This tree is the canonical Move Big Rocks instance-template layout for deploying Move Big Rocks, the AI-native service operations platform.
It is the canonical customer deployment-control-plane starting point inside the public Move Big Rocks core repo.
A private instance repo is the deployment control plane for one live Move Big Rocks installation. It should contain desired state, deployment policy, branding, and extension configuration. It should not contain a long-lived fork of the core source tree.
This source tree is:
- the starting point for private instance repos such as
acme/mbr-prod - the canonical home for the deployment-control-plane shape customers should use
- the place agents and humans should read when they want to understand what belongs in an instance repo
This source tree is not:
- the whole public core repo
- a live DemandOps or customer instance
- a place to store secrets
- a place to author first-party paid extension source
- Create a private repo from this template structure.
- Fill in
mbr.instance.yaml. - Add repository and environment secrets.
- Open the repo in Codex or Claude Code.
- Point the agent at
START_HERE.md. - Let the agent deploy and operate the instance.
- Use
scripts/read-instance-config.shto validate and inspect the non-secret desired state. - Use
scripts/validate-extension-desired-state.shbefore changing or deployingextensions/desired-state.yaml. - Review the
spec.fleetsettings and run the manualRegister Fleetworkflow if this instance should be registered for support, grandfathering, or future commercial transitions.
See also:
mbr.instance.yamlCanonical desired state for one Move Big Rocks installation.START_HERE.mdSingle-file handoff for Codex or Claude Code.agents/bootstrap.mdThe first-run instructions an agent should follow.branding/site.jsonCustomer-owned branding and copy overrides.extensions/desired-state.yamlInstalled and planned extension refs..github/workflows/Deployment, verification, and explicit fleet-registration workflows owned by the instance repo.deploy/Deploy scripts, service units, and host bootstrap assets owned by the instance repo.security/Threat-model and review materials for custom extensions.scripts/read-instance-config.shCanonical parser and validator formbr.instance.yaml.scripts/validate-extension-desired-state.shVerifies that installed extension refs are real before deploy.
- Pin core releases instead of tracking arbitrary commits.
- Pin extension artifact refs instead of storing proprietary extension source here.
- Validate extension desired-state refs before merge or deploy.
- Store custom extension source in separate repos.
- Keep customer-specific secrets in GitHub Actions secrets or another secret manager, not in this repo.
- Keep hosts, domains, artifact refs, buckets, and provider choices in
mbr.instance.yaml. - Keep fleet registration explicit. Every instance repo carries
spec.fleet, but registration remains a manual control-plane action and the heartbeat stays disclosed, coarse, and optional for the running core platform. - Default to one private instance repo only. Add a custom extension repo only when you are building custom extension logic.
This tree already includes the deployment workflows, deploy assets, and config reader needed to materialize a working instance repo layout without manual copying.
You can materialize that repo layout locally with:
scripts/export-instance-template.sh /absolute/path/to/acme-mbr-prodValidate it before or after export with:
make validate-instance-template