[go: up one dir, main page]

Admission Webhooks Latest

Automatically validate resource changes to prevent misconfiguration and enforce best practices

There are some several misconfiguration scenarios that can produce scaling problems in productive workloads, for example: in Kubernetes a single workload should never be scaled by 2 or more HPA because that will produce conflicts and unintended behaviors.

Some errors with data format can be detected during the model validation, but these misconfigurations can’t be detected in that step because the model is correct indeed. For trying to avoid those misconfigurations at data plane detecting them early, admission webhooks validate all the incoming (KEDA) resources (new or updated) and reject any resource that doesn’t match the rules below.

Prevention Rules

KEDA will block all incoming changes to ScaledObject that don’t match these rules:

  • The scaled workload (scaledobject.spec.scaleTargetRef) is already autoscaled by another other sources (other ScaledObject or HPA).
  • CPU and/or Memory trigger are used and the scaled workload doesn’t have the requests defined. This rule doesn’t apply to all the workload types, only to Deployment and StatefulSet.
  • CPU and/or Memory trigger are the only used triggers and the ScaledObject defines minReplicaCount:0. This rule doesn’t apply to all the workload types, only to Deployment and StatefulSet.
  • In the case of multiple triggers where a name is specified, the name must be unique (it is not allowed to have multiple triggers with the same name)
  • The fallback feature is configured with a metrics type other than AverageValue. Fallback feature only supports AverageValue metrics type and doesn’t support CPU and Memory metrics.

KEDA will block all incoming changes to TriggerAuthentication/ClusterTriggerAuthentication that don’t match these rules:

  • The specified identity ID for Azure AD Workload Identity and/or Pod Identity is empty. (Default/unset identity ID will be passed through.)

    NOTE: This only applies if the TriggerAuthentication/ClusterTriggerAuthentication is overriding the default identityId provided to KEDA during the installation