Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion charts/netapp-copilot-connector/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -914,7 +914,7 @@ helm uninstall netapp-connector --namespace netapp-connector
| `postgresql.image.tag` | PostgreSQL image tag. | `16.10-alpine3.21` |
| `postgresql.image.pullPolicy` | PostgreSQL image pull policy. | `IfNotPresent` |
| `postgresql.auth.username` | PostgreSQL username. | `postgres` |
| `postgresql.auth.password` | PostgreSQL password. **Should be changed for production.** | `neodbsecret` |
| `postgresql.auth.password` | PostgreSQL password. **Should be changed for production.** | `YOUR_DB_PASSWORD_HERE` |
| `postgresql.auth.database` | PostgreSQL database name. | `netappconnector` |
| `postgresql.service.type` | PostgreSQL service type. | `ClusterIP` |
| `postgresql.service.port` | PostgreSQL service port. | `5432` |
Expand Down
2 changes: 1 addition & 1 deletion charts/netapp-copilot-connector/values.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -57,7 +57,7 @@ postgresql:
# Database credentials
auth:
username: postgres
password: neodbsecret
password: YOUR_DB_PASSWORD_HERE
database: netappconnector
service:
type: ClusterIP
Expand Down
4 changes: 2 additions & 2 deletions docs/projects/mlai/neo/core/legacy.md
Original file line number Diff line number Diff line change
Expand Up @@ -370,8 +370,8 @@ HTTPS_PROXY=http://proxy.company.com:8080
HTTP_PROXY=http://proxy.company.com:8080

# Proxy authentication (optional)
PROXY_USERNAME=proxy_user
PROXY_PASSWORD=proxy_password
PROXY_USERNAME=YOUR_PROXY_USERNAME_HERE
PROXY_PASSWORD=YOUR_PROXY_PASSWORD_HERE

# SSL configuration
GRAPH_VERIFY_SSL=true
Expand Down
6 changes: 3 additions & 3 deletions docs/projects/mlai/neo/core/m-acls.md
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@ POST /shares
{
"share_path": "\\\\fileserver\\public-documents",
"username": "domain\\serviceaccount",
"password": "your-password",
"password": "YOUR_PASSWORD_HERE",
"crawl_schedule": "0 2 * * *",
"rules": {
"acl_override_mode": "everyone"
Expand All @@ -56,7 +56,7 @@ POST /shares
{
"share_path": "\\\\fileserver\\department-files",
"username": "domain\\serviceaccount",
"password": "your-password",
"password": "YOUR_PASSWORD_HERE",
"crawl_schedule": "0 2 * * *",
"rules": {
"acl_override_mode": "specified",
Expand Down Expand Up @@ -164,7 +164,7 @@ ACL overrides can be combined with other share rules:
{
"share_path": "\\\\fileserver\\documents",
"username": "domain\\serviceaccount",
"password": "your-password",
"password": "YOUR_PASSWORD_HERE",
"rules": {
"acl_override_mode": "specified",
"acl_override_principals": [
Expand Down
28 changes: 14 additions & 14 deletions docs/projects/mlai/neo/core/m-mcp.md
Original file line number Diff line number Diff line change
Expand Up @@ -205,9 +205,9 @@ Add these to your `.env` file or container environment:
```bash
# OAuth Configuration (Required for MCP)
MCP_OAUTH_ENABLED=true
MCP_OAUTH_TENANT_ID=your-tenant-id # Microsoft Entra tenant ID
MCP_OAUTH_CLIENT_ID=your-client-id # App registration client ID
MCP_OAUTH_CLIENT_SECRET=your-client-secret # App registration secret
MCP_OAUTH_TENANT_ID=YOUR_TENANT_ID_HERE # Microsoft Entra tenant ID
MCP_OAUTH_CLIENT_ID=YOUR_CLIENT_ID_HERE # App registration client ID
MCP_OAUTH_CLIENT_SECRET=YOUR_CLIENT_SECRET_HERE # App registration secret

# Optional: Rate Limiting Configuration
MCP_RATE_LIMIT_SEARCH=30 # search_files requests per minute
Expand Down Expand Up @@ -265,8 +265,8 @@ This method allows Claude Desktop to handle OAuth automatically. Edit your Claud
"netapp-files": {
"url": "http://localhost:8080/mcp",
"oauth": {
"client_id": "your-client-id",
"client_secret": "your-client-secret",
"client_id": "YOUR_CLIENT_ID_HERE",
"client_secret": "YOUR_CLIENT_SECRET_HERE",
"authorization_url": "http://localhost:8080/authorize",
"token_url": "http://localhost:8080/token",
"scopes": ["openid", "profile", "email"]
Expand Down Expand Up @@ -327,10 +327,10 @@ For development or when HTTP transport isn't available:
"env": {
"NETAPP_API_URL": "http://localhost:8080",
"MCP_OAUTH_ENABLED": "true",
"MCP_OAUTH_TENANT_ID": "your-tenant-id",
"MCP_OAUTH_CLIENT_ID": "your-client-id",
"MCP_OAUTH_CLIENT_SECRET": "your-client-secret",
"MCP_OAUTH_TOKEN": "your-user-oauth-token"
"MCP_OAUTH_TENANT_ID": "YOUR_TENANT_ID_HERE",
"MCP_OAUTH_CLIENT_ID": "YOUR_CLIENT_ID_HERE",
"MCP_OAUTH_CLIENT_SECRET": "YOUR_CLIENT_SECRET_HERE",
"MCP_OAUTH_TOKEN": "YOUR_OAUTH_TOKEN_HERE"
}
}
}
Expand Down Expand Up @@ -372,7 +372,7 @@ curl -X POST "http://localhost:8080/auth/device/poll?device_code=YOUR_DEVICE_COD

```bash
az login
az account get-access-token --resource api://your-client-id --query accessToken -o tsv
az account get-access-token --resource api://YOUR_CLIENT_ID_HERE --query accessToken -o tsv
```

---
Expand Down Expand Up @@ -544,7 +544,7 @@ There are two ways to configure an MCP API key:
Set the `MCP_API_KEY` environment variable in your deployment:

```bash
MCP_API_KEY=your-secret-api-key
MCP_API_KEY=YOUR_MCP_API_KEY_HERE
```

This takes precedence over any key stored in the database.
Expand Down Expand Up @@ -741,9 +741,9 @@ When rate limited, tools return:

```bash
MCP_OAUTH_ENABLED=true
MCP_OAUTH_TENANT_ID=your-tenant-id
MCP_OAUTH_CLIENT_ID=your-client-id
MCP_OAUTH_CLIENT_SECRET=your-client-secret
MCP_OAUTH_TENANT_ID=YOUR_TENANT_ID_HERE
MCP_OAUTH_CLIENT_ID=YOUR_CLIENT_ID_HERE
MCP_OAUTH_CLIENT_SECRET=YOUR_CLIENT_SECRET_HERE
```

#### 2\. "Token validation failed"
Expand Down
22 changes: 11 additions & 11 deletions docs/projects/mlai/neo/core/m-protocols.md
Original file line number Diff line number Diff line change
Expand Up @@ -79,7 +79,7 @@ curl -s -X POST -H "Authorization: Bearer $TOKEN" \
"protocol": "smb",
"share_path": "//fileserver01/shared-docs",
"username": "svc-neo",
"password": "SecureP@ssw0rd",
"password": "YOUR_PASSWORD_HERE",
"domain": "CORP"
}' \
"http://localhost:8000/api/v1/shares?crawl_immediately=true"
Expand All @@ -94,7 +94,7 @@ curl -s -X POST -H "Authorization: Bearer $TOKEN" \
"protocol": "smb",
"share_path": "//nas.corp.com/finance",
"username": "svc-neo",
"password": "SecureP@ssw0rd",
"password": "YOUR_PASSWORD_HERE",
"domain": "CORP",
"crawl_schedule": "0 2 * * 0",
"rules": {
Expand Down Expand Up @@ -226,7 +226,7 @@ curl -s -X POST -H "Authorization: Bearer $TOKEN" \
"nfs_version": "4",
"nfs_security": "krb5i",
"username": "svc-neo@CORP.COM",
"password": "kerberos-password"
"password": "YOUR_KERBEROS_PASSWORD_HERE"
}' \
"http://localhost:8000/api/v1/shares"
```
Expand Down Expand Up @@ -352,8 +352,8 @@ curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-d '{
"protocol": "s3",
"share_path": "s3://company-documents",
"username": "AKIAIOSFODNN7EXAMPLE",
"password": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"username": "YOUR_AWS_ACCESS_KEY_HERE",
"password": "YOUR_AWS_SECRET_KEY_HERE",
"s3_region": "us-east-1"
}' \
"http://localhost:8000/api/v1/shares?crawl_immediately=true"
Expand All @@ -367,8 +367,8 @@ curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-d '{
"protocol": "s3",
"share_path": "s3://grid-archive/legal",
"username": "GRIDACCESSKEY",
"password": "GRIDSECRETKEY",
"username": "YOUR_GRID_ACCESS_KEY_HERE",
"password": "YOUR_GRID_SECRET_KEY_HERE",
"s3_endpoint_url": "https://s3.storagegrid.company.com:8082",
"s3_region": "us-east-1",
"s3_use_ssl": true
Expand All @@ -384,8 +384,8 @@ curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-d '{
"protocol": "s3",
"share_path": "s3://test-bucket",
"username": "minioadmin",
"password": "minioadmin",
"username": "YOUR_MINIO_ACCESS_KEY_HERE",
"password": "YOUR_MINIO_SECRET_KEY_HERE",
"s3_endpoint_url": "http://minio.local:9000",
"s3_region": "us-east-1",
"s3_use_ssl": false
Expand All @@ -401,8 +401,8 @@ curl -s -X POST -H "Authorization: Bearer $TOKEN" \
-d '{
"protocol": "s3",
"share_path": "s3://prod-data-lake/customer-docs",
"username": "AKIAIOSFODNN7EXAMPLE",
"password": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"username": "YOUR_AWS_ACCESS_KEY_HERE",
"password": "YOUR_AWS_SECRET_KEY_HERE",
"s3_region": "eu-west-1",
"crawl_schedule": "0 1 * * 0",
"rules": {
Expand Down
4 changes: 2 additions & 2 deletions docs/projects/mlai/neo/core/m-shares.md
Original file line number Diff line number Diff line change
Expand Up @@ -152,8 +152,8 @@ curl -X POST "http://localhost:8000/api/v1/shares?crawl_immediately=true" \
-d '{
"protocol": "s3",
"share_path": "s3://my-documents/reports",
"username": "AKIAIOSFODNN7EXAMPLE",
"password": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY",
"username": "YOUR_AWS_ACCESS_KEY_HERE",
"password": "YOUR_AWS_SECRET_KEY_HERE",
"s3_bucket": "my-documents",
"s3_prefix": "reports/",
"s3_region": "us-east-1",
Expand Down
16 changes: 8 additions & 8 deletions docs/projects/mlai/neo/core/m-users.md
Original file line number Diff line number Diff line change
Expand Up @@ -119,8 +119,8 @@ curl -s -X PATCH http://localhost:8000/api/v1/users/me/password \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"current_password": "oldP@ssw0rd",
"new_password": "newS3cur3P@ss!"
"current_password": "YOUR_CURRENT_PASSWORD_HERE",
"new_password": "YOUR_NEW_PASSWORD_HERE"
}'
```

Expand Down Expand Up @@ -207,7 +207,7 @@ curl -s -X POST http://localhost:8000/api/v1/users \
-H "Content-Type: application/json" \
-d '{
"username": "analyst",
"password": "An@lyst2026!",
"password": "YOUR_PASSWORD_HERE",
"email": "analyst@example.com",
"is_admin": false
}'
Expand Down Expand Up @@ -334,7 +334,7 @@ curl -s -X POST http://localhost:8000/api/v1/users/admin \
-H "Content-Type: application/json" \
-d '{
"username": "backup_admin",
"password": "B@ckup2026!"
"password": "YOUR_PASSWORD_HERE"
}'
```

Expand All @@ -361,7 +361,7 @@ curl -s http://localhost:8000/api/v1/setup/initial-credentials | jq
```json
{
"username": "admin",
"password": "aB3$kL9mNpQ2",
"password": "YOUR_AUTO_GENERATED_PASSWORD_HERE",
"message": "Please change this password immediately after logging in. This endpoint will be disabled after first login."
}
```
Expand All @@ -383,16 +383,16 @@ curl -s http://localhost:8000/api/v1/setup/initial-credentials | jq
3. Authenticate with the initial credentials:
```bash
TOKEN=$(curl -s -X POST http://localhost:8000/api/v1/token \
-d "username=admin&password=aB3\$kL9mNpQ2" | jq -r .access_token)
-d "username=admin&password=YOUR_AUTO_GENERATED_PASSWORD_HERE" | jq -r .access_token)
```
4. Change the admin password immediately:
```bash
curl -s -X PATCH http://localhost:8000/api/v1/users/me/password \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{
"current_password": "aB3$kL9mNpQ2",
"new_password": "YourSecurePassword!"
"current_password": "YOUR_AUTO_GENERATED_PASSWORD_HERE",
"new_password": "YOUR_NEW_PASSWORD_HERE"
}'
```
5. Create additional user accounts as needed using the admin endpoints above.
8 changes: 4 additions & 4 deletions docs/projects/mlai/neo/core/qs-docker.md
Original file line number Diff line number Diff line change
Expand Up @@ -60,7 +60,7 @@ Neo can be fully configured after startup via the UI or API. However, if you pre
```bash
# Database credentials (defaults shown)
POSTGRES_USER=neo
POSTGRES_PASSWORD=neo_password
POSTGRES_PASSWORD=YOUR_DB_PASSWORD_HERE
POSTGRES_DB=neo_connector

# License key (can also be set via UI/API during setup)
Expand Down Expand Up @@ -181,9 +181,9 @@ curl -X POST http://localhost:8000/api/v1/setup/license \
curl -X POST http://localhost:8000/api/v1/setup/graph \
-H "Content-Type: application/json" \
-d '{
"tenant_id": "your-tenant-id",
"client_id": "your-client-id",
"client_secret": "your-client-secret"
"tenant_id": "YOUR_TENANT_ID_HERE",
"client_id": "YOUR_CLIENT_ID_HERE",
"client_secret": "YOUR_CLIENT_SECRET_HERE"
}'
```

Expand Down
Loading