Production-ready Azure backend API
/api/health, /api/version, and telemetry
endpoints for portfolio data.
az webapp log tail.
self-deploying GPT backend built with FastAPI, Docker, and Azure automation
Type a question and hit Send. Requests route Astro → AutoForge API
(FastAPI) → Azure OpenAI.
For security and cost control, this demo is rate-limited to 3 requests per hour per IP.
Token limit is set to 6000, use for Short Reasoning only!
/ai/chat for GPT-style replies. Config
via env vars:
AZURE_OPENAI_KEY, AZURE_OPENAI_ENDPOINT, AZURE_OPENAI_DEPLOYMENT, AZURE_OPENAI_API_VERSION.
requirements.txt; custom startup:
python -m uvicorn app.main:app --host 0.0.0.0 --port $PORT.
azure/login → azure/webapps-deploy,
replacing publish-profile auth. SP is scoped to the resource group.
ci.yml) builds
the image on every push (via docker/build-push-action@v6),
runs tests in-container (pytest with a mocked AI client), and on main merges can push to GHCR. Reproduce locally:
docker build -t autoforge-ai . then docker run -p 8000:8000 autoforge-ai → open http://localhost:8000.
jeremygallardo.com, localhost:4321), secrets in Azure App Settings + GitHub
Secrets.
/ai/chat with a messages array, and renders the JSON reply in a chat UI — the terminal
above uses the same flow.
Hands-off device encryption with audit-ready reporting
Click Start to simulate Day 1 → Day 4 rollout. Data shown here
mirrors the
daily_counts.csv produced by aggregate.ps1 (Encrypted
/ Pending / Error).
A fully automated PowerShell-driven system that enforces BitLocker encryption and collects telemetry across all domain-joined Windows computers. It ensures every endpoint is encrypted, recovery keys are securely backed up, and compliance metrics are automatically generated for dashboards.
Bitlocker-Enforcement.ps1) runs at startup via GPO or a SYSTEM-level task. It checks each
drive’s BitLocker state and:
\\fserver\Data\Chicago\IT\Private_IT\Bitlocker\keys\ and telemetry JSON is written to \\fserver\...\telemetry\YYYY-MM\.
aggregate.ps1) runs
daily to summarize all telemetry JSONs. It counts Encrypted, Pending, and Error states, then updates a
daily_counts.csv for visualization.
Together, these scripts form a self-healing, policy-driven encryption pipeline that maintains compliance across your Windows fleet while providing transparent encryption telemetry.
# Detect drive state and enable BitLocker if missing
$vol = Get-BitLockerVolume -MountPoint "C:"
if ($vol.ProtectionStatus -eq 'Off') {
Enable-BitLocker -MountPoint "C:" -EncryptionMethod XtsAes256 -UsedSpaceOnly
Add-BitLockerKeyProtector -MountPoint "C:" -RecoveryPasswordProtector
Backup-BitLockerKeyProtector -MountPoint "C:" -RecoveryKeyPath $keyPath
}
AI that explains failing builds and recommends fixes
ChatOps modal content will go here.