Skip to content
#

cicd

Here are 1,818 public repositories matching this topic...

jannfis
jannfis commented Dec 19, 2021

Summary

The Argo CD core mode should allow the user to set a permanent path to a K8s client configuration file, instead of either using ~/.kube/config per default or having to specify --kubeconfig for each command.

Motivation

Some K8s distributions by default install a Kubernetes client CLI (kubectl) which uses a custom path for its configuration. For example, K3s uses `/etc/ran

zyupo
zyupo commented May 12, 2020

Spug运维平台在过去的公司里稳定运行6年以上,开源的大部分代码也是基于稳定版本之上,为了增加更多用户在企业使用的信心,如您愿意,请将您在企业中使用Spug的案例展示给我们,请在该issue页面提供您的使用案例,提交格式:企业名称 + 公司官网地址。官网地址为可选项,您可以直接提供企业名称即可。

此外,您也可以通过其他渠道如QQ、微信、邮件的方式联系项目作者提供使用案例。

征集长期有效,感谢大家支持!

Spug部分案例:

microk8s
mitchdenny
mitchdenny commented Feb 18, 2022

I've been playing around with microk8s quite a bit lately and I really like how simple you've made it to get a multi-node cluster up and running. I'm running it on a 5-node RPi4 cluster and it works great. I'm using this cluster as a bit of a test bed for different ideas, one of which is reliability when nodes fail.

I'm using Longhorn to provide a distributed storage so

jx
ankitm123
ankitm123 commented Jan 5, 2022

Not sure what the error is, but lint passes in the CI and locally even if exported structs dont have comments.
Most probably, it's an issue with the golangci yaml config we use.

Also we use revive instead of golint (which is deprecated), may be some setting in revive needs to be enabled?

If we check the goreport card, we can see the issues: https://goreportcard.com/report/github.com/jenkins

cml
gennaro-tedesco
gennaro-tedesco commented Dec 13, 2021

I noticed that when CML produces the reports (as per in cml-send-comment --update --pr report.md) such reports are shown in the PR conversation as belonging to a certain user rather than GitHub actions reports. Is this intended behaviour or is there a setting/flag where we can choose which user to assign to the comments reports?

I haven't figured out how such user is chosen, I suspect it is t

github-pages-deploy-action
database-lab-engine
npalm
npalm commented Feb 2, 2022

Description

GitHub released an option to disable the auto update of runners. https://github.blog/changelog/2022-02-01-github-actions-self-hosted-runners-can-now-disable-automatic-updates/ Now we can add an option to support this by the module

Default

Question is what should be the default?

  • Without AMI. Keep the current behaviror. With the S3 we haven't any issue for months.
narenaryan
narenaryan commented Sep 9, 2021

Hi,

We are using terraform-aws-gitlab-runnner to spin up GitLab runners on our AWS account. As part of security auditing, there was a severe alert raised on this policy created by terraform module: https://github.com/npalm/terraform-aws-gitlab-runner/blob/develop/policies/instance-docker-machine-policy.json#L21

The problem lies with permitting IamPassrole action on all resources. As per

Improve this page

Add a description, image, and links to the cicd topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the cicd topic, visit your repo's landing page and select "manage topics."

Learn more