Supported Providers
Any provider that offers a Linux VM will work. The instructions below use Ubuntu 22.04 as the example OS.| Provider | Recommended VM size |
|---|---|
| AWS EC2 | t3.small or larger |
| Azure | Standard_B2s or larger |
| DigitalOcean | Basic 2 GB Droplet |
| Hetzner | CX22 or larger |
| Google Cloud | e2-small or larger |
Step 1 — Provision a VM
Create a new VM running Ubuntu 22.04 LTS. Note your VM’s public IP address — you’ll need it in a moment. Make sure you can SSH into it:Step 2 — Install FideliOS
Once connected via SSH, run:fidelios CLI.
Step 3 — Open Port 3100
FideliOS listens on port3100. Open that port in your provider’s firewall so you can reach it from a browser.
AWS — Edit the inbound rules on your EC2 security group:
- Type: Custom TCP
- Port: 3100
- Source: your IP address (or
0.0.0.0/0for public access)
- Port: 3100
- Source: your IP (or Any)
Step 4 — Bind FideliOS to All Interfaces
By default FideliOS only listens on127.0.0.1. To accept external connections, set the HOST variable:
Step 5 — Run as a System Service
To keep FideliOS running after you close the SSH session and restart on reboot:Private Access with Tailscale (Recommended)
Exposing port 3100 to the internet works but is not ideal. A better option is to use Tailscale so that only devices on your private network can reach FideliOS.- Install Tailscale on the VM: follow the Tailscale Linux install docs
- Join your Tailnet:
sudo tailscale up - Find your Tailscale IP:
tailscale ip -4 - Close port 3100 in your cloud firewall (only allow Tailscale traffic)
- Access FideliOS via the Tailscale IP:
http://<tailscale-ip>:3100
Where Your Data Lives
All data is stored under~/.fidelios/ on the VM:
| Data | Location |
|---|---|
| Config | ~/.fidelios/instances/default/config.json |
| Database | ~/.fidelios/instances/default/db |
| Secrets key | ~/.fidelios/instances/default/secrets/master.key |
What’s Next
Core Concepts
Learn how agents, tasks, and goals fit together
Adapters
Connect FideliOS to Claude, Codex, or your own model