AI-powered sysadmin toolkit
for IBM POWER Linux.
Classify logs, diagnose incidents, translate code, audit compliance, decode error messages — all locally on ppc64le. Your data never leaves the machine.
Your POWER systems generate thousands of log entries, error reports, and messages daily. Finding what matters requires expert knowledge that's increasingly scarce. lpai brings AI-powered analysis directly to your system — everything runs locally, zero data leaves the machine.
Run on local vLLM, Ollama, or any OpenAI-compatible endpoint on your LAN. Air-gapped friendly. Critical for regulated industries on Power.
Single binary. No Python, no Java, no containers. Native ppc64le builds for every major Linux distribution and AIX. apt install lpai.
Pipe anything in, get structured output. Works the way sysadmins already work — journalctl | lpai diagnose.
Classify log entries by severity — CRITICAL, WARNING, INFO. Pipes through journalctl, syslog, anything.
Filter logs to show only actionable entries. Cut through the noise.
Root cause analysis with concrete remediation commands. From symptom to fix.
Decode SRC/FRU codes, CPF messages, errno values. Knows POWER and IBM i error catalogs.
Explain ANY system output — auto-detects 39+ command types and tells you what it means.
Monitor logs continuously and alert on critical events. tail -f | lpai watch.
Classify and route alerts to teams via webhooks. Slack, PagerDuty, anything.
Generate formatted reports from raw data. Ready for the morning standup.
Security audit with PCI, CIS, NIST, SOC2 and COBIT compliance frameworks built in.
Detect and mask PII / sensitive data before sharing. Regex post-pass catches misses.
Risk assessment of changes — git diffs, config files, anything. Know before you ship.
Translate between 40 code, SQL and config formats. RPG IV → Python, COBOL → Java, and more.
Generate test cases from existing code. Coverage without the chore.
Suggest code improvements with before / after diffs. Modernize legacy code in place.
Generate structured documentation from code. README files that don't lie.
Free-form questions with RAG-enhanced context. Cites sources from your indexed runbooks.
Index documents for RAG-enhanced ask. Hybrid keyword + vector search. Incremental.
Map-reduce summarization of long documents. Incident reports in seconds.
Evaluate RAG retrieval quality. Know if your index is actually working.
Performance analysis and tuning recommendations. Targeted at your actual workload.
HTTP API server with 22 REST endpoints. Run as a systemd daemon, query from anywhere.
Print version and platform info. Quick sanity check.
Modernize decades of POWER and IBM i code. Translate languages, SQL dialects, and config formats — preserving logic, not just syntax.
Every demo recorded on actual ppc64le and AIX hardware.
errpt straight in and gets back classified incidents with root cause and remediation. Same tool, same syntax, native ppc64.
lpai audit command.
Run security audits against the standards your organization actually has to answer to. Generates findings with remediation, mapped to control IDs.
Cardholder data protection
Hardening benchmarks
800-53 control families
Trust services criteria
IT governance framework
Works with any OpenAI-compatible or Anthropic-compatible API. Run private inference on your own POWER hardware, or use a hosted provider when latency matters more than locality.
Data never leaves your machine or LAN. Air-gapped deployments fully supported. Recommended for regulated workloads.
Set LPAI_ENDPOINT and LPAI_API_KEY. Data is sent to the provider — review your compliance posture first.
RPM and DEB packages include a systemd service.
Run sudo systemctl enable --now lpai to start the daemon. Then query any of the 22 REST endpoints from your applications.
SIXE can help you stand up vLLM on Power, integrate lpai into your runbooks, or train your team.
Subscribe for releases, deep-dives, and POWER community news.