OpenRemedy¶
Autonomous SRE platform for Linux fleets — alerts in, classification, diagnosis, gated remediation, audit.
OpenRemedy watches every server continuously and, when something is detected, classifies, decides, and either fixes or escalates. The riskier the fix, the more human approval it needs. Every step is logged.
This site is the operator-facing reference documentation. For the high-level pitch and design philosophy, see the whitepaper.
Get started¶
The shortest path from zero to a running install:
- Installation — requirements, prerequisites, DNS, secrets, smoke test.
- Configuration — every environment variable the platform reads, what to override and when.
- Architecture — read this once so the rest of the docs make sense in context.
Concepts¶
The mental model the rest of the docs assume.
- Architecture — the shape of the system: components, data flows, the agent pipeline.
- Server modes —
live/shadow/audit, the coarsest control over what the platform is allowed to do per server. - Security — auth, encryption, HMAC webhooks, rate limits, the trust × risk gate, sandboxes for custom tools.
- Privacy — exactly what telemetry sends, what it does not, and how to disable it.
Operating¶
Day-to-day: how to use what's installed.
- Proactive monitoring — how policy-driven checks become incidents, and how the IncidentWatcher re-invokes agents on operator comments.
- Integrations — webhooks, outbound notifications, plugins, the API surface for programmatic clients.
- Recipes — what a recipe is and how to author one.
- Maintenance plans — the markdown DSL, strategies, the AI editor.
- Daemon — install + configure the host-side
openremedy-clientagent.
Dashboard reference¶
A walkthrough of every page in the operator UI lives under Dashboard reference.
Source¶
OpenRemedy is licensed under the Functional Source License, version 1.1, Apache 2.0 Future License (FSL-1.1-ALv2). Source lives at github.com/OpenRemedy.