Everything You Need to Orchestrate at Scale

Deep dive into every capability that makes Dimensigon the most flexible decentralized automation platform.

Polyglot Orchestration

Define automation workflows in any language your infrastructure speaks. Dimensigon's orchestration engine is technology-agnostic — it doesn't force you into a single scripting language or DSL.

Shell Scripts

Execute bash, sh, or any shell command natively on target nodes with full stdout/stderr capture.

Python (Sandboxed)

Run Python code securely via RestrictedPython with configurable timeouts and resource limits.

HTTP/REST Calls

Integrate with any HTTP API as an orchestration step. Supports headers, authentication, and response parsing.

Nested Orchestrations

Compose complex workflows from smaller orchestrations. Build reusable automation building blocks.

orchestration.json
{
  "name": "deploy-service",
  "version": 1,
  "steps": [
    {
      "name": "health-check",
      "action_type": "shell",
      "code": "curl -sf localhost:8080/health",
      "target": "web-servers"
    },
    {
      "name": "notify-api",
      "action_type": "http",
      "method": "POST",
      "url": "https://api.example.com/deploy"
    },
    {
      "name": "validate",
      "action_type": "python",
      "code": "assert status == 'healthy'"
    }
  ]
}

Mesh Networking

A true peer-to-peer architecture where every node is equal. No central coordinators, no master elections, no single point of failure. Nodes discover each other and form an intelligent mesh topology automatically.

Dynamic Route Discovery

Nodes automatically discover optimal paths through the mesh. Routes update in real-time as topology changes.

Self-Healing Topology

When a node goes down, the mesh automatically reroutes traffic. No manual intervention required.

Gates & Endpoints

Each node exposes multiple network endpoints (Gates) for redundancy. DNS and IP-based addressing supported.

Zero Configuration

Join with a single command and token. The mesh handles discovery, routing, and topology automatically.

N1 N2 N3 N4 N5
Every node is an equal peer — no masters

Distributed Vault

Securely store and distribute secrets, credentials, API keys, and configuration data across your entire cluster. Every secret is encrypted at rest and in transit.

Fernet Encryption

Industry-standard symmetric encryption protects every vault entry. Keys never leave the cluster.

Automatic Replication

Vault entries are distributed across all nodes via catalog sync. Every node has access to shared secrets.

API Access

Full CRUD via REST API. Read, write, update, and delete vault entries programmatically.

Variable Substitution

Reference vault entries in orchestration steps. Secrets are injected at execution time, never stored in plain text.

Vault API Usage
# Store a secret
$ curl -X POST https://node:20194/api/v1.0/vault \
  -H "Authorization: Bearer <jwt>" \
  -d '{"name": "db_password",
       "value": "s3cur3_p4ss!"}'

# Use in orchestration steps
{
  "code": "mysql -p{{vault.db_password}}",
  "action_type": "shell"
}

# List all vault entries
$ curl https://node:20194/api/v1.0/vault \
  -H "Authorization: Bearer <jwt>"

RESTful API

Two complete API versions for full programmatic access to every Dimensigon capability. Build custom integrations, dashboards, and automation workflows.

API v1.0

Full CRUD for all resources: servers, orchestrations, executions, vault, users, files, and more.

API v2.0 (Data Dictionary)

Schema introspection API. Discover available resources, fields, relationships, and validation rules programmatically.

JSON Schema Validation

Every request is validated against JSON schemas. Clear error messages for invalid payloads.

JWT Authentication

Secure token-based authentication. 15-minute access tokens with 30-day refresh tokens.

API Endpoints

GET /api/v1.0/servers
POST /api/v1.0/orchestrations
POST /api/v1.0/launch
GET /api/v1.0/executions
GET /api/v1.0/vault
POST /api/v1.0/vault
GET /api/v1.0/users
GET /api/v1.0/files
POST /api/v1.0/lock
GET /api/v2/data-dictionary

Double Encryption

A 7-layer security model that goes far beyond basic TLS. Every message is encrypted at the transport level AND at the application level. Trust nothing, verify everything.

Layer 1: Network

Firewall, VPN, and IP whitelisting at the infrastructure level.

Layer 2: Transport (TLS 1.2+)

HTTPS with auto-generated SSL certificates. All traffic encrypted in transit.

Layer 3: Message Encryption

Fernet symmetric encryption on every message payload. Even if TLS is compromised, data remains encrypted.

Layers 4-7: Auth, ACL, Sandbox, Data

JWT tokens, group-based ACLs, RestrictedPython sandboxing, and SHA-256 password hashing complete the stack.

7Data SecuritySHA-256 · Vault Encryption
6Code SandboxRestrictedPython · Subprocess Isolation
5AuthorizationGroup ACLs · Resource Permissions
4AuthenticationJWT · 15min Access · 30d Refresh
3Message EncryptionFernet Symmetric Encryption
2TransportHTTPS / TLS 1.2+
1NetworkFirewall · VPN · IP Whitelist

Log Federation

Aggregate logs from every node in your dimension into a single, queryable view. No need for external log aggregation infrastructure — Dimensigon handles it natively.

Centralized Visibility

Query logs from all nodes through any single node. Complete cluster-wide observability from one endpoint.

Execution Tracing

Track orchestration executions across multiple nodes with full stdout/stderr capture for every step.

Real-Time Monitoring

The DM-WebManager dashboard provides live execution monitoring and log streaming.

Federated Log Output
2025-01-15 14:23:01 [node-01] INFO  Orchestration "deploy-v2" started
2025-01-15 14:23:02 [node-02] INFO  Step "health-check" executing
2025-01-15 14:23:03 [node-03] INFO  Step "health-check" executing
2025-01-15 14:23:04 [node-02] OK    Health check passed
2025-01-15 14:23:04 [node-03] WARN  Health check slow (2.1s)
2025-01-15 14:23:05 [node-01] INFO  Step "deploy" executing
2025-01-15 14:23:08 [node-01] OK    Deployment complete

Granular ACLs

Fine-grained, group-based access control that lets you define exactly who can do what, on which resources, and on which nodes. Built on JWT for stateless, scalable authentication.

Group-Based Permissions

Organize users into groups. Assign permissions at the group level for easy management at scale.

JWT Token Lifecycle

Short-lived access tokens (15 min) minimize risk. Long-lived refresh tokens (30 days) for convenience.

Resource-Level Control

Control access to specific orchestrations, vault entries, servers, and API endpoints.

ACL Configuration
# Create a user
$ curl -X POST /api/v1.0/users \
  -d '{
    "username": "deploy-bot",
    "groups": ["deployers", "readers"],
    "active": true
  }'

# Authenticate and get JWT
$ curl -X POST /api/v1.0/auth/login \
  -d '{"username": "deploy-bot",
       "password": "..."}'

# Response:
{
  "access_token": "eyJ...",
  "refresh_token": "eyJ..."
}

Distributed Locking

Coordinate concurrent operations safely across your entire cluster. Quorum-based consensus ensures that critical sections are protected even in a decentralized environment.

Quorum-Based Consensus

Locks require agreement from a majority of nodes, preventing split-brain scenarios.

API-Driven Locking

Acquire and release locks via the REST API. Integrate locking into any workflow or external tool.

Prevent Race Conditions

Ensure deployments, database migrations, and critical operations never run concurrently when they shouldn't.

Distributed Lock Example
# Acquire a distributed lock
$ curl -X POST /api/v1.0/lock \
  -H "Authorization: Bearer <jwt>" \
  -d '{"scope": "db-migration",
       "action": "lock"}'

# Lock acquired with quorum consensus
{
  "status": "locked",
  "scope": "db-migration",
  "quorum": "3/5 nodes agreed"
}

# Release the lock
$ curl -X POST /api/v1.0/lock \
  -d '{"scope": "db-migration",
       "action": "unlock"}'

Additional Capabilities

File Distribution

Synchronize files across all cluster nodes. Deploy configs, scripts, and assets with built-in transfer tracking.

DShell (Interactive CLI)

Distributed shell with syntax highlighting, tab completion, and batch execution. Execute commands across your entire cluster interactively.

DM-WebManager

Full web GUI for managing orchestrations, monitoring executions, viewing logs, and administering the cluster through a browser.

Catalog Sync

Automatic eventual consistency. Entity changes propagate across the cluster via timestamp-based catalog synchronization.

DAG Workflows

Define step dependencies as directed acyclic graphs. Steps execute in parallel where possible with automatic topological ordering.

Auto Rollback

Define undo steps for every action. On failure, Dimensigon automatically executes rollback in reverse dependency order.

Start Building with Dimensigon

Open source, no vendor lock-in, no license fees. Just powerful, decentralized automation.