|
Managing workspaces and access controlDagKnows enables you to create multiple workspaces. Think of a workspace like a project. In a typical enterprise, you may have multiple teams who want isolation of their runbooks. Workspace is the way to handle it. You can create multiple workspaces, one for each team, and assign permissions to users so they can do various things on those workspaces. Please refer to the following figure: |
|
DagKnows Architecture OverviewDagKnows is an Agentic AI platform for automation. With DagKnows, users can effortlessly automate various tasks by simply chatting with an AI agent in natural language. However, the AI Agent part is optional. If users prefer to build and manage automation manually, DagKnows makes that easy too. Let's discuss the AI Agent first.
|
|
Setting up SSO via Azure AD for Dagknows
|
|
All the expertsTo create an expert you need these fields: -- title. It indicates the expertise of the expert. -- description: it becomes the prompt -- tags: It must be tagged as expertprompt. Very important. -- A bunch of other inputs are needed as follows:
|
|
Enable "Auto Exec" and "Send Execution Result to LLM" in "Adjust Settings" if desired
|
|
|
Add a key-value pairThis command allows you to create a key-value pair Inputs:
|
|
Deployment of an EKS Cluster with Worker Nodes in AWSThe workflow involves planning and configuring the necessary components to establish an Amazon EKS cluster in the specified region. It begins with the creation of a Virtual Private Cloud (VPC), subnets, and security groups essential for the cluster's operation. Following this, an EKS cluster named 'my-eks-cluster' is set up, along with a worker node to ensure functionality. The process conclud... |
|
|
Kubernetes pod issueThe Kubernetes pod is facing an issue and needs to be resolved. The steps below outline the resolution process. |
|
Comprehensive AWS Security and Compliance Evaluation Workflow (SOC2 Super Runbook)This workflow involves a thorough evaluation of various AWS services and configurations to ensure compliance with security best practices. It includes checking Amazon S3 buckets for public read access and encryption compliance, as well as auditing AWS IAM user credentials and access keys. The process also assesses IAM policies for overly permissive statements and evaluates password policies. A... |
|
Instruction to allow WinRM connectionExpand the code section |
|
MSP Usecase: User Onboarding Azure + M365This runbook outlines the process for onboarding a new user within an organization, encompassing the creation and configuration of user accounts across various platforms including Active Directory, Microsoft 365, and related services. |
|
Post a message to a Slack channelPost the formatted message to a given Slack channel. Use the cred_label to get the right credentials stored in the backed. |
|
How to debug a kafka cluster and kafka topics?Debugging a Kafka cluster and Kafka topics involves identifying and resolving issues related to data processing, replication, and communication within the cluster. This process helps ensure the stability and performance of the Kafka environment. |
|
|
|