License key
Issued by Autonomize. Format sk_yourorg_*. Used by both genesis CLI and the in-cluster wizard.
Genesis Downloads · Install guide
End-to-end runbook for an air-gapped customer cluster. Two Zarf bundles, one license key, one wizard. Vendor side never reaches in — everything runs in your VPC.
Issued by Autonomize. Format sk_yourorg_*. Used by both genesis CLI and the in-cluster wizard.
Linux/macOS workstation with one-way internet access to downloads.genesis.autonomize.ai. Used to pull bundles. Never connects to your cluster.
Any conformant Kubernetes 1.28+ (AKS / EKS / GKE / OpenShift / RKE2 / on-prem). 3 nodes, 8 vCPU + 32 GiB RAM each.
Genesis ships no statefuls. Your DBA / platform team operates the following; preflight verifies them as the wizard's first step.
Connection URL (postgres://user:pass@host:5432/db) supplied at the wizard's config step. HA / backup discipline is yours. Backs Keycloak, AI Studio backend, authz, etc.
Connection URL (redis://host:6379/0) supplied at the config step. Used for rate limiting and session caching. Single-instance OK for dev; HA for prod.
Installed in any namespace (default cert-manager). Issues TLS certs for in-cluster Ingress. Preflight FAILs if absent.
Your platform hostname (e.g. genesis.acme-health.internal) resolves to the cluster's Ingress LB. Customer-supplied IngressClass.
Your cert + intermediate + root in a Kubernetes Secret. We never issue certs via Let's Encrypt or ACM — air-gapped clusters.
Three patterns: customer-owned (Harbor / private ACR / ECR / GCR / Nexus / Artifactory), Zarf in-cluster (zarf init), or cloud-native attached (AKS attach-acr / GKE Artifact Registry / EKS ECR).
genesis-holmes-creds Secret with Azure OpenAI
credentials enables the HolmesGPT advice layer on the Pre-flight
and Troubleshoot tabs. Without it, deterministic checks still
gate everything; LLM-driven remediation copy is just disabled.
See air-gap workflow →
Autonomize ops issues sk_<slug>_<32hex> through the portal admin UI; your platform-admin receives it via 1Password.
One-way internet workstation. The CLI is a Typer + httpx + cosign tool with no cluster credentials.
pipx install genesis
genesis login # paste sk_yourorg_*
genesis releases # see the bundles entitled to you
Each release publishes ops (CRDs + Operator + Control Plane console + 5 agents — stateless) and platform (the Genesis umbrella, includes Keycloak + APISIX). Both signed and SBOM'd.
genesis pull 3.2.10 # downloads ops + platform .tar.zst + .cosign.bundle + .sha256
Cosign keyless verification is rooted in the public Sigstore TUF root; nothing crosses the air-gap until both bundles pass. Pipe the SBOMs into your vulnerability scanner (Trivy / Grype / Snyk) and gate on your CVE policy.
genesis verify ./genesis-ops-3.2.10.tar.zst
genesis verify ./genesis-platform-3.2.10.tar.zst
# Both should print: ✓ cosign verify OK · sha256 match · SLSA provenance present
trivy sbom ./sbom-3.2.10.cdx.json # ingest into your scanner of choice
Move the tarballs via your approved process — USB, data diode, or one-way file portal. We don't constrain the medium.
Installs the four CRDs (GenesisDeployment, GenesisUpgrade, PreflightReport, HealthReport), the kopf operator, the Control Plane console, and the five agents (Preflight, Deploy, Health, Troubleshoot, Support-Bundle). Stateless — no Postgres or Keycloak yet.
zarf package deploy genesis-ops-3.2.10.tar.zst
kubectl get pods -n genesis # all Running, all 1/1
kubectl port-forward -n genesis svc/genesis-control-plane 8443:443
# open https://localhost:8443 in a browser
port-forward only required for the first install — later access is via your Ingress.
Sign in to the Control Plane console. Tabs are phase-locked — you can't reach the next tab until the previous phase reports Passed. See the four-tab breakdown below.
17+ deterministic checks across cluster, network, identity, data, and your cloud. Stage 1 needs no inputs; stage 2 collects your postgres_url, redis_url, keycloak_issuer_url, cert_manager_namespace, image_registry, and tls_cert_secret and re-runs the affected probes.
Operator runs the three-gate chain (preflight passed, customer approval, bundle SHA re-verify), then zarf package deploy genesis-platform-<ver>.tar.zst followed by helm install genesis. Reconcile events stream live via SSE.
Eight verification probes (Pod Health, Service Endpoints, TLS, DB connectivity, FHIR R4, Prior Auth smoke, Performance baseline, Secrets audit) plus a HolmesGPT chat panel.
Steady-state ops landing — KPI strip + activity log streamed from the agents' CRs.
Keyless OIDC-federated signature. Verify with cosign verify-blob --bundle <file>.cosign.bundle <file>.tar.zst. Identity must be the AzDO release pipeline.
CycloneDX 1.5. Pipe into your scanner of choice (Snyk, Trivy, Grype). Lists every container layer + Python wheel + OS package across both bundles.
Signed PDF enumerating every change since the previous release that touches PHI handling, encryption, audit logging, or access control.
Same shape as install. Pull a new bundle, verify, transfer, and submit a GenesisUpgrade CR via the Upgrade tab. The operator reconciles through the same three-gate chain (preflight → approval → bundle SHA re-verify), runs zarf package deploy + helm upgrade, audits Postgres schema migrations, and regenerates a per-upgrade HIPAA attestation. rollbackOnFailure defaults to true.
The exact sneakernet path: gap-host pulls, sidecar manifests, cluster-side ingest. Read the workflow.
Plug the SBOM and image archives into your existing scanners (Trivy, Snyk, Aqua, Wiz, etc.). No new tool to approve.
Sign in to see the latest releases entitled to your organisation, rotate keys, and view the download audit log.