Network requirements
Outbound connectivity required:artifacts-self-hosted.qodo.ai- Helm chart and image registryartif-reg-self-hosted.codium.ai- Container images- AI model provider endpoints (api.openai.com, api.anthropic.com, etc.)
- Git provider APIs (github.com, gitlab.com, or your self-hosted instances)
- Git provider webhooks must reach your ingress endpoints
- Developer IDEs must reach Qodo API endpoints
- (For Context Engine) Context retriever MCP endpoint
- Allow outbound HTTPS (443) to all external dependencies
- Allow inbound HTTPS (443) for webhooks and API access
- Ensure K8s cluster can reach external PostgreSQL if not in-cluster
Security best practices
Secrets management:- Use Kubernetes secrets for all sensitive data
- Never commit
.secrets.tomlfiles to version control - Consider External Secrets Operator for centralized secret management
- Rotate API keys and credentials regularly
- Restrict pod-to-pod communication
- Limit egress to only required endpoints
- Implement namespace isolation
- Use RBAC for Kubernetes access
- Implement principle of least privilege
- Use service accounts with minimal permissions
- Always use TLS for external endpoints
- Use cert-manager for certificate management
- Configure proper certificate validation
- Images come from trusted Replicated registry
- Regular updates through Helm for security patches
- Scan images for vulnerabilities if required by policy