updated
This commit is contained in:
8
01-claude-ocp/.gemini/settings.json
Normal file
8
01-claude-ocp/.gemini/settings.json
Normal file
@@ -0,0 +1,8 @@
|
||||
{
|
||||
"mcpServers": {
|
||||
"mcp-ocp": {
|
||||
"command": "npx -y supergateway --streamableHttp http://192.168.0.244:8080/mcp",
|
||||
"args": []
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,12 +1,41 @@
|
||||
---
|
||||
title: "Model Context Protocol in Practice"
|
||||
sub_title: MCP In Action
|
||||
---
|
||||
|
||||
|
||||
<!-- column_layout: [1, 3, 1] -->
|
||||
|
||||
<!-- column: 1 -->
|
||||
<!-- alignment: center -->
|
||||
<!-- font_size: 5 -->
|
||||
<!-- jump_to_middle -->
|
||||
MCP Demo
|
||||
<!-- font_size: 4 -->
|
||||
What is MCP?
|
||||
===
|
||||
|
||||
<!-- reset_layout -->
|
||||
<!-- font_size: 2 -->
|
||||
<!-- incremental_lists: true -->
|
||||
|
||||
<!-- column_layout: [5, 1] -->
|
||||
<!-- column: 1 -->
|
||||
<!-- jump_to_middle -->
|
||||

|
||||
|
||||
|
||||
<!-- column: 0 -->
|
||||
<!-- alignment: left -->
|
||||
* Open Standard
|
||||
<!-- new_line -->
|
||||
* Created by Anthropic (The Claude folks) in 2024
|
||||
<!-- new_line -->
|
||||
* Allows LLMs to connect to data and systems
|
||||
<!-- new_line -->
|
||||
* Enables _agentic_ workflows
|
||||
<!-- new_line -->
|
||||
* Gives tools to AI
|
||||
|
||||
|
||||
|
||||
<!-- no_footer -->
|
||||
<!-- speaker_note: Title Slide -->
|
||||
<!-- end_slide -->
|
||||
|
||||
@@ -1,27 +0,0 @@
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: ClusterRole
|
||||
metadata:
|
||||
name: vault-restricted-scc-role
|
||||
rules:
|
||||
- apiGroups:
|
||||
- security.openshift.io
|
||||
resources:
|
||||
- securitycontextconstraints
|
||||
resourceNames:
|
||||
- vault-restricted
|
||||
verbs:
|
||||
- use
|
||||
---
|
||||
apiVersion: rbac.authorization.k8s.io/v1
|
||||
kind: RoleBinding
|
||||
metadata:
|
||||
name: vault-restricted-scc-binding
|
||||
namespace: vault
|
||||
roleRef:
|
||||
apiGroup: rbac.authorization.k8s.io
|
||||
kind: ClusterRole
|
||||
name: vault-restricted-scc-role
|
||||
subjects:
|
||||
- kind: ServiceAccount
|
||||
name: vault
|
||||
namespace: vault
|
||||
@@ -1,25 +0,0 @@
|
||||
kind: SecurityContextConstraints
|
||||
apiVersion: security.openshift.io/v1
|
||||
metadata:
|
||||
name: vault-restricted
|
||||
priority: 20
|
||||
allowPrivilegedContainer: false
|
||||
allowHostDirVolumePlugin: false
|
||||
allowHostIPC: false
|
||||
allowHostNetwork: false
|
||||
allowHostPID: false
|
||||
allowHostPorts: false
|
||||
runAsUser:
|
||||
type: MustRunAs
|
||||
uid: 100
|
||||
seLinuxContext:
|
||||
type: MustRunAs
|
||||
fsGroup:
|
||||
type: MustRunAs
|
||||
supplementalGroups:
|
||||
type: RunAsAny
|
||||
defaultAddCapabilities: []
|
||||
requiredDropCapabilities:
|
||||
- ALL
|
||||
users: []
|
||||
groups: []
|
||||
Reference in New Issue
Block a user