
/dev/null/conceptual.py
Try it
Sign up and install the autonomy command
Complete the steps to get started with Autonomy.
Configure 1Password Connect
Create Add your 1Password Connect credentials file. In the 1Password developer portal, create a Connect server and download the credentials file. Save it to:This file is gitignored and required for the 1Password Connect container to authenticate with your vault.
secrets.yaml with your 1Password Connect token:/dev/null/terminal.sh
secrets.yaml
/dev/null/path.txt
Deploy
/dev/null/terminal.sh
How it works
The application demonstrates a complete incident response workflow with secure credential handling. Monitor. A long-runningMonitor starts when the app deploys and continuously watches for anomalies. In production, it would poll Prometheus, CloudWatch, or other metrics sources. For demos, anomalies are triggered via the /incidents endpoint.
images/main/main.py
images/main/main.py
images/main/main.py
| Agent | Focus | Tools |
|---|---|---|
| database | Connection pools, slow queries | query_db_connections, query_slow_queries |
| cache | Hit rates, memory pressure | check_cache_health, get_eviction_stats |
| network | Latency, packet loss | check_network_latency, trace_route |
| resources | CPU, memory, disk | get_cloudwatch_metrics, check_instance_health |
| logs | Errors, traces | get_application_logs, search_errors |
images/main/main.py
images/main/main.py
images/main/main.py
/dev/null/request.json
/dev/null/response.json
/dev/null/response.json
/dev/null/request.json
/graph), history (/investigation/history), and health checks (/health) are available in the source code.
Customize for your infrastructure
The example uses mock tools and manual triggers for demonstration. To adapt for your infrastructure:- Connect your monitoring : Replace the manual
/incidentstrigger with your observability stack. TheMonitor._monitor_loop()can poll Prometheus, CloudWatch, or Datadog for anomalies. - Implement real diagnostics : Replace mock tool functions with actual infrastructure queries. For example,
query_db_connectionsbecomes a real PostgreSQL connection pool query,get_cloudwatch_metricsuses the AWS SDK. - Map your infrastructure : Update
REGIONSandSERVICESto match your actual deployment topology. Add specialists for your stack (Redis, Kafka, etc.). - Configure 1Password : Set up vaults with your infrastructure credentials. The read/write separation ensures diagnostic queries use read-only access while remediation requires explicit approval.
Learn more

