HN 표시: Sonde – 오픈 소스 LLM 분석(LLM 전체에서 브랜드 언급 추적)
hackernews
|
|
💼 비즈니스
#ai검색
#llm
#tip
#분석도구
#브랜드추적
#오픈소스
#ai 검색
#분석
#브랜드
원문 출처: hackernews · Genesis Park에서 요약 및 분석
요약
웹사이트 트래픽 감소와 ChatGPT 등을 통한 발견 증가라는 변화에 맞춰, 기존 SEO 도구의 비용 문제를 해결하기 위해 오픈 소스 'Sonde'가 개발되었습니다. 이 도구는 여러 LLM에 프롬프트를 예약 실행하고 브랜드 언급, 경쟁사 대비 순위 및 감정 분석을 추적하여 AI 답변 내 가시성을 모니터링합니다. Supabase와 Next.js를 기반으로 구축된 이 소프트웨어는 Docker Compose를 통한 셀프 호스팅과 유료 관리형 버전을 모두 지원합니다.
본문
People are finding products through AI instead of search engines. Sonde helps you understand how your brand, product, or service appears in those responses. Across multiple models, over time. Sonde tracks: - Visibility – Are you being mentioned? - Sentiment – How are you described? - Ranking – How do you compare against competitors? Instead of guessing whether your content or SEO efforts are working, Sonde gives you a concrete KPI to measure and optimize. Sonde is designed to run via Docker Compose. - Docker - Docker Compose v2 ( docker compose ) - Git Verify: docker --version docker compose version deploy user, assign it all files in the folder (chown -R deploy:deploy . ) and switch to it before running services (su deploy ). Clone the repository: git clone https://github.com/compiuta-origin/sonde.git cd sonde/docker Create your environment file: cp .env.example .env Generate secure secrets: ./utils/generate-keys.sh This will overwrite secret values inside .env with secure random keys. Edit .env to fill in the required external service credentials: SYSTEM_OPENROUTER_KEY STRIPE_API_KEY STRIPE_PUBLISHABLE_KEY STRIPE_WEBHOOK_SECRET SMTP_HOST SMTP_PORT SMTP_USER SMTP_PASSWORD SMTP_ADMIN_USER For production, also configure: SITE_URL API_EXTERNAL_URL From the docker/ directory: docker compose up -d You can now access both Sonde's UI and Supabase Studio: - App: SITE_URL (defaulthttp://app.localhost ) - Supabase Studio: API_EXTERNAL_URL (defaulthttp://api.localhost ). When accessing it, you'll be prompted for a user/password pair:- Default user: supabase - Password: see generated .env - Default user: SELECT vault.create_secret('your-service-role-key-value','service_role_key') where your-service-role-key-value is the value associated to SERVICE_ROLE_KEY in your .env file. You can double check the currently stored secred at any time with: SELECT * from vault.decrypted_secrets docker compose down To remove volumes ( docker compose down -v cd sonde git pull cd docker docker compose pull docker compose up -d --build The generate-keys.sh script creates: - JWT secrets - Database passwords - Service keys Never reuse these between environments. Never commit .env , store it in a safe place. Only expose: - 80 (HTTP) - 443 (HTTPS) - 22 (SSH) Your database and internal services must not be publicly accessible. If on Ubuntu, you can use ufw (Uncomplicated Firewall). sudo ufw allow OpenSSH sudo ufw allow 80/tcp sudo ufw allow 443/tcp sudo ufw enable Check status: sudo ufw status You should see: 22/tcp ALLOW 80/tcp ALLOW 443/tcp ALLOW For those who'd rather trade a small monthly fee for the convenience of a managed service, we offer a hosted version. GNU AGPLv3.
Genesis Park 편집팀이 AI를 활용하여 작성한 분석입니다. 원문은 출처 링크를 통해 확인할 수 있습니다.
공유