<img src="https://ws.zoominfo.com/pixel/JHVDdRXH2uangmUMQBZd" width="1" height="1" style="display: none;">

New! Magalix brings you the SaC (Security-as-Code) podcast. Listen now!

Exit icon Listen Now

Magalix Product Update

DevOps Kubernetes K8s Magalix Magalix Updates
Magalix Product Update
DevOps Kubernetes K8s Magalix Magalix Updates

What’s New?

1- Extended Governance Using KubeAdvisor 2.0

We have extended your ability to enforce security, reliability, and best practices policies through KubeAdvisor 2.0, by allowing you to write your own policies against the following K8s object types:

  • Network (Ingress, Services, Network Policies)
  • Storage (PV, PVC, and Storage Classes)
  • Access Control (ClusterRoleBinding, ClusterRole, RoleBinding, Role, ServiceAccount)
  • Nodes

We also added new dashboards for each of the mentioned object groups, so you have better visibility of each group’s compliances and violations.

You can read more about getting started with KubeAdvisor here.

2- Built-in Node Policies

We have released a new set of policies that target your clusters nodes to ensure you have the right configurations for them to help you manage them at scale. To read more about these policies check our documentation here

3- Rego Playground

We have released a rego playground for you to help you author your rego and test them out before using them in your KubeAdvisor policies. You will be able to test out your Rego against a spec you have or better against an existing object YAML spec from your cluster.Magalix Product - Rego Playground

4- Manually Trigger Advisor

We have our regular KubeAdvisor scan every 24 hours to check if your cluster objects are compliant or violating. Now we have enabled you to manually trigger any advisor from KubeAdvisor to be able to check your cluster objects compliance.

5- Top CPU and Memory Waste Containers

We made it really easy for you to identify which containers are the top wasting CPU or memory resources. Currently, in your optimizations view, you will be able to see the top 25 containers that waste resources and how much resources you can save if you started applying the recommended requests or limits.Magalix KubeOptimizer

What Did we Improve?

1- Fine Tuned Optimizations by KubeOptimizer

We are actively enhancing our KubeOptimizer algorithms to have more accurate and reliable recommendations. Recently we have released the following enhancements;

  • Better accuracy around throttling and high utilization cases.
  • Dynamically change analysis period according to changes in request and limit values.
  • Added settings to customize min recommended request values.
  • Ability to ignore generating optimizations for specific workloads via annotations

3- Revamped Dashboards

In the search for a better user experience, we started revamping a couple of dashboards. We started with a better-designed onboarding screen to connect your first cluster, we changed the way the cluster dashboard was reporting violations and optimizations summary to help you have a bird-eye view on what’s happening with your cluster and where to take action. Finally, we introduced more filtration ability around tables across all of our dashboards to get you focused on the things that matter the most for you.Magalix Dashboard

Connect your first cluster and start your 30-days free trial with Magalix

Connect Your Cluster Now

Comments and Responses

Related Articles

The Shared Security Model - Dividing Responsibilities

Understanding the Shared Cloud Security Model and causes behind common data breaches.

Read more
How to Prevent Non-Secure Container Images from Being Deployed with Policy-As-Code

Security is critical to business continuity. As such, DevOps teams must prevent non-secure container images from being deployed. But how do you do it?

Read more
Using Affinity with nodeSelector and Policy-As-Code, and Exclusions

In a Kubernetes cluster, you have to leverage policy-as-code to enforce Node Affinity using nodeSelector. But how do you do go about it? Learn more.

Read more