• Product / Portfolio Work
    • OCPSTRAT-2123OpenShift Lightspeed 2.0
    • False
    • Hide

      None

      Show
      None
    • False
    • None
    • None
    • None
    • None
    • None
    • None
    • None
    • None

      Feature Overview (aka. Goal Summary)  

      Users can preview the assistant’s execution plan, see tool steps as they complete, and approve or reject the plan before actions are executed.

      https://docs.google.com/document/d/1spo_V5jDyEiC69KbbDnsYsHlWhNYzq8B1i-aYWH77VQ/edit?tab=t.0 

      Use Case Purpose When It Runs Scenario & System Action User Experience & Result
      1. Gating for Destructive Operations Enforces HITL approval for write/delete MCP tool executions to prevent accidental resource loss. After the LLM selects a tool, but before the MCP Host sends the request to the MCP Server. Scenario: User asks to "clean up old test deployments."

      Action: Agent attempts to run resources_delete for deployments matching env=test.|UX: Safety Interception prompt appears showing the target cluster (prod-billing). Options: [Approve], [Deny], [Edit].

      Result: User realizes they are in the wrong environment and clicks [Deny], preventing production data loss.|

      2. Protecting OpenShift Secrets Prevents accidental exfiltration of OpenShift secrets to external LLM providers. After the Agent requests a tool, but before the read data is returned to the LLM context. Scenario: User asks to check a database secret to troubleshoot a crash.

      Action: Agent attempts to run resources_get on Secret/db-credentials.|UX: Security Alert pauses the flow, warning that raw secrets will be visible to the LLM. Options: [Approve], [Deny], [Edit].

      Result: User chooses [Edit] to enforce redaction, replacing sensitive values with [REDACTED] before sending to the LLM.|

      3. Controlling MCP Tools Strictly controls which tools the AI can invoke, preventing unauthorized cluster changes (fail-closed). After tool/argument generation, but before the MCP server executes against the Kubernetes API. Scenario: User asks to give the default service account cluster-admin rights.

      Action: Agent attempts resources_create_or_update to build a ClusterRoleBinding.|UX: Authorization Validation modal warns of privilege escalation. Options: [Approve], [Deny], [Edit Request].

      Result: User chooses [Edit Request], changing it to a safer, namespace-level RoleBinding before applying.|

      4. Post-Processing Code Automatically formats, lints, or scans AI-generated code to enforce cluster compliance. After the Agent generates or edits a file, before presenting the final output to the user. Scenario: User asks for a Node.js Deployment YAML.

      Action: Agent drafts the file. An intercepting scanner detects it violates Restricted SCCs (container runs as root).|UX: Compliance Alert shows the policy violation and a proposed YAML fix. Options: [Approve and Apply Fixes], [Deny], [Edit].

      Result: User chooses [Approve and Apply Fixes], saving a compliant, secure-by-default file.|

      5. Validate User Prompts Scans outgoing user prompts to prevent leaking sensitive information or to enforce policies. Before sending the user's prompt from the OLS chat to the LLM. Scenario: User pastes a massive log dump containing a live sha256~... authentication token into the chat.

      Action: OLS detects a high-entropy string matching a secret pattern.|UX: Policy Violation warning intercepts the message. Options: [Approve], [Deny], [Edit].

      Result: User edits/redacts the token from the prompt, preventing a live cluster token from leaking externally.|

      6. Retry Logic & Validation Implements automatic retry or human-assisted validation when an operation fails. When the agent loop ends or validation fails post-execution. Scenario: User asks to deploy an Nginx config.

      Action: Agent deploys it, but a validation loop detects a CrashLoopBackOff. Agent diagnoses a typo in the mountPath.|UX: Validation Failed card displays the AI diagnosis and proposes a patch to fix the typo. Options: [Approve Fix & Retry], [Deny], [Edit].

      Result: User reviews the diagnosis, clicks [Approve Fix & Retry], and the Agent successfully resumes the rollout.|

       

              gausingh@redhat.com Gaurav Singh
              gausingh@redhat.com Gaurav Singh
              None
              None
              XAVIER DHARMAIYAN XAVIER DHARMAIYAN
              Joao Bastos Fula Joao Bastos Fula
              Tim O'Keefe Tim O'Keefe
              Josh Wilson Josh Wilson
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated: