Skip to content

redhat-et/kagenti-demo-deployment

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

Kagenti Demo Deployment

GitOps-managed AI Agent Platform deployed on Kubernetes using ArgoCD with the Components + Overlays pattern.

Current Environment: Kind (Local Development) βœ… Planned: OpenShift (Staging & Production) 🚧


🎯 What is Kagenti?

Kagenti is a production-ready AI agent orchestration platform built on Kubernetes with:

  • GitOps Deployment - All infrastructure defined as code, deployed via ArgoCD
  • Service Mesh Security - Istio mTLS STRICT mode for all pod-to-pod communication
  • SSO Authentication - Keycloak with OAuth2/OIDC for unified access control
  • Distributed Tracing - Dual-backend (Tempo for infrastructure, Phoenix for AI/LLM traces)
  • Comprehensive Observability - Grafana, Prometheus, Loki, Kiali for full platform visibility
  • Tekton CI/CD - Automated agent build pipelines with operator-based workflows

Key Architecture Documents:

  • ARCHITECTURE.md - Detailed platform architecture and deployment layers
  • CLAUDE.md - Development workflow, GitOps practices, TDD approach
  • TODO_SECURITY.md - Comprehensive security roadmap (Kind β†’ OpenShift)

πŸš€ Quick Start (15 Minutes)

One-Command Deployment

# Complete cluster redeploy (auto-detects repo/branch)
./scripts/quick-redeploy.sh

What it does:

  1. βœ… Auto-detects repository and branch (works with PRs/forks in GitHub Actions)
  2. βœ… Destroys existing Kind cluster
  3. βœ… Creates new Kind cluster with registry
  4. βœ… Installs ArgoCD
  5. βœ… Bootstraps applications (uses detected repo/branch automatically)
  6. βœ… Prompts for operator images (build/load/skip)
  7. βœ… Prompts for agent images (build from source/load pre-built/skip)
  8. βœ… Syncs root application and child apps
  9. βœ… Shows final status and access URLs

Branch Detection (automatic):

  • Local development: Uses current Git branch
  • GitHub Actions PR: Automatically uses PR branch and fork repository
  • Default: Falls back to main branch from upstream repo

Interactive Prompts (local only, auto-skipped in CI):

Operator Images (kagenti-operator, kagenti-platform-operator):

  • y - Load pre-built images from Docker (30 seconds) βœ… Recommended
  • n - Rebuild from source (2-5 minutes)
  • skip - Skip loading (operators will show ImagePullBackOff)

Agent Images (research-agent, code-agent, orchestrator-agent):

  • y - Build from source (2-5 minutes)
  • n - Load pre-built images (30 seconds)
  • skip - Skip agents (agents will show ImagePullBackOff) βœ… Default

Environment Variables (optional):

# Custom agent source location
export AGENT_SOURCE_DIR=/path/to/your/agent-repo
./scripts/quick-redeploy.sh

# Skip all prompts (CI mode)
CI=true ./scripts/quick-redeploy.sh

# Specify operator mode
export OPERATOR_IMAGE_MODE=rebuild  # rebuild|load|skip
./scripts/quick-redeploy.sh

Manual Step-by-Step Deployment

For more control, run scripts individually:

# 1. Create Kind cluster
./scripts/kind/01-create-cluster.sh

# 2. Install ArgoCD
./scripts/kind/02-install-argocd.sh

# 3. Bootstrap ArgoCD Applications
./scripts/kind/03-bootstrap-apps.sh

# 4. (Optional) Load agent images
./scripts/kind/04-load-agent-images.sh build  # or 'load'

# 5. Sync root application (creates all child apps)
argocd app sync kagenti-platform-kind \
  --port-forward --port-forward-namespace argocd --grpc-web \
  --timeout 600

# 6. Monitor deployment progress
./scripts/monitor-argocd-apps.sh 900  # 15-minute timeout

# 7. Check platform health
./scripts/platform-status.sh

πŸ§ͺ Test-Driven Development (TDD)

Kagenti follows GitOps + TDD workflow as documented in CLAUDE.md.

Core Principle

ALWAYS test after deployment changes

All platform changes go through:

  1. βœ… Edit manifests in Git
  2. βœ… Validate syntax with kustomize build
  3. βœ… Commit and push to branch
  4. βœ… Sync via ArgoCD
  5. βœ… Test with pytest integration tests
  6. βœ… Merge when tests pass

Quick Test Commands

# Fast validation (critical apps only, ~30s)
pytest tests/validation/test_app_state.py -v --only-critical

# Full platform health check (includes automated tests)
./scripts/platform-status.sh

# Specific component tests
pytest tests/integration/test_observability.py -v

# Full test suite with HTML report
pytest tests/ -v --html=report.html --self-contained-html

Test Coverage (see docs/CI_CD_TESTING.md):

  • βœ… ArgoCD application state validation
  • βœ… Pod health checks across all namespaces
  • βœ… Service accessibility via Gateway
  • βœ… OAuth authentication flows
  • βœ… Observability stack integration (Grafana, Tempo, Phoenix)
  • βœ… Istio mTLS STRICT mode verification
  • βœ… Certificate readiness checks

Integration with Observability (see CLAUDE.md):

  • Real-time test results in Grafana dashboards
  • Alert testing via Grafana API
  • Trace validation in Tempo and Phoenix
  • Log aggregation in Loki

🐳 Loading Agent Images

Option 1: Use Example Agents (Quick Test)

# Build from local source
export AGENT_SOURCE_DIR=/path/to/agent-examples-local
./scripts/kind/04-load-agent-images.sh build

# Or load pre-built images
./scripts/kind/04-load-agent-images.sh load

Default agent source (can be overridden):

AGENT_SOURCE_DIR=/Users/ladas/Projects/OCTO/research/agent-examples-local

Option 2: Use Your Own Agent Repository

Point to your own agent repo by setting environment variable before deployment:

# Set custom agent source directory
export AGENT_SOURCE_DIR=/path/to/my-agent-repo

# Run quick-redeploy (will use your repo)
./scripts/quick-redeploy.sh
# Select 'y' when prompted for agent images

Requirements for custom repo:

  • Directory structure: a2a/{agent-name}/Dockerfile
  • Agents: research-agent, code-agent, orchestrator-agent
  • Images will be tagged: localhost:5000/{agent}:v0.0.15

Option 3: Use Operator-Based Builds (Production Workflow)

For production-like builds using Tekton + kagenti-operator:

# 1. Setup agent source repo in Kubernetes
./scripts/dev/setup-agent-source-repo.sh

# 2. Trigger builds via Tekton pipelines
./scripts/dev/trigger-agent-builds.sh

# 3. Monitor build progress
kubectl get pipelineruns -n kagenti-operator -w

See components/03-applications/agents/agent-builds/README.md for details.

🚧 Note: Legacy build script (04-load-agent-images.sh) is for quick local dev only. Use operator-based workflow for production.


🌐 Access Services

All services accessible via localtest.me DNS wildcard (points to localhost):

# Get comprehensive access information
./scripts/show-access-info.sh
Service URL Default Credentials Purpose
ArgoCD https://argocd.localtest.me:9443 admin / (see /tmp/argocd-pass.txt) GitOps deployment
Keycloak https://keycloak.localtest.me:9443 admin / admin123 (dev) SSO identity provider
Grafana https://grafana.localtest.me:9443 admin / admin123 (dev) Metrics dashboards
Phoenix https://phoenix.localtest.me:9443 Keycloak kagenti realm LLM observability
Kiali https://kiali.localtest.me:9443 Keycloak kubernetes realm Service mesh visualization
Kagenti UI https://kagenti.localtest.me:9443 Keycloak kagenti realm Platform management
Kubernetes Dashboard https://k8s-dashboard.localtest.me:9443 Keycloak kubernetes realm Cluster management

πŸ”’ Security:

  • βœ… All traffic encrypted (TLS 1.3 at Gateway, mTLS STRICT between services)
  • βœ… SSO authentication via Keycloak
  • βœ… OAuth2-Proxy for services without native auth
  • βœ… Self-signed certificates (Kind only - production uses Let's Encrypt)

See docs/08-security/encryption.md for encryption architecture.


πŸ“Š Platform Status & Monitoring

Quick Health Check

# Comprehensive platform status (includes pytest tests)
./scripts/platform-status.sh

Checks:

  • βœ… ArgoCD applications (health & sync status)
  • βœ… Platform pods (all namespaces)
  • βœ… Gateway & certificates
  • βœ… Istio mTLS STRICT verification
  • βœ… Service accessibility (via Gateway)
  • βœ… OAuth authentication flows
  • βœ… Automated pytest integration tests (runs real tests)

Monitor ArgoCD Sync Progress

# Monitor with 15-minute timeout, formatted tables
./scripts/monitor-argocd-apps.sh 900

Shows:

  • Formatted ArgoCD application status table (with colors)
  • Formatted pod status by namespace table
  • Progress tracking with elapsed time
  • Smart failure logic (only fails on CRITICAL apps degraded)
  • Monitors ALL apps (critical + optional observability, Kiali, Ollama)

Observability

Built-in dashboards:

See docs/04-observability/ for detailed observability documentation.


πŸ—οΈ Architecture

High-Level Overview

β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                        GitOps Layer                             β”‚
β”‚  ArgoCD (App-of-Apps) β†’ Components + Overlays β†’ Kubernetes     β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                ↓
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚                     Security Layer                              β”‚
β”‚  TLS 1.3 (Gateway) + Istio mTLS STRICT + Keycloak SSO         β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜
                                ↓
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”¬β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚ Infrastructureβ”‚  Platform    β”‚ Observabilityβ”‚  Applications  β”‚
β”‚ (Wave 0-5)   β”‚ (Wave 10-15) β”‚ (Wave 20)    β”‚ (Wave 25-30)   β”‚
β”œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”Όβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€
β”‚ Gateway API  β”‚ Operators    β”‚ Grafana      β”‚ AI Agents      β”‚
β”‚ cert-manager β”‚ Kagenti UI   β”‚ Tempo        β”‚ Kiali          β”‚
β”‚ Istio        β”‚ Keycloak     β”‚ Phoenix      β”‚ K8s Dashboard  β”‚
β”‚ Tekton       β”‚ OAuth2-Proxy β”‚ Prometheus   β”‚                β”‚
β”‚              β”‚              β”‚ Loki         β”‚                β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”΄β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

See ARCHITECTURE.md for:

  • Detailed component diagrams
  • Deployment layers and sync waves
  • Service mesh architecture
  • Secrets management (Kind vs OpenShift)
  • Network architecture with mTLS
  • Access patterns and authentication flows

Components + Overlays Pattern

components/                    # Base Kubernetes manifests (reusable)
β”œβ”€β”€ 00-infrastructure/        # Core (Gateway, cert-manager, Istio, Keycloak)
β”œβ”€β”€ 01-platform/             # Platform services (Operators, UI)
β”œβ”€β”€ 02-observability/        # Monitoring (Grafana, Tempo, Phoenix, Prometheus)
└── 03-applications/         # Applications (AI Agents)

argocd/applications/
β”œβ”€β”€ base/                    # Base Application templates
β”œβ”€β”€ kind-local/             # Kind-specific patches (localtest.me, self-signed certs)
└── openshift/              # OpenShift patches (Routes, SCCs) 🚧 PLANNED

Benefits:

  • βœ… No code duplication across environments
  • βœ… Modular components (enable/disable per environment)
  • βœ… Single source of truth
  • βœ… Easy to add new environments (e.g., OpenShift staging/prod)

Security Architecture

Defense-in-Depth (6 Layers) - see TODO_SECURITY.md:

  1. Perimeter - Gateway API, TLS 1.3, cert-manager
  2. Identity - Keycloak SSO, OAuth2-Proxy, SPIRE (planned)
  3. Network - Istio mTLS STRICT, NetworkPolicies (limited), AuthorizationPolicies
  4. Application - Pod Security Standards (partial), RBAC (basic)
  5. Data - Secrets encryption at rest (🚧 planned), Vault (🚧 planned)
  6. Runtime - Falco (🚧 planned), OPA/Kyverno (🚧 planned)

Current Status:

  • βœ… IMPLEMENTED: TLS 1.3, Istio mTLS STRICT, Keycloak SSO, OAuth2-Proxy, basic RBAC
  • ⚠️ PARTIAL: NetworkPolicies (only observability namespace), Pod Security Standards
  • 🚧 PLANNED: CI/CD security scanning, etcd encryption, Vault, Falco, comprehensive NetworkPolicies

See TODO_SECURITY.md for complete security roadmap.


🚧 Roadmap: OpenShift Deployment

Next Phase: Deploy to OpenShift (Staging & Production)

What's Different in OpenShift

Component Kind (Local) OpenShift (Production)
Ingress Gateway API + MetalLB OpenShift Routes
Certificates Self-signed (cert-manager) Let's Encrypt
Secrets Sealed Secrets (Git) External Secrets Operator + Vault
Pod Security Baseline mode Restricted mode (SCC)
NetworkPolicies Permissive (dev-friendly) Strict (default-deny)
Observability In-cluster (Grafana, Tempo) Hybrid (in-cluster + Grafana Cloud)
Encryption at Rest None (etcd base64 only) FIPS-validated cryptography

Preparation Checklist

See TODO_SECURITY.md for ultra-detailed implementation tasks:

Phase 1: Foundation (P0 - Critical) - 3-6 months:

  • CI/CD Security Scanning - Multi-layer pipeline (Trivy, Snyk, Checkov, Kubescape, Semgrep)
  • Expand NetworkPolicies - Default-deny + allow-specific for all namespaces
  • OpenShift SCCs - SecurityContextConstraints for all components
  • etcd Encryption - Secrets encrypted at rest
  • Sealed Secrets - Encrypted secrets in Git
  • Pod Security Standards - Baseline (Kind), Restricted (OpenShift)
  • Audit Logging - Kubernetes API audit logs β†’ Loki

Phase 2: Hardening (P1 - High) - 6-12 months:

  • External Secrets Operator + Vault - Centralized secret management
  • Container Image Scanning - Trivy in Tekton pipelines
  • Enhanced RBAC - Least-privilege ServiceAccounts
  • Secret Rotation - Automated 90-day rotation
  • Istio AuthorizationPolicies - Layer 7 access control

Phase 3: Production Ready (P2 - Medium) - 12-18 months:

  • Falco - Runtime threat detection
  • OPA/Kyverno - Policy enforcement
  • MFA - Keycloak multi-factor authentication
  • Rate Limiting - Istio EnvoyFilter
  • Compliance - SOC 2, GDPR, HIPAA readiness

Detailed tasks, code examples, validation steps: TODO_SECURITY.md


πŸ“š Documentation

Core Documentation

Document Description
ARCHITECTURE.md Detailed platform architecture, deployment layers, diagrams
CLAUDE.md Development workflow, GitOps best practices, TDD approach
TODO_SECURITY.md Comprehensive security roadmap (Kind β†’ OpenShift)
docs/README.md Complete documentation index

Getting Started

Infrastructure & Platform

Service Mesh & Security

Authentication & Authorization

Observability & Monitoring

CI/CD & Operations

AI Agents & Platform


πŸ› οΈ Repository Structure

kagenti-demo-deployment/
β”œβ”€β”€ argocd/                        # ArgoCD GitOps definitions
β”‚   β”œβ”€β”€ bootstrap/kind/           # Root Application (App-of-Apps)
β”‚   └── applications/             # Application definitions
β”‚       β”œβ”€β”€ base/                # Base application templates
β”‚       β”œβ”€β”€ helm/                # Helm-based applications
β”‚       β”œβ”€β”€ kind-local/          # Kind-specific patches
β”‚       └── openshift/           # OpenShift patches (🚧 PLANNED)
β”‚
β”œβ”€β”€ components/                    # Reusable Kubernetes manifests
β”‚   β”œβ”€β”€ 00-infrastructure/       # Foundation (Wave 0-5)
β”‚   β”‚   β”œβ”€β”€ cert-manager.yaml
β”‚   β”‚   β”œβ”€β”€ gateway-api-chart/
β”‚   β”‚   β”œβ”€β”€ istio/
β”‚   β”‚   β”œβ”€β”€ keycloak/
β”‚   β”‚   β”œβ”€β”€ oauth2-proxy/
β”‚   β”‚   β”œβ”€β”€ spire/
β”‚   β”‚   └── tekton/
β”‚   β”œβ”€β”€ 01-platform/            # Platform services (Wave 10-15)
β”‚   β”‚   β”œβ”€β”€ gateway/
β”‚   β”‚   β”œβ”€β”€ kagenti-ui/
β”‚   β”‚   β”œβ”€β”€ kagenti-operator/
β”‚   β”‚   └── platform-operator/
β”‚   β”œβ”€β”€ 02-observability/       # Monitoring (Wave 20)
β”‚   β”‚   β”œβ”€β”€ grafana/
β”‚   β”‚   β”œβ”€β”€ tempo/
β”‚   β”‚   β”œβ”€β”€ phoenix/
β”‚   β”‚   β”œβ”€β”€ prometheus/
β”‚   β”‚   β”œβ”€β”€ loki/
β”‚   β”‚   └── kiali/
β”‚   β”œβ”€β”€ 03-applications/        # Applications (Wave 25-30)
β”‚   β”‚   └── agents/
β”‚   └── 08-security/           # Security configs (🚧 PLANNED)
β”‚       β”œβ”€β”€ network-policies/
β”‚       β”œβ”€β”€ pod-security/
β”‚       β”œβ”€β”€ rbac/
β”‚       └── sealed-secrets/
β”‚
β”œβ”€β”€ scripts/                      # Automation scripts
β”‚   β”œβ”€β”€ quick-redeploy.sh        # ⭐ One-command deployment
β”‚   β”œβ”€β”€ platform-status.sh       # Platform health check
β”‚   β”œβ”€β”€ monitor-argocd-apps.sh   # Monitor sync progress
β”‚   β”œβ”€β”€ show-access-info.sh      # Service URLs and credentials
β”‚   β”œβ”€β”€ kind/                    # Kind cluster setup
β”‚   β”‚   β”œβ”€β”€ 01-create-cluster.sh
β”‚   β”‚   β”œβ”€β”€ 02-install-argocd.sh
β”‚   β”‚   β”œβ”€β”€ 03-bootstrap-apps.sh
β”‚   β”‚   └── 04-load-agent-images.sh
β”‚   └── dev/                     # Developer tools
β”‚       β”œβ”€β”€ setup-agent-source-repo.sh
β”‚       └── trigger-agent-builds.sh
β”‚
β”œβ”€β”€ tests/                        # Integration & validation tests
β”‚   β”œβ”€β”€ integration/             # Component integration tests
β”‚   └── validation/              # Platform validation tests
β”‚
β”œβ”€β”€ environments/                 # Environment overlays (🚧 LEGACY)
β”‚   └── openshift-stage/         # OpenShift staging example
β”‚
└── docs/                        # Documentation
    β”œβ”€β”€ 00-getting-started/
    β”œβ”€β”€ 01-infrastructure/
    β”œβ”€β”€ 02-service-mesh/
    β”œβ”€β”€ 03-authentication/
    β”œβ”€β”€ 04-observability/
    β”œβ”€β”€ 05-ci-cd/
    β”œβ”€β”€ 07-platform/
    β”œβ”€β”€ 08-security/
    β”œβ”€β”€ 09-deployment/
    β”œβ”€β”€ 10-operations/
    └── runbooks/

πŸ’» Resource Requirements

Kind (Local Development)

Minimum:

  • CPU: 4 cores
  • Memory: 8 GB RAM
  • Disk: 20 GB

Recommended:

  • CPU: 6 cores
  • Memory: 12 GB RAM
  • Disk: 40 GB

Total pods: ~35-40 (infrastructure + observability + agents)

OpenShift (Production)

Cluster Size (recommended):

  • Master nodes: 3x (4 vCPU, 16 GB RAM)
  • Worker nodes: 5x (8 vCPU, 32 GB RAM)
  • Storage: 500 GB+ (persistent volumes)

See TODO_SECURITY.md for production security requirements.


πŸ”§ Troubleshooting

Common Issues

Issue: Pods stuck in ImagePullBackOff

# Check pod events
kubectl describe pod <pod-name> -n <namespace>

# Verify image in Kind
docker exec kagenti-demo-control-plane crictl images | grep <image>

# Load missing images
./scripts/kind/04-load-agent-images.sh load

Issue: ArgoCD app stuck OutOfSync

# Force sync
argocd app sync <app-name> --force \
  --port-forward --port-forward-namespace argocd --grpc-web

Issue: Services not accessible via Gateway

# Check Gateway status
kubectl get gateway -A
kubectl describe gateway external-gateway -n default

# Check HTTPRoutes
kubectl get httproute -A

Full troubleshooting guide: docs/10-operations/troubleshooting.md

Alert troubleshooting: docs/04-observability/ALERT_FIX_SUMMARY.md


🀝 Contributing

See CLAUDE.md for:

  • Development workflow and GitOps best practices
  • TDD approach with pytest integration
  • How to add new components
  • Branch-based development strategy
  • Testing and validation procedures

Key Principles:

  1. βœ… All changes via Git (no kubectl apply)
  2. βœ… Test before merge (pytest integration tests)
  3. βœ… Sync via ArgoCD (argocd app sync)
  4. βœ… Validate with ./scripts/platform-status.sh

πŸ“– Further Reading

Internal Documentation

External Resources


πŸ“ License

Apache 2.0

🏒 Maintained By

Kagenti Platform Team Repository: https://github.com/Ladas/kagenti-demo-deployment


Status Legend:

  • βœ… Implemented - Ready to use
  • ⚠️ Partial - Working but incomplete
  • 🚧 Planned - Documented in roadmap
  • πŸ”΄ Critical - High priority

About

A gitops repo for a demo stack for playing with agents

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 2

  •  
  •