[10:15:33] 10GitLab (Account Approval), 06Release-Engineering-Team: Requesting GitLab account activation for [gkyziridis] - https://phabricator.wikimedia.org/T383311 (10gkyziridis) 03NEW [12:22:29] 10GitLab (Account Approval), 06Release-Engineering-Team: Requesting GitLab account activation for [gkyziridis] - https://phabricator.wikimedia.org/T383311#10444125 (10Aklapper) 05Open→03Resolved a:03Aklapper @gkyziridis Hi, please link your LDAP account to your Phabricator account in your settings at... [15:44:11] 10GitLab (Account Approval), 06Release-Engineering-Team: Requesting GitLab account activation for [gkyziridis] - https://phabricator.wikimedia.org/T383311#10444995 (10gkyziridis) >>! In T383311#10444125, @Aklapper wrote: > @gkyziridis Hi, please also link your LDAP account to your Phabricator account in yo... [19:44:09] 10GitLab (Pipeline Services Migration🐤), 06collaboration-services, 10Wikidata, 10Wikidata Query UI, and 3 others: move commons-query.wikimedia.org and query.wikidata.org to kubernetes - https://phabricator.wikimedia.org/T350793#10445803 (10Tarrow) > When everything is ready I'll cherry pick all missing cha... [22:16:44] i'm enabling https://docs.gitlab.com/ee/user/clusters/agent/ci_cd_workflow.html#restrict-access-to-the-agent-to-protected-branches [22:17:08] it seems pretty low-risk, logging in #wikimedia-releng [22:24:30] 10GitLab, 06Release-Engineering-Team: Enable kubernetes_agent_protected_branches on GitLab - https://phabricator.wikimedia.org/T383375 (10brennen) 03NEW [22:25:33] 10GitLab, 06Release-Engineering-Team: Enable kubernetes_agent_protected_branches on GitLab - https://phabricator.wikimedia.org/T383375#10446321 (10brennen) 05Open→03In progress [22:26:51] 10GitLab, 06Release-Engineering-Team: Enable kubernetes_agent_protected_branches on GitLab - https://phabricator.wikimedia.org/T383375#10446330 (10brennen) [22:57:03] 10GitLab, 06Release-Engineering-Team: Enable kubernetes_agent_protected_branches on GitLab - https://phabricator.wikimedia.org/T383375#10446400 (10brennen) Jeena couldn't get this to work, tried switching to per-project enablement in case that's relevant: ` irb(main):002:0> Feature.disable(:kubernetes_agent_p...