Skip to main content
Glama
DEMO_QUICK_REFERENCE.mdβ€’4.85 kB
# ARC Healthcare Demo - Quick Reference ## 🎬 Demo Script (5-10 minutes) ### Opening Statement "Today I'll demonstrate deploying production-ready GitHub Actions runners with healthcare-grade compliance in under 5 minutes using natural language commands." ### Demo Flow #### 1. **Initial Deployment** (30 seconds) ``` User: "Deploy 20-40 runners" ``` **Show**: - Auto-detection of missing controller - Automatic installation and configuration - Immediate runner deployment with auto-scaling #### 2. **Healthcare Compliance** (1 minute) ``` User: "Generate me arc policies for a production environment in the healthcare industry" ``` **Show**: - HIPAA/SOC2/ISO27001 policy generation - Strict enforcement configuration - Healthcare-specific security controls #### 3. **Automated Remediation** (1 minute) ``` User: "Is there anything else that can be fixed with the auto fix functionality?" ``` **Show**: - Policy violation detection - Automatic security fixes - Compliance score improvement (55.6% β†’ 72.2%) - **Built-in prompt** suggesting drift detection next #### 4. **Configuration Management** (1 minute) ``` User: "Let's run the drift detection tool to make sure our configuration files are up to date" ``` **Show**: - Drift detection finds differences (expected after auto-fixes!) - Automatic config file regeneration - GitOps workflow maintains sync between cluster and configs ### Key Talking Points #### **Business Value** - "From zero to healthcare-compliant in 5 minutes" - "Automatic policy enforcement prevents security violations" - "GitOps workflow ensures audit compliance" #### **Technical Excellence** - "AI understands industry requirements (healthcare = HIPAA)" - "Auto-scaling prevents over/under-provisioning" - "Built-in workflow guidance (auto-fix β†’ drift detection)" #### **Compliance & Security** - "85% compliance score with healthcare-grade policies" - "Non-root containers, security contexts enforced" - "Complete audit trail in version control" ## πŸ“Š Demo Metrics to Highlight | Before | After | Improvement | |--------|-------|-------------| | No runners | 20-40 auto-scaling | ∞ | | No policies | HIPAA compliant | 85% score | | Manual setup | Natural language | 95% faster | | Config drift risk | Zero drift | 100% sync | ## 🎯 Demo Variations ### **Quick Demo** (2 minutes) Just run the 4 commands sequentially, show final status ### **Deep Dive** (10 minutes) - Show generated configuration files - Explain policy rules in detail - Demonstrate manual policy customization ### **Industry Focused** - Healthcare: HIPAA compliance focus - Financial: PCI-DSS, SOX requirements - Government: FedRAMP, high security - Startup: Cost optimization, speed ## πŸ”§ Pre-Demo Setup ### Prerequisites - Clean Kubernetes cluster - GitHub organization access - ARC MCP server running - Terminal ready with project directory ### Reset Commands (if needed) ```bash # Clean up previous demo kubectl delete namespace arc-systems --ignore-not-found rm -rf configs/ ``` ## πŸ’¬ Q&A Preparation ### Common Questions **Q: "How does it know healthcare requirements?"** A: AI detects industry context and applies appropriate compliance frameworks (HIPAA, SOC2, ISO27001) **Q: "What if we need custom policies?"** A: Policies are fully configurable - you can override any rule or add custom requirements **Q: "Is this production ready?"** A: Yes - generates GitOps configs, enforces security contexts, and provides complete audit trails **Q: "How does auto-scaling work?"** A: Monitors workflow queue, scales from 20 to 40 runners based on demand, costs optimize automatically **Q: "What about other cloud providers?"** A: Works on any Kubernetes - AWS EKS, Azure AKS, Google GKE, on-premises, or local development **Q: "What happens when the cluster state differs from config files?"** A: Drift detection identifies differences and auto-regenerates config files to match the actual cluster state - maintaining GitOps principles ## πŸš€ Follow-up Actions ### For Interested Prospects 1. Share the documentation 2. Offer environment-specific demo 3. Provide trial access to MCP server ### For Technical Teams 1. Show the generated YAML configurations 2. Explain policy customization options 3. Demonstrate integration with existing GitOps workflows ## πŸ“ Demo Assets ### Generated Files (show these) - `configs/controller.yaml` - Controller configuration - `configs/policies/arc-policy-config.json` - Healthcare policies - `configs/runner-sets/tsvi-runners.yaml` - Auto-fixed runner config ### Commands to Verify Success ```bash # Show running system kubectl get pods -n arc-systems # Show compliance score # (via MCP command or dashboard) # Show configuration files tree configs/ ``` This demo showcases enterprise-grade infrastructure automation with AI-driven compliance and security.

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tsviz/arc-config-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server