Add commandline flags for exclusion of specific namespaces and setting the default memory requests

This commit is contained in:
2019-03-12 10:07:26 +01:00
parent d6d869d980
commit 1dd9edf4e0
4 changed files with 110 additions and 22 deletions
+67 -21
View File
@@ -1,15 +1,26 @@
package main
import (
"flag"
"k8s.io/api/core/v1"
"k8s.io/apimachinery/pkg/api/resource"
metav1 "k8s.io/apimachinery/pkg/apis/meta/v1"
"k8s.io/client-go/kubernetes"
"k8s.io/client-go/rest"
"log"
"strings"
"time"
)
type args struct {
ExcludedNS *string
Memory *string
_ struct{}
}
func main() {
args := parseArgs()
config, err := rest.InClusterConfig()
if err != nil {
panic(err.Error())
@@ -18,32 +29,67 @@ func main() {
if err != nil {
panic(err.Error())
}
namespaces, err := clientset.CoreV1().Namespaces().List(metav1.ListOptions{})
memory, err := resource.ParseQuantity(*args.Memory)
if err != nil {
panic(err.Error())
}
log.Printf("Memory: %v", memory.String())
for _, ns := range namespaces.Items {
log.Printf("Checking for LimitRange named extreme-request-defaults in namespace '%v'\n", ns.Name)
if limitRange, err := clientset.CoreV1().LimitRanges(ns.Name).List(metav1.ListOptions{FieldSelector: "metadata.name=extreme-request-defaults"}); err == nil && len(limitRange.Items) == 0 {
log.Printf("Trying to create LimitaRange\n")
limits := []v1.LimitRangeItem{
{
DefaultRequest: v1.ResourceList{"memory": *resource.NewQuantity(1024*1024*1024*1024, resource.BinarySI)},
Type: "Container",
},
}
limitRange := v1.LimitRange{
Spec: v1.LimitRangeSpec{Limits: limits},
ObjectMeta: metav1.ObjectMeta{
Name: "extreme-request-defaults",
},
}
if _, err := clientset.CoreV1().LimitRanges(ns.Name).Create(&limitRange); err != nil {
log.Printf("Unable to create LimitRange in namespace '%v': Error: %v\n", ns.Name, err)
} else {
log.Printf("LimitRange extreme-request-defaults created in namespace '%v'\n", ns.Name)
limits := []v1.LimitRangeItem{
{
DefaultRequest: v1.ResourceList{"memory": memory},
Type: "Container",
},
}
limitRange := v1.LimitRange{
Spec: v1.LimitRangeSpec{Limits: limits},
ObjectMeta: metav1.ObjectMeta{
Name: "extreme-request-defaults",
},
}
excludedNS := strings.Split(*args.ExcludedNS, ",")
for {
namespaces, err := clientset.CoreV1().Namespaces().List(metav1.ListOptions{})
if err != nil {
panic(err.Error())
}
for _, ns := range namespaces.Items {
if !nsExcluded(ns.Name, excludedNS) {
log.Printf("Checking for LimitRange named extreme-request-defaults in namespace '%v'\n", ns.Name)
if limitRanges, err := clientset.CoreV1().LimitRanges(ns.Name).List(metav1.ListOptions{FieldSelector: "metadata.name=extreme-request-defaults"}); err == nil && len(limitRanges.Items) == 0 {
log.Printf("Trying to create LimitRange\n")
if _, err := clientset.CoreV1().LimitRanges(ns.Name).Create(&limitRange); err != nil {
log.Printf("Unable to create LimitRange in namespace '%v': Error: %v\n", ns.Name, err)
} else {
log.Printf("LimitRange extreme-request-defaults created in namespace '%v'\n", ns.Name)
}
}
}
}
time.Sleep(10 * time.Second)
}
}
func nsExcluded(name string, excludedNS []string) bool {
for _, ns := range excludedNS {
if name == ns {
return true
}
}
return false
}
func parseArgs() args {
args := args{
ExcludedNS: flag.String("excluded-ns", "kube-system", "Comma-separated list of namespaces to be excluded"),
Memory: flag.String("memory", "1Ti", "The default memory requests to set in the LimitRange. Default: 1Ti"),
}
flag.Parse()
return args
}