diff --git a/terraform/gcp/modules/gke_cluster/cluster.tf b/terraform/gcp/modules/gke_cluster/cluster.tf index ef927ee21..162618473 100644 --- a/terraform/gcp/modules/gke_cluster/cluster.tf +++ b/terraform/gcp/modules/gke_cluster/cluster.tf @@ -67,6 +67,10 @@ resource "google_container_cluster" "cluster" { tags = [local.cluster_network_tag] service_account = google_service_account.gke-sa.email oauth_scopes = var.oauth_scopes + kubelet_config { + cpu_cfs_quota = false + pod_pids_limit = 0 + } } resource_labels = { diff --git a/terraform/gcp/modules/gke_cluster/node_pool.tf b/terraform/gcp/modules/gke_cluster/node_pool.tf index cdc29fcef..0567ce190 100644 --- a/terraform/gcp/modules/gke_cluster/node_pool.tf +++ b/terraform/gcp/modules/gke_cluster/node_pool.tf @@ -65,6 +65,11 @@ resource "google_container_node_pool" "cluster_nodes" { service_account = google_service_account.gke-sa.email oauth_scopes = ["https://www.googleapis.com/auth/cloud-platform"] + kubelet_config { + cpu_cfs_quota = false + pod_pids_limit = 0 + } + // Protect node metadata and enable Workload Identity // for this node pool. "SECURE" just protects the metadata. // "EXPOSE" or not set allows for cluster takeover.