ProficientNowTechRFCs
Platform RFCs/Rfcs/Wg/RFC WG 0002

9. Rationale

RFC-WG-0002                                                     Section 9
Category: Architecture                                     Rationale

9. Rationale

← Service Access Model | Index | Next →


Alternatives Considered

AlternativeWhy ConsideredWhy Rejected
Public IP + firewall per-serviceSimple and directHigh exposure risk, operational overhead
SSH tunnelsMinimal change to servicesNot scalable, brittle, manual
Docker Swarm overlayAutomated multi-host networkingRequires orchestrator adoption
Kubernetes CNIStandardized overlay networkingRequires Kubernetes migration

Invariant Violations

AlternativeViolated Invariant
Public IP + firewall per-serviceInvariant 1 (WG-only access)
SSH tunnelsInvariant 2 (stable host identity)
Swarm overlayInvariant 2 (deterministic addressing)

Conclusion

A host-level WireGuard mesh provides the minimum viable architecture that satisfies privacy, encryption, and operational simplicity without requiring a full orchestrator.


End of Rationale — RFC-WG-0002

On this page