Gating in Domino Governance

Gating enforces governance policies by requiring approval before specific user actions can proceed. Gates help teams limit risk, automate compliance, and respond quickly to policy changes. Gating decisions are applied automatically and recorded for audit.

Governance Admins define gates in policies to control actions based on parameters such as hardware tiers or data planes. When a policy with gates is attached to a project, Domino evaluates any actions at creation and on restart. If a user attempts a gated action, they are blocked until the required approval is granted.

Common use cases include:

  • Blocking GPU or high-cost hardware tiers until reviews are complete

  • Controlling deployments to specific data planes

  • Rechecking approval status on restart to maintain compliance

Gates apply only to governed actions in projects where a bundle with gating policies has been attached.

Define gates in a policy

Gates are defined in YAML as part of a governance policy. Each gate includes:

  • One or more rules that define the governed action and its parameters

  • A list of required approvals for the action to proceed

Example: Define gates in YAML

In this example, the gate blocks creation of apps that use the large-k8s or gpu-small-k8s hardware tiers unless the Validation sign off stage has been completed:

gates:
  - name: Prod
    rules:
      - action: CreateApp
        parameters:
          hardwareTierId:
            - large-k8s
            - gpu-small-k8s
    approvals:
      - Validation sign off

Activate gating in a project

When a practitioner attaches a bundle with gating policies to a project, the system begins enforcing the gate rules. Only governed actions and parameters are affected. All other activity proceeds normally.

Gates remain active as long as the bundle is attached and the policy requires the relevant approvals.

Manage gate approvals

Gates rely on the same approval stages used elsewhere in governance. Admins or approvers can grant or revoke approvals at any time.

When approval status changes, the system updates gate behavior automatically. This affects both new actions and restarts of governed resources.

How gating enforcement works

When a user attempts a governed action, the system evaluates gate rules in real time. If the action and its parameters match a gated rule, the system checks for approval before allowing it to proceed.

  • During creation: invalid configuration options are blocked in the UI

  • On restart: users receive an error if a previously approved configuration no longer meets policy requirements

ActionResult

User creates an app using allowed settings

Action proceeds

User selects a gated hardware tier without approval

Action is blocked

Approval is granted after creation

Gated actions become allowed

Approval is revoked after creation

Gated actions are blocked on restart

How gating decisions are enforced and tracked

Gating is enforced by two internal services:

  • Governance Service: manages policies, approvals, and gate definitions

  • Rules Service: applies gate logic and determines whether to allow or block actions in real time

Gate rules are stored in the shared governance database. When a policy is activated, the Rules Service sets all governed actions to "deny" by default. Actions are allowed only after the required approvals are granted.

All rule evaluations and gating outcomes are:

  • Recorded in the Audit Log

  • Tracked in MixPanel to support compliance reporting and usage analysis

Next steps