Pulse/docs/release-control/v6/internal/PLATFORM_SUPPORT_MODEL.md
2026-04-10 16:52:18 +01:00

19 KiB

Pulse v6 Platform Support Model

Last updated: 2026-03-31 Status: ACTIVE

This file is the canonical governed model for platform support in Pulse v6. It exists so new platforms are admitted against one shared contract instead of through platform-by-platform improvisation.

Canonical Rules

  1. A first-class platform is a governed Pulse platform id with one declared primary ingestion mode, one owned onboarding path, explicit canonical resource projections, and one declared support matrix across the product surfaces below.
  2. Platform families are grouping aids, not the support unit. Proxmox is a family; proxmox-pve, proxmox-pbs, and proxmox-pmg are separate first-class platforms because they onboard differently, project different canonical resources, and carry different support floors.
  3. Runtime variants are not top-level platforms. podman is a runtime variant inside the first-class docker platform. qemu, lxc, OCI guest/runtime details, and TrueNAS app-runtime internals are workload technologies inside an owning platform, not new platforms.
  4. Transport-specific implementations are not platforms. API clients, JSON-RPC sessions, pollers, agent heartbeat schemas, install flags, CRUD routes, and saved-connection tests are implementation details.
  5. Optional augmentation paths are not platforms. A unified agent installed on an API-backed host may enrich or enable control for that platform, but it does not replace the platform's primary support contract.
  6. hybrid is an ingestion mode, not a platform category. Use hybrid only when one first-class platform or resource contract intentionally merges API-backed and agent-backed truth.
  7. Platform work must project into canonical shared resources first. Do not add provider-local top-level resource types by default.

Platform Categories

First-Class Platform

A first-class platform must define:

  1. canonical platform id
  2. platform family, if any
  3. primary ingestion mode: api-backed, agent-backed, or hybrid
  4. owned onboarding path
  5. canonical unified-resource projections
  6. support-floor row across the product surfaces below
  7. assistant read classification and assistant control classification
  8. optional augmentation rules, if a secondary path is allowed

Runtime Variant

A runtime variant changes how a platform runs but does not change the owning platform id, onboarding path, or top-level support contract.

Examples:

  1. podman inside docker
  2. qemu versus lxc inside proxmox-pve
  3. container-runtime details inside TrueNAS-managed app-container resources

Transport-Specific Implementation

A transport-specific implementation is the concrete mechanism used to ingest, test, or execute a platform path.

Examples:

  1. pkg/pbs, pkg/pmg, and TrueNAS JSON-RPC clients
  2. Docker and Kubernetes agent report schemas
  3. --enable-docker, --enable-kubernetes, and --proxmox-type pve|pbs
  4. platform-connections CRUD and saved-connection test routes

Optional Augmentation Path

An optional augmentation path is a secondary governed path that enriches an existing first-class platform without replacing its primary ingestion mode.

Examples:

  1. a unified agent on a Proxmox node enabling hybrid host telemetry or guest control for proxmox-pve
  2. a unified agent on a TrueNAS appliance enriching a truenas system that is already supported through the API-backed poller

Canonical Ingestion Modes

API-backed

Pulse polls or queries the platform API directly. Optional agent data may augment the platform later, but API truth defines the support floor.

Current API-backed primary platforms:

  1. proxmox-pve
  2. proxmox-pbs
  3. proxmox-pmg
  4. truenas

Agent-backed

Pulse relies on a Pulse-managed agent as the primary source of truth. Specialized runtime modules may ride on the same host install, but the agent path defines the support floor.

Current agent-backed primary platforms:

  1. agent for unified-agent hosts
  2. docker
  3. kubernetes

Hybrid

Hybrid means one admitted platform deliberately merges API-backed and agent-backed truth into one canonical resource contract. Hybrid is valid only when the primary owner and the augmentation rule are both explicit.

Current governed hybrid-capable platforms:

  1. proxmox-pve
  2. proxmox-pbs
  3. truenas

docker and kubernetes do not become hybrid platforms merely because they run on a machine that also reports as agent; those are parallel first-class platforms sharing one physical host.

Canonical Resource Projection Rules

  1. Host-like systems should project as canonical agent resources plus platformType, not as provider-local host types.
  2. Current top-level exceptions are pbs and pmg, which remain dedicated canonical resource types because their product semantics are not reducible to a generic host row.
  3. Proxmox guest workloads project as vm and system-container.
  4. OCI and application workloads project as app-container, including TrueNAS-managed apps.
  5. Docker Swarm service topology projects as docker-service.
  6. Kubernetes projects as k8s-cluster, k8s-node, pod, and k8s-deployment.
  7. Storage projects through shared storage, ceph, and physical-disk resources instead of provider-local storage types.
  8. Recovery artifacts stay in internal/recovery and reference canonical platform ids plus canonical resource ids. Recovery provider strings are forward-compatible vocabulary, not support declarations by themselves.

Support Floor

Every first-class platform must declare one matrix row covering these product surfaces:

  1. onboarding/setup
  2. infrastructure visibility
  3. workloads, if the platform projects workload resources
  4. storage, if the platform projects storage or disk resources
  5. recovery, if the platform emits protected-item or recovery-artifact truth
  6. alerts, if the platform contributes operator-significant health state
  7. assistant read
  8. assistant control

A platform counts as supported only when every applicable surface above is either supported or explicitly n/a. Blank, implied, or hand-wavy coverage is not acceptable.

assistant control must be classified explicitly as one of:

  1. supported
  2. augmentation-only
  3. read-only
  4. n/a

Pre-Support Readiness Stages

An admitted first-class platform may be real engineering work long before it is honest to call it supported. Pulse therefore uses one governed pre-support checkpoint so delivery progress is visible without inflating the support claim.

  1. architecture-locked The admission model is resolved and implementation may start, but the platform is still only a planned or admitted direction.
  2. first-lab-ready The architecture is locked, the bounded shared phase floor is implemented, automated non-live proof covers that floor well enough to catch regression, and the next highest-value step is a real lab or customer environment run. first-lab-ready is an implementation checkpoint, not a support claim.
  3. supported Live proof validates the declared floor and the platform is admitted into the current support matrix.

Rules:

  1. Only supported changes the current support matrix.
  2. first-lab-ready may be used in execution plans, proof matrices, blocked-proof records, and progress reporting for admitted platforms.
  3. first-lab-ready must not leak into product wording, settings wording, or Assistant behavior as if support already exists.

Current Classification

First-class platforms

  1. agent for unified-agent hosts
  2. docker
  3. kubernetes
  4. proxmox-pve
  5. proxmox-pbs
  6. proxmox-pmg
  7. truenas

Admitted platforms (not yet supported)

  1. vmware-vsphere

Presentation-only platform vocabulary

  1. unraid
  2. synology-dsm
  3. microsoft-hyperv
  4. aws
  5. azure
  6. gcp

Machine-readable projection

PLATFORM_SUPPORT_MANIFEST.json is the machine-readable projection of the supported, admitted, and presentation-only platform vocabulary declared here. Tests and shared frontend vocabulary may consume that manifest, and the tracked frontend projection in frontend-modern/src/utils/platformSupportManifest.generated.ts must be generated from it, but neither projection may introduce platform ids or governance states that are not declared in this document.

Runtime variants

  1. podman is a runtime variant inside docker, surfaced through runtime metadata such as containerRuntime, not as a top-level platform.
  2. qemu, lxc, and OCI guest/runtime details are workload technologies inside proxmox-pve, not first-class platforms.
  3. TrueNAS app runtime internals are implementation details of truenas-owned app-container resources, not docker adoption.

Transport-specific implementations

  1. Proxmox, PBS, PMG, and TrueNAS connection CRUD and test routes
  2. PBS/PMG API clients and the TrueNAS JSON-RPC poller stack
  3. Docker and Kubernetes agent report contracts
  4. install-command helpers and setup-script flags
  5. platform badge and filter helpers

Optional augmentation paths

  1. unified agent on a Proxmox node
  2. unified agent on a TrueNAS appliance
  3. host-level agent support that enables shell or guest control for an already admitted API-backed platform

Current Support Matrix

Platform Family Primary mode Optional augmentation Canonical projections
agent Pulse-managed host agent-backed none agent, storage, physical-disk
docker container runtime agent-backed none agent, app-container, docker-service
kubernetes cluster runtime agent-backed none k8s-cluster, k8s-node, pod, k8s-deployment
proxmox-pve Proxmox api-backed host agent may augment into hybrid agent, vm, system-container, storage, ceph, physical-disk
proxmox-pbs Proxmox api-backed host agent may augment into hybrid pbs, storage
proxmox-pmg Proxmox api-backed none today pmg
truenas TrueNAS api-backed host agent may augment into hybrid agent, app-container, storage, physical-disk
Platform Setup Visibility Workloads Storage Recovery Alerts Assistant read Assistant control
agent install workspace supported n/a supported n/a supported supported supported
docker install workspace / runtime enablement supported supported n/a n/a supported supported supported
kubernetes install workspace / runtime enablement supported supported n/a supported supported supported supported
proxmox-pve platform connections supported supported supported supported supported supported augmentation-only
proxmox-pbs platform connections supported n/a supported supported supported supported read-only
proxmox-pmg platform connections supported n/a n/a n/a supported supported read-only
truenas platform connections supported supported supported supported supported supported supported

Current Inconsistencies To Treat Explicitly

  1. PLATFORM_SUPPORT_MANIFEST.json intentionally carries admitted and presentation-only ids such as vmware-vsphere, microsoft-hyperv, aws, azure, gcp, unraid, and synology-dsm so shared tests and frontend vocabulary can normalize them consistently. Those ids must not be interpreted as current support unless the classifications above say so.
  2. Recovery provider strings are intentionally forward-compatible and already include values such as docker, agent, and proxmox-pmg. Those strings do not mean recovery support exists until the platform matrix above marks recovery as supported.
  3. Frontend compatibility types still expose some legacy or presentation-local resource aliases. The canonical backend truth remains the shared unified-resource model plus this platform matrix.

Future Platform Admission

A new platform may be admitted as first-class only after governance answers all of these questions before implementation starts:

  1. What is the canonical platform id, and what platform family does it belong to, if any?
  2. Is the primary ingestion mode api-backed, agent-backed, or hybrid? If hybrid, what is primary and what is only augmentation?
  3. What is the canonical onboarding path: platform connections, install workspace, or both?
  4. What existing canonical resource types does it project into? New resource types require explicit justification; provider-local host types are forbidden by default.
  5. Which support-floor surfaces are supported, augmentation-only, read-only, or n/a?
  6. What stable identities drive dedupe, monitored-system counting, and cross-source merge with agent, docker, kubernetes, or other existing platforms?
  7. What transport/security boundary owns credentials, polling cadence, reconnect semantics, and disabled/default behavior?
  8. What proof demonstrates the declared floor is real in onboarding, visibility, applicable domain surfaces, alerts, and assistant behavior?

If those answers are not yet stable, the work must stop at a governed open-decision or resolved-decision update instead of starting runtime code.

VMware vSphere Admission Model

Pulse now has a resolved architecture recommendation for any future VMware vSphere work. This does not admit vmware-vsphere into the current support matrix yet. It defines the only acceptable phase-1 model if implementation starts.

  1. treat VMware as one separate first-class platform id, vmware-vsphere, not as another Proxmox subtype and not as a generic future-label shortcut
  2. use vCenter as the only supported phase-1 entry point
  3. treat direct ESXi onboarding as deferred work, not as an implied part of the vCenter claim
  4. keep the primary ingestion mode api-backed
  5. use official VMware APIs first: vCenter Automation API for modern inventory and VM control surfaces, plus the Virtual Infrastructure JSON API for alarm, event, snapshot, and performance/detail paths
  6. treat a Pulse-managed agent only as future augmentation for deeper host or guest behavior, not as a bootstrap requirement or primary support contract
  7. project ESXi hosts as canonical agent, guest workloads as canonical vm, and datastores as canonical storage
  8. keep vCenter, datacenter, cluster, folder, and resource-pool objects as topology or relationship metadata under those shared resources rather than inventing top-level esxi-host, vsphere-cluster, or vsphere-vm types
  9. keep physical-disk, system-container, app-container, and recovery artifacts out of the phase-1 projection contract unless a later governed slice proves they belong on the shared path
Platform Family Entry point Primary mode Optional augmentation Canonical projections Admission state Readiness stage
vmware-vsphere VMware vCenter only in phase 1 api-backed host or guest agent later, not phase 1 agent, vm, storage architecture locked, not yet in support matrix first-lab-ready

VMware vSphere Proposed Phase-1 Floor

This is the proposed phase-1 support floor once implementation and proof land. It is not a claim that VMware is currently supported in Pulse.

Platform Setup Visibility Workloads Storage Recovery Alerts Assistant read Assistant control
vmware-vsphere platform connections to vCenter only supported supported supported n/a supported supported read-only

Phase-1 floor details:

  1. visibility means inventory and topology read across vCenter-backed ESXi hosts, VM placement, and datastore relationships
  2. workloads means VM inventory, power/runtime state, guest identity when the API exposes it, snapshot-tree visibility, and metrics/alarm context
  3. storage means datastore inventory, capacity/free-space/accessibility, host attachments, and VM-to-datastore usage
  4. recovery stays n/a in the platform matrix because vSphere snapshots and changed-disk APIs are recovery-adjacent read signals, not a governed Pulse recovery-artifact or restore surface by themselves
  5. alerts means vSphere alarm state, overall health state, and related event/task history projected through shared alert and incident paths
  6. assistant control stays read-only even though VMware exposes real control APIs, because Pulse has not yet expanded the governed action surface into a general VMware admin plane

Phase-1 exclusions:

  1. direct ESXi onboarding
  2. physical-disk projection, including vSAN-only physical disk health APIs
  3. system-container or app-container projections
  4. treating vSphere snapshots as shared Pulse recovery support
  5. assistant or operator control claims for VM power, snapshot lifecycle, or guest operations
  6. any provider-local resource type, page shell, or AI tool family

Support gate:

Pulse should not call VMware supported until a real vCenter proves the declared floor end to end: connection onboarding, minimum privilege bundle, supported version floor, canonical agent/vm/storage projections, alert and metrics history truth, and assistant read behavior. If that proof does not hold, implementation must stop at governance rather than widening the support claim. The concrete first-implementation slice order and stop/go checks live in docs/release-control/v6/internal/VMWARE_VSPHERE_PHASE1_EXECUTION_PLAN.md. As of 2026-03-31, VMware has reached the governed first-lab-ready checkpoint: the non-live phase-1 floor is implemented and regression-proofed well enough that the next proper step is a real vCenter proof run rather than more architecture work.