Skip to content

Unmanaged architecture

Open in ChatGPT ↗
Ask ChatGPT about this page
Open in Claude ↗
Ask Claude about this page
Copied!

Run Oz agents in your existing CI, Kubernetes, or dev environments using the oz agent run CLI. You orchestrate the runs; Warp provides tracking and observability.

With the unmanaged architecture, you orchestrate agent runs by invoking oz agent run directly from your existing CI pipelines, Kubernetes pods, VMs, or dev boxes. The agent runs on whatever host the command is executed from; Warp tracks the session for you but does not start or stop agents.

  • CI/CD pipelines — Run agents as part of a build or deployment workflow. This is how the warpdotdev/oz-agent-action GitHub Action works.
  • Kubernetes pods — Run agents inside pods with access to your cluster’s network and services.
  • Dev boxes and VMs — Run agents in pre-provisioned development environments. Especially useful for large monorepos with long setup times.
  • Existing orchestrators — Drop oz agent run into any system that schedules work (Jenkins, Buildkite, internal job schedulers).

Unmanaged works on any platform Warp supports (Linux, macOS, Windows) with no dependency on Docker or any other sandboxing platform.


~5 minutes

No Docker, no worker daemon, no environment required — just the Oz CLI on any host that can reach the internet.

  • The Oz CLI installed on the machine where agents will run. See Installing the CLI for platform-specific instructions.
  • A Warp API key — For automation, create a team-scoped API key in the Warp app at Settings > Cloud platform > Oz Cloud API Keys. See API Keys for details.

Export your API key so the CLI can authenticate requests automatically:

Terminal window
export WARP_API_KEY="your_team_api_key"

Invoke oz agent run in the directory where you want the agent to operate. The agent has access to whatever tools, network resources, and credentials the host provides.

Terminal window
oz agent run --prompt "Refactor the authentication module" --share team

Expected outcome: The agent starts immediately in the current working directory, and a tracked session appears in the Oz dashboard.

Use --share to control who can attach to the session and steer the agent:

  • --share — Share the session with yourself (accessible on other devices or in a browser).
  • --share team or --share team:view — Give all team members read-only access.
  • --share team:edit — Give all team members read/write access.
  • --share user@example.com — Give a specific user read-only access.
  • --share user@example.com:edit — Give a specific user read/write access.

The --share flag can be repeated to combine multiple sharing targets. If you authenticate with a team API key, agents are automatically team-scoped.


Warp maintains the warpdotdev/oz-agent-action action for running agents in GitHub Actions. The action wraps oz agent run and is a drop-in for CI workflows:

- name: Run Oz agent
uses: warpdotdev/oz-agent-action@v1 # wraps `oz agent run` under the hood
with:
prompt: "Review the code changes on this branch"
warp_api_key: ${{ secrets.WARP_API_KEY }}

See GitHub Actions integration for full details.

Run an agent inside a Kubernetes pod with access to your cluster’s services:

apiVersion: batch/v1
kind: Job
metadata:
name: oz-agent-task
spec:
template:
spec:
containers:
- name: oz-agent
image: warpdotdev/warp-agent:latest
command: ["agent", "run", "--prompt", "Run the test suite and report failures"]
env:
- name: WARP_API_KEY
valueFrom:
secretKeyRef:
name: warp-credentials
key: api-key
restartPolicy: Never

Unmanaged agents are tracked on Warp’s backend. Each run creates a persistent session that your team can:

Unmanaged sessions benefit from the same shared configuration as other cloud agent runs — MCP servers, secrets, Warp Drive context, and saved prompts all apply.