Operator-grade infrastructure ECS · Fargate · EKS
Struxt
v0 / private Brooklyn · NY
The operator's console

The execution layer for AWS-native applications.

§ 01 / Problem

Infrastructure ecosystems are fragmented by design.

Server infrastructure ecosystems are fragmented, complicated, and often poorly designed. Most of the operational data teams need is freely available — or already paid for inside their hosting bill — but it lives behind a dozen different dashboards, CLIs, and access control systems.

Access control. Visibility. Configuration. Deployment. CI/CD. Security audits. Cost monitoring. The list of team requirements is endless. The list of teams equipped to meet it, short.

Infrastructure teams are frequently small, under-resourced, and lack the specialized expertise needed to stitch these tools together well.

The result: critical signals get missed, deployments require tribal knowledge, on-call rotations are miserable, and security posture degrades quietly over time.

§ 02 / Current state

A patchwork, for every team.

Even a modest production environment targeting high availability requires a patchwork of tools, each with its own auth model, data format, and operational overhead:

AWS Console Grafana Graylog Prometheus SSH / Bastions Jenkins GH Actions Slack PagerDuty Tenable / Nessus SonarQube Semgrep Trivy Terraform CloudWatch OpenSearch IAM consoles   …  

Each tool solves its piece competently. Integration is the customer's problem, and it's an expensive one.

§ 03 / Solution

One opinionated console. AWS-first. Operator-built.

i.
Docker Compose → ECS in minutes
Hand Struxt a docker-compose.yml. Get back a correctly-configured ECS service — task definitions, target groups, service discovery, secrets, autoscaling. The workflow AWS deprecated and nobody replaced.
ii.
Application lifecycle, end to end
Deploy, observe, debug, roll back, scale. The daily operator loop made frictionless. Logs and exec without leaving the console. Rollbacks without reading runbooks.
iii.
Host agents as a consistent backplane
Unified access, direct logging, and remote ops across the fleet, regardless of underlying compute. One control surface, whether you're running EC2-backed ECS, Fargate, or EKS.
iv.
Integrated observability
Logs, metrics, and traces through a single pane. Backed by OpenSearch and InfluxDB, configured and tuned — so teams don't have to assemble it from parts or staff a platform team to keep it alive.
v.
RBAC as a first-class citizen
High-level roles when you need speed. Per-resource microtuning when you need control. Access control is not bolted on after the fact — it is the foundation the platform is built on.
vi.
Proactive operational signals
Timely warnings on resource utilization, security posture, cost anomalies, and misconfiguration. The things small teams miss because nobody was watching.

What Struxt is deliberately not

  • A multi-cloud platform. AWS-first, probably forever.
  • A FinOps replacement. Surfaces what matters. Integrates with Vantage, CloudHealth, Datadog CCM.
  • A CNAPP. Integrates with Wiz, Snyk, Semgrep. Does not try to scan anything itself.
  • A full CI/CD system. Triggers from GHA, CircleCI, Jenkins. Does not replace them.
  • An IDP in the portal-theater sense. No scorecards. No golden-path ceremony.
§ 04 / References

Adjacent leaders. No one owning this gap.

The consolidation thesis is validated by category leaders in adjacent domains. None deliver a complete execution-layer experience for AWS-native container workloads.

Rancher SUSE
Kubernetes management
Validates the consolidation thesis. No ECS story.
Aviatrix
Multi-cloud networking
Adjacent pillar. Integration target, not competitor.
Harness
CI/CD + FF + cost + IaC
Closest philosophical analog. The VC-path version of consolidation.
Spacelift
IaC orchestration
Leader in the IaC control-plane layer. Complementary.
Northflank
BYOC app platform
Closest direct competitor. K8s-first. Struxt is ECS-first.
Qovery
App deployment, AWS
Direct overlap on ECS. Lighter on ops / observability.
AWS Copilot
AWS-native ECS CLI
AWS's own attempt, effectively abandoned. The gap Struxt fills.
§ 05 / Strategy

Dogfood-first. Not VC-shaped.

Struxt is not pursuing a land-grab. Every feature is driven by active daily use by an experienced operator managing real production workloads. The product is built by the person who gets paged, for the person who gets paged.

Phase 01 · Now → 12 mo
Operator dogfood
Running in production on real workloads. Every feature earns its place by solving a problem the builder has at 2am. Private repo, source-available license when open.
Phase 02 · 12 → 24 mo
Small circle of trust
10-20 design-partner organizations running it in anger. Operator-to-operator sharing. No sales motion. No marketing site. Issues and contributions, not leads.
Phase 03 · 24+ mo
Public & optional
Independent steady-state, managed-hosting commercial offering, or strategic acquisition — all acceptable outcomes. The project is not structured to require any one of them.

Struxt competes on being the tool its operator actually wants to use — a bar most VC-funded platforms never clear, because their incentives point elsewhere.

Below · proposal template

Operator-to-operator structure · one match-to-style cover slide · section scaffolding

Cover slide · 16:9
Struxt
Design Partner Proposal · 2026

Run production like someone who's done it before.

An invitation to run Struxt against your AWS workloads, file the issues only operators file, and help shape the tool we all want.

Proposal

Design Partner Scope

Table of contents
  1. Who this is for
  2. What Struxt does today
  3. What you get
  4. What we ask
  5. What we don't ask
  6. Architecture & data posture
  7. Timeline & cadence
  8. Exit & ownership
§ 01

Who this is for

Small-to-mid infrastructure teams running production container workloads on AWS. One to five people. ECS today, probably some EKS, probably Fargate creeping in. A platform that works but requires too many tabs open to operate well.

  • You are the operator, or you work directly with them
  • You can install agents and connect AWS accounts without a six-week legal review
  • You have opinions about how production should work, and you're willing to share them
§ 02

What Struxt does today

Struxt is a running platform, not a slide deck. Current capabilities:

  • Deploy an ECS service from a docker-compose.yml in minutes
  • Host agents for monitoring, logging, and remote ops
  • Integrated logs (OpenSearch) and metrics (InfluxDB)
  • RBAC with both role-level and per-resource control
  • Operational signals: utilization, cost anomalies, misconfiguration flags

On the near roadmap: Fargate parity, EKS support, expanded cost-control guidance, deeper performance diagnostics.

§ 03

What you get

  • Access to a running platform that replaces half of your current tab-switching
  • Direct line to the builder — your issues are triaged same-day, not routed through support
  • Influence on the roadmap proportional to your engagement
  • Perpetual license to the version you deploy, regardless of what happens commercially later
  • Architecture review of your ECS/EKS setup as part of onboarding, at no cost
§ 04

What we ask

  • Install Struxt against at least one non-trivial production or staging environment
  • File issues the way operators file issues — specific, reproducible, grumpy
  • A monthly 30-minute conversation about what's working and what isn't
  • Permission to reference your deployment abstractly (never your name without explicit consent) in future conversations
The goal is 10-20 organizations running this in anger, not 1,000 signups. Your feedback shapes the product more than any other input will.
§ 05

What we don't ask

  • No payment during the design partner phase
  • No case studies, logos, or marketing participation
  • No exclusivity. Run whatever else you want alongside.
  • No NDA. This is operator-to-operator, not procurement.
§ 06

Architecture & data posture

Struxt is self-hosted. It runs in your AWS account. The control plane (Go + Postgres), log store (OpenSearch), and metrics store (InfluxDB) are all deployed into your environment. Host agents run on your infrastructure.

  • No telemetry back to Struxt. Ever.
  • No customer data leaves your account
  • Works with existing AWS IAM. Compatible with SSO.
§ 07

Timeline & cadence

  • Week 0: Architecture review, access setup, install walkthrough
  • Week 1-2: First production workload onboarded, initial issue backlog
  • Monthly: 30-minute sync, roadmap review
  • Ongoing: Direct chat channel, same-day response
§ 08

Exit & ownership

Design partners can exit at any time. Anything deployed in your account remains yours to run or decommission. Data stores are standard Postgres / OpenSearch / InfluxDB — exportable, forkable, not hostage.

If Struxt eventually goes commercial, design partners receive defined pricing protection for the life of the relationship. If Struxt is acquired, existing partners' terms survive the transaction.

Appendix · Design system

Reference tokens

Palette
Paper
#F4EFE6
Paper shade
#EBE3D4
Ink
#1A1613
Ink mute
#6B6055
Rust (accent)
#B2431E
Moss
#5C6B3D
Ochre
#C08B28
Iron
#2E3440
Typography
Display · Fraunces
The execution layer.
Lede · Fraunces italic
Built by operators, for operators.
Body · IBM Plex Sans
Infrastructure teams are frequently small, under-resourced, and lack the specialized expertise needed to stitch these tools together well.
Mono · IBM Plex Mono
Section header · numbered
Notes for the designer

Three levels of rules structure the page — full black (section breaks), 15% black (within-section dividers), and ink-borders on chips and phase cards. Accent color is rust only, used sparingly on numerals, markers, and italicized display emphasis. Moss and ochre appear exclusively as phase markers. The paper-shade tint carries callouts and chips; the ink block is reserved for the divider bar and the label strip. Shadow on the cover slide is a hard offset (8px 8px 0), not blurred — a print-production cue, not a UI drop-shadow.

Typographic contrast is intentional: Fraunces at display sizes in optical 144 for tight letter-spacing and high bloom, Plex Sans for body running copy, Plex Mono for metadata and machine-feeling labels. The italic serif is used to soften moments where the page risks reading too corporate — the lede, callouts, emphasis within display headlines.

Struxt · design reference Warm-Operator · v0.1