Sidecar proxy injection in Linkerd may be handled at the Namespace level by setting the annotation `linkerd.io/inject` to `enabled`. In addition, a second annotation may be applied which controls the Pod startup behavior. This policy sets the annotations, if not present, `linkerd.io/inject` and `config.linkerd.io/proxy-await` to `enabled` on all new Namespaces.
apiVersion: kyverno.io/v1kind: ClusterPolicymetadata:name: add-linkerd-mesh-injectionannotations:policies.kyverno.io/title: Add Linkerd Mesh Injectionpolicies.kyverno.io/category: Linkerdpolicies.kyverno.io/severity: mediumpolicies.kyverno.io/subject: Namespace, Annotationpolicies.kyverno.io/description: Sidecar proxy injection in Linkerd may be handled at the Namespace level by setting the annotation `linkerd.io/inject` to `enabled`. In addition, a second annotation may be applied which controls the Pod startup behavior. This policy sets the annotations, if not present, `linkerd.io/inject` and `config.linkerd.io/proxy-await` to `enabled` on all new Namespaces.spec:rules:- name: add-mesh-annotationsmatch:any:- resources:kinds:- Namespacemutate:patchStrategicMerge:metadata:annotations:+(linkerd.io/inject): enabled+(config.linkerd.io/proxy-await): enabled
The Kubernetes cluster autoscaler does not evict pods that use hostPath or emptyDir volumes. To allow eviction of these pods, the annotation cluster-autoscaler.kubernetes.io/safe-to-evict=true must be added to the pods.
The Kubernetes cluster autoscaler does not evict pods that use hostPath or emptyDir volumes. To allow eviction of these pods, the annotation cluster-autoscaler.kubernetes.io/safe-to-evict=true must be added to the pods.
CAST AI will not downscale a node that includes a pod with the autoscaling.cast.ai/removal-disabled="true" label on it, this protects sensitive workloads from being evicted and can be attributed to any pod to protect against unwanted downscaling. This policy will mutate jobs and cronjobs to add the removal-disabled label to protect against eviction.