You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/overview/Introduction.md
+55-30Lines changed: 55 additions & 30 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -6,56 +6,81 @@ title: " "
6
6
7
7
# Introduction
8
8
9
-
Flamingock is a change management framework that ensures your distributed systems evolve safely and consistently. It applies versioned, auditable changes to any target system (message brokers, APIs, cloud services, databases, and any other external service) with guaranteed safety and recovery mechanisms.
9
+
**Flamingock** brings *Change-as-Code (CaC)* to your entire stack.
10
+
It applies **versioned, auditable changes** to the external systems your application depends on — such as databases, schemas, message brokers, APIs, and cloud services.
11
+
12
+
Unlike infrastructure-as-code tools, Flamingock runs **inside your application** (or via the **CLI**).
13
+
It ensures these systems evolve **safely, consistently, and in sync with your code at runtime**.
14
+
15
+
---
16
+
17
+
### What Flamingock manages
18
+
Flamingock focuses on **application-level changes** that your code requires to run safely:
19
+
20
+
- Database schemas and reference data
21
+
- Message queues and schemas
22
+
- APIs and configuration values
23
+
- Cloud service resources directly tied to your application
Flamingock is **not an infrastructure-as-code tool**. It does not provision servers, clusters, or networks — those belong in Terraform, Pulumi, or similar. Instead, Flamingock **complements them by handling the runtime changes your application depends on**.
28
+
29
+
---
10
30
11
31
## Core principles
12
32
13
-
### Safety by default
33
+
### 🔒 Safety by default
14
34
When Flamingock cannot guarantee a safe outcome, it stops and requires manual intervention. This prevents silent data corruption and ensures predictable deployments.
15
35
16
-
### Complete auditability
36
+
### 📝 Complete auditability
17
37
Every change execution is tracked in an audit store, providing a complete history of what was applied, when, by whom, and with what result.
18
38
19
-
### Recovery strategies
20
-
Configurable recovery mechanisms determine how Flamingock handles failures:
21
-
-**Manual intervention** (default): Stops on failure and requires human review
**Flamingock** brings *Change-as-Code (CaC)* to your entire stack.
10
+
It applies **versioned, auditable changes** to the external systems your application depends on — such as databases, schemas, message brokers, APIs, and cloud services.
11
+
12
+
Unlike infrastructure-as-code tools, Flamingock runs **inside your application** (or via the **CLI**).
13
+
It ensures these systems evolve **safely, consistently, and in sync with your code at runtime**.
14
+
15
+
👉 For a deeper explanation, see the [Introduction](./get-started/introduction.md)
0 commit comments