New Page
Cirrus Stack: Enterprise Service Mesh Technical Overview
Owner: Tranquil IT (trql.it)
Mission: Leading the transition to sustainable, high-efficiency IT infrastructure through aggressive service consolidation, automated lifecycle management, and the implementation of "Gold Image" architectures that minimize carbon emissions.
🏗️ 1. Architecture Overview
The Cirrus Stack is engineered around a sophisticated "Double-Stack" model, a design philosophy specifically chosen for maximum resource density and administrative simplicity. At its core, a master Caddy gateway acts as the primary intelligent traffic controller. This gateway provides unified SSL/TLS termination and executes path-based routing logic that directs traffic with microsecond precision.
Technically, this architecture bifurcates the environment: it separates the core application stack (Samba, Keycloak, Nextcloud) from a standalone, highly optimized Mailcow instance. This separation ensures that high-velocity communication services (SMTP/IMAP) do not compete for the same kernel process resources or I/O priority as collaborative document tools. By integrating every service via OpenID Connect (OIDC) and LDAP, we have effectively eliminated fragmented user databases. This shift toward a centralized Identity and Access Management (IAM) framework serves as a "Force Multiplier" for security—reducing the attack surface while dramatically lowering the carbon footprint. By minimizing "idle-cycle" waste—the energy consumed by servers waiting for tasks—we achieve a level of efficiency that siloed, multi-server environments cannot match.
đź”’ 2. Connectivity & Security Layer
Caddy (The Unified Intelligent Gateway)
-
Role: High-performance reverse proxy, automatic TLS manager, and HTTP/3 enabled entry point.
-
Technical Depth & Benefits:
-
Zero-Touch Automation: Caddy revolutionizes certificate management by handling the entire lifecycle of SSL/TLS certificates through ACME protocols (via Let's Encrypt or ZeroSSL). This includes automatic domain validation, acquisition, and silent renewals, which eliminates the common risk of service downtime caused by human oversight of expiration dates.
-
Traffic Orchestration & Efficiency: By consolidating all web traffic into a single entry point, Caddy allows for global load balancing and header manipulation. For instance, it handles autoconfig and autodiscover hijacks, providing a "Zero-Config" experience where users simply enter an email address, and the proxy provides all necessary server settings to clients like Thunderbird and Outlook.
-
Memory-Safe Security: Built on a memory-safe architecture (Go), Caddy provides an inherent defense against the buffer overflow vulnerabilities that plague legacy C-based proxies. It also implements modern security headers (HSTS, CSP) by default, hardening the web front-end against cross-site scripting and protocol downgrades.
-
Netbird (Zero-Trust Mesh VPN)
-
Role: Peer-to-peer (P2P) overlay network built on the high-performance WireGuard protocol.
-
Technical Depth & Benefits:
-
Elimination of Public Exposure: Netbird creates a private mesh that allows remote hosts, such as the Nextcloud and AD servers, to communicate securely across the public internet as if they were on the same local switch. This removes the need for traditional port forwarding or "DMZs," which are frequent targets for automated brute-force attacks.
-
SSO-Driven Zero-Trust: Unlike legacy VPNs that grant broad network access once a user is "in," Netbird treats every connection as untrusted. Access is only granted after successful authentication via the stack's centralized Keycloak SSO. This ensures that even if one device is compromised, lateral movement within the network is strictly prevented by cryptographic access control lists (ACLs).
-
High-Speed Cryptography: Utilizing WireGuard ensures that the CPU overhead for encryption is negligible. This allows for near-line-speed throughput, which is essential for handling large-scale file synchronizations in Nextcloud without the latency typical of older IPSec or OpenVPN implementations.
-
Step-CA (Private Certificate Authority)
-
Role: Automated internal certificate management and private ACME server.
-
Technical Depth & Benefits:
-
East-West Traffic Security: While Caddy secures external "North-South" traffic, Step-CA provides the infrastructure for Mutual TLS (mTLS) between internal containers. This ensures that data moving between the Samba and Keycloak containers, for example, is encrypted and verified, preventing internal sniffing or spoofing.
-
Private Trust Infrastructure: It establishes an internal root of trust that is independent of public certificate authorities. This is critical for authenticating legacy protocols like RADIUS or securing IoT devices that cannot communicate with the public internet. It automates the rotation of internal certs, ensuring that even if an internal key is leaked, its window of utility is extremely short.
-
🔑 3. Identity & Access Management (IAM)
Samba (Active Directory Domain Controller)
-
Role: The authoritative, master source of truth for all user identities and group memberships.
-
Technical Depth & Benefits:
-
Protocol Bridge: Samba acts as a vital bridge between legacy and modern worlds. It provides Kerberos and LDAP support for Windows and Linux workstations to join the domain, while simultaneously serving as the high-speed backend for modern OIDC applications.
-
Automated User Provisioning: The centralized nature of Samba means that creating a single user record automatically propagates that identity across the entire ecosystem—Email, Cloud, and VPN. This reduces administrative overhead by an estimated 80% and ensures that offboarding a user results in the instant, global revocation of all access privileges.
-
Keycloak (The Modern Identity Provider)
-
Role: OIDC and SAML 2.0 identity broker and federation engine.
-
Technical Depth & Benefits:
-
Unified User Experience: Keycloak enables a single, secure login point at
sso.trql.it. Once authenticated, users receive cryptographically signed JWT (JSON Web Tokens) that grant them access to every other service without re-entering credentials. This eliminates "password fatigue" and prevents the use of weak, repetitive passwords across different systems. -
Granular Access Policies: Beyond simple authentication, Keycloak enforces complex authorization rules. For example, it can be configured to only allow access to Nextcloud if a user is part of the "Drive_Users" AD group and has successfully completed a Multi-Factor Authentication (MFA) challenge via TOTP or hardware keys (WebAuthn).
-
LDAP Account Manager (LAM)
-
Role: Comprehensive web-based interface for managing the Samba AD backend.
-
Technical Depth & Benefits:
-
Administrative Simplicity: LAM abstracts the inherent complexity of LDAP schemas and directory trees into a user-friendly, "scientific" UI. It allows administrators to manage complex objects—like Organizational Units (OUs), Unix attributes, and group memberships—without requiring deep command-line expertise.
-
Risk Reduction: By providing validation checks and standardized templates for user creation, LAM significantly reduces the chance of configuration errors that could lead to security holes or synchronization failures within the mesh.
-
đź“§ 4. Communication & Collaboration
Mailcow: Dockerized (The Complete Groupware Suite)
-
Role: Full-stack mail system including SMTP, IMAP, Antispam (Rspamd), and SOGo Groupware.
-
Technical Depth & Benefits:
-
Self-Healing Design: Mailcow is built with integrated health checks that monitor each sub-service (postfix, dovecot, etc.) and automatically restart them if a failure is detected. This ensures high availability without manual intervention.
-
Advanced Security Integration: It utilizes Rspamd, which employs machine learning and sophisticated filtering to provide enterprise-grade protection against phishing, malware, and spam. Its deep integration with Caddy ensures that all mail services are delivered over high-speed, secure TLS connections.
-
Native Mobile Sync: Through SOGo, Mailcow provides native CalDAV and CardDAV support. This ensures that calendars and contacts are perfectly synchronized across all devices without the data-mining risks associated with third-party providers.
-
Nextcloud (The Content Collaboration Hub)
-
Role: Enterprise-grade file synchronization, sharing, and real-time office collaboration.
-
Technical Depth & Benefits:
-
Data Sovereignty: Nextcloud ensures that all organizational data remains on Tranquil IT controlled infrastructure. This provides the functionality of public clouds (like Google Drive or Microsoft 365) while completely bypassing the privacy concerns and unpredictable subscription costs of "Big Tech."
-
Optimized Performance Stack: Our implementation is tuned for high concurrency. By leveraging MariaDB for structured data and APCu/Redis for memory caching, Nextcloud delivers a responsive user experience. The integration with Keycloak via OIDC means users transition from mail to files seamlessly, using a single set of managed credentials.
-
đź“¶ 5. Network Authentication
daloRADIUS & FreeRADIUS
-
Role: RADIUS server for centralized network access control (NAC).
-
Technical Depth & Benefits:
-
Hardened Perimeter: By implementing WPA2/3 Enterprise, we ensure that Wi-Fi access is not based on a shared "office password." Instead, every device must authenticate using the user's individual Samba AD credentials.
-
Session Auditing: FreeRADIUS provides detailed accounting and logging of every network session. This allows the IT team to identify exactly who is on the network and which devices are active, providing a critical trail for security audits and forensic analysis.
-
🌱 6. Systemic Benefits & Sustainability
-
Extreme Carbon Footprint Reduction: Traditional IT deployments rely on multiple physical servers or underutilized virtual machines. By consolidating 10+ enterprise services onto high-density, containerized hosts, the Cirrus Stack minimizes "idle power" draw. Fewer physical CPUs running at higher efficiency means significantly less energy consumed and less heat generated, directly contributing to global carbon reduction goals.
-
Resource and Cost Optimization: The use of shared Docker bridges and centralized memory caching allows the stack to handle high user loads with a fraction of the RAM and I/O overhead required by independent server deployments. This not only saves energy but also extends the lifecycle of the underlying hardware.
-
Operational Sustainability: Automated certificate renewals, unified SSO, and "Gold Image" snapshotting reduce the "human-in-the-loop" time. This eliminates administrative "friction," allowing the IT team to focus on strategic innovation rather than repetitive maintenance, creating a truly sustainable and scalable operational model for the future.