Este contenido no está disponible en el idioma seleccionado.
Chapter 1. Configuring and deploying OpenShift Lightspeed
Configure and deploy the OpenShift Lightspeed Service to enable AI-powered assistance in your OpenShift Container Platform cluster.
The instructions assume that you are installing OpenShift Lightspeed using the kubeadmin user account. If you are using a regular user account with cluster-admin privileges, read the section of the documentation that discusses Role-Based Access Control (RBAC).
First, create a credential secret using the credentials for your large language model (LLM) provider. Next, create the OLSConfig custom resource (CR) that the Operator uses to deploy the Service. Finally, verify that the OpenShift Lightspeed Service is operating.
Starting with OpenShift Container Platform 4.19, the perspectives in the web console are unified. The Developer perspective is no longer enabled by default.
All users can interact with all OpenShift Container Platform web console features. However, if you are not the cluster owner, you might need to request permission to certain features from the cluster owner.
You can still enable the Developer perspective. On the Getting Started pane in the web console, you can take a tour of the console, find information on setting up your cluster, view a quick start for enabling the Developer perspective, and follow links to explore new features and capabilities.
1.1. Creating the credentials secret by using the web console Copiar enlaceEnlace copiado en el portapapeles!
Use the OpenShift Container Platform web console to store the API token that OpenShift Lightspeed uses to authenticate with the large language model (LLM) provider.
As another option, Microsoft Azure also supports authentication by using Microsoft Entra ID.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you can log in to a user account that has permission to create a secret to store the Provider tokens. - You have installed the OpenShift Lightspeed Operator.
Procedure
-
Click the Quick create (
) menu in the upper-right corner of the OpenShift web console and select Import YAML.
Paste the YAML content for your LLM provider into the text area of the web console.
NoteThe YAML parameter is always
apitokenregardless of what the LLM provider calls the access details.Use the following example to create the Secret to provide OpenShift Lightspeed with the OpenAI API key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token, and is notbase64encoded.
-
Use the following example to create the Secret to provide OpenShift Lightspeed with the Red Hat Enterprise Linux AI key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Use the following example to create the Secret to provide OpenShift Lightspeed with the Red Hat OpenShift AI key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Use the following example to create the Secret to provide OpenShift Lightspeed with the IBM watsonx key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Use the following example to create the Secret to provide OpenShift Lightspeed with the Microsoft Azure OpenAI key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Optional: As another option with Microsoft Azure OpenAI you can use Microsoft Entra ID to authenticate your LLM provider. Microsoft Entra ID users must configure the required roles for their Microsoft Azure OpenAI resource. For more information, see the official Microsoft Cognitive Services OpenAI Contributor(Microsoft Azure OpenAI Service documentation). Use the following example to authenticate by using Microsoft Entra ID.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
data.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
- Click Create.
1.2. Creating the OpenShift Lightspeed custom resource file by using the web console Copiar enlaceEnlace copiado en el portapapeles!
Use the OpenShift Container Platform web console to create the custom resource (CR) file required to deploy OpenShift Lightspeed.
The specific content of the CR file is unique for each large language model (LLM) provider. Choose the configuration file for the LLM provider that you are using.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you have logged in to a user account that has permission to create a cluster-scoped CR file. - You have an LLM provider available for use with the OpenShift Lightspeed Service.
- You have installed the OpenShift Lightspeed Operator.
Procedure
-
Click the Quick create (
) menu in the upper-right corner of the OpenShift web console and select Import YAML.
Paste the YAML content for your LLM provider into the text area of the web console.
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your OpenAI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your Red Hat Enterprise Linux AI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.llm.providers.credentialsSecretRef.namespecifies the name of the Secret that has the API key for the provider. By default, the Red Hat Enterprise Linux AI API key requires a token as part of the request. If your Red Hat Enterprise Linux AI endpoint does not require a token, you must still set the token value to any valid string for the request to authenticate. -
spec.llm.providers.urlspecifies the URL endpoint for the provider. The URL must end withv1to be valid. For example, https://3.23.103.8:8000/v1. -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your Red Hat OpenShift AI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.llm.providers.credentialsSecretRef.namespecifies the name of the Secret that has the API key for the provider. If your provider configuration does not require a token, you must still provide a Secret containing a valid string for the request to authenticate. -
spec.llm.providers.urlspecifies the URL endpoint for the provider. The URL must end withv1to be valid. For example,https://<model_name>.<domain_name>.com:443/v1. -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your Microsoft Azure OpenAI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your IBM watsonx provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
- Click Create.
1.2.1. Configuring custom TLS certificates Copiar enlaceEnlace copiado en el portapapeles!
Use the OpenShift Container Platform web console to configure custom TLS certificates for secure communication between OpenShift Lightspeed and your service endpoints.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you have logged in to a user account that has permission to create or edit theOLSConfigcustom resource (CR). - You have a large language model (LLM) provider.
- You have installed the OpenShift Lightspeed Operator.
-
You have created the credentials secret and the
OLSconfigCR.
Procedure
-
In the OpenShift Container Platform web console, click Operators
Installed Operators. - Select All Projects in the Project dropdown at the top of the screen.
- Click OpenShift Lightspeed Operator.
-
Click OLSConfig, then click the
clusterconfiguration instance in the list. - Click the YAML tab.
Update the
OLSconfigCR to contain the file that has the TLS secret.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.tlsConfig.keyCertSecretRef.namespecifies the secret that has thetls.crtandtls.keyfile. -
apiVersion.data.tlsspecifies that the name of the certificate must betls.crtand the name of the key must betls.key.
-
- Click Save.
Verification
Verify that a new pod exists in the
lightspeed-app-serverdeployment by running the following command:oc get pod -n openshift-lightspeed
$ oc get pod -n openshift-lightspeedCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.3. Creating the credentials secret by using the CLI Copiar enlaceEnlace copiado en el portapapeles!
Use the command line interface to store the API token that OpenShift Lightspeed uses to authenticate with the large language model (LLM) provider.
Alternatively, Microsoft Azure also supports authentication using Microsoft Entra ID.
Prerequisites
-
You have access to the OpenShift CLI (
oc) as a user with thecluster-adminrole. Alternatively, you are logged in to a user account that has permission to create a secret to store the Provider tokens. - You have installed the OpenShift Lightspeed Operator.
Procedure
Create a YAML file that has the credential secret for the LLM provider that you are using.
NoteThe YAML parameter is always
apitokenregardless of what the LLM provider calls the access details.Use the following example to create the Secret to provide OpenShift Lightspeed with the OpenAI API key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Use the following example to create the Secret to provide OpenShift Lightspeed with the Red Hat OpenShift AI key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Use the following example to create the Secret to provide OpenShift Lightspeed with the IBM watsonx key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Use the following example to create the Secret to provide OpenShift Lightspeed with the Microsoft Azure OpenAI key.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
stringData.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Optional: As another option with Microsoft Azure OpenAI you can use Microsoft Entra ID to authenticate your LLM provider. Microsoft Entra ID users must configure the required roles for their Microsoft Azure OpenAI resource. For more information, see the official Microsoft Cognitive Services OpenAI Contributor(Microsoft Azure OpenAI Service documentation). Use the following example to authenticate by using Microsoft Entra ID.
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
data.apitokenrepresents the API token. The token must bebase64encoded when stored in a secret.
-
Create the Secret by running the following command:
oc create -f /path/to/secret.yaml
$ oc create -f /path/to/secret.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.4. Creating the OpenShift Lightspeed custom resource file by using the CLI Copiar enlaceEnlace copiado en el portapapeles!
Use the command line interface to create the custom resource (CR) file required to deploy OpenShift Lightspeed.
The specific content of the CR file is unique for each large language model (LLM) provider. Choose the configuration file for the LLM provider that you are using.
Prerequisites
-
You have access to the OpenShift CLI (
oc) and have logged in as a user with thecluster-adminrole. As another option, you have logged in to a user account that has permission to create a cluster-scoped CR file. - You have an LLM provider available for use with the OpenShift Lightspeed Service.
- You have installed the OpenShift Lightspeed Operator.
Procedure
Create an
OLSConfigfile that has the YAML content for the LLM provider you use.Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your OpenAI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your Red Hat Enterprise Linux AI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.llm.providers.credentialsSecretRef.namespecifies the name of the Secret that has the API key for the provider. By default, the Red Hat Enterprise Linux AI API key requires a token as part of the request. If your Red Hat Enterprise Linux AI endpoint does not require a token, you must still set the token value to any valid string for the request to authenticate. -
spec.llm.providers.urlspecifies the URL endpoint for the provider. The URL must end withv1to be valid. For example, https://3.23.103.8:8000/v1. -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your Red Hat OpenShift AI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.llm.providers.credentialsSecretRef.namespecifies the name of the Secret that has the API key for the provider. By default, the Red Hat OpenShift AI API key requires a token as part of the request. If your Red Hat OpenShift AI endpoint does not require a token, you must still set the token value to any valid string for the request to authenticate. -
spec.llm.providers.urlspecifies the URL endpoint for the provider. The URL must end withv1to be valid. For example,https://<model_name>.<domain_name>.com:443/v1. -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your Microsoft Azure OpenAI provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Use the following example to create the
OLSConfigCR to configure OpenShift Lightspeed with your IBM watsonx provider:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.hideIconspecifies whether to hide the OpenShift Lightspeed icon in the OpenShift Container Platform web console. The default value isfalse. Set this field totrueto hide the icon from users, such as those who do not have access to the OpenShift Lightspeed API.
-
Run the following command so that the Operator deploys OpenShift Lightspeed using the information in the YAML configuration file.
oc create -f /path/to/config-cr.yaml
$ oc create -f /path/to/config-cr.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.4.1. Support for trusted-ca certificates and LLM providers Copiar enlaceEnlace copiado en el portapapeles!
Use the OpenShift Container Platform web console to configure custom TLS certificates for secure communication between OpenShift Lightspeed and your service endpoints.
The OpenShift Lightspeed Service supports adding trusted-ca certificates for the following LLM providers:
- Red Hat Enterprise Linux AI vLLM
- Red Hat OpenShift AI vLLM
- OpenAI
- Microsoft Azure OpenAI
To add a trusted-ca certificate you must create a ConfigMap object that has the certificates. Then, add the name of the object to the OLSConfig custom resource (CR) file as shown in the following example:
ols:
additionalCAConfigMapRef:
name: <config_map_name>
ols:
additionalCAConfigMapRef:
name: <config_map_name>
1.4.2. Configuring OpenShift Lightspeed with a trusted CA certificate for the LLM Copiar enlaceEnlace copiado en el portapapeles!
Use the OpenShift Container Platform web console to configure a trusted CA certificate for secure communication between OpenShift Lightspeed and your large language model (LLM) provider.
If the LLM provider you are using requires a trusted-ca certificate to authenticate the OpenShift Lightspeed Service you must perform this procedure. If the LLM provider does not require a trusted-ca certificate to authenticate the Service, you should skip this procedure.
Procedure
-
Copy the contents of the certificate file and paste it into a file called
caCertFileName. Create a
ConfigMapobject calledtrusted-certsby running the following command:oc create configmap trusted-certs --from-file=caCertFileName --namespace openshift-lightspeed
$ oc create configmap trusted-certs --from-file=caCertFileName --namespace openshift-lightspeedCopy to Clipboard Copied! Toggle word wrap Toggle overflow This command returns an output similar to the following example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
data.caCertFileNamespecifies the CA certificates required to connect to your LLM provider. You can include one or more certificates within this block to ensure secure communication.
-
Update the
OLSConfigcustom resource (CR) file to include the name of theConfigMapobject you just created. The following example uses Red Hat Enterprise Linux AI as the LLM provider.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.additionalCAConfigMapRef.namespecifies the name ofConfigMapobject.
-
Create the custom CR by running the following command:
oc apply -f <olfconfig_cr_filename>
$ oc apply -f <olfconfig_cr_filename>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.5. Verifying the OpenShift Lightspeed deployment Copiar enlaceEnlace copiado en el portapapeles!
Use the OpenShift Container Platform web console to verify that the OpenShift Lightspeed Service is running and deployed.
Starting with OpenShift Container Platform 4.19, the perspectives in the web console are unified. The Developer perspective is no longer enabled by default.
All users can interact with all OpenShift Container Platform web console features. However, if you are not the cluster owner, you might need to request permission to certain features from the cluster owner.
You can still enable the Developer perspective. On the Getting Started pane in the web console, you can take a tour of the console, find information on setting up your cluster, view a quick start for enabling the Developer perspective, and follow links to explore new features and capabilities.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. -
You have access to the OpenShift CLI (
oc). - You have installed the OpenShift Lightspeed Operator.
-
You have created the credentials secret and the
OLSConfigCustom Resource configuration file.
Procedure
In the OpenShift Container Platform web console, click the Project drop-down list.
NoteFor OpenShift Container Platform 4.18 and earlier, select the Developer perspective from the drop-down list at the top of the pane to access the Project drop-down list.
- Enable the toggle switch to show default projects.
- Select openshift-lightspeed from the list.
Verify that the OpenShift Lightspeed is ready by running the following command:
oc logs deployment/lightspeed-app-server -c lightspeed-service-api -n openshift-lightspeed | grep Uvicorn
$ oc logs deployment/lightspeed-app-server -c lightspeed-service-api -n openshift-lightspeed | grep UvicornCopy to Clipboard Copied! Toggle word wrap Toggle overflow Example output
INFO: Uvicorn running on https://0.0.0.0:8443 (Press CTRL+C to quit)
INFO: Uvicorn running on https://0.0.0.0:8443 (Press CTRL+C to quit)Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.6. About OpenShift Lightspeed and role-based access control (RBAC) Copiar enlaceEnlace copiado en el portapapeles!
Use role-based access control (RBAC) to manage system security by assigning permissions to specific roles rather than individual users.
OpenShift Lightspeed RBAC is binary. By default, not all cluster users have access to the OpenShift Lightspeed interface. Only users with administrative rights can grant access. All users of an OpenShift cluster with OpenShift Lightspeed installed can see the OpenShift Lightspeed button; however, only users with permissions can submit questions to OpenShift Lightspeed.
If you want to evaluate the RBAC features of OpenShift Lightspeed, your cluster will need users other than the kubeadmin account. The kubeadmin account always has access to OpenShift Lightspeed.
1.6.1. Granting a user access by using the CLI Copiar enlaceEnlace copiado en el portapapeles!
Grant OpenShift Lightspeed permissions to an individual user by running a single oc adm command to apply the query-access role immediately.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you have logged in as a user with the ability to grant permissions. - You have deployed the OpenShift Lightspeed service.
-
You have access to the OpenShift CLI (
oc).
Procedure
Grant the
lightspeed-operator-query-accessrole to a user. Enter the actual user name in place of<user_name>when running the following command:oc adm policy add-cluster-role-to-user \ lightspeed-operator-query-access <user_name>$ oc adm policy add-cluster-role-to-user \ lightspeed-operator-query-access <user_name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
Verify that the user has been successfully added to the cluster role binding by running the following command:
oc get clusterrolebinding lightspeed-operator-query-access
$ oc get clusterrolebinding lightspeed-operator-query-accessCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.6.2. Granting a user access by using a YAML configuration file Copiar enlaceEnlace copiado en el portapapeles!
Grant OpenShift Lightspeed permissions to an individual user by creating and applying a ClusterRoleBinding YAML file for reproducible access management.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you have logged in as a user with the ability to grant permissions. - You have deployed the OpenShift Lightspeed service.
-
You have access to the OpenShift CLI (
oc).
Procedure
Generate a YAML configuration file for the cluster role binding. Enter the actual user name in place of
<user_name>when running the following command:oc adm policy add-cluster-role-to-user lightspeed-operator-query-access <user_name> -o yaml --dry-run
$ oc adm policy add-cluster-role-to-user lightspeed-operator-query-access <user_name> -o yaml --dry-runCopy to Clipboard Copied! Toggle word wrap Toggle overflow Apply the generated configuration file to the cluster:
oc apply -f ols-user-access.yaml
$ oc apply -f ols-user-access.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
Verification
Verify the creation of the
ClusterRoleBindingby running the following command:oc get clusterrolebinding lightspeed-operator-query-access
$ oc get clusterrolebinding lightspeed-operator-query-accessCopy to Clipboard Copied! Toggle word wrap Toggle overflow Inspect the YAML configuration and ensure that it lists the correct user in the
subjectssection by running the following command:oc get clusterrolebinding lightspeed-operator-query-access -o yaml
$ oc get clusterrolebinding lightspeed-operator-query-access -o yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow This command returns an output similar to the following example:
Copy to Clipboard Copied! Toggle word wrap Toggle overflow
1.6.3. Granting a user group access by using the CLI Copiar enlaceEnlace copiado en el portapapeles!
Enable a user group to use the OpenShift Lightspeed Service by running a single command to apply cluster permissions immediately.
If your cluster has more advanced identity management configured, including user groups, you can grant all users of a specific group access to the OpenShift Lightspeed Service.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you have logged in as a user with the ability to grant permissions. - You have deployed the OpenShift Lightspeed Service.
- You have access to the OpenShift CLI (oc).
Procedure
Grant the
lightspeed-operator-query-accessrole to your user group by running the following command. Replace<group_name>with the actual name of the user group in your cluster.oc adm policy add-cluster-role-to-group \ lightspeed-operator-query-access <group_name>
$ oc adm policy add-cluster-role-to-group \ lightspeed-operator-query-access <group_name>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Optional: Verify that the role binding contains the user group by running the following command:
oc get clusterrolebinding lightspeed-operator-query-access -o wide
$ oc get clusterrolebinding lightspeed-operator-query-access -o wideCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.6.4. Granting a user group access by using a YAML configuration file Copiar enlaceEnlace copiado en el portapapeles!
Grant multiple users access to the OpenShift Lightspeed Service by applying a YAML configuration file.
If your cluster has more advanced identity management configured, including user groups, you can grant all users of a specific group access to the OpenShift Lightspeed Service.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you have logged in as a user with the ability to grant permissions. - You have deployed the OpenShift Lightspeed Service.
- You have access to the OpenShift CLI (oc).
Procedure
Generate the YAML configuration by running the following command:
oc adm policy add-cluster-role-to-group lightspeed-operator-query-access <group_name> -o yaml --dry-run > access-policy.yaml
$ oc adm policy add-cluster-role-to-group lightspeed-operator-query-access <group_name> -o yaml --dry-run > access-policy.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow Open the
access-policy.yamlfile and verify thesubjectssection contains the correct group name:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
subjects.namespecifies the name of the user group you are granting access to.
-
Apply the configuration file to the cluster by running the following command:
oc create -f access-policy.yaml
$ oc create -f access-policy.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.7. Filtering and redacting information Copiar enlaceEnlace copiado en el portapapeles!
Configure sensitive data filtering in OpenShift Lightspeed to redact private information before sending it to the large language model (LLM) provider.
You should test your regular expressions against sample data to confirm that they identify the information you want to filter or redact, and that they do not identify information you want to send to the LLM. There are several third-party websites that you can use to test your regular expressions. When using third-party sites, you should practice caution with regards to sharing your private data. As another option, you can test the regular expressions locally using Python. In Python, it is possible to design very computationally-expensive regular expressions. Using several complex expressions as query filters can adversely impact the performance of OpenShift Lightspeed.
This example shows how to update the OLSConfig custom resource (CR) file to redact IP addresses, but you can also filter or redact other types of sensitive information.
If you configure filtering or redacting in the OLSConfig CR file, and you configure introspectionEnabled to enable a Model Context Protocol (MCP) server, any content that the tools return is not filtered and is visible to the LLM.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. -
You have access to the OpenShift CLI (
oc). - You have installed the OpenShift Lightspeed Operator and deployed the OpenShift Lightspeed service.
Procedure
Update the
OLSConfigCR file and create an entry for each regular expression to filter. The following example redacts IP addresses:Copy to Clipboard Copied! Toggle word wrap Toggle overflow Run the following command to apply the modified OpenShift Lightspeed custom configuration:
oc apply -f OLSConfig.yaml
$ oc apply -f OLSConfig.yamlCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.8. About the BYO Knowledge tool Copiar enlaceEnlace copiado en el portapapeles!
Enhance OpenShift Lightspeed responses by using the BYO Knowledge tool to create a retrieval-augmented generation (RAG) database that includes documentation specific to your organization.
When you create a RAG database, you customize the OpenShift Lightspeed service for your environment. For example, a network administrator can use a standard operating procedure (SOP) to provision an OpenShift Container Platform cluster. Then, the network administrator can use the BYO Knowledge tool to enhance the knowledge available to the LLM by including information from the SOP.
To bring your own knowledge to an LLM, you complete the following steps:
- Create the custom content in Markdown format.
- Use the BYO Knowledge tool to package the content as a container image.
-
Push the container image to an image registry, such as
quay.io. -
Update the
OLSConfigcustom resource file to list the image that you pushed to the image registry. Access the OpenShift Lightspeed virtual assistant and submit a question associated with the custom knowledge that you made available to the LLM.
NoteWhen you use the BYO Knowledge tool, you provide documents directly to the LLM provider.
OpenShift Lightspeed supports automatic updates of BYO Knowledge images that use floating tags, such as latest. If over time a BYO Knowledge image tag points to different underlying images, OpenShift Lightspeed detects those changes and updates the corresponding BYO Knowledge database accordingly. This feature uses OpenShift ImageStream objects. OpenShift Container Platform clusters check for updates to ImageStream objects every 15 minutes.
1.8.1. About document title and URL Copiar enlaceEnlace copiado en el portapapeles!
Display the source titles and URLs OpenShift Lightspeed uses to verify the accuracy of generated responses and access the original documentation for additional context.
In the retrieval-augmented generation (RAG) database, titles and URLs accompany documents as metadata. The BYO Knowledge tool obtains the title and URL attributes from metadata if they reside in the Markdown files that the tool processes.
If a Markdown file does not have metadata with the title and url attributes, the first top-level Markdown heading, for example # Introduction to Layers, becomes the title and the file path becomes the URL.
1.8.2. Providing custom knowledge to the LLM Copiar enlaceEnlace copiado en el portapapeles!
Customize the information available to the large language model (LLM) by providing access to a container image that resides in a remote image registry.
The container image that the tool generates contains a custom RAG database. The RAG database provides additional information to the LLM.
The examples in this procedure use quay.io as the remote container image registry, and the path for the custom image is quay.io/<username>/my-byok-image:latest.
The BYO Knowledge tool is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user account that has permission to create a cluster-scoped custom resource (CR) file, such as a user with the
cluster-adminrole. - You have an LLM provider available for use with the OpenShift Lightspeed Service.
- You have installed the OpenShift Lightspeed Operator.
-
Your custom information consists of Markdown files with
.mdextensions. The tool does not support other file formats. -
You have logged in to
registry.redhat.ioby using Podman. -
You have an account for a container image registry, such as
quay.io.
Procedure
Specify the location of the directory with the Markdown files for the retrieval-augmented generation (RAG) database and the path for the image that the BYO Knowledge tool generates by running the following command:
podman run -it --rm --device=/dev/fuse \ -v $XDG_RUNTIME_DIR/containers/auth.json:/run/user/0/containers/auth.json:Z \ -v <dir_tree_with_markdown_files>:/markdown:Z \ -v <dir_for_image_tar>:/output:Z \ registry.redhat.io/openshift-lightspeed-tech-preview/lightspeed-rag-tool-rhel9:latest
$ podman run -it --rm --device=/dev/fuse \ -v $XDG_RUNTIME_DIR/containers/auth.json:/run/user/0/containers/auth.json:Z \ -v <dir_tree_with_markdown_files>:/markdown:Z \ -v <dir_for_image_tar>:/output:Z \ registry.redhat.io/openshift-lightspeed-tech-preview/lightspeed-rag-tool-rhel9:latestCopy to Clipboard Copied! Toggle word wrap Toggle overflow Load the container image that the BYO Knowledge tool generated by running the following command:
podman load < <directory_for_image_tar>/<my-byok-image.tar>
$ podman load < <directory_for_image_tar>/<my-byok-image.tar>Copy to Clipboard Copied! Toggle word wrap Toggle overflow Display the Podman images that are on your local computer by running the following command:
podman images
$ podman imagesCopy to Clipboard Copied! Toggle word wrap Toggle overflow This command returns an output similar to the following example:
REPOSITORY TAG IMAGE ID CREATED SIZE localhost/my-byok-image latest be7d1770bf10 1 minute ago 2.37 GB ...
REPOSITORY TAG IMAGE ID CREATED SIZE localhost/my-byok-image latest be7d1770bf10 1 minute ago 2.37 GB ...Copy to Clipboard Copied! Toggle word wrap Toggle overflow Tag the local image with a name and destination so that you can push the image to the container image registry by running the following command:
podman tag localhost/my-byok-image:latest quay.io/<username>/my-byok-image:latest
$ podman tag localhost/my-byok-image:latest quay.io/<username>/my-byok-image:latestCopy to Clipboard Copied! Toggle word wrap Toggle overflow Push the local container image to the container image registry by running the following command:
podman push quay.io/<username>/my-byok-image:latest
$ podman push quay.io/<username>/my-byok-image:latestCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the
OLSconfigCR to deploy the newly created RAG database alongside the existing one:-
In the OpenShift Container Platform web console, click Operators
Installed Operators. - Select All Projects in the Project dropdown at the top of the screen.
- Click OpenShift Lightspeed Operator.
-
Click OLSConfig, then click the
clusterconfiguration instance in the list. - Click the YAML tab.
Insert the
spec.ols.ragYAML code:Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.rag.imagespecifies the tag for the image that you pushed to the image registry so that the OpenShift Lightspeed Operator can access the custom content. The OpenShift Lightspeed Operator can work with more than one RAG database that you create.
-
-
In the OpenShift Container Platform web console, click Operators
Optional: Specify pull secrets in the
OLSSpecsection of theOLSConfigCR file. These secrets provide authentication for remote registries. Use this optional field if your RAG BYO Knowledge images reside in a private registry that the standard cluster-wide pull secret cannot access.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.imagePullSecretsdefines the pull secrets that OpenShift Lightspeed uses only when you specify BYO Knowledge RAG images. Instead of linking a specific secret to a specific image, the system maintains a general list of pull secrets. For every BYO Knowledge image, the system tries each pull secret in sequential order until it achieves a successful authentication.
-
- Click Save.
Verification
Access the OpenShift Lightspeed virtual assistant and submit a question associated with the custom content that you provided to the LLM.
The OpenShift Lightspeed virtual assistant generates a response based on the custom content.
1.8.3. Disabling the OpenShift Container Platform documentation retrieval-augmented generation (RAG) database Copiar enlaceEnlace copiado en el portapapeles!
Disable the default OpenShift Container Platform documentation in the OLSConfig custom resource (CR) to prevent the service from using the built-in database that has the OpenShift Container Platform documentation.
Then, the only retrieval-augmented generation (RAG) databases OpenShift Lightspeed uses are the ones that you provide to the service by using the BYO Knowledge feature.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user account with permission to create a cluster-scoped CR file, such as a user with the
cluster-adminrole. - You have installed the OpenShift Lightspeed Operator.
- You have configured the large language model provider.
-
You have configured the
OLSConfigCR file, which automatically deploys the OpenShift Lightspeed Service. - You have created a RAG database that contains the content you want to use, as described in "Providing custom knowledge to the LLM".
Procedure
-
In the OpenShift Container Platform web console, click Operators
Installed Operators. - Select All Projects in the Project list at the top of the screen.
- Click OpenShift Lightspeed Operator.
-
Click OLSConfig, then click the
clusterconfiguration instance in the list. - Click the YAML tab.
Insert the
spec.ols.byokRAGOnlyYAML code.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.byokRAGOnlyspecifies if the Service limits responses by using only the information found in the local documentation that you provide. Specifytrueso that OpenShift Lightspeed only uses RAG databases that you create by using the BYO Knowledge feature. Whentrue, OpenShift Lightspeed does not use the default RAG database that contains the OpenShift Container Platform documentation.
-
- Click Save.
1.9. About cluster interaction Copiar enlaceEnlace copiado en el portapapeles!
Enable the cluster interaction feature to supply the large language model (LLM) with additional context about your OpenShift Container Platform cluster.
OpenShift Lightspeed uses a large language model (LLM) to answer your questions. When you share details about your cluster objects, the LLM can give specific answers for your environment.
The Model Context Protocol (MCP) is an open protocol. It creates a standard way for applications to give context to an LLM. Using the protocol, an MCP server offers a standardized way for an LLM to increase context by requesting and receiving real-time information from external resources.
If you configure filtering or redacting in the OLSConfig CR file, and you configure introspectionEnabled to enable a Model Context Protocol (MCP) server, any content that the tools return is not filtered and is visible to the LLM.
When you enable cluster interaction, the OpenShift Lightspeed Operator installs an MCP server. The MCP server provides the OpenShift Lightspeed Service with access to the OpenShift API. Through this access, the Service performs read operations to gather more context for the LLM, enabling the Service to generate answers to questions about the Kubernetes objects that reside in your OpenShift cluster.
The ability of OpenShift Lightspeed to choose and use a tool effectively is very sensitive to the large language (LLM) model. In general, a larger model with more parameters performs better, and the best performance comes from an extremely large frontier model that represents the latest AI capabilities. When using a small model, you might notice poor performance in tool selection or other aspects of cluster interaction.
You must enable tool calling in the LLM provider to activate the cluster interaction feature in the OpenShift Lightspeed Service.
Enabling tool calling can dramatically increase token usage. When you use a public model provider, an increase in token usage usually increases billing costs.
1.9.1. Enabling cluster interaction Copiar enlaceEnlace copiado en el portapapeles!
Enable the cluster interaction feature by modifying the OLSConfig custom resource (CR) to give OpenShift Lightspeed cluster-specific context.
The cluster interaction feature is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. As another option, you have logged in to a user account that has permission to create a cluster-scoped custom resource. - You have configured the large language model (LLM) provider.
- You have installed the OpenShift Lightspeed Operator.
Procedure
-
In the OpenShift Container Platform web console, click Operators
Installed Operators. - Click OpenShift Lightspeed Operator.
-
Click OLSConfig, then click the
clusterconfiguration instance in the list. - Click the YAML tab.
Set the
spec.ols.introspectionEnabledparameter totrueto enable cluster interaction:Copy to Clipboard Copied! Toggle word wrap Toggle overflow - Click Save.
Verification
Access the OpenShift Lightspeed virtual assistant and submit a question associated with your cluster.
The OpenShift Lightspeed virtual assistant generates a highly refined response specific to your environment.
1.9.2. Enabling a custom MCP server Copiar enlaceEnlace copiado en el portapapeles!
Add an additional Model Context Protocol (MCP) server that interfaces with a tool in your environment so that the large language model (LLM) uses the tool to generate answers to your questions.
The MCP server feature is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Prerequisites
- You have installed the OpenShift Lightspeed Operator.
- You have configured a large language model provider.
-
You have configured the
OLSConfigCR file, which automatically deploys the OpenShift Lightspeed Service.
Procedure
Open the OpenShift Lightspeed
OLSconfigcustom resource (CR) file by running the following command:oc edit olsconfig cluster
$ oc edit olsconfig clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Add
MCPServerto thespec.featureGatesspecification file and include the MCP server information.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.featureGatesspecifies the MCP server functionality on the OpenShift Lightspeed pod. -
spec.mcpServers.namespecifies the name of the MCP server. -
spec.mcpServers.urlspecifies the URL path that the MCP server uses to communicate -
spec.mcpServers.timeoutspecifies the time that the MCP server has to respond to a query. If the client does not receive a query within the time specified, the MCP server times out. In this example, the timeout is 30 seconds. -
spec.mcpServers.headersspecifies MCP headers as an array of structured objects containing the key-value pairs required for server authentication and context. -
spec.mcpServers.headers.namespecifies the name of the header that gets sent to the MCP server. -
spec.mcpServers.headers.valueFrom.typespecify the stringkubernetesto provide the user’s bearer token -
spec.mcpServers.headers.valueFrom.secretRef.namespecifies the name of the secret that contains the header value. Ensure that the secret has the key nameheader.
-
Click Save.
The save operation saves the file and applies the changes so that the MCP server is available to the OpenShift Lightspeed service.
1.10. Tokens and token quota limits Copiar enlaceEnlace copiado en el portapapeles!
Token quotas manage the amount of text that the OpenShift Lightspeed Service exchanges with a large language model (LLM). These limits control costs and ensure all users get fair access to resources.
The Service measures the text it exchanges with the LLM in tokens. A token is a small unit of text, ranging from a single character to a full word. Every chat between the Service and the LLM uses tokens.
Token quotas limit how many tokens you can use within a specific time frame. You can define token quota limits for OpenShift clusters or OpenShift user accounts.
1.10.1. Activating token quota limits Copiar enlaceEnlace copiado en el portapapeles!
Activate token quota limits for OpenShift Lightspeed by creating a ConfigMap resource and referencing it in the OLSConfig custom resource.
The OpenShift Lightspeed pod mounts the ConfigMap resource as a volume, enabling access to the file stored within it. The OLSConfig custom resource (CR) references the ConfigMap resource to obtain the quota limit information.
Prerequisites
- You have installed the OpenShift Lightspeed Operator.
- You have configured a large language model provider.
- The OpenShift Lightspeed Service has access to a PostgreSQL database.
Procedure
Open the OpenShift Lightspeed
OLSconfigCR file by running the following command:oc edit olsconfig cluster
$ oc edit olsconfig clusterCopy to Clipboard Copied! Toggle word wrap Toggle overflow Update the
spec.ols.quotaHandlersConfigspecification to include token quota limit information.Copy to Clipboard Copied! Toggle word wrap Toggle overflow User quota configuration fields
-
spec.ols.quotaHandlersConfig.limitersConfig.namespecifies the token limit for the user account. -
spec.ols.quotaHandlersConfig.limitersConfig.initialQuotaspecifies a token quota limit of100,000for each user over the time period specified in theperiodfield. -
spec.ols.quotaHandlersConfig.limitersConfig.quotaIncreaseincreases the token quota limit for the user by1,000at the end of the time period specified in theperiodfield.
-
Cluster quota configuration fields
-
spec.ols.quotaHandlersConfig.limitersConfig.namespecifies the token limit for a cluster. -
spec.ols.quotaHandlersConfig.limitersConfig.initialQuotaspecifies a token quota limit of1,000,000for each cluster over the time period specified in theperiodfield. -
spec.ols.quotaHandlersConfig.limitersConfig.quotaIncreaseincreases the token quota limit for the cluster by 100,000 at the end of the time period specified in theperiodfield.
-
Shared configuration field
-
spec.ols.quotaHandlersConfig.limitersConfig.perioddefines the amount of time that the scheduler waits before the period resets or the quota limit increases.
-
Click Save.
The save operation saves the file and applies the changes to activate the token quota limits.
1.11. About OpenShift Lightspeed and PostgreSQL persistence Copiar enlaceEnlace copiado en el portapapeles!
PostgreSQL persistence ensures that OpenShift Lightspeed conversation history and quota usage data remain available across pod restarts and rescheduling events.
By default, the Service disables PostgreSQL persistence.
To enable the functionality, add the spec.ols.storage specification to the OLSConfig custom resource (CR).
1.11.1. Enabling PostgreSQL persistence Copiar enlaceEnlace copiado en el portapapeles!
Enable PostgreSQL persistence for OpenShift Lightspeed by modifying the OLSConfig custom resource (CR) file.
PostgreSQL persistence is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs) and might not be functionally complete. Red Hat does not recommend using them in production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process.
For more information about the support scope of Red Hat Technology Preview features, see Technology Preview Features Support Scope.
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user account with permission to create a cluster-scoped CR file, such as a user with the
cluster-adminrole. - You have installed the OpenShift Lightspeed Operator.
- You have configured the large language model provider.
Procedure
-
In the OpenShift Container Platform web console, click Operators
Installed Operators. - Select All Projects in the Project list at the top of the screen.
- Click OpenShift Lightspeed Operator.
-
Click OLSConfig, then click the
clusterconfiguration instance in the list. - Click the YAML tab.
Insert the
spec.ols.storageYAML code.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.storagespecifies how the assistant stores persistent data, specifically conversation history. The class depends on the existing instances of the storage class in the cluster. If you leave the storage class empty, the assistant uses default values. The persistent volume allocated for the PostgreSQL database is 1 GB in size and uses the storage class of the default cluster. Specify empty braces for thestorageparameter to use the default values.
-
- Click Save.
1.11.2. Overriding default Persistent Volume Claim (PVC) specifications Copiar enlaceEnlace copiado en el portapapeles!
Customize the storage capacity and storage class for the OpenShift Lightspeed database by modifying the OLSConfig custom resource (CR).
Prerequisites
-
You have logged in to the OpenShift Container Platform web console as a user account with permission to create a cluster-scoped CR, such as a user with the
cluster-adminrole. - You have installed the OpenShift Lightspeed Operator.
- You have configured the large language model provider.
-
You have access to the OpenShift CLI (
oc).
Procedure
-
In the OpenShift Container Platform web console, click Operators
Installed Operators. - Select All Projects in the Project dropdown at the top of the screen.
- Click OpenShift Lightspeed Operator.
-
Click OLSConfig, then click the
clusterconfiguration instance in the list. - Click the YAML tab.
Update the
OLSconfigCR to override the default PVC specifications as shown in the following example.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.ols.storage.sizespecifies the total storage capacity for the database. If you do not specify this parameter, the Operator uses the default size of 1 GiB. -
spec.ols.storage.classspecifies the Storage Class for the database volume. If you do not specify this parameter, the Operator uses the default storage class setting of the cluster.
-
- Click Save.
Verification
Verify that the cluster has successfully provisioned the storage by checking the status of the Persistent Volume Claim.
oc get pvc -n openshift-lightspeed
$ oc get pvc -n openshift-lightspeedCopy to Clipboard Copied! Toggle word wrap Toggle overflow
1.12. About query-based tool filtering Copiar enlaceEnlace copiado en el portapapeles!
Query-based filtering uses a hybrid retrieval-augmented generation (RAG) system to identify the most appropriate set of tool for a user request.
When a large language model (LLM) application has access to hundreds of tools, sending the full list in one prompt slows performance and raises costs. Query-based filtering finds and retrieves the most relevant set of tools for a request in milliseconds. This pre-processing step removes selection interference, and ensures that the LLM focuses its reasoning capabilities on a small, high-quality subset of functions.
Restricting the set of tools available reduces token use, prevents model confusion, and maintains high execution accuracy. This approach transforms a massive tool library into a fast, lean interface.
1.12.1. Enabling query-based tool filtering Copiar enlaceEnlace copiado en el portapapeles!
Enable query-based tool filtering to automatically select the set of tools most relevant for your request.
Prerequisites
-
You are logged in to the OpenShift Container Platform web console as a user with the
cluster-adminrole. Alternatively, you are logged in to a user account that has permission to create a cluster-scoped CR file. - You have an LLM provider available for use with the OpenShift Lightspeed Service.
- You have installed the OpenShift Lightspeed Operator.
Procedure
-
In the OpenShift Container Platform web console, click Operators
Installed Operators. - Select All Projects in the Project dropdown at the top of the screen.
- Click OpenShift Lightspeed Operator.
-
Click OLSConfig, then click the
clusterconfiguration instance in the list. - Click the YAML tab.
Modify the
ols.Configcustom resource (CR) file to define a feature gate and the tools filtering configuration.Copy to Clipboard Copied! Toggle word wrap Toggle overflow -
spec.featureGates.ToolFilterspecifies the feature gate. -
spec.olsConfig.toolFilteringConfig.alphaspecifies the weight balance between semantic (RAG-based) and keyword matching. Increasing the value provides more weight to the semantic search. The valid range of values is0to1. -
spec.olsConfig.toolFilteringConfig.topkspecifies the maximum number of tools available for the LLM. spec.olsConfig.toolFilteringConfig.thresholdspecifies the minimum score for the tool to be considered as a candidate. Tools with a value of the score lower then the threshold value are discarded. Increasing the value discards more tools. The valid range of values is0.01to0.1.NoteThis example uses the default values for the
alpha,tpokandthresholdfields. If you use the default values in your configuration you do not have to specify them.
-
- Click Save.
Verification
- Navigate to the OpenShift Container Platform web console.
-
Select Workloads
Pods and then click the pod that contains OpenShift Lightspeed. - Click Logs and confirm that the log displays RAG information.