Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

perf: Exclude kube-bench pods from being evaluated in the Trivy operator #2398

Merged
merged 1 commit into from
Jan 31, 2025

Conversation

mjshastha
Copy link
Contributor

In a scaled 800-node cluster, running the Trivy operator with KE results in 1600 pods being created for kube-bench. Since kube-bench is an internal Aqua component, its evaluation can be safely skipped. By excluding kube-bench from the Trivy operator's scope, we can reduce the overall memory consumption of the Trivy operator, optimizing its performance in large-scale environments.

…tor.

In a scaled 800-node cluster, running the Trivy operator with KE results in 1600 pods being created for kube-bench. Since kube-bench is an internal Aqua component, its evaluation can be safely skipped. By excluding kube-bench from the Trivy operator's scope, we can reduce the overall memory consumption of the Trivy operator, optimizing its performance in large-scale environments.
@mjshastha mjshastha changed the title Perf: Exclude kube-bench pods from being evaluated in the Trivy operator perf: Exclude kube-bench pods from being evaluated in the Trivy operator Jan 27, 2025
@simar7
Copy link
Member

simar7 commented Jan 29, 2025

Thanks for the PR @mjshastha - do you have a way to measure the memory footprint? I ask this as I'd like to run that too locally and if possible add it to CI testing.

@mjshastha
Copy link
Contributor Author

mjshastha commented Jan 30, 2025

@simar7 Following the performance improvements seen in KE, we're applying the same fix to the Trivy-operator. We've measured memory usage using Pyroscope and Grafana, and Go benchmarking can also be utilized.

@simar7 simar7 merged commit 85bab6e into aquasecurity:main Jan 31, 2025
8 of 9 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants