k8s-resource-optimizer
K8s Resource Optimizer
Purpose and Intent
The k8s-resource-optimizer helps teams balance performance and cost. It identifies containers that are either "starving" (causing crashes) or "bloated" (wasting money) by comparing their configuration against actual usage patterns.
When to Use
- Cloud Cost Optimization: Run monthly to identify waste in your clusters.
- Reliability Engineering: Use after a production incident involving OOMKills to find the correct memory threshold.
- Pre-production Scaling: Set realistic requests/limits before a major launch.
When NOT to Use
- Initial Development: Don't over-optimize before you have real traffic patterns.
- Real-time Autoscaling: This tool is for "right-sizing" configuration; use a HPA/VPA for real-time adjustments.
Security and Data-Handling Considerations
- No live cluster interaction required if metrics are passed as text/json.
- Safe to run on infrastructure-as-code files.
More from jorgealves/agent_skills
python-security-scanner
Detect common Python vulnerabilities such as SQL injection, unsafe deserialization, and hardcoded secrets. Use as part of a secure SDLC for Python projects.
191gdpr-ccpa-privacy-auditor
Audits web applications to ensure declared privacy policies match actual technical data collection practices. Use to identify discrepancies in cookie usage, tracking scripts, and user data handling.
158prompt-injection-scanner
Audits agent skill instructions and system prompts for vulnerabilities to prompt hijacking and indirect injection. Use when designing new agent skills or before deploying agents to public environments where users provide untrusted input.
156pii-sanitizer
Detects and redacts Personally Identifiable Information (PII) like emails, phone numbers, and credit cards. Use when cleaning logs, datasets, or communications to comply with GDPR/CCPA privacy standards.
135hipaa-compliance-guard
Audits HealthTech applications for HIPAA technical safeguards like encryption and audit logging. Use when reviewing healthcare infrastructure or ensuring PHI is handled according to legal security standards.
133documentation-generator
Analyzes source code to automatically generate technical documentation and architecture diagrams. Use to maintain up-to-date API references and onboarding materials for engineering teams.
131