Skip to content

Commit 112e871

Browse files
mayurkrCopilot
andauthored
Clarify distinction between Zelyo core product and Operator (#27)
* docs: Clarify the distinction between the Zelyo core product and the Zelyo Operator in documentation. * Update README.md Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com> --------- Co-authored-by: Copilot <175728472+Copilot@users.noreply.github.com>
1 parent fe48c4b commit 112e871

3 files changed

Lines changed: 15 additions & 11 deletions

File tree

README.md

Lines changed: 9 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -20,9 +20,11 @@
2020

2121
---
2222

23-
## What is Zelyo Operator?
23+
## What is Zelyo?
2424

25-
Zelyo Operator is your **Digital SRE and Security Engineer** — a self-hosted Kubernetes Operator powered by **Agentic AI** that does the job of a full-time site reliability and security engineer. It doesn't just alert — it **observes**, **reasons**, and **acts**, continuously protecting your production clusters while you sleep.
25+
**Zelyo** is your **Digital SRE and Security Engineer** powered by **Agentic AI** that does the job of a full-time site reliability and security engineer. It doesn't just alert — it **observes**, **reasons**, and **acts**, continuously protecting your production clusters while you sleep.
26+
27+
The **Zelyo Operator** is a self-hosted Kubernetes Operator that allows you to manage and automate the lifecycle of Zelyo within your cluster.
2628

2729
Think of a seasoned SRE who:
2830
- 👁️ **Watches** every pod restart, OOMKill, security misconfiguration, and RBAC drift
@@ -31,13 +33,13 @@ Think of a seasoned SRE who:
3133
- 🔧 **Fixes** problems by generating production-ready YAML patches and opening GitOps PRs
3234
- 📋 **Reports** compliance posture against CIS Benchmarks, NIST 800-53, SOC 2, and PCI-DSS
3335

34-
That's Zelyo Operator. All automated, all autonomous, all with **read-only cluster access**.
36+
That's Zelyo. All automated, all autonomous, all with **read-only cluster access**.
3537

36-
**Bring your own LLM API keys** (OpenRouter, OpenAI, Anthropic, Azure OpenAI, Ollama) — Zelyo Operator is heavily optimized to minimize token usage.
38+
**Bring your own LLM API keys** (OpenRouter, OpenAI, Anthropic, Azure OpenAI, Ollama) — Zelyo is heavily optimized to minimize token usage.
3739

3840
### What a Digital SRE & Security Engineer Does
3941

40-
| Responsibility | How Zelyo Operator Handles It |
42+
| Responsibility | How Zelyo Handles It |
4143
|---|---|
4244
| 🔒 **Security Scanning** | Continuously scans for RBAC issues, image CVEs, PodSecurity violations, secrets exposure, and network policy gaps |
4345
| 🛡️ **Compliance Auditing** | Maps scan findings to CIS Kubernetes Benchmark controls, generates audit-ready reports with evidence |
@@ -51,7 +53,7 @@ That's Zelyo Operator. All automated, all autonomous, all with **read-only clust
5153

5254
### The Agentic Pipeline: Observe → Reason → Act
5355

54-
Unlike traditional scanning tools that dump findings and walk away, Zelyo Operator operates as a **closed-loop autonomous agent**:
56+
Unlike traditional scanning tools that dump findings and walk away, Zelyo operates as a **closed-loop autonomous agent**:
5557

5658
```mermaid
5759
graph LR
@@ -95,7 +97,7 @@ graph TB
9597
Metrics[Resource Metrics]
9698
end
9799
98-
subgraph "Zelyo Operator — The Digital SRE"
100+
subgraph "Zelyo — The Digital SRE"
99101
subgraph "Observe"
100102
Watcher[Real-Time Watcher]
101103
Scanner[Security Scanner]

docs/compliance.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
# Compliance Frameworks
22

3-
As your Digital SRE and Security Engineer, Zelyo Operator automatically evaluates your cluster against industry-standard compliance frameworks. Every `ClusterScan` maps security findings to specific compliance controls, generates audit-ready reports with evidence, and emits `ComplianceViolation` Kubernetes events.
3+
As your Digital SRE and Security Engineer, Zelyo automatically evaluates your cluster against industry-standard compliance frameworks. Every `ClusterScan` maps security findings to specific compliance controls, generates audit-ready reports with evidence, and emits `ComplianceViolation` Kubernetes events.
44

55
## Supported Frameworks
66

docs/index.md

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -28,9 +28,11 @@ hide:
2828

2929
---
3030

31-
## What is Zelyo Operator?
31+
## What is Zelyo?
3232

33-
Zelyo Operator is your **Digital SRE and Security Engineer** — a self-hosted Kubernetes Operator powered by **Agentic AI** that does the job of a full-time site reliability and security engineer. It autonomously **observes** your cluster, **reasons** about security findings and anomalies using LLMs, and **acts** by opening GitOps PRs with production-ready fixes — all with **read-only cluster access**.
33+
**Zelyo** is your **Digital SRE and Security Engineer** powered by **Agentic AI** that does the job of a full-time site reliability and security engineer. It autonomously **observes** your cluster, **reasons** about security findings and anomalies using LLMs, and **acts** by opening GitOps PRs with production-ready fixes — all with **read-only cluster access**.
34+
35+
The **Zelyo Operator** is a self-hosted Kubernetes Operator that allows you to manage and automate the lifecycle of Zelyo within your cluster.
3436

3537
**Bring your own LLM API keys** (OpenRouter, OpenAI, Anthropic, Azure, Ollama) — optimized for minimal token usage.
3638

@@ -128,7 +130,7 @@ graph TB
128130
Metrics[Resource Metrics]
129131
end
130132
131-
subgraph "Zelyo Operator — The Digital SRE"
133+
subgraph "Zelyo — The Digital SRE"
132134
subgraph "Observe"
133135
Watcher[Real-Time Watcher]
134136
Scanner[Security Scanner]

0 commit comments

Comments
 (0)