-
Story
-
Resolution: Done
-
Normal
-
None
-
None
-
None
Using rasa, build out of a proof of concept for information-based and action-based queries. Not all use cases are required to be part of the PoC.
Here are some examples provided by the lovely kmarchan :
- RHEL/Red Hat Insights
- what RHEL systems do I have that are exposed to critical CVEs that are known exploits? Do I have any RHEL systems exposed to critical CVEs? Are any of these known exploits? What if the user didn’t ask about the known exploits…would we offer the known exploit attribute too?
- OpenShift
- Query: Did anything change in the cluster infrastructure - like core os image updates
- Something about ROSA or ARO
- Ideas from this doc
- Ansible
- Query: What playbooks were run recently and against what systems
- Console RBAC
- Change action: “Add user kendra to group Source Administrators.” Could come up with an interesting scenario here. Maybe “Source Administrators” is not the right name of the group. It’s Source Admins. And maybe kendra is not the full name of the user…so we’d want to confirm the user name and offer a closer group name (though is that a security no no?) Could also say that I don’t have access to the RBAC so can’t do this action; do you want me (assistant) to contact your administrator to ask on your behalf?
- Query: What user access do I have on this console?
- Query: I need permission to update this openshift cluster. Possible responses: ask your administrator to give you permissions, do you want me (assistant) to ask your administrator on your behalf?
- Query: What permissions do i have for the Advisor service? (permissions isn’t really the right term here…it’s user access, but can we help the user here).
Out of Scope:
- any UI work or chat interface on the console