Dedicated on-prem deployment with clear network and trust boundaries.
NOXA deployment is designed for customer-controlled infrastructure. DNS/FQDN, static IP, reverse proxy, and TLS choices are integrated in deployment planning without changing the runtime verify-only trust model.
What is implemented today and what stays environment-specific
NOXA runtime is delivered for customer-owned on-prem infrastructure with Compose, Kubernetes, or Helm deployment paths.
The product documents DNS/FQDN and certificate expectations, while the final mapping is defined per client by integrators.
Helm ingress is implemented, and TLS controls are enforced. External reverse proxy patterns are deployment architecture decisions handled with the integrator.
Operational deployment relies on signed artifacts delivered by Factory and Packager, then verified locally by runtime.
Client network planning baseline
Boundary and implementation notes
Single-server, internal infrastructure, and air-gapped variants
Deployment commands
Fast on-prem bootstrap and repeatable local operation.
python ./scripts/install.py compose-up --init-env --generate-certsRaw manifest deployment for controlled cluster environments.
python ./scripts/install.py k8s-up --init-env --generate-certsChart-based rollout with ingress-oriented deployment paths.
python ./scripts/install.py helm-up --init-env --generate-certsPreflight and readiness validation
python ./scripts/preflight.py --mode composepython ./scripts/preflight.py --mode k8spython ./scripts/preflight.py --mode helmcd backend && make prod-readiness-checkcd backend && make license-check