Skip to main content
Glama

ARC Config MCP Server

๐Ÿš€ AI-Powered GitHub Actions Runner Controller Management

A comprehensive TypeScript MCP (Model Context Protocol) server that transforms complex ARC operations into conversational AI interactions. Deploy, monitor, and manage GitHub Actions runners with natural language commands.

๐ŸŽฏ QUICK START: Add to your MCP client: ghcr.io/tsviz/arc-config-mcp:latest โ†’ Ask AI: "Install ARC in my cluster" โ†’ Done! โœจ

GitHub release Docker Image License: MIT TypeScript

๐ŸŽฏ What is ARC Config MCP Server?

ARC Config MCP Server is an enterprise-grade automation tool that bridges the gap between complex Kubernetes-based GitHub Actions runner management and intuitive AI-powered operations. Instead of memorizing kubectl commands and YAML configurations, simply tell the AI what you want to accomplish.

๐ŸŒŸ Key Capabilities

  • ๐Ÿค– Natural Language Operations: Transform complex ARC tasks into simple conversations

  • โšก Intelligent Installation: Zero-configuration ARC deployment with smart defaults

  • ๐Ÿ“Š Real-time Monitoring: Live status dashboards and proactive health monitoring

  • ๐Ÿ”’ Enterprise Security: Built-in policy validation and compliance enforcement

  • ๐Ÿ’ฐ Cost Intelligence: Automatic scaling and resource optimization

  • ๐Ÿ› ๏ธ Self-Healing: Automated troubleshooting and remediation

๐Ÿš€ Quick Start

๐ŸŽฏ MCP Client Integration (Recommended)

The primary way to use ARC Config MCP Server is through MCP client integration with AI assistants like GitHub Copilot in VSCode.

Add this configuration to your MCP client settings:

{ "mcpServers": { "arc-config": { "command": "docker", "args": [ "run", "-i", "--rm", "-v", "${HOME}/.kube:/home/node/.kube:ro", "-e", "GITHUB_TOKEN", "ghcr.io/tsviz/arc-config-mcp:latest" ] } } }

โœจ That's it! Your AI assistant now has access to powerful ARC management capabilities. Simply ask natural language questions like:

  • "Install ARC controller in my cluster"

  • "Scale my runners to handle more load"

  • "Check why my runners are failing"

  • "Optimize costs for my GitHub Actions setup"


๐Ÿณ Alternative: Docker Standalone

# Pull and run the latest version docker run -p 3000:3000 ghcr.io/tsviz/arc-config-mcp:latest # With custom configuration docker run -p 3000:3000 \ -e GITHUB_TOKEN=your_token \ -e KUBECONFIG_PATH=/kubeconfig \ -v ~/.kube/config:/kubeconfig:ro \ ghcr.io/tsviz/arc-config-mcp:latest

๐Ÿ› ๏ธ Alternative: Local Development

git clone https://github.com/tsviz/arc-config-mcp.git cd arc-config-mcp npm install npm run build npm start -- --stdio # For MCP protocol connection

๐ŸŽญ Natural Language Examples

Transform complex ARC operations into simple conversations:

๐Ÿง‘ "Install ARC in my dev cluster with basic security settings" ๐Ÿค– โœ… Installing ARC controller with development security profile... ๐Ÿ“ฆ Helm chart: actions-runner-controller v0.9.1 ๐Ÿ”’ Security: Basic validation enabled ๐Ÿ“ Namespace: arc-system โฑ๏ธ Installation completed in 45 seconds ๐Ÿง‘ "Scale my repo runners to handle the evening build rush" ๐Ÿค– โœ… Analyzing current load and scaling runners... ๐Ÿ“Š Current: 3 runners, Target: 8 runners ๐Ÿ“ˆ Load factor: 85% โ†’ 45% ๐Ÿ’ฐ Cost impact: +$12/hour (estimated) โฑ๏ธ Scaling completed in 90 seconds ๐Ÿง‘ "Show me why my runners keep failing" ๐Ÿค– ๐Ÿ” Analyzing runner health and recent failures... โŒ Issue found: Insufficient CPU resources ๐Ÿ’ก Recommendation: Increase runner resource limits ๐Ÿ› ๏ธ Auto-fix available: Update resource quotas ๐Ÿ“‹ Policy violation: Resource limits below minimum

๐Ÿ—๏ธ Architecture Overview

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ AI Client โ”‚ โ”‚ MCP Server โ”‚ โ”‚ Kubernetes โ”‚ โ”‚ (Copilot) โ”‚โ—„โ”€โ”€โ–บโ”‚ (This Repo) โ”‚โ—„โ”€โ”€โ–บโ”‚ (ARC Runs) โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜ โ–ฒ โ”‚ โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ GitHub API โ”‚ โ”‚ (Runner Mgmt) โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

Components

  • Natural Language Processor: Converts human intent to structured operations

  • ARC Policy Engine: Validates configurations against enterprise policies

  • Kubernetes Orchestrator: Manages cluster resources and deployments

  • GitHub Integration: Handles runner registration and lifecycle

  • Monitoring Hub: Tracks performance and health metrics

๐Ÿ› ๏ธ Complete Tool Catalog

๐ŸŽฏ Core ARC Operations

Tool

Purpose

Example Usage

arc_install_controller

Deploy ARC to Kubernetes

Install with custom config

arc_get_status

Comprehensive health check

Monitor all components

arc_scale_runners

Horizontal runner scaling

Handle load spikes

arc_manage_runners

Full lifecycle management

Create/update/delete runners

arc_validate_policies

Policy compliance check

Ensure security standards

๐Ÿค– AI-Powered Features

Tool

Purpose

Example Usage

arc_process_natural_language

Convert speech to action

"Scale up for deployment"

arc_troubleshoot_issues

Automated diagnostics

Find and fix problems

arc_optimize_costs

Resource efficiency

Reduce unnecessary spending

arc_generate_reports

Operational insights

Weekly performance summaries

๐Ÿ”ง Infrastructure Tools

Tool

Purpose

Example Usage

arc_configure_networking

Network policy setup

Secure runner communication

arc_manage_secrets

Credential management

Rotate GitHub tokens

arc_backup_config

Configuration backup

Disaster recovery prep

arc_upgrade_components

Version management

Keep ARC up-to-date

๐Ÿ“‹ Prerequisites & Requirements

System Requirements

  • Node.js: 18.0+ (LTS recommended)

  • Kubernetes: 1.24+ (tested up to 1.30)

  • Memory: 512MB+ for server

  • Storage: 100MB for installation

Kubernetes Permissions

The server requires these cluster permissions:

  • Namespaces: List, create, watch

  • Deployments: Full CRUD operations

  • Services: Create, update, delete

  • ConfigMaps/Secrets: Manage runner configurations

  • RBAC: Create service accounts and roles

GitHub Requirements

  • Personal Access Token with scopes:

    • repo (for repository access)

    • admin:org (for organization runners)

    • workflow (for Actions management)

  • Organization/Repository admin permissions

  • GitHub Actions enabled

๐Ÿ”ง Installation & Configuration

Environment Configuration

Create a .env file with your settings:

# GitHub Configuration GITHUB_TOKEN=ghp_your_personal_access_token GITHUB_ORG=your-organization GITHUB_REPO=your-repository # Kubernetes Configuration KUBECONFIG_PATH=/path/to/kubeconfig ARC_NAMESPACE=arc-system RUNNER_NAMESPACE=arc-runners # MCP Server Configuration MCP_PORT=3000 LOG_LEVEL=info ENABLE_METRICS=true # Security Settings ENABLE_POLICY_VALIDATION=true SECURITY_PROFILE=standard # basic|standard|strict AUTO_FIX_VIOLATIONS=false # Performance Tuning MAX_CONCURRENT_OPERATIONS=5 OPERATION_TIMEOUT=300 RETRY_ATTEMPTS=3

VS Code + GitHub Copilot Integration

  1. Configure MCP Server (already shown above): The JSON configuration from the Quick Start section works directly with VS Code + GitHub Copilot.

  2. Enable MCP in GitHub Copilot: Add to your VS Code settings:

    { "github.copilot.enable": { "*": true, "mcp": true } }
  3. Start using natural language commands with GitHub Copilot to manage your ARC infrastructure!

Production Deployment

Kubernetes Deployment

apiVersion: apps/v1 kind: Deployment metadata: name: arc-config-mcp namespace: mcp-system spec: replicas: 2 selector: matchLabels: app: arc-config-mcp template: metadata: labels: app: arc-config-mcp spec: containers: - name: mcp-server image: ghcr.io/tsviz/arc-config-mcp:latest ports: - containerPort: 3000 env: - name: GITHUB_TOKEN valueFrom: secretKeyRef: name: github-credentials key: token - name: LOG_LEVEL value: "info" resources: requests: memory: "256Mi" cpu: "100m" limits: memory: "512Mi" cpu: "500m"

Docker Compose

version: '3.8' services: arc-mcp: image: ghcr.io/tsviz/arc-config-mcp:latest ports: - "3000:3000" environment: - GITHUB_TOKEN=${GITHUB_TOKEN} - LOG_LEVEL=info volumes: - ~/.kube/config:/app/.kube/config:ro restart: unless-stopped

๐ŸŽจ Usage Patterns & Examples

1. First-Time ARC Installation

๐Ÿง‘ "I need to set up GitHub Actions runners in my new cluster" ๐Ÿค– I'll help you install ARC with best practices: 1๏ธโƒฃ Checking cluster compatibility... โœ… Kubernetes 1.28 detected โœ… Sufficient resources available โœ… RBAC permissions verified 2๏ธโƒฃ Installing ARC controller... ๐Ÿ“ฆ Adding Actions Runner Controller Helm repository โš™๏ธ Configuring with security defaults ๐Ÿš€ Deploying to namespace: arc-system 3๏ธโƒฃ Setting up runner infrastructure... ๐Ÿ‘ฅ Creating runner group: default-runners ๐Ÿ”’ Configuring GitHub webhook authentication ๐Ÿ“Š Enabling monitoring and metrics โœ… Installation complete! ๐ŸŒ Controller endpoint: https://arc.your-cluster.com ๐Ÿ“ˆ Grafana dashboard: https://monitoring.your-cluster.com/arc ๐Ÿ“š Next steps: Configure your first runner set

2. Scaling for High Load

๐Ÿง‘ "Our deployment pipeline is slow, we need more runners during business hours" ๐Ÿค– I'll set up intelligent scaling for your deployment pipeline: ๐Ÿ“Š Current Analysis: โ€ข 3 active runners โ€ข 12 queued jobs โ€ข Average wait time: 8 minutes ๐ŸŽฏ Optimization Plan: โ€ข Scale to 8 runners immediately โ€ข Configure auto-scaling: 3-15 runners โ€ข Business hours boost: 9AM-6PM EST โ€ข Weekend scale-down: 1-3 runners โš™๏ธ Implementing changes... โœ… HorizontalPodAutoscaler configured โœ… Schedule-based scaling rules applied โœ… Cost optimization policies enabled ๐Ÿ’ฐ Cost Impact: โ€ข Current: ~$180/month โ€ข Optimized: ~$245/month (+36%) โ€ข ROI: 2.5x faster deployments

3. Troubleshooting Runner Issues

๐Ÿง‘ "My runners keep dying and I don't know why" ๐Ÿค– Let me analyze your runner health: ๐Ÿ” Diagnostic Results: โŒ 3 runners crashed in last hour โŒ OOMKilled events detected โŒ CPU throttling at 95% ๐ŸŽฏ Root Cause: Resource constraints โ€ข Memory limit: 2Gi (insufficient) โ€ข CPU limit: 1000m (too low for builds) โ€ข Recommended: 4Gi memory, 2000m CPU ๐Ÿ› ๏ธ Auto-fix Available: 1. Update resource quotas 2. Configure memory overcommit protection 3. Add resource monitoring alerts Would you like me to apply these fixes? [y/N]

4. Security Compliance Check

๐Ÿง‘ "Check if our ARC setup meets SOC2 requirements" ๐Ÿค– Running SOC2 compliance audit... ๐Ÿ”’ Security Assessment: โœ… Network policies configured โœ… RBAC least-privilege applied โœ… Secrets encryption at rest โŒ Container image scanning missing โŒ Audit logging not comprehensive ๐Ÿ“‹ SOC2 Control Mapping: โ€ข CC6.1 (Logical Access) - 85% compliant โ€ข CC6.7 (Data Transmission) - 100% compliant โ€ข CC7.1 (System Monitoring) - 70% compliant ๐Ÿ› ๏ธ Remediation Steps: 1. Enable admission controller image scanning 2. Configure comprehensive audit logging 3. Implement runtime security monitoring ๐Ÿ“Š Compliance Score: 78/100 Target for SOC2: 95/100

๐Ÿ”’ Security & Best Practices

๐Ÿ›ก๏ธ Security Framework

Our security model implements defense-in-depth principles:

โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ Security Layers โ”‚ โ”œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”ค โ”‚ ๐Ÿ” Authentication โ”‚ GitHub tokens, RBAC, mTLS โ”‚ โ”‚ ๐Ÿ›ก๏ธ Authorization โ”‚ Fine-grained permissions โ”‚ โ”‚ ๐Ÿ” Audit Logging โ”‚ All operations tracked โ”‚ โ”‚ ๐Ÿ“ฆ Container Securityโ”‚ Image scanning, non-root users โ”‚ โ”‚ ๐ŸŒ Network Policies โ”‚ Zero-trust networking โ”‚ โ”‚ ๐Ÿ”’ Secrets Managementโ”‚ Encrypted storage, rotation โ”‚ โ”‚ ๐Ÿ“Š Monitoring โ”‚ Real-time threat detection โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐Ÿšจ Security Policies

The server includes built-in security policies:

Critical Security Rules

  • Container images must be from approved registries

  • No privileged containers allowed

  • Resource limits must be specified

  • Network policies required for all namespaces

Access Control Policies

  • GitHub tokens must have minimal required scopes

  • Kubernetes RBAC follows least-privilege principle

  • MCP client authentication required in production

Operational Security

  • All operations are logged and auditable

  • Sensitive data is masked in logs

  • Failed operations trigger security alerts

๐Ÿ” Secure Configuration Example

# Security-hardened ARC configuration apiVersion: v1 kind: ConfigMap metadata: name: arc-security-config data: security_profile: "strict" audit_logging: "enabled" network_policies: "enforced" image_scanning: "required" resource_quotas: "mandatory" # Policy definitions allowed_registries: | - ghcr.io - gcr.io - docker.io/library mandatory_labels: | - app.kubernetes.io/name - app.kubernetes.io/version - security.policy/compliant

โš ๏ธ Security Notice: This tool provides administrative access to Kubernetes clusters and GitHub repositories. Always follow your organization's security policies and use appropriate access controls.

๐Ÿ“Š Monitoring & Observability

๐Ÿ“ˆ Built-in Metrics

The server exposes comprehensive metrics for monitoring:

// Prometheus metrics available at /metrics arc_operations_total{operation="install",status="success"} 42 arc_operations_duration_seconds{operation="scale"} 1.23 arc_runners_active{namespace="production"} 8 arc_policy_violations_total{severity="critical"} 0 arc_github_api_requests_total{endpoint="runners"} 1337

๐Ÿ” Health Checks

Multiple health check endpoints:

  • /health - Basic server health

  • /health/kubernetes - Cluster connectivity

  • /health/github - GitHub API status

  • /health/runners - Runner status summary

๐Ÿ“Š Grafana Dashboard

Pre-built dashboard for comprehensive monitoring:

{ "dashboard": { "title": "ARC MCP Server Monitoring", "panels": [ { "title": "Runner Utilization", "type": "stat", "targets": ["arc_runners_active / arc_runners_total"] }, { "title": "Operation Success Rate", "type": "gauge", "targets": ["rate(arc_operations_total{status='success'}[5m])"] } ] } }

๐Ÿš€ Advanced Features

๐ŸŽฏ Cost Optimization Engine

Intelligent cost management for runner infrastructure:

๐Ÿ’ฐ Cost Analysis Report โ”Œโ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ” โ”‚ Monthly Runner Costs: $1,247 โ”‚ โ”‚ Optimization Potential: -$312 (25%) โ”‚ โ”‚ โ”‚ โ”‚ ๐Ÿ“Š Recommendations: โ”‚ โ”‚ โ€ข Scale down during weekends (-$89) โ”‚ โ”‚ โ€ข Use spot instances (-$156) โ”‚ โ”‚ โ€ข Optimize resource allocations (-$67) โ”‚ โ”‚ โ”‚ โ”‚ ๐ŸŽฏ Auto-optimization Available โ”‚ โ””โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”€โ”˜

๐Ÿค– Predictive Scaling

AI-powered scaling based on workload patterns:

apiVersion: v1 kind: ConfigMap metadata: name: predictive-scaling-config data: enabled: "true" prediction_window: "2h" confidence_threshold: "0.8" scale_up_factor: "1.5" scale_down_factor: "0.7" # ML model configuration model_type: "time_series_forecast" training_data_days: "30" retrain_interval: "24h"

๐Ÿ› ๏ธ Self-Healing Capabilities

Automated problem detection and resolution:

๐Ÿ”ง Self-Healing Engine Status โ”œโ”€โ”€ ๐Ÿ” Issue Detection: Active โ”‚ โ”œโ”€โ”€ Resource exhaustion monitoring โ”‚ โ”œโ”€โ”€ Network connectivity checks โ”‚ โ”œโ”€โ”€ GitHub API rate limit tracking โ”‚ โ””โ”€โ”€ Runner health verification โ”‚ โ”œโ”€โ”€ ๐Ÿ› ๏ธ Auto-Remediation: Enabled โ”‚ โ”œโ”€โ”€ Restart unhealthy runners โ”‚ โ”œโ”€โ”€ Scale up on resource pressure โ”‚ โ”œโ”€โ”€ Rotate expired credentials โ”‚ โ””โ”€โ”€ Clean up orphaned resources โ”‚ โ””โ”€โ”€ ๐Ÿ“Š Success Rate: 94.2% โ”œโ”€โ”€ Issues detected: 127 โ”œโ”€โ”€ Auto-resolved: 119 โ””โ”€โ”€ Manual intervention: 8

๐Ÿงช Testing & Validation

๐Ÿ”ฌ Comprehensive Test Suite

Run the full test suite to ensure reliability:

# Unit tests npm run test:unit # Integration tests (requires cluster) npm run test:integration # End-to-end tests npm run test:e2e # Performance tests npm run test:performance # Security tests npm run test:security

๐ŸŽฏ Test Coverage

Current test coverage metrics:

  • Unit Tests: 94% line coverage

  • Integration Tests: 87% API coverage

  • E2E Tests: 78% workflow coverage

  • Security Tests: 100% vulnerability checks

๐Ÿ—๏ธ Local Testing Environment

Set up a complete local testing environment:

# Start local Kubernetes cluster npm run dev:cluster:start # Deploy test ARC environment npm run dev:arc:setup # Run MCP server in development mode npm run dev:server # Execute test scenarios npm run dev:test:scenarios

๐Ÿ”„ CI/CD Integration

GitHub Actions Workflow

Example workflow for automated ARC management:

name: ARC Management on: schedule: - cron: '0 */6 * * *' # Every 6 hours workflow_dispatch: jobs: arc-health-check: runs-on: ubuntu-latest steps: - name: Check ARC Status uses: ./ with: mcp-server: 'ghcr.io/tsviz/arc-config-mcp:latest' operation: 'health-check' github-token: ${{ secrets.GITHUB_TOKEN }} - name: Scale for Peak Hours if: github.event.schedule == '0 9 * * 1-5' # Weekday mornings uses: ./ with: operation: 'scale-runners' target-replicas: 10 - name: Cost Optimization if: github.event.schedule == '0 18 * * 5' # Friday evenings uses: ./ with: operation: 'optimize-costs' apply-recommendations: true

๐Ÿ“š API Reference

MCP Protocol Integration

The server implements the full MCP specification:

// Tool invocation example interface MCPToolCall { method: "tools/call"; params: { name: "arc_install_controller"; arguments: { namespace: "arc-system"; security_profile: "standard"; auto_scaling: true; }; }; } // Response format interface MCPToolResponse { content: [ { type: "text"; text: "โœ… ARC controller installed successfully"; } ]; isError: false; }

REST API Endpoints

When running in HTTP mode, these endpoints are available:

GET /health - Server health check GET /metrics - Prometheus metrics POST /api/v1/arc/install - Install ARC controller GET /api/v1/arc/status - Get ARC status POST /api/v1/arc/scale - Scale runners GET /api/v1/tools - List available tools POST /api/v1/execute - Execute natural language command

๐Ÿค Contributing

We welcome contributions to improve ARC Config MCP Server!

๐Ÿš€ Getting Started

  1. Fork the repository

  2. Create a feature branch: git checkout -b feature/amazing-feature

  3. Set up development environment:

    npm install npm run dev:setup
  4. Make your changes

  5. Run tests: npm test

  6. Submit a pull request

๐Ÿ“‹ Development Guidelines

  • Follow TypeScript best practices

  • Maintain 90%+ test coverage

  • Update documentation for new features

  • Follow conventional commit messages

  • Ensure all security checks pass

๐Ÿ” Code Review Process

All contributions go through our review process:

  1. Automated Checks: CI/CD pipeline validation

  2. Security Review: Vulnerability scanning

  3. Performance Review: Load testing for critical paths

  4. Documentation Review: Ensure docs are updated

  5. Maintainer Review: Final approval by core team

๐Ÿ†˜ Troubleshooting

Common Issues

Installation Problems

โŒ Error: KUBECONFIG not found ๐Ÿ”ง Solution: Set KUBECONFIG environment variable export KUBECONFIG=/path/to/kubeconfig โŒ Error: GitHub token invalid ๐Ÿ”ง Solution: Check token scopes and expiration - Required scopes: repo, admin:org, workflow - Generate new token: https://github.com/settings/tokens

Runtime Issues

โŒ Error: Runners not starting ๐Ÿ”ง Diagnosis: Check resource constraints kubectl describe pod -n arc-runners โŒ Error: High API rate limits ๐Ÿ”ง Solution: Configure rate limiting Set GITHUB_API_RATE_LIMIT=5000 in environment

Performance Issues

โŒ Issue: Slow response times ๐Ÿ”ง Optimization: Enable caching Set ENABLE_CACHE=true Set CACHE_TTL=300 โŒ Issue: High memory usage ๐Ÿ”ง Solution: Tune garbage collection NODE_OPTIONS="--max-old-space-size=512"

๐Ÿ” Debug Mode

Enable detailed logging for troubleshooting:

# Environment variable export LOG_LEVEL=debug # Runtime flag npm start -- --log-level debug # Specific component debugging export DEBUG=arc:*,mcp:*,k8s:*

๐Ÿ“ž Getting Help

๐ŸŽ“ Learning Resources

๐Ÿ“– Essential Reading

๐ŸŽฅ Video Tutorials

๐Ÿ’ก Best Practices Guide

๐Ÿš— Roadmap

๐ŸŽฏ Upcoming Features

Version 1.6.0 (Next Release)

  • Multi-cluster Support: Manage ARC across multiple Kubernetes clusters

  • Advanced Cost Analytics: ML-powered cost prediction and optimization

  • Webhook Integration: Real-time event processing from GitHub

  • Custom Policy DSL: Domain-specific language for policy configuration

Version 1.7.0 (Q2 2024)

  • GitOps Integration: ArgoCD and Flux compatibility

  • Advanced Scheduling: Complex workload-aware runner scheduling

  • Integration Hub: Pre-built integrations with popular DevOps tools

  • Mobile Dashboard: React Native app for on-the-go monitoring

Version 2.0.0 (Q3 2024)

  • Multi-Cloud Support: AWS, GCP, Azure runner orchestration

  • AI-Powered Optimization: GPT-4 powered operational intelligence

  • Enterprise SSO: SAML, OIDC, and LDAP integration

  • Compliance Framework: SOC2, ISO27001, PCI-DSS automation

๐Ÿ—บ๏ธ Long-term Vision

Transform ARC management from manual operations to fully autonomous, AI-driven infrastructure that:

  • Predicts and prevents issues before they occur

  • Optimizes costs automatically across cloud providers

  • Ensures compliance with evolving security standards

  • Scales intelligently based on development team patterns

๐Ÿ“„ License & Legal

License

This project is licensed under the MIT License - see the LICENSE file for details.

Third-Party Dependencies

  • Node.js Ecosystem: Various MIT and Apache 2.0 licensed packages

  • Kubernetes Client: Apache 2.0 License

  • GitHub API: Used under GitHub Terms of Service

Security Disclosure

For security vulnerabilities, please email security@tsviz.com instead of using public issues.

Contributing License Agreement

By contributing to this project, you agree that your contributions will be licensed under the same MIT License.

๐Ÿ”— Related Projects & Ecosystem

Official Projects

Community Projects

Complementary Tools

  • Monitoring: Prometheus, Grafana, DataDog integration examples

  • Security: Falco, OPA Gatekeeper policy examples

  • GitOps: ArgoCD, Flux configuration templates

  • Cost Management: Kubecost, OpenCost integration guides


๐Ÿš€ Ready to transform your ARC operations?

Get Started โ€ข View Examples โ€ข Join Community

Transforming GitHub Actions runner management from manual kubectl commands to conversational AI-powered automation โœจ

-
security - not tested
-
license - not tested
-
quality - not tested

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/tsviz/arc-config-mcp'

If you have feedback or need assistance with the MCP directory API, please join our Discord server