Warning
You are currently viewing v"2.14" of the documentation and it is not the latest. For the most recent documentation, kindly click here.
Admission Webhooks Click here for latest
Automatically validate resource changes to prevent misconfiguration and enforce best practices
There are some several misconfiguration scenarios that can produce scaling problems in productive workloads, for example: in Kubernetes a single workload should never be scaled by 2 or more HPA because that will produce conflicts and unintended behaviors.
Some errors with data format can be detected during the model validation, but these misconfigurations can’t be detected in that step because the model is correct indeed. For trying to avoid those misconfigurations at data plane detecting them early, admission webhooks validate all the incoming (KEDA) resources (new or updated) and reject any resource that doesn’t match the rules below.
KEDA will block all incoming changes to ScaledObject
that don’t match these rules:
scaledobject.spec.scaleTargetRef
) is already autoscaled by another other sources (other ScaledObject or HPA).Deployment
and StatefulSet
.minReplicaCount:0
. This rule doesn’t apply to all the workload types, only to Deployment
and StatefulSet
.name
is specified, the name must be unique (it is not allowed to have multiple triggers with the same name)KEDA will block all incoming changes to TriggerAuthentication
/ClusterTriggerAuthentication
that don’t match these rules:
NOTE: This only applies if the
TriggerAuthentication/ClusterTriggerAuthentication
is overriding the default identityId provided to KEDA during the installation