This template runs agentmemory on a single Render Web Service with a
persistent disk mounted at /data. The HMAC secret is generated on
first boot and persisted to the disk — you capture it from the deploy
logs exactly once.
- A public HTTPS endpoint serving the agentmemory REST API on port 3111
(Render injects
PORTdefaulting to 10000; we override it to 3111 viaenvVarsso the published port matches the container's bind) - A 1 GB persistent disk at
/datafor memories, BM25 index, and stream backlog - Render healthcheck against
/agentmemory/livez - The HMAC bearer secret is generated on first boot inside the
container and persisted to
/data/.hmac(chmod 600); the operator copies it from the deploy logs once.
Render's one-click deploy button only auto-detects render.yaml at the
repository root, which the agentmemory repo keeps clean. Use the
dashboard's manual Blueprint flow instead:
- Push the
deploy/render/directory to a Git provider Render can reach (a fork ofrohitg00/agentmemoryworks). - In the Render dashboard, click New + → Blueprint.
- Point Render at the repo and the path
deploy/render/render.yaml. - Render reads the Blueprint, provisions the disk, builds the Dockerfile, and starts the service. The whole flow takes 3–5 minutes on the first run.
Once the Blueprint exists in your account, generate a Deploy Hook URL in the service settings. Future deploys are a single curl call:
curl "https://api.render.com/deploy/srv-XXYYZZ?key=AABBCC"To pin a specific @agentmemory/agentmemory release, set the
AGENTMEMORY_VERSION build arg in the service's Environment tab
before the next deploy. Same for III_VERSION.
After the first deploy succeeds, open the service's Logs tab and
search for AGENTMEMORY_SECRET=. You will see exactly one line of the
form AGENTMEMORY_SECRET=<64 hex chars>. Copy it into your client
environment. The secret is never printed again on subsequent boots.
curl https://agentmemory.onrender.com/agentmemory/livez
# {"status":"ok"}For an authenticated call, your client must send Authorization: Bearer <secret>.
Render only exposes one public port per service, and we use it for 3111. The viewer port stays bound to localhost inside the container. Reach it via Render's SSH:
# Settings → SSH → enable for your service, copy the connection command
ssh srv-XXYYZZ@ssh.<region>.render.com -L 3113:localhost:3113
# now http://localhost:3113 in your browser hits the in-container viewerssh srv-XXYYZZ@ssh.<region>.render.com
rm /data/.hmac
exit
# trigger a redeploy from the Render dashboard or via the Deploy HookAfter the redeploy, grab the new secret from the logs and update every client. Old tokens stop working immediately.
ssh srv-XXYYZZ@ssh.<region>.render.com "tar czf - /data" > agentmemory-$(date +%Y%m%d).tar.gzRender also takes daily snapshots of persistent disks automatically on paid plans — the SSH tarball is a belt-and-braces option you can ship off-platform.
- Starter plan web service: $7/month (0.5 CPU, 512 MB RAM).
- 1 GB persistent disk: $0.25/GB/month, so $0.25/month for the default.
- Bandwidth: 100 GB outbound included, then $0.10/GB.
See https://render.com/pricing for the current rate card.
- Render Free tier does not support persistent disks. The Starter plan ($7/month) is the minimum.
- Render restarts the service on every deploy. The HMAC secret survives because it lives on the disk, but expect a 10–30 s gap of 502s during rollouts.
- Render runs amd64 only for web services. The Dockerfile selects the
matching iii binary automatically via
uname -m.