 5 WAN access.
L3Gateway CompromisePhysical SeverOPNsense on The Citadel disables the uplink port to The Gateway.

8. The Intelligence Layer (Observability & Meritocracy)

A. The Split-Brain Protocol

  • Sovereign Data: (Internal ops) Stays on The Citadel ZFS. No offsite transit except via encrypted PBS.
  • Liability Data: (Talent logs) Wazuh agents on The Range and Gateway forward immutable telemetry over the Janitor Rule exception directly to Watchtower (Zone 0) for non-repudiation.

B. The Meritocracy Loop

  • Event: Talent passes quiz in Moodle (The Gateway).
  • Signal: Moodle sends webhook to n8n-Alpha (The Citadel).
  • Action: n8n-Alpha connects to LDAP-Beta (The Gateway) and promotes user to “Associate.”
  • Result: User instantly gains access to GitLab Writers Group.

C. The External Pulse

  • Uptime Kuma (VPS): Pings the Gateway and Citadel public IPs every 60 seconds.
  • Dead Man’s Switch: If The Citadel goes dark, it sends a high-priority Pushover notification to the Owner via 5G/LTE.

9. Documentation Structure

With GitLab migrating to the Gateway, the physical location of documentation is split to enforce the Sovereign Gap.

  • GitLab (The Gateway): Technical Source of Truth (Infrastructure as Code, CI/CD pipelines, Opplet/KenyaX source code).
  • BookStack-Alpha (The Citadel): The Sovereign’s Grimoire (Owner’s private SOPs, architecture blueprints, disaster recovery keys).
  • BookStack-Beta (The Gateway): The Common Library (Public knowledge base, community guides, and Talent onboarding instructions).
// back to top