Skip to main content

Services & Operational Workflows

Aussivo powers Web3-native DevOps — enabling developers to log in with wallets, activate decentralized infrastructure, and manage compute and storage on-chain with total transparency.

End-to-End Hosting Workflow

Here’s how Aussivo handles service provisioning — in 8 streamlined steps:

  1. Wallet Login : Users log in using crypto wallets like Metamask or WalletConnect. No passwords — just secure wallet signatures.

  2. Service Selection : Users choose from pre-configured templates for compute, storage, or full hosting setups. Custom parameters can be added.

  3. Meta-Transaction Creation :
    The system creates a signed meta-transaction with all selected options and instructions.

  4. Relayer Submission :
    Aussivo’s Gastank relayer receives the meta-tx, wraps it into a blockchain-ready transaction, and submits it to the SPoS chain.

  5. Smart Contract Execution :
    Smart contracts handle billing, trigger provisioning, and log usage events — all on-chain and fully auditable.

  6. Cloud Integration :
    Aussivo’s orchestrator invokes APIs to launch resources — whether on Aussivo’s native data centers, AWS (with Nitro Enclave), or Alibaba Cloud.

  7. Security Agent Deployment :
    The Advanced Security Agent (ASA) is auto-installed on new instances. It performs integrity scans and records results on-chain.

  8. Live Dashboard Monitoring :
    Users can monitor everything in real time — from service activation and endpoints to billing, uptime, and security logs.

Data Flow Diagram

Security Agent (ASA) Tiers

FunctionalityBasic TierEnhanced Tier (Nitro Enclave)
DeploymentRuns as a VM-level software agentRuns inside a Nitro Enclave with Trusted Launch
Security ChecksMalware, rootkits, file & network scansAll Basic checks + hardware-backed attestation
Key ProtectionEncrypted inside the VMEnclave-based tamper-proof key storage
On-Chain AnchoringRelayer posts signed hashRelayer posts enclave-signed, hardware-verified hash
Audit VerificationSignature integrity check on-chainHardware attestation verified by SPoS validators

Simplified Data Flow

User → Wallet Login → Service Selection → Meta-Tx → Relayer → Blockchain → Cloud Instantiation → ASA Scan → Dashboard View

Data Flow Diagram