Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Set usable and safe client-side rate limit on Kubernetes client #50

Closed
wants to merge 1 commit into from

Conversation

slok
Copy link

@slok slok commented May 9, 2024

Note: Same PR as jetstack#203 :) many thanks for the effort of this fork!

Hi!

First of all, thanks for this awesome project!

We started using kube-oidc-proxy to access our clusters. Normally when a user uses the proxy to access a Kubernetes cluster, there isn't any problem, and works like a charm. However, when a machine/bot/app (e.g ArgoCD) starts using it the proxy starts rate-limiting the requests because the Kubernetes client client-side rate limit is not configured.

For example, our Argo CD installation failed constantly connecting to the clusters (get status, send actions...) because of this client-side rate limit.

This PR adds a safe default that it's known that works correctly:

QPS: 100
Burst: 100
Some projects that configure this to don't get this kind of problems:

Prometheus operator
Cert manager

@mlbiam
Copy link

mlbiam commented May 21, 2024

i'm OK with defaults, but i think we should have parameters to set these options.

@slok
Copy link
Author

slok commented Jun 18, 2024

Closing in favor of #51

@slok slok closed this Jun 18, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants