Once a host node is established, accelerated, and encapsulated by the runtime fabric, the platform applies target-specific service definitions. Rather than treating hosts as generic servers, site.yml matches specific inventory group scopes—such as AI inference compute clusters, corporate domain definitions, or management gateways—and configures them using dedicated service paths.
The control-plane service tier parses the node’s final group assignment to apply purpose-driven system profiles:
graph TD
A[Active Runtime Fabric<br/><code>bootstrap_docker_stack Complete</code>] --> B{Inventory Group Scope?}
B -- ollama_hosts / aibrix_prod --> C[Local Inference Platforms<br/><code>bootstrap_llm_host</code>]
B -- ca_domain_prefix_groups --> D[Inventory Domain Architecture<br/><code>Dynamic Target Mapping</code>]
B -- ansible_controller --> E[Declarative Automation Panels<br/><code>bootstrap_awx_resources</code>]
style A fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
style B fill:#fff,stroke:#cbd5e1,stroke-width:2px;
style C fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
style D fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
style E fill:#f1f5f9,stroke:#cbd5e1,stroke-width:2px;
bootstrap_llm_host)For air-gapped or localized enterprise machine learning spaces, the platform isolates model runtime loops entirely within your local computing farm.
aibrix_prod or ollama_hosts.Domain binding inside the platform completely avoids fragile, standalone infrastructure lookup roles. Instead, system and environment mapping is managed purely through Inventory Group Conventions.
Targets are systematically assigned to their authoritative environments using a reverse-order naming schema:
ca_domain_ followed by the target domain name mapped in reverse order with underscores replacing dots.inventory/{environment}/hosts.yml. Downstream templates and shared execution tasks evaluate these parent memberships to dynamically configure localized resolver strings, trust structures, and system contexts.dettonville.int → Inventory Group: ca_domain_int_dettonvillejohnson.int → Inventory Group: ca_domain_int_johnsonbootstrap_awx_resources)To maintain complete Configuration-as-Code control over your central execution management panels, the framework prevents administrators from configuring platform rules via the user interface.
ansible_controller master instance profiles (e.g., control_host).This profile shows how individual machine types map their designated group attributes to configure downstream target layers via your service variables:
# Inside inventory/group_vars/aibrix_prod.yml (Local LLM Compute Grid)
bootstrap_linux__setup_gpu_drivers: true
bootstrap_linux__setup_docker: true
# LLM Node Parameters
llm_host_engine: "ollama"
llm_host_models:
- name: "llama3:8b"
state: "present"
- name: "codegemma"
state: "present"
llm_host_storage_backend: "/var/data/models"
---
# Inside inventory/prod/hosts.yml (Enforcing the Naming Convention)
ca_domain_int_dettonville:
hosts:
vm-template-01.dettonville.int:
inference-grid-01.dettonville.int:
control-panel.dettonville.int:
vars:
domain_environment_type: "production"
local_pki_realm: "dettonville_root"
ansible-playbook -i inventory/hosts site.yml --tags "bootstrap-llm-host" --limit "aibrix"
ansible-inventory -i inventory/prod/hosts.yml --graph