mirror of
https://github.com/awesome-foss/awesome-sysadmin.git
synced 2026-05-06 02:18:54 -05:00
[PR #772] Add osModa to Configuration Management #5883
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
📋 Pull Request Information
Original PR: https://github.com/awesome-foss/awesome-sysadmin/pull/772
Author: @bolivian-peru
Created: 4/23/2026
Status: 🔄 Open
Base:
master← Head:add-osmoda-config-mgmt📝 Commits (1)
1f47150Add osModa to Configuration Management📊 Changes
1 file changed (+1 additions, -0 deletions)
View changed files
📝
README.md(+1 -0)📄 Description
Thank you for taking the time to work on a PR for Awesome-Sysadmin!
To ensure your PR is dealt with swiftly please check the following:
- [Name](url) - Description, sentence case under 80 chars. ([Source Code](url)) `License` `Language`OpenVoxandRudder(case-insensitive: openv < osmoda < rudder)Languagetag is the main server-side requirement —Rust/TypeScript(10 Rust daemons + TypeScript gateway)osModa is a NixOS distribution where every system change is a transaction with atomic rollback (NixOS generations) and every action is logged to a SHA-256 hash-chained tamper-evident audit ledger (
agentctl verify-ledger). The agent layer adds 91 typed tools across 9 Rust daemons (system bridge, deploys, watchers, mesh, voice, MCP, learning, egress, wallets) — the AI agent uses structured tool calls instead of raw shell, making AI-driven sysadmin meaningfully safer than running an LLM with shell access on traditional Linux.The Configuration Management category currently has Ansible, CFEngine, CINC, cloud-init, OpenVox, Rudder, Salt — all imperative or declarative tools that humans drive. osModa fits adjacent: declarative NixOS config that an AI can autonomously evolve through a SafeSwitch-gated deploy loop with auto-rollback on health-check failure.
I built it. Running ~2.5 months on a fleet of small Hetzner VMs and on the spawn server hosting spawn.os.moda since February 2026. Production-shaped workloads include the spawn-app itself, ProxySmart marketplace, and several internal automation services.
Both. Personal: home-server experiments, AI bots. Professional: spawn.os.moda is a hosted-provisioning product running on it.
5 production servers (CX22 to Pro tier) + the spawn server itself. Combined ~12 systemd services per VM, ~60 services across the fleet. 10 daemons per host, ~50 daemons total across the fleet.
Pros vs Ansible/Salt: every change is a NixOS generation —
nixos-rebuild --rollback switchis one command, not a "playbook to undo." The audit ledger is tamper-evident, not just append-only logs. The AI is constrained to typed tool calls instead of arbitrary shell.Cons vs Ansible/Salt: NixOS-only — does not target Ubuntu/RHEL/Debian without converting them first (the installer does this on cloud VMs but it's destructive). Younger project, smaller ecosystem. Configuration management surface is the NixOS module + 91 MCP tools, not 1000s of pre-built modules.
Submitting on the back of multiple recent ecosystem listings (in punkpeye/awesome-mcp-servers, nix-community/awesome-nix, rust-unofficial/awesome-rust). Happy to make any format adjustments.
🔄 This issue represents a GitHub Pull Request. It cannot be merged through Gitea due to API limitations.