kubernetes / ingress-nginx

Ingress-NGINX Controller for Kubernetes
https://kubernetes.github.io/ingress-nginx/
Apache License 2.0
17.32k stars 8.22k forks source link

HorizontalPodAutoscaling(HPA) on kubernetes nginx ingress Controller #11005

Open thejaswiniguduru opened 7 months ago

thejaswiniguduru commented 7 months ago

I'm currently utilizing the Kubernetes Nginx Ingress Controller in Azure Kubernetes Service. In order to meet the security requirements raised by internal vulnerability scanning tool, I need to add CPU and MEMORY requests for the kind-role , for name: ingress-nginx-admission-create and name: ingress-nginx-admission-patch.

Kindly help me in knowing if HorizontalPodAutoscaling(HPA) can be enabled to the Nginx ingress controller version 1.9.3.

Please suggest on possible in-stability on adding CPU and MEMORY requests for the above mentioned area. since' InfoSecurity team detected possible vulnerability or information breach as shown in the below link. https://avd.aquasec.com/misconfig/kubernetes/general/avd-ksv-0015/ https://avd.aquasec.com/misconfig/kubernetes/general/avd-ksv-0016/

The following Kubernetes Ingress Controller Manifest file is used in my project. https://github.com/kubernetes/ingress-nginx/blob/main/deploy/static/provider/baremetal/deploy.yaml

k8s-ci-robot commented 7 months ago

This issue is currently awaiting triage.

If Ingress contributors determines this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available [here](https://git.k8s.io/community/contributors/guide/pull-requests.md). If you have questions or suggestions related to my behavior, please file an issue against the [kubernetes/test-infra](https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue:) repository.
longwuyuan commented 7 months ago

You can edit the manifest and add the requests and/or limits

/remove-kind bug

On Wed, 21 Feb, 2024, 8:45 pm Kubernetes Prow Robot, < @.***> wrote:

This issue is currently awaiting triage.

If Ingress contributors determines this is a relevant issue, they will accept it by applying the triage/accepted label and provide further guidance.

The triage/accepted label can be added by org members by writing /triage accepted in a comment.

Instructions for interacting with me using PR comments are available here https://git.k8s.io/community/contributors/guide/pull-requests.md. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra https://github.com/kubernetes/test-infra/issues/new?title=Prow%20issue: repository.

— Reply to this email directly, view it on GitHub https://github.com/kubernetes/ingress-nginx/issues/11005#issuecomment-1956902779, or unsubscribe https://github.com/notifications/unsubscribe-auth/ABGZVWQMC52P4PZIO7BUPULYUYFSNAVCNFSM6AAAAABDTHV22WVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMYTSNJWHEYDENZXHE . You are receiving this because you are subscribed to this thread.Message ID: @.***>

github-actions[bot] commented 6 months ago

This is stale, but we won't close it automatically, just bare in mind the maintainers may be busy with other tasks and will reach your issue ASAP. If you have any question or request to prioritize this, please reach #ingress-nginx-dev on Kubernetes Slack.