charts/goldilocks-4.9/charts/vpa
2023-10-18 21:21:40 +08:00
..
charts/metrics-server Add new goldilocks 2023-10-18 21:21:40 +08:00
ci Add new goldilocks 2023-10-18 21:21:40 +08:00
crds Add new goldilocks 2023-10-18 21:21:40 +08:00
templates Add new goldilocks 2023-10-18 21:21:40 +08:00
.helmignore Add new goldilocks 2023-10-18 21:21:40 +08:00
Chart.lock Add new goldilocks 2023-10-18 21:21:40 +08:00
Chart.yaml Add new goldilocks 2023-10-18 21:21:40 +08:00
README.md Add new goldilocks 2023-10-18 21:21:40 +08:00
README.md.gotmpl Add new goldilocks 2023-10-18 21:21:40 +08:00
values.yaml Add new goldilocks 2023-10-18 21:21:40 +08:00

VPA

A chart to install the Kubernetes Vertical Pod Autoscaler

This chart is mostly based on the manifests and various scripts in the deploy and hack directories of the VPA repository.

Tests and Debugging

There are a few tests included with this chart that can help debug why your installation of VPA isn't working as expected. You can run helm test -n <Release Namespace> <Release Name> to run them.

  • crds-available - Checks for both the verticalpodautoscalers and verticalpodautoscalercheckpoints CRDs
  • metrics-api-available - Checks to make sure that the metrics API endpoint is available. If it's not, install metrics-server in your cluster.
  • create-vpa - A simple check to make sure that VPA objects can be created in your cluster. Does not check for functionality of that VPA.
  • webhook-configuration - Checks that both the service and the CA bundle in the MutatingWebhookconfiguration are configured correctly.

Components

There are three primary components to the Vertical Pod Autoscaler that can be enabled individually here.

  • recommender
  • updater
  • admissionController

The admissionController is the only one that poses a stability consideration because it will create a MutatingWebhookconfiguration in your cluster. This could cause the cluster to stop accepting pod creation requests, if it is not configured correctly. Because of this, the MutatingWebhookconfiguration has its failurePolicy set to Ignore by default.

For more details, please see the values below, and the vertical pod autosclaer documentation.

BREAKING Upgrading from <= v1.7.x to 2.0.0

Certificate generation

The certificate creation process was changed from using OpenSSL to kube-webhook-certgen to simplify the process. It still uses the same configuration keys (.Values.admissionController.certGen), which makes it impossible to reuse the values from a previous install.

You can mitigate this change by setting the correct image for the upgrade:

helm upgrade <release name> fairwinds-stable/vpa --version 2.0.0 --reuse-values \
  --set "admissionController.certGen.image.repository=registry.k8s.io/ingress-nginx/kube-webhook-certgen" \
  --set "admissionController.certGen.image.tag=v20230312-helm-chart-4.5.2-28-g66a760794"

The new process is incompatible with the old secrets layout. To mitigate this, the secret was renamed to (by default) <release name>-tls-certs and can now also be customized.

All other changes are implemented in a non breaking fashion.

MutatingWebhookconfiguration

Previously, the webhook creation was handled by the admission controller itself. This had the downside that Helm is not in control of the resource and therefore required the cleanupOnDelete job.

This version disables the selfRegistration by the admission controller and creates the MutatingWebhookconfiguration using Helm.

You can either:

  • Migrate the MutatingWebhookconfiguration by:

    • adding the label app.kubernetes.io/managed-by: Helm
    • adding the annotation meta.helm.sh/release-name: <release name>
    • adding the annotation meta.helm.sh/release-namespace: <release namespace>
  • delete the configuration and it will be recreated by Helm

  • or keep the configuration as it is and Helm will ignore it. Execute the tests, to make sure everything works.

Also, the cleanupOnDelete configuration is obsolete.

Admission controller

The admission controller is enabled by default.

BREAKING Upgrading from v0.x.x to v1.x.x

In the previous version, when the admissionController.cleanupOnDelete flag was set to true, MutatingWebhookconfiguration and the tls secret for the admission controller were removed. There was no chance to pass any image information to start remove process. Now, it could be passed custom image by version 1.0.0.

cleanupOnDelete:
    enabled: true
    image:
      repository: quay.io/reactiveops/ci-images
      tag: v11-alpine

Installation

helm repo add fairwinds-stable https://charts.fairwinds.com/stable
helm install vpa fairwinds-stable/vpa --namespace vpa --create-namespace

Utilize Prometheus for History

In order to utilize prometheus for recommender history, you will need to pass some extra flags to the recommender. If you use prometheus operator installed in the prometheus-operator namespace, these values will do the trick.

recommender:
  extraArgs:
    prometheus-address: |
      http://prometheus-operator-prometheus.prometheus-operator.svc.cluster.local:9090      
    storage: prometheus

Values

Key Type Default Description
imagePullSecrets list [] A list of image pull secrets to be used for all pods
priorityClassName string "" To set the priorityclass for all pods
nameOverride string "" A template override for the name
fullnameOverride string "" A template override for the fullname
podLabels object {} Labels to add to all pods
rbac.create bool true If true, then rbac resources (clusterroles and clusterrolebindings) will be created for the selected components. Temporary rbac resources will still be created, to ensure a functioning installation process
serviceAccount.create bool true Specifies whether a service account should be created for each component
serviceAccount.annotations object {} Annotations to add to the service accounts for each component
serviceAccount.name string "" The base name of the service account to use (appended with the component). If not set and create is true, a name is generated using the fullname template and appended for each component
serviceAccount.automountServiceAccountToken bool true Automount API credentials for the Service Account
recommender.enabled bool true If true, the vpa recommender component will be installed.
recommender.extraArgs object {"pod-recommendation-min-cpu-millicores":15,"pod-recommendation-min-memory-mb":100,"v":"4"} A set of key-value flags to be passed to the recommender
recommender.replicaCount int 1
recommender.podDisruptionBudget object {} This is the setting for the pod disruption budget
recommender.image.repository string "registry.k8s.io/autoscaling/vpa-recommender" The location of the recommender image
recommender.image.tag string "" Overrides the image tag whose default is the chart appVersion
recommender.image.pullPolicy string "Always" The pull policy for the recommender image. Recommend not changing this
recommender.podAnnotations object {} Annotations to add to the recommender pod
recommender.podLabels object {} Labels to add to the recommender pod
recommender.podSecurityContext object {"runAsNonRoot":true,"runAsUser":65534} The security context for the recommender pod
recommender.securityContext object {} The security context for the containers inside the recommender pod
recommender.livenessProbe object {"failureThreshold":6,"httpGet":{"path":"/health-check","port":"metrics","scheme":"HTTP"},"periodSeconds":5,"successThreshold":1,"timeoutSeconds":3} The liveness probe definition inside the recommender pod
recommender.readinessProbe object {"failureThreshold":120,"httpGet":{"path":"/health-check","port":"metrics","scheme":"HTTP"},"periodSeconds":5,"successThreshold":1,"timeoutSeconds":3} The readiness probe definition inside the recommender pod
recommender.resources object {"limits":{"cpu":"200m","memory":"1000Mi"},"requests":{"cpu":"50m","memory":"500Mi"}} The resources block for the recommender pod
recommender.nodeSelector object {}
recommender.tolerations list []
recommender.affinity object {}
recommender.podMonitor object {"annotations":{},"enabled":false,"labels":{}} Enables a prometheus operator podMonitor for the recommender
updater.enabled bool true If true, the updater component will be deployed
updater.extraArgs object {} A key-value map of flags to pass to the updater
updater.replicaCount int 1
updater.podDisruptionBudget object {} This is the setting for the pod disruption budget
updater.image.repository string "registry.k8s.io/autoscaling/vpa-updater" The location of the updater image
updater.image.tag string "" Overrides the image tag whose default is the chart appVersion
updater.image.pullPolicy string "Always" The pull policy for the updater image. Recommend not changing this
updater.podAnnotations object {} Annotations to add to the updater pod
updater.podLabels object {} Labels to add to the updater pod
updater.podSecurityContext object {"runAsNonRoot":true,"runAsUser":65534} The security context for the updater pod
updater.securityContext object {} The security context for the containers inside the updater pod
updater.livenessProbe object {"failureThreshold":6,"httpGet":{"path":"/health-check","port":"metrics","scheme":"HTTP"},"periodSeconds":5,"successThreshold":1,"timeoutSeconds":3} The liveness probe definition inside the updater pod
updater.readinessProbe object {"failureThreshold":120,"httpGet":{"path":"/health-check","port":"metrics","scheme":"HTTP"},"periodSeconds":5,"successThreshold":1,"timeoutSeconds":3} The readiness probe definition inside the updater pod
updater.resources object {"limits":{"cpu":"200m","memory":"1000Mi"},"requests":{"cpu":"50m","memory":"500Mi"}} The resources block for the updater pod
updater.nodeSelector object {}
updater.tolerations list []
updater.affinity object {}
updater.podMonitor object {"annotations":{},"enabled":false,"labels":{}} Enables a prometheus operator podMonitor for the updater
admissionController.enabled bool true If true, will install the admission-controller component of vpa
admissionController.extraArgs object {} A key-value map of flags to pass to the admissionController
admissionController.generateCertificate bool true If true and admissionController is enabled, a pre-install hook will run to create the certificate for the webhook
admissionController.secretName string "{{ include \"vpa.fullname\" . }}-tls-secret" Name for the TLS secret created for the webhook. Default {{ .Release.Name }}-tls-secret
admissionController.certGen.image.repository string "registry.k8s.io/ingress-nginx/kube-webhook-certgen" An image that contains certgen for creating certificates. Only used if admissionController.generateCertificate is true
admissionController.certGen.image.tag string "v20230312-helm-chart-4.5.2-28-g66a760794" An image tag for the admissionController.certGen.image.repository image. Only used if admissionController.generateCertificate is true
admissionController.certGen.image.pullPolicy string "Always" The pull policy for the certgen image. Recommend not changing this
admissionController.certGen.env object {} Additional environment variables to be added to the certgen container. Format is KEY: Value format
admissionController.certGen.resources object {} The resources block for the certgen pod
admissionController.certGen.securityContext object {} The securityContext block for the certgen pod
admissionController.certGen.nodeSelector object {}
admissionController.certGen.tolerations list []
admissionController.certGen.affinity object {}
admissionController.mutatingWebhookConfiguration.annotations object {} Additional annotations for the MutatingWebhookConfiguration. Can be used for integration with cert-manager
admissionController.mutatingWebhookConfiguration.failurePolicy string "Ignore" The failurePolicy for the mutating webhook. Allowed values are: Ignore, Fail
admissionController.mutatingWebhookConfiguration.namespaceSelector object {} The namespaceSelector controls, which namespaces are affected by the webhook
admissionController.mutatingWebhookConfiguration.objectSelector object {} The objectSelector can filter object on e.g. labels
admissionController.mutatingWebhookConfiguration.timeoutSeconds int 30
admissionController.replicaCount int 1
admissionController.podDisruptionBudget object {} This is the setting for the pod disruption budget
admissionController.image.repository string "registry.k8s.io/autoscaling/vpa-admission-controller" The location of the vpa admission controller image
admissionController.image.tag string "" Overrides the image tag whose default is the chart appVersion
admissionController.image.pullPolicy string "Always" The pull policy for the admission controller image. Recommend not changing this
admissionController.podAnnotations object {} Annotations to add to the admission controller pod
admissionController.podLabels object {} Labels to add to the admission controller pod
admissionController.podSecurityContext object {"runAsNonRoot":true,"runAsUser":65534} The security context for the admission controller pod
admissionController.securityContext object {} The security context for the containers inside the admission controller pod
admissionController.livenessProbe object {"failureThreshold":6,"httpGet":{"path":"/health-check","port":"metrics","scheme":"HTTP"},"periodSeconds":5,"successThreshold":1,"timeoutSeconds":3} The liveness probe definition inside the admission controller pod
admissionController.readinessProbe object {"failureThreshold":120,"httpGet":{"path":"/health-check","port":"metrics","scheme":"HTTP"},"periodSeconds":5,"successThreshold":1,"timeoutSeconds":3} The readiness probe definition inside the admission controller pod
admissionController.resources object {"limits":{"cpu":"200m","memory":"500Mi"},"requests":{"cpu":"50m","memory":"200Mi"}} The resources block for the admission controller pod
admissionController.tlsSecretKeys list [] The keys in the vpa-tls-certs secret to map in to the admission controller
admissionController.nodeSelector object {}
admissionController.tolerations list []
admissionController.affinity object {}
tests.securityContext object {"allowPrivilegeEscalation":false,"capabilities":{"drop":["ALL"]},"readOnlyRootFilesystem":true,"runAsNonRoot":true,"runAsUser":10324} The security context for the containers run as helm hook tests
tests.image.repository string "bitnami/kubectl" An image used for testing containing bash, cat and kubectl
tests.image.tag string "" An image tag for the tests image
tests.image.pullPolicy string "Always" The pull policy for the tests image.
metrics-server object {"enabled":false} configuration options for the metrics server Helm chart. See the projects README.md for all available options
metrics-server.enabled bool false Whether or not the metrics server Helm chart should be installed