-
Notifications
You must be signed in to change notification settings - Fork 452
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Helm Chart: Move vulnerability processing to be a cronjob by default #25488
base: main
Are you sure you want to change the base?
Conversation
- vuln processing requires 4Gi RAM. Fleet can run fine with less for most items - Add "dedicated" flag and default to true - Allow user to customize vulnProcessing resources independently from main resources var - ensure that FLEET_VULNERABILITIES_DISABLE_SCHEDULE=true when using dedicated
7aa3ccf
to
3b535d8
Compare
@pboushy Thank you for your contribution! Because this changes the default product behavior, I'm adding this PR to our drafting board so that our product design team can review. Some users will need vulnerability processing to run more often than once a day, so that's likely something that needs to be configurable. But we'll review with our team first and let you know our thoughts. Thanks again! |
I'm also open to switching this so it operates as it already does by default, and the admin has to opt-in to moving this to a dedicated cronjob for vulnerability processing. It's a very simple change to vulnProcessing:
- dedicated: true
+ dedicated: false I went with making this method the default because the default resources specified in the chart are insufficient to run vuln processing, and this makes the resource utilization more efficient overall. |
Thanks for your efforts here @pboushy! The default the internal cron uses when not configured for vuln processing is once per hour. My guess is we will likely want to match that as the default in values.yaml. We'll also need to ensure to have a concurrencyPolicy of CC: @lukeheath |
Thanks @pboushy! I tracked a feature request for this here: #25566 From the feature request:
@rfairburn can you please schedule 15 mins with me next week to discuss? cc @lukeheath |
The existing helm chart is designed to run vulnerability processing on every container, which requires 4Gi/container.
However, the default for the helm chart is for each container to have a maximum of 1Gi.
This change switches the default so that vulnerability processing is disabled in the deployment, and moves vulnerability processing to a dedicated cronjob that runs 1/day at 1am. (I didn't make that configurable...)
A few items I think are important to call out:
Checklist for submitter
changes/
,orbit/changes/
oree/fleetd-chrome/changes
.See Changes files for more information.