Skip to main content

AI-Powered Infrastructure Copilot: The Self-Healing SRE.

Project description

ResponseIQ

CI GitHub Release PyPI License Checked with mypy Code style: black

"Don't just debug. Fix."

ResponseIQ is an AI-Native Self-Healing Infrastructure Copilot. Unlike traditional parsers that match regex strings, ResponseIQ reads your application logs, loads your actual source code into an LLM context, and generates surgical, context-aware remediation patches for incidents.


📸 See It In Action

ResponseIQ CLI Demo

Above: ResponseIQ scanning a crash log, reading the service.py file mentioned in the stack trace, and proposing a specific code patch.


✨ Key Features

  • 🧠 AI-Native Analysis: Uses Generic AI reasoning instead of fragile regex parsing rules.
  • 👁️ Context-Aware: Reads the local source files referenced in logs to understand why the crash happened.
  • ⚡ Self-Healing: Can generate Pull Requests or apply patches directly (CLI mode).
  • 🛡️ Battle-Tested: Includes "Sandbox Mode" to safely test remediation logic.

🚀 Quick Start (CLI Tool)

For developers who want to fix bugs in their local environment or CI pipeline.

1. Install

pip install responseiq

2. Configure an LLM

Choose one option:

Option A: Ollama (free, fully local — recommended)

# Install Ollama: https://ollama.com
ollama serve &
ollama pull llama3.2

# Add to .env in your project root:
echo "LLM_BASE_URL=http://localhost:11434/v1" >> .env
echo "LLM_ANALYSIS_MODEL=llama3.2" >> .env

Option B: OpenAI

echo "OPENAI_API_KEY=sk-..." >> .env

Option C: No config (rule-engine fallback) Works out of the box with no API key — uses a local heuristic parser.

3. Scan Your Logs

# Single file (JSON or .log or .txt)
responseiq --mode scan --target ./logs/error.log

# Whole directory
responseiq --mode scan --target ./var/log/app/

Example output:

------------------------------------------------------------
  ResponseIQ Scan Report
  Target : logs/error.log
  Status : SUCCESS
------------------------------------------------------------
  Scanned  : 1 message(s)
  Incidents: 1 found
------------------------------------------------------------
  1. [CRITICAL] Out of Memory Error
     Source     : ai
     Description: The system is experiencing a critical error due to an out of
                  memory condition caused by a resource leak or excessive allocation.
------------------------------------------------------------
  Tip: run with --mode fix to apply safe remediations.
------------------------------------------------------------

4. Shadow Mode (zero-risk demo)

Analyse all incidents and get a projected MTTR savings report — nothing is changed:

responseiq --mode shadow --target ./logs/ --shadow-report

🏢 Platform Server (Self-Hosted)

For Platform Engineers who want a centralized incident response API (webhooks for Datadog, PagerDuty, Sentry etc.).

Prerequisites

  • Docker & Docker Compose
  • LLM configured via .env (Ollama or OpenAI — see Quick Start above)

Running with Docker

# 1. Start the API and Database
docker-compose up -d

# 2. The API is now available at http://localhost:8000
curl http://localhost:8000/health

Development Setup (Local)

We use UV for lightning-fast dependency management.

# Install dependencies
uv sync

# Run the API server with hot-reload
uv run uvicorn src.app:app --reload

🧪 Development & Contributing

Workflow

  1. Linting: make lint
  2. Testing: make test
  3. Format: make format

Project Structure

  • src/cli.py: Entry point for the CLI tool.
  • src/app.py: Entry point for the API Server.
  • src/services/remediation_service.py: The core "Brain" that interfaces with the LLM.

License

MIT


⚠️ Disclaimer & Liability

This tool uses Generative AI to suggest infrastructure and code fixes. By using ResponseIQ, you acknowledge that:

  1. AI Can Hallucinate: The suggestions provided may be syntactically correct but functionally wrong or insecure.
  2. Human Review is Mandatory: You must strictly review all Pull Requests or patches generated by this tool before deploying them.
  3. No Warranty: As per the MIT License, the authors assume no liability for system outages, data loss, or security vulnerabilities resulting from the use of this software.

For security reporting instructions, please see SECURITY.md.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

responseiq-2.15.0.tar.gz (128.2 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

responseiq-2.15.0-py3-none-any.whl (160.6 kB view details)

Uploaded Python 3

File details

Details for the file responseiq-2.15.0.tar.gz.

File metadata

  • Download URL: responseiq-2.15.0.tar.gz
  • Upload date:
  • Size: 128.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for responseiq-2.15.0.tar.gz
Algorithm Hash digest
SHA256 0fa1e504ce2ea79f73635c6395ac8e8b24e7ee20536aeb1b95884e0649f24da4
MD5 cc10ff1bc3172631c6359105e3f02645
BLAKE2b-256 54107dd19cc3dc7fc4b22e01aa53da0a8a34744749f1d8fb076e6bdf70c08529

See more details on using hashes here.

File details

Details for the file responseiq-2.15.0-py3-none-any.whl.

File metadata

  • Download URL: responseiq-2.15.0-py3-none-any.whl
  • Upload date:
  • Size: 160.6 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/6.1.0 CPython/3.13.7

File hashes

Hashes for responseiq-2.15.0-py3-none-any.whl
Algorithm Hash digest
SHA256 924dd05d0c82f40c157b4ab3b3d0302cb36b0e7e70c825752b4ade55f78a0ee4
MD5 f0933adb5083c49b7183f3cb561e066e
BLAKE2b-256 c5993a42dfbc21666a9dd8a6798eeea839c4141af245c842226cdd9fbb3c4641

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page