Konstruct 0.3.4
Released: February 26, 2026
Highlights
- GitHub App Authentication (Foundation) - Groundwork for GitHub App auth across operators; will be delivered with 0.3.5
- Operator Stability - Rate limiting eliminated, Prometheus metrics added, reconciliation hardened
- Cluster Management - Workload cluster directory cleanup, provisioning scoped to IaC and bootstrap apps
- Platform UX - License key activation, self-hosted mode, app repository view and edit, and UI polish
- Deployment Reliability - ArgoCD sync fixes, RBAC improvements, and production promotion hardening
GitHub App Authentication (Foundation)
This release includes foundation work for GitHub App authentication across Konstruct operators. Full GitHub App support — including the UI onboarding flow and migration tooling — will be delivered with 0.3.5.
What Changed
- GitAccount operator supports storing GitHub App credentials (App ID, installation ID, private key) in Vault
- All operators can read auth credentials from a platform git config instead of per-user PATs
- Konstruct API adds initial GitHub App auth endpoints
Affected Components
- gitaccount-operator
- application-operator
- workloadcluster-operator
- team-management-operator
- konstruct-api
Existing PAT-based configurations continue to work. A guided migration path from PATs to GitHub App auth will be available in 0.3.5.
Operator Stability and Observability
Rate Limiting Eliminated
All operators now use CloneOrOpen helpers and condition guards to avoid redundant GitHub API calls. This eliminates rate limiting issues in environments with many repositories.
Prometheus Metrics
GitHub operations across all operators now expose Prometheus metrics:
github_api_requests_total- Total API calls by operator and methodgithub_api_errors_total- Failed API callsgithub_clone_duration_seconds- Repository clone/open latency
New Observability Additions
Platform observability has been extended with additional metrics and alerting foundations across operators to support production monitoring workflows.
Reconciliation Fixes
- Environment reconciliation uses single-pass, generation-aware logic to prevent duplicate processing
- CatalogDeployment supports public repositories and fixes status race conditions
- CRD field sync ensures
repoClonedPathpropagates correctly across Helm chart values
Cluster Management
Workload Cluster Directory Cleanup
The workloadcluster-operator now cleans up GitOps repository directories when a workload cluster is deleted. Previously, stale cluster directories remained in the GitOps repo after cluster deletion.
Provisioning Detail Scoped to IaC and Bootstrap Apps
Cluster provisioning status now considers only infrastructure-as-code (Terraform) and bootstrap application readiness. Platform apps managed by ArgoCD are excluded from provisioning detail, providing a more accurate view of cluster readiness during creation.
Workload Cluster Infrastructure
- Workloadcluster-operator uses a distroless debug image for secure
kubectl execoperations - Platform GitOps repository references are now used during workload cluster provisioning
Platform UX Improvements
License Key Activation
Konstruct now supports license key activation with:
- Activation flow with error handling
- Support contact information on failure
- License status visible in the UI
Self-Hosted Configuration
A new selfHosted configuration flag controls sidebar and layout behavior for self-hosted deployments.
App Repositories
- View and edit app repository details directly in the UI
- Manage repository configurations without leaving the Konstruct dashboard
Application Management
- Shared
DeleteDialogandBulkDeleteDialogcomponents for consistent delete workflows
UI Polish
- Environment table loading states
- Standardized date formatting across all views
- GitOps catalog icon refresh
- Dependency updates
Deployment Reliability
ArgoCD Sync Fixes
Removed ServerSideApply from ArgoCD configuration to fix PipelineTemplate sync loops that caused continuous reconciliation.
RBAC Improvements
Namespace-scoped ClusterRole and ClusterRoleBinding resources now use consistent naming conventions to prevent conflicts across environments.
Documentation and Brand Alignment
- Domain migrated from
civonetes.comtokonstruct.civo.com - Clean URL serving with Nginx and trailing slash redirects
- SEO hardening with canonical tags and version indexing
- Typesense search integration
- Civo brand alignment (colors, typography, logos)
Upgrading from 0.3.x
Update the Konstruct chart version in your GitOps desired state:
- Open your Konstruct ArgoCD Application manifest (typically in
registry/<cluster>/konstruct-components/konstruct.yamlor similar) - Update the
targetRevisionto0.3.4:
spec:
source:
chart: konstruct
repoURL: oci://europe-west2-docker.pkg.dev/civo-com/charts
targetRevision: 0.3.4
- Commit and push — ArgoCD syncs the new version automatically
Existing PAT-based git configurations continue to work without changes.