How DroidAgent Works
DroidAgent builds company-level intelligence by gathering context from multiple sources during investigations:
Investigations
How does DroidAgent select queries for log search in Coralogix?
How does DroidAgent select queries for log search in Coralogix?
DroidAgent has been given context of patterns in your logs. Along with that, it leverages the information of ongoing alerts, any runbooks or documents and its innate knowledge of error debugging and monitoring to try different queries.It can try multiple different queries in case it doesn’t find success with one of them.
How does DroidAgent select which tools to use during investigation?
How does DroidAgent select which tools to use during investigation?
Based on the alert, it creates a plan of potential root causes and tries to find evidence to validate/disvalidate each hypothesis.To create the plan, it uses a combination of real-time context (what alerts are going on), what dashboards/integrations exist in context of that alert/service and what documents are accessible.
How does DroidAgent select commands to run on Kubernetes clusters?
How does DroidAgent select commands to run on Kubernetes clusters?
The agent is using SOTA models with deep understanding of modern day cloud, infrastructure, engineering design principles and SRE practices. Using the combination of this knowledge, and the custom context provided to it, it’s able to decide the commands to run on a cluster.
How does DroidAgent determine the time windows for investigation?
How does DroidAgent determine the time windows for investigation?
The agent has been trained to understand the relevance of different time windows in context of an alert (e.g. it can decide to get metrics for a timewindow just before the alert, or for the same timewindow in a previous day/week setup or at the current time to check if the issue is still ongoing).It prioritizes alert_time when it finds context in some document or alert itself.
Data & Agent Security
DroidAgent implements multiple layers of security to protect your data and infrastructure:
Does DroidAgent have access to API keys and credentials?
Does DroidAgent have access to API keys and credentials?
No. For all the integrations, the agent does not have access to keys — it only has access to request specific API executions and the execution engine stores the keys securely in a database.Additionally, there are guardrails in place to avoid agent from running unauthorised state-change or critical commands.
Can DroidAgent execute write commands or make changes?
Can DroidAgent execute write commands or make changes?
The agent does NOT have access to execute write commands by default. It can be given the access to execute commands with appropriate roll-backs and permissions in place. This can be done run-time or pre-configured based on specific situations as per the team’s context.
What security measures are in place?
What security measures are in place?
DroidAgent implements multiple layers of security including RBAC and access management, PII scrubbing, safety checks, and built-in guardrails to prevent unauthorized operations. The execution engine can be deployed within your VPC for additional security.
Workflow Integration
DroidAgent seamlessly integrates into your existing workflows without requiring changes to your current setup:
Does DroidAgent require changes to my existing monitoring setup?
Does DroidAgent require changes to my existing monitoring setup?
No metrics or logging tool changes required. DroidAgent auto-syncs with your ticketing and on-call tools, has RBAC and access management integration, and is lightweight and quick to configure.
How does DroidAgent integrate with my current tools?
How does DroidAgent integrate with my current tools?
DroidAgent integrates with Grafana, Coralogix, New Relic, Datadog, PagerDuty, Opsgenie, Slack, Jira, Kubernetes, cloud platforms (AWS, Azure, GCP), and databases.
How quickly can DroidAgent be set up?
How quickly can DroidAgent be set up?
DroidAgent is lightweight and quick to configure. It works with your existing monitoring infrastructure, auto-discovers your tools, and doesn’t require downtime during installation.
What level of customization is available?
What level of customization is available?
You can upload custom runbooks, configure specific integrations, customize alert routing, and define investigation scope and permissions.