Have something to say?

Tell us how we could make the product more useful to you. For Support reach out at hello@lamatic.ai.

Planned

Test Case Expected Results

When creating Test Cases, capture expected results (in addition to capturing the name and test conditions as Lamatic does currently). Consider also, Using code checks and AI to find deviation and grade result quality. Use this quality score as an input for deciding whether to deploy an update. Assist in recommending the best option when A|B testing prompts, agents, workflows, models and other settings such as temperature. Using these results to create benchmarks. Measuring and alerting about “model drift” over time. Integrating “human-in-the-loop” strategies to expand Test Cases and quality checking. Added Later (based on feedback from another user): Make it easier to see the history of Test Case executions (without leaving Experiments). Marc Greenberg didn’t realize he could find the results in Logs, but also didn’t like having to dig through logs to find the execution details for a given test.

cwhiteman Over 1 year ago

15

💡 Feature Requests

Planned

PostgreSQL Read-Only User Setup Guide

Add comprehensive documentation for creating a dedicated read-only PostgreSQL user before connecting to Lamatic, following security best practices similar to Airbyte's integration guide. Problem Currently, users may connect to Lamatic using admin/superuser credentials, which poses security risks. A clear guide for creating properly scoped read-only users is needed to ensure secure database connections. Proposed Solution Add a pre-setup section to the PostgreSQL integration documentation with step-by-step instructions for creating a dedicated read-only user. Suggested Documentation Structure: Step 1: Create a Dedicated Read-Only PostgreSQL User 1. Connect to your PostgreSQL database as a superuser: psql -h -p -U -d 2. Create a dedicated user for Lamatic: CREATE USER lamatic_user WITH PASSWORD 'your_secure_password'; 3. Grant connection privileges: GRANT CONNECT ON DATABASE TO lamatic_user; 4. Grant schema usage: GRANT USAGE ON SCHEMA TO lamatic_user; 5. Grant read permissions on tables: -- For existing tables GRANT SELECT ON ALL TABLES IN SCHEMA TO lamatic_user; -- For future tables (optional) ALTER DEFAULT PRIVILEGES IN SCHEMA GRANT SELECT ON TABLES TO lamatic_user; 6. Grant read permissions on sequences (if needed): GRANT SELECT ON ALL SEQUENCES IN SCHEMA TO lamatic_user; Step 2: Configure Lamatic Connection Use the newly created lamatic_user credentials in your Lamatic PostgreSQL connection settings. Step 3: Verify Connection Test the connection to ensure the read-only user has appropriate access without write permissions. Benefits Enhanced Security: Limits database access to read-only operations Principle of Least Privilege: Grants only necessary permissions Audit Trail: Clear separation between admin and integration users Risk Mitigation: Reduces potential impact of credential compromise Acceptance Criteria [ ] Documentation includes complete SQL commands [ ] Examples cover common schema configurations [ ] Verification steps are provided [ ] Security considerations are highlighted [ ] Troubleshooting section for common permission issues This addition would significantly improve the security posture of PostgreSQL integrations with Lamatic while providing users with clear, actionable guidance.

Aman Sharma 7 months ago

👏🏻 Feedback