Alert fatigue is a bug, not a feature
+
Alert fatigue is a bug, not a feature
Ingest webhooks from PagerDuty, Datadog, OpsGenie, and Grafana. Group related alerts into incidents using time-window correlation. Stop waking up three times for the same outage.
Multi-source correlation
HMAC-verified webhooks from 4 providers. Canonical alert schema normalizes everything into one format.
Time-window grouping
5-minute correlation windows. Late alerts attach to existing incidents. Very late alerts create new ones.
80% noise reduction
20 alerts from the same root cause become 1 incident. Your on-call engineer sees one notification, not twenty.
Slack, email, webhook
Severity-gated notifications. Critical goes to Slack + email. Low goes to a dashboard. You decide.
Stop paying enterprise prices
for tools you half-use
dd0c is built by a solo engineer who got tired of $50K/year DevOps platforms diff --git a/products/marketing/site/dist/cost/index.html b/products/marketing/site/dist/cost/index.html index 39fb91d..836aa3b 100644 --- a/products/marketing/site/dist/cost/index.html +++ b/products/marketing/site/dist/cost/index.html @@ -1,4 +1,4 @@ -
Know about cost spikes before the bill arrives
+
Know about cost spikes before the bill arrives
Welford's algorithm builds running baselines per resource type. Z-score anomaly detection catches spikes in real time. Slack alerts with one-click snooze for expected costs. Governance engine auto-promotes from shadow to enforce.
Statistical baselines
Welford's online algorithm. No batch jobs. Baselines update with every data point. Optimistic locking prevents corruption.
0-100 anomaly score
Z-score mapped to a simple 0-100 scale. Set your threshold. Default 50 (2σ). Tune per resource type.
Governance engine
Shadow → audit → enforce. Auto-promotes after 14 days with <10% false positive rate. Safe by default.
Snooze & mark expected
Known cost spike? Snooze for 1-168 hours or mark as expected. Reduces false positive rate over time.
Stop paying enterprise prices
for tools you half-use
dd0c is built by a solo engineer who got tired of $50K/year DevOps platforms diff --git a/products/marketing/site/dist/drift/index.html b/products/marketing/site/dist/drift/index.html index 80d4ce6..1a15fe9 100644 --- a/products/marketing/site/dist/drift/index.html +++ b/products/marketing/site/dist/drift/index.html @@ -1,4 +1,4 @@ -
Catch Terraform drift before it catches you
+
Catch Terraform drift before it catches you
Lightweight Go agent scans your Terraform state files, compares against live infrastructure, scrubs secrets from reports, and alerts your team on Slack. Know when someone ClickOps'd your production VPC.
State scanning
Parses Terraform v4 state files. Detects resource changes, attribute drift, and deleted resources.
Secret scrubbing
Regex + Shannon entropy detection. AWS keys, RSA keys, PEM certs — scrubbed before reports leave your network.
Slack alerts
Block Kit messages with severity, affected resources, and one-click remediate/accept buttons.
Install the agent
$ curl -sSL https://install.dd0c.dev/drift | bash
$ dd0c-drift check --state terraform.tfstate --endpoint https://drift.dd0c.dev
diff --git a/products/marketing/site/dist/index.html b/products/marketing/site/dist/index.html
index e6b6526..607818d 100644
--- a/products/marketing/site/dist/index.html
+++ b/products/marketing/site/dist/index.html
@@ -1,4 +1,4 @@
- dd0c — DevOps tools that don't waste your time
+ dd0c — DevOps tools that don't waste your time
Now in beta — free while we ship
DevOps tools that
don't waste your time
diff --git a/products/marketing/site/dist/portal/index.html b/products/marketing/site/dist/portal/index.html
index 72d759f..7dd1f14 100644
--- a/products/marketing/site/dist/portal/index.html
+++ b/products/marketing/site/dist/portal/index.html
@@ -1,4 +1,4 @@
-
dd0c/portal — Service Catalog dd0c/portal "Who owns this service?"
answered in 2 seconds
+
dd0c/portal — Service Catalog dd0c/portal "Who owns this service?"
answered in 2 seconds
Auto-discovers ECS services, Lambda functions, and RDS instances from AWS. Reads CODEOWNERS from GitHub. Full-text search across your entire service catalog. Like Backstage, but you can set it up before lunch.
🔎 Auto-discovery
Scans AWS (ECS, Lambda, RDS) and GitHub orgs. Partial scan failures stage results — never corrupts your catalog.
👤 Ownership resolution
Config > CODEOWNERS > AWS tags > heuristic. Explicit always wins. No more guessing.
⚡ Instant search
Meilisearch-powered full-text search. Falls back to PostgreSQL if Meili is down. Always available.
Stop paying enterprise prices
for tools you half-use
dd0c is built by a solo engineer who got tired of $50K/year DevOps platforms
diff --git a/products/marketing/site/dist/route/index.html b/products/marketing/site/dist/route/index.html
index 928a2a1..6eb5988 100644
--- a/products/marketing/site/dist/route/index.html
+++ b/products/marketing/site/dist/route/index.html
@@ -1,4 +1,4 @@
-
dd0c/route — LLM Cost Router dd0c/route Stop burning money on LLM APIs
+
dd0c/route — LLM Cost Router dd0c/route Stop burning money on LLM APIs
Drop-in proxy that sits between your app and OpenAI/Anthropic/Google. Routes each request to the cheapest provider that meets your quality threshold. Real-time cost dashboards. Budget alerts before you blow through $10K.
💸 Cost-based routing
Classify prompt complexity. Route simple queries to cheap models, complex ones to GPT-4. Save 40-60% on average.
📊 Real-time dashboard
Cost per model, per team, per endpoint. Token usage breakdowns. Anomaly detection when spend spikes.
🔑 API key management
Issue scoped keys per team. Set budget caps. Rotate without downtime. Full audit trail.
Integration is one line
# Before
OPENAI_BASE_URL=https://api.openai.com/v1
diff --git a/products/marketing/site/dist/run/index.html b/products/marketing/site/dist/run/index.html
index 715c59f..f9a4a51 100644
--- a/products/marketing/site/dist/run/index.html
+++ b/products/marketing/site/dist/run/index.html
@@ -1,4 +1,4 @@
- dd0c/run — Runbook Automation dd0c/run Runbooks that run themselves
(with your permission)
+
dd0c/run — Runbook Automation dd0c/run Runbooks that run themselves
(with your permission)
Write runbooks in YAML. The Rust agent classifies every command as read-only, modifying, or destructive. Read-only runs automatically. Destructive commands pause and ask for Slack approval. Full audit trail. No YOLO.
Example runbook
name: restart-ecs-service
steps:
diff --git a/products/marketing/site/public/favicon.svg b/products/marketing/site/public/favicon.svg
new file mode 100644
index 0000000..e614e8e
--- /dev/null
+++ b/products/marketing/site/public/favicon.svg
@@ -0,0 +1,5 @@
+
diff --git a/products/marketing/site/src/components/Layout.astro b/products/marketing/site/src/components/Layout.astro
index af07f85..7528719 100644
--- a/products/marketing/site/src/components/Layout.astro
+++ b/products/marketing/site/src/components/Layout.astro
@@ -14,6 +14,7 @@ const { title, description = 'Six DevOps tools. One platform. Built for teams th
+