Skip to content

aurva-io/AIOstack

AIOStack Logo

License: Apache 2.0 Kubernetes eBPF

Website

eBPF-based observability for AI workloads in Kubernetes

AIOStack® automatically discovers and monitors AI infrastructure across your Kubernetes clusters using eBPF. It captures AI-related traffic (OpenAI, Anthropic, HuggingFace, vector databases, MCP servers) at the kernel level without requiring code changes or service restarts. Get immediate visibility into shadow AI deployments, per-team cost attribution, and security insights.

Key Features

  • Zero-instrumentation discovery: Automatically detect LLM API calls, model downloads, vector databases, and AI agents across all pods
  • AI Bill of Materials (AIBOM): Complete inventory of models, APIs, and AI dependencies running in your infrastructure
  • Cost attribution: Map API usage and token consumption to Kubernetes namespaces, service accounts, and teams
  • Compliance audit trails: Generate evidence for GDPR, SOC2, and internal audits with pod-level attribution
  • Language-agnostic: Works with Python, Node.js, Go, Java, or any language making network calls
  • Minimal overhead: <2% CPU impact per node using kernel-level filtering
  • Security alerts: Real-time detection of unapproved AI services, data exfiltration patterns, and policy violations (coming soon)

Prerequisites

  • Kubernetes 1.29+ with eBPF support (EKS, GKE, AKS)
  • Linux kernel 5.15+
  • Helm 3.x

How to install (Kubernetes)

curl -fsSL https://raw.githubusercontent.com/aurva-io/AIOstack/main/install.sh | bash

The installer will guide you through setup, open app.aurva.ai for signup, and deploy AIOStack® to your cluster. Your AI inventory appears within 60 seconds.

See the Installation Guide for manual Helm installation.

Uninstall

curl -fsSL https://raw.githubusercontent.com/aurva-io/AIOstack/main/uninstall.sh | bash

How It Works

AIOStack deploys two components in your cluster:

Observer (DaemonSet): Runs on each node and loads eBPF programs that hook into kernel tracepoints (tcp_sendmsg, tcp_recvmsg, execve, openat). These programs capture network metadata, DNS queries, and process execution events, filtering for AI-specific patterns (API endpoints, model downloads, vector DB protocols) before forwarding to userspace.

Outpost (Deployment): Receives events from Observers, parses application protocols (HTTP/1.1, HTTP/2, gRPC), classifies AI services using signature matching, and enriches events with Kubernetes metadata by correlating socket inodes to pod identities via /proc/net/tcp and cgroup information.

Traffic is analyzed at the syscall level—before TLS encryption on egress, after decryption on ingress—using uprobes on SSL_write/SSL_read functions. Only metadata (HTTP headers, payload sizes, latencies) is extracted; request/response bodies are never captured.

Read : How we escaped the SSL/TLS Trap

Documentation

Full documentation: aurva.ai/docs

Feedback & Support

We're actively developing AIOStack and would love to hear from you:

License

Apache License 2.0 - see LICENSE for details.

The hosted version at app.aurva.ai provides managed ClickHouse® storage and UI hosting. All core observability logic will be open sourced in this repository once approved by our Chief Architect.

⭐ Star History

Star History Chart


Built by Aurva

About

AI runtime inventory: discover shadow AI, trace LLM calls

Topics

Resources

License

Code of conduct

Contributing

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 6