**Changes** - Refactored the way controllers work to be an interface - Added configurable controllers to include in scans - Added daemonsets, jobs and cronjobs in scans - Added `ReplicationController` type controllers to the supported list - Adjusted logic for failed YAML parsing to bubble up errors - Added better logic for calculating summaries on cluster wide results - Relocated responsibilities for counting types into validators vs spreading it around more packages - Fixed bug where cronjob parsing was using wrong KIND - Added fixtures for mocking new controller types - Added example yamls to test scanning files - Added functions to NamespacedResult(s) to reduce code complexity deep set iterations - Refactored how results get added to namespacedresults so adding more later is easier - Minor signature changes for interface implementing structs for controllers
2.7 KiB
Resources
Polaris supports a number of checks related to CPU and Memory requests and limits.
Presence Checks
To simplify ensure that these values have been set, the following attributes are available:
| key | default | description |
|---|---|---|
resources.cpuRequestsMissing |
error |
Fails when resources.requests.cpu attribute is not configured. |
resources.memoryRequestsMissing |
error |
Fails when resources.requests.memory attribute is not configured. |
resources.cpuLimitsMissing |
error |
Fails when resources.limits.cpu attribute is not configured. |
resources.memoryLimitsMissing |
error |
Fails when resources.limits.memory attribute is not configured. |
Range Checks
Polaris can also verify that those values fall within a certain range. These checks are not enabled by default, and as such do not have default values. The cpuRequestRanges, cpuLimitRanges, memoryRequestRanges, and memoryLimitRanges all support the following attributes:
| key | description |
|---|---|
warning.below |
Warn when resource is below this value (or not defined) |
warning.above |
Warn when resource is above this value |
error.below |
Error when resource is below this value (or not defined) |
error.above |
Error when resource is above this value |
Background
Configuring resource requests and limits for containers running in Kubernetes is an important best practice to follow. Setting appropriate resource requests will ensure that all your applications have sufficient compute resources. Setting appropriate resource limits will ensure that your applications do not consume too many resources.
Having these values appropriately configured ensures that:
-
Cluster autoscaling can function as intended. New nodes are scheduled once pods are unable to be scheduled on an existing node due to insufficient resources. This will not happen if resource requests are not configured.
-
Each container has sufficient access to compute resources. Without resource requests, a pod may be scheduled on a node that is already overutilized. Without resource limits, a single poorly behaving pod could utilize the majority of resources on a node, significantly impacting the performance of other pods on the same node.