You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 30, 2024. It is now read-only.
Limits restrict resource usage for namespaces, nodes, or Pods. These policies are important to reserve compute and storage space for a resource and avoid resource exhaustion.
It'd be nice to have the limits auditor also flag when those policies are not set. Alternatively, we can create a new resources policies auditor?
ISSUE TYPE
Bug Report
Feature Idea
FEATURE IDEA
If the maintainers agree with the feature as described here, I intend to submit a Pull Request myself.1
Proposal:
1This is the quickest way to get a new feature! We reserve the right to close feature requests, even ones we like, if the proposer does not intend to contribute to the feature and it doesn't fit in our current roadmap.
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
NSA's K8s hardening guidelines mention
LimitRanges
,ResourceQuotas
, andProcess ID
on page 24 as something that can be set to harden k8s clustersIt'd be nice to have the limits auditor also flag when those policies are not set. Alternatively, we can create a new resources policies auditor?
ISSUE TYPE
FEATURE IDEA
Proposal:
1 This is the quickest way to get a new feature! We reserve the right to close feature requests, even ones we like, if the proposer does not intend to contribute to the feature and it doesn't fit in our current roadmap.
The text was updated successfully, but these errors were encountered: