-
Notifications
You must be signed in to change notification settings - Fork 7
Init of preprod branch #1458
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Init of preprod branch #1458
Conversation
|
| GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
|---|---|---|---|---|---|
| 23016484 | Triggered | Generic Database Assignment | 85fa909 | kubernetes/helm_charts/upstream/outline/values-preprod.yaml | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secret safely. Learn here the best practices.
- Revoke and rotate this secret.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
846c7c2 to
dc717ad
Compare
…cutor storage class
- Removed nodeSelector: dedicated=zuul-ci from all 8 base component files - Deleted remove-node-selectors.yaml patch (no longer needed) - Updated kustomization.yaml to remove patch reference - Allows pods to schedule on any available nodes
- Add patch to change zuul-config PVC from csi-nas to csi-sfsturbo - csi-nas was failing with provisioning errors - Deleted old zuul-var-zuul-executor-0 PVC (will be recreated with correct storageClassName)
b1956d0 to
becabb8
Compare
- csi-sfsturbo requires special parameters (everest.io/volume-as) - Use nfs-rw flex-volume based storage class instead
- Pods expect exact secret names without hash suffixes - Added disableNameSuffixHash: true to both secret generators
- Changed container names from component-specific (zuul-scheduler, zuul-web, etc) to 'zuul' - Base components use 'name: zuul' for all containers - Patches were creating new containers instead of patching existing ones - This caused volume mounts from base to be lost
* Anubis Preprod * Fix issue * test * test * test * test * test * test * Add kustomize for anubis * Remove Helm chart for anubis * Remove Helm chart for anubis * Switch ingress overwrite to anubis folder * switch branch
- Update tenant configuration to use single zuul-infra instead of three separate repos - Remove zuul-config, otc-zuul-jobs, zuul-project-config references - Add opentelekomcloud-infra/zuul-infra as sole config-project - Simplify nodepool to Debian-only configuration - Remove debian-bullseye, pod-default, pod-fedora-latest, ubuntu-jammy labels - Keep only debian (VM) and pod-debian (Kubernetes pod) labels - Use Debian Bookworm exclusively - Update ZUUL_CONFIG_REPO environment variable to point to zuul-infra - Align with zuul-infra repository structure and Debian-only strategy
- dependencytrack-api: 2000m -> 10m CPU (actual: 1m) - dependencytrack-frontend: 1000m -> 10m CPU (actual: 1m) - circle-partner-navigator cpn-backend: 500m -> 10m CPU (actual: 1m) Total CPU savings: ~4980m (~5 CPUs) to enable node scheduling
This reverts commit 28b86f3.
No description provided.