Documentation Index
Fetch the complete documentation index at: https://docs.equinix.dev/llms.txt
Use this file to discover all available pages before exploring further.
github.com/equinix/agent-factory
is the canonical, Equinix-shipped collection of Fabric automation
agents. equinix.dev’s job is to plan the infrastructure
(equinix-dev plan, then terraform apply); Agent Factory’s job is
to keep that infrastructure healthy after apply.This page maps the Agent Factory inventory to the
Use Cases — so for each
deployment pattern, you know which agents to run next.The three categories
Agent Factory classifies every agent by execution shape. The classification is what makes it composable — your platform team picks a Run-Once on apply, a Scheduled audit cadence, and the right Event- Driven mitigations, and ships a stack.Run-Once
Execute immediately on deployment. Use for first-time scans,
alert-rule creation, baseline diagnostics, and one-shot reports.
Scheduled
Trigger on a cadence (hourly / daily / weekly). Use for utilization
monitoring, drift detection, periodic reports, and proactive
bandwidth upgrades.
Event-Driven
React to real-time Fabric Streams events. Use for packet-drop
mitigation, metro latency spikes, BGP session churn, and any
state-change alerting.
Catalog of agents (Equinix-shipped, as of preview)
| Agent | Category | What it does |
|---|---|---|
| Auto-upgrade connection bandwidth | Scheduled | Watch utilization on primary + secondary connections; when threshold crossed, upgrade bandwidth and maintain redundancy parity. |
| Auto-upgrade Cloud Router package | Scheduled | Monitor route count on the FCR; upgrade BASIC → ADVANCED when route table approaches package limit. |
| PING + TRACEROUTE diagnostics | Run-Once | Issue diagnostics from the FCR’s metro perspective; email the report. |
| Alert rule creation for connections | Run-Once | Create the canonical alert set (down, degraded, BGP-session-lost) on every connection at provision time. |
| Project lifecycle PDF report | Scheduled | Weekly per-project summary with route table, connection list, recent state changes; emit PDF. |
| GCP metrics integration | Event-Driven | Subscribe to Fabric Streams, transform, push to GCP Cloud Monitoring. |
| Metro latency spike detection | Event-Driven | Watch P95 latency by metro pair; page when spike exceeds threshold. |
| Packet drop mitigation | Event-Driven | Detect packet drop pattern; auto-shift traffic to secondary path, page on-call. |
| Real-time network stream analysis | Event-Driven | Generic Fabric Streams consumer for custom heuristics. |
How equinix.dev hands off to Agent Factory
Recommended agent set per Use Case
Private AI inference path
Private AI inference path
The minimum operationally-defensible agent set after this Use
Case’s
terraform apply:- Auto-upgrade connection bandwidth (Scheduled, daily) — GPU traffic to Lambda fluctuates with workload; let utilization trigger upgrades, not paging.
- PING + TRACEROUTE diagnostics (Run-Once) — bake the baseline latency profile on day one.
- Alert rule creation for connections (Run-Once) — on both the origin-to-FCR and FCR-to-Lambda connections.
- Metro latency spike detection (Event-Driven, P95 > 30ms) — the inference path’s first-token latency budget.
- Packet drop mitigation (Event-Driven) — failover to the secondary FCR if a metro flaps.
Multi-cloud private interconnect
Multi-cloud private interconnect
For the regulated multi-cloud pattern, the agent set leans on auditing and BGP health:
- Alert rule creation for connections (Run-Once) — on all 6 cloud connections (3 clouds × 2 metros).
- Project lifecycle PDF report (Scheduled, weekly) — auditor-ready snapshot of routing posture and connection state.
- Auto-upgrade Cloud Router package (Scheduled, hourly) — the FCRs handle BGP routes for AWS/Azure/GCP; route count grows with VPC count.
- Real-time network stream analysis (Event-Driven) — custom rule: any prefix outside the PCI route filter being advertised triggers an immediate page.
Distributed AI observability
Distributed AI observability
The observability Use Case is itself an agent-shaped pattern, so the Agent Factory set is mostly Event-Driven on top of the Fabric Streams subscriptions you already provisioned:
- GCP metrics integration (Event-Driven) — if your AI inference compute lives in GCP, this routes Fabric metrics to Cloud Monitoring next to your application metrics.
- Metro latency spike detection (Event-Driven) — paired with the Datadog sink so the spike pages and lands a snapshot.
- PING + TRACEROUTE diagnostics (Run-Once per metro) — three baseline traceroutes (IAD/DFW/SV5) for the first incident’s “compared to last week” delta.
Why this split is the right boundary
equinix.dev is plan-only by design — see the Safety model. The mutation that Agent Factory performs (creating alert rules, upgrading bandwidth, shifting traffic) is real, authorized at apply time, and scoped to the specific agent’s capability rather than blanket account access. This means:- An attacker compromising the agent-factory runtime can do what the agent’s capability allows — they can’t suddenly drain your whole Fabric account.
- An audit can answer “what changed and who changed it” because every agent has a Markdown definition that names its tools.
- A board / regulator can read the Agent Factory repo and the equinix.dev safety model in one sitting, and verify that the plan-only / agent-bounded boundary holds.
Next
Three full Use Cases
Each one has a Terraform recipe that the agents above operate on top of.
Safety model
The six controls keeping the boundary between plan-only and operational.