Skip to content
@cyse7125-su24-team10

cyse7125-su24-team10

LLaMaCVE

LLaMA Kubernetes Amazon EKS Pinecone Jenkins Terraform Helm Flyway Postgresql Streamlit Kubernetes Operator

How can Large Language Models (LLMs) be leveraged to meet your business needs?

This is the central question our project aims to address. Large Language Models (LLMs) have the potential to revolutionize various aspects of business operations, from customer service to data analysis and decision-making processes. Our project demonstrates a powerful approach to harness this potential: Retrieval Augmented Generation (RAG).

Key Highlights:

  • LLaMA3.1 Integration: We utilize the advanced llama3.1 model for superior natural language processing capabilities.
  • Self-Hosted on Kubernetes: Our solution, along with the llama3.1 8-billion parameter model, is hosted on Kubernetes, providing unparalleled control, scalability, and customization options.

Project Demo

Watch our project demonstration:

LLaMaCVE Demo

RAG combines the vast knowledge of LLMs with the ability to retrieve and incorporate specific, up-to-date information. This makes it particularly valuable for businesses that need to process and analyze large amounts of domain-specific data while leveraging the general capabilities of LLMs.

In our project, we've developed a CVE (Common Vulnerabilities and Exposures) RAG application. This application integrates llama3.1 with Pinecone vectors, which act as a knowledge base containing up-to-date CVE data. Our system is designed to provide the latest information on vulnerabilities and exposures, crucial for cybersecurity and risk management in businesses.

Key features of our application include:

  • Integration of LLM with Pinecone vector database for efficient information retrieval
  • Self-hosted solution on Kubernetes for enhanced control and customization
  • Operators running hourly to ensure data freshness
  • Ability to query and analyze the latest vulnerability information

Our project, built and deployed on Amazon EKS, showcases how this RAG application can be implemented in a robust, scalable environment. We adhere to DevOps best practices, utilizing comprehensive CI/CD pipelines with Jenkins and Infrastructure as Code (IaC) using Terraform. This ensures that our solution is not only powerful but also maintainable and adaptable to changing business needs.

We invite you to explore our work and see how self-hosted LLMs, particularly llama3.1, can be practically applied to solve real-world business challenges, especially in the realm of cybersecurity and vulnerability management. If you find our project valuable, please consider leaving a ⭐️!

Architecture Diagram

Architecture Diagram

Application Architecture

Application Architecture

AWS Orchestration & Observability Stack

AWS Orchestration

Repositories

  1. AWS Infrastructure
  2. LLM CVE
  3. Jenkins AMI
  4. Kubernetes Operator
  5. EKS Autoscaler
  6. Jenkins Infrastructure
  7. CVE Processor
  8. CVE Consumer
  9. PineCone Loader
  10. DB CVE Processor
  11. Helm Chart: LLM CVE
  12. Helm Chart: Kubernetes Operator
  13. Helm Chart: CVE Processor
  14. Helm Chart: CVE Consumer

Contributors

Mentors

Popular repositories Loading

  1. infra-aws infra-aws Public

    Production-Grade Kubernetes Cluster set-up on AWS with Terraform and Helm, including Istio for service mesh, Kafka for messaging, and KMS keys for encryption. Configured for high availability, scal…

    Smarty 1 1

  2. ami-jenkins ami-jenkins Public

    AWS AMI build using HashiCorp Packer w/ Jenkins pre-configured and NGINX as a reverse proxy.

    Groovy

  3. infra-jenkins infra-jenkins Public

    CI/CD Infrastructure w/jenkins

    HCL

  4. static-site static-site Public

    A simple Caddy server

    Dockerfile

  5. webpp-cve-processor webpp-cve-processor Public

    A Go-based application that automates the download, normalization, and publishing of CVE records to Kafka Topic.

    Go

  6. helm-webapp-cve-processor helm-webapp-cve-processor Public

    The cve-processor Helm chart deploys a Go-based application designed to fetch CVE data from the CVE repository and push it to Kafka for further processing. The chart includes configuration for runn…

    Smarty

Repositories

Showing 10 of 16 repositories
  • .github Public
    cyse7125-su24-team10/.github’s past year of commit activity
    0 MIT 1 0 0 Updated Dec 9, 2024
  • infra-aws Public

    Production-Grade Kubernetes Cluster set-up on AWS with Terraform and Helm, including Istio for service mesh, Kafka for messaging, and KMS keys for encryption. Configured for high availability, scalability, and secure management of resources.

    cyse7125-su24-team10/infra-aws’s past year of commit activity
    Smarty 1 MIT 1 0 0 Updated Oct 9, 2024
  • db-cve-processor Public

    Builds Docker image for running Flyway-based PostgreSQL migrations as an init container in Kubernetes, ensuring proper schema setup and updates for CVE data management.

    cyse7125-su24-team10/db-cve-processor’s past year of commit activity
    Dockerfile 0 1 0 0 Updated Sep 11, 2024
  • pinecone-loader Public

    Builds Docker Image for Loading Pinecone Database with Vectors from CVE data.

    cyse7125-su24-team10/pinecone-loader’s past year of commit activity
    Python 0 1 0 0 Updated Sep 11, 2024
  • helm-llm-cve Public

    Helm Chart for Deploying llm-cve Application on Kubernetes.

    cyse7125-su24-team10/helm-llm-cve’s past year of commit activity
    Smarty 0 1 0 0 Updated Sep 11, 2024
  • helm-k8s-operator Public

    Helm chart for deploying a Kubernetes operator that monitors GitHub releases, processes CVE data, and publishes it to Kafka, with integration for Pinecone indexing.

    cyse7125-su24-team10/helm-k8s-operator’s past year of commit activity
    Smarty 0 0 0 0 Updated Sep 11, 2024
  • helm-webapp-cve-processor Public

    The cve-processor Helm chart deploys a Go-based application designed to fetch CVE data from the CVE repository and push it to Kafka for further processing. The chart includes configuration for running the application as a Kubernetes job, secured access via environment variables, and a robust scaling policy.

    cyse7125-su24-team10/helm-webapp-cve-processor’s past year of commit activity
    Smarty 0 0 0 2 Updated Sep 9, 2024
  • helm-webapp-cve-consumer Public

    The cve-consumer Helm chart deploys a robust Go-based application that processes CVE data from Kafka streams into a PostgreSQL database. It integrates secure Kafka communication with SASL authentication, offers efficient database interactions, and includes comprehensive health check endpoints.

    cyse7125-su24-team10/helm-webapp-cve-consumer’s past year of commit activity
    Smarty 0 0 0 0 Updated Sep 9, 2024
  • webpp-cve-processor Public

    A Go-based application that automates the download, normalization, and publishing of CVE records to Kafka Topic.

    cyse7125-su24-team10/webpp-cve-processor’s past year of commit activity
    Go 0 0 0 0 Updated Sep 9, 2024
  • webapp-cve-consumer Public

    Go application that processes CVE data from Kafka streams and stores it in PostgreSQL. It features secure Kafka integration, efficient database handling, and health check endpoints. Dockerized and managed through a CI/CD pipeline with Jenkins, it ensures streamlined deployment and reliable CVE data monitoring.

    cyse7125-su24-team10/webapp-cve-consumer’s past year of commit activity
    Go 0 MIT 0 0 0 Updated Sep 9, 2024

People

This organization has no public members. You must be a member to see who’s a part of this organization.

Top languages

Loading…

Most used topics

Loading…