Capabilities
Linux visibility without another agent tier.
It is built for fast operational checks from a phone: see what is wrong, confirm trust, inspect logs, and act on the host without adding a collector or relay.
Live host overview
CPU, memory, disk, network, and alert freshness refresh from the target host so you can see current pressure without opening a laptop.
Systemd and logs
Inspect service state, failures, and journal output from the same place you check live health.
Docker or Podman
Read container lists, stats, and logs across mixed hosts instead of assuming every box runs the same stack.
Local history
Keep CPU, memory, disk, and temperature history on device, then export CSV when you need to hand the numbers off.
Host-key trust
Known-host trust is explicit and visible, so you can see what the app trusts instead of accepting hidden security shortcuts.
Agentless SSH path
Nodex reads `/proc`, `systemctl`, `journalctl`, `ip`, `df`, sensors, and container CLIs over SSH rather than depending on a second daemon.
Privacy
No relay in the monitoring path.
Nodex polls your servers over SSH, keeps trusted hosts and keys on device, and stores recent history locally. Monitoring data is not bounced through a vendor control plane.
Agentless
Host setup
Local
Trust store
On-device
History cache
Architecture
SwiftUI client. Linux data at the source.
Nodex runs as a native iOS client and leans on Linux tools at the source. Health comes from `/proc`, `systemctl`, `journalctl`, `ip`, `df`, sensors, and container CLIs instead of a second agent.
Swift
iOS client
The iPhone app handles onboarding, host profiles, dashboards, and the small operational actions needed when you are away from a terminal.
SSH
Transport and commands
SSH stays on the hot path for collection and action execution, keeping access rules simple and the monitoring flow direct.
Local stores
Trust and history
Keys, trusted hosts, recent history, and user settings stay on device so the app can keep state without pushing it into a cloud control plane.
Linux host tools
Source of truth
The target machine stays authoritative for metrics, logs, services, and containers, so what you see reflects the host rather than a delayed mirror.
