Quick Start
Get your first AI-powered investigation running in about 10 minutes.
Prerequisites
- A Kubernetes cluster (EKS, GKE, AKS, or self-hosted, version 1.24+)
- Helm 3.x installed on your machine
- kubectl access to your cluster with admin permissions
- A monitoring system with webhook support (Prometheus AlertManager, Grafana Alerting, or Datadog)
- A Slack workspace (recommended, for receiving investigation results)
Steps Overview
1. Create Your Account
- Go to app.opsworker.ai and click Sign Up
- Sign up with Google SSO or email/password
- Verify your email address
2. Create a Workspace
- After signup, you'll be prompted to create your first workspace
- Name it something meaningful (e.g., your company or team name)
- Workspaces group your clusters, users, and configurations — you can create more later
3. Add Your First Cluster
- Navigate to Configurations → Add Cluster
- Name your cluster (e.g.,
production-us-east) - Select which integrations to enable (you can add more later)
- Copy the Helm install command — it includes your unique cluster token
4. Install the Kubernetes Agent
Run the Helm command from Step 3 in your terminal:
helm repo add opsworker https://charts.opsworker.ai
helm repo update
helm install opsworker-agent opsworker/opsworker-agent \
--namespace opsworker \
--create-namespace \
--set clusterToken=YOUR_CLUSTER_TOKEN
Verify the agent is running:
kubectl get pods -n opsworker
You should see the agent pod in Running state. Back in the portal, your cluster status should show Connected.
5. Connect Your Alerting System
Configure your monitoring system to send alerts to OpsWorker via webhook. Your webhook URL is available in the portal under Integrations.
- Prometheus AlertManager — Add a webhook receiver (detailed guide)
- Grafana Alerting — Create a Contact Point with type Webhook (detailed guide)
- Datadog — Add a webhook integration (detailed guide)
6. Connect Slack
- In the portal, go to Integrations → Slack → Install
- Authorize OpsWorker in your Slack workspace
- Select the channel where investigation results should be posted
7. Run Your First Investigation
You have three options:
- Test Integration — Click the Test Integration button in your cluster settings to send a synthetic alert through the full pipeline
- Wait for a real alert — The next alert from your monitoring system that matches your alert rules will trigger an investigation automatically
- Use AI Chat — Open the Chat interface in the portal and ask a question about your cluster
Expected Outcome
When an investigation completes, you'll receive a Slack message containing:
- Alert summary — What triggered the investigation
- Root cause analysis — The underlying issue identified by AI
- Affected resources — Kubernetes resources involved (pods, services, deployments)
- Recommended actions — Specific steps to resolve the issue, including kubectl commands
- Feedback buttons — Rate the investigation quality (Accurate, Partially Accurate, Needs Improvement)
The full investigation is also available in the portal under Investigations, where you can see the topology map, collected data, and chat with the investigation for follow-up questions.
Next Steps
- Configure Alert Rules — Control which alerts trigger investigations
- Set Up Notification Routing — Route results to different Slack channels
- Explore AI Chat — Ask questions about your clusters interactively
- Understand Investigations — Learn how the AI investigation process works