Prevent waste before it ships.
Wozz helps engineering teams reduce Kubernetes spend through two approaches:
| Tool | Purpose | How It Works |
|---|---|---|
| PR Cost Linter | Prevention | Analyzes pull requests for resource changes and comments with cost impact before merge. |
| Audit CLI | Discovery | Scans running clusters to identify over-provisioned pods and wasted resources. |
Catches expensive resource changes during code review.
# .github/workflows/wozz.yml
name: Cost Check
on: [pull_request]
jobs:
check:
runs-on: ubuntu-latest
steps:
- uses: actions/checkout@v3
with:
fetch-depth: 0
- uses: WozzHQ/wozz@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
cost-threshold: 100Identifies waste in your current cluster. Runs locally.
🔒 No Data Exfiltration - Runs Locally
Homebrew (Recommended):
brew tap WozzHQ/wozz
brew install wozzGitHub Action (CI/CD):
# .github/workflows/wozz.yml
- uses: WozzHQ/wozz@v1
with:
github-token: ${{ secrets.GITHUB_TOKEN }}
cost-threshold: 100Manual / Advanced Installation:
# Download, Inspect, Run
curl -o wozz.sh -L https://raw.githubusercontent.com/WozzHQ/wozz/main/scripts/wozz-audit.sh
cat wozz.sh
chmod +x wozz.sh && ./wozz.sh- Zero Trust: Runs entirely on your infrastructure (local machine or GitHub runner).
- No Agents: No DaemonSets or cluster modifications required.
- Read-Only: Only uses
kubectl getandkubectl top. - Open Source: MIT Licensed.
MIT License - see LICENSE file for details.
Built with ❤️ by the Wozz team
wozz.io