Base URLs
Prod
https://api.aix-aleph.com/v1Sandbox
https://sandbox.api.aix-aleph.com/v1 empfohlen für TestsEine einheitliche, sichere API für Agenten-Orchestrierung, Events/Streams, Policies und Observability – von Edge bis Cloud.
https://api.aix-aleph.com/v1https://sandbox.api.aix-aleph.com/v1 empfohlen für TestsBearer Token per OAuth2 Client Credentials oder API Key.
# Beispiel (cURL)
curl -X POST https://auth.aix-aleph.com/oauth/token \
-d 'grant_type=client_credentials' \
-u CLIENT_ID:CLIENT_SECRETAdaptive, fair-use basiert; Header liefern Kontingente.
| Plan | Limit | Bursts |
|---|---|---|
| Core | 1,000 req/min | Yes |
| Pro | 5,000 req/min | Yes |
| Enterprise | Custom | Custom |
npm i @aix-aleph/sdkimport { Aleph } from '@aix-aleph/sdk'
const api = new Aleph({ baseUrl:'https://api.aix-aleph.com/v1', token: process.env.AIX_TOKEN })
const agent = await api.agents.create({ name:'planner-01', role:'planner' })pip install aix-alephfrom aix_aleph import Aleph
api = Aleph(token=os.getenv("AIX_TOKEN"))
print(api.health())go get github.com/aix-aleph/sdk-gocli := aleph.New(os.Getenv("AIX_TOKEN"))
st, _ := cli.Health()POST /v1/agents
Authorization: Bearer <TOKEN>
Content-Type: application/json
{
"name": "planner-01",
"role": "planner",
"resources": {"cpu":"500m","mem":"512Mi"},
"policies": ["fleet.read","dispatch.write"]
}200 OK
{
"id":"agt_9f2x...","status":"ready",
"created_at":"2025-08-30T10:00:00Z"
}POST /v1/streams/fleet.events
Authorization: Bearer <TOKEN>
Content-Type: application/json
{
"type":"vehicle/arrived",
"vehicle_id":"veh_123",
"soc": 0.28,
"location": {"lat":50.12,"lon":8.67}
}202 Accepted
{"offset":"00000017-9abe","ingested":true}POST /v1/policies
{
"name":"no_unverified_dispatch",
"effect":"deny",
"when":"context.user.verified == false && action == 'dispatch'"
}GET /v1/explain?plan_id=pln_7ab3...
Authorization: Bearer <TOKEN>200 OK
{
"plan_id":"pln_7ab3...",
"causal_path":[{"step":"perceive"},{"step":"plan"},{"step":"execute"}],
"artifacts":[{"type":"trace","uri":"aleph://..."}]
}Benachrichtigungen zu wichtigen Events (Plan fertig, Policy-Verstoß, Telemetrie-Grenzen).
POST /v1/webhooks
{
"url":"https://example.com/hooks/aleph",
"events":["plan.completed","policy.violation","fleet.arrival"],
"secret":"<HMAC-SECRET>"
}# X-Aleph-Signature: sha256=<HMAC>
# Body per HMAC-SHA256 mit 'secret' prüfen| Code | Typ | Beschreibung |
|---|---|---|
| 400 | validation_error | Request unvollständig/ungültig |
| 401 | unauthorized | Token fehlt/ungültig |
| 403 | forbidden | Policy verbietet Aktion |
| 409 | conflict | Concurrent-Änderung/Versionskonflikt |
| 429 | rate_limited | Bitte Retry-After beachten |
| 500 | server_error | Unerwarteter Fehler – Request-ID im Support angeben |
Sandbox-Zugang & Beispiel-Credentials innerhalb weniger Minuten.