Clean up a policy concept page: resource-quotas
parent
7f83a3ae4c
commit
40e5543854
|
@ -25,7 +25,8 @@ be consumed by resources in that namespace.
|
||||||
|
|
||||||
Resource quotas work like this:
|
Resource quotas work like this:
|
||||||
|
|
||||||
- Different teams work in different namespaces. This can be enforced with [RBAC](/docs/reference/access-authn-authz/rbac/).
|
- Different teams work in different namespaces. This can be enforced with
|
||||||
|
[RBAC](/docs/reference/access-authn-authz/rbac/).
|
||||||
|
|
||||||
- The administrator creates one ResourceQuota for each namespace.
|
- The administrator creates one ResourceQuota for each namespace.
|
||||||
|
|
||||||
|
@ -43,15 +44,21 @@ Resource quotas work like this:
|
||||||
for an example of how to avoid this problem.
|
for an example of how to avoid this problem.
|
||||||
|
|
||||||
{{< note >}}
|
{{< note >}}
|
||||||
|
|
||||||
- For `cpu` and `memory` resources, ResourceQuotas enforce that **every**
|
- For `cpu` and `memory` resources, ResourceQuotas enforce that **every**
|
||||||
(new) pod in that namespace sets a limit for that resource.
|
(new) pod in that namespace sets a limit for that resource.
|
||||||
If you enforce a resource quota in a namespace for either `cpu` or `memory`,
|
If you enforce a resource quota in a namespace for either `cpu` or `memory`,
|
||||||
you, and other clients, **must** specify either `requests` or `limits` for that resource,
|
you and other clients, **must** specify either `requests` or `limits` for that resource,
|
||||||
for every new Pod you submit. If you don't, the control plane may reject admission
|
for every new Pod you submit. If you don't, the control plane may reject admission
|
||||||
for that Pod.
|
for that Pod.
|
||||||
- For other resources: ResourceQuota works and will ignore pods in the namespace without setting a limit or request for that resource. It means that you can create a new pod without limit/request ephemeral storage if the resource quota limits the ephemeral storage of this namespace.
|
- For other resources: ResourceQuota works and will ignore pods in the namespace without
|
||||||
|
setting a limit or request for that resource. It means that you can create a new pod
|
||||||
|
without limit/request for ephemeral storage if the resource quota limits the ephemeral
|
||||||
|
storage of this namespace.
|
||||||
|
|
||||||
You can use a [LimitRange](/docs/concepts/policy/limit-range/) to automatically set
|
You can use a [LimitRange](/docs/concepts/policy/limit-range/) to automatically set
|
||||||
a default request for these resources.
|
a default request for these resources.
|
||||||
|
|
||||||
{{< /note >}}
|
{{< /note >}}
|
||||||
|
|
||||||
The name of a ResourceQuota object must be a valid
|
The name of a ResourceQuota object must be a valid
|
||||||
|
@ -71,7 +78,7 @@ Neither contention nor changes to quota will affect already created resources.
|
||||||
|
|
||||||
## Enabling Resource Quota
|
## Enabling Resource Quota
|
||||||
|
|
||||||
Resource Quota support is enabled by default for many Kubernetes distributions. It is
|
ResourceQuota support is enabled by default for many Kubernetes distributions. It is
|
||||||
enabled when the {{< glossary_tooltip text="API server" term_id="kube-apiserver" >}}
|
enabled when the {{< glossary_tooltip text="API server" term_id="kube-apiserver" >}}
|
||||||
`--enable-admission-plugins=` flag has `ResourceQuota` as
|
`--enable-admission-plugins=` flag has `ResourceQuota` as
|
||||||
one of its arguments.
|
one of its arguments.
|
||||||
|
@ -88,7 +95,7 @@ that can be requested in a given namespace.
|
||||||
The following resource types are supported:
|
The following resource types are supported:
|
||||||
|
|
||||||
| Resource Name | Description |
|
| Resource Name | Description |
|
||||||
| --------------------- | ----------------------------------------------------------- |
|
| ------------- | ----------- |
|
||||||
| `limits.cpu` | Across all pods in a non-terminal state, the sum of CPU limits cannot exceed this value. |
|
| `limits.cpu` | Across all pods in a non-terminal state, the sum of CPU limits cannot exceed this value. |
|
||||||
| `limits.memory` | Across all pods in a non-terminal state, the sum of memory limits cannot exceed this value. |
|
| `limits.memory` | Across all pods in a non-terminal state, the sum of memory limits cannot exceed this value. |
|
||||||
| `requests.cpu` | Across all pods in a non-terminal state, the sum of CPU requests cannot exceed this value. |
|
| `requests.cpu` | Across all pods in a non-terminal state, the sum of CPU requests cannot exceed this value. |
|
||||||
|
@ -104,31 +111,31 @@ In addition to the resources mentioned above, in release 1.10, quota support for
|
||||||
|
|
||||||
As overcommit is not allowed for extended resources, it makes no sense to specify both `requests`
|
As overcommit is not allowed for extended resources, it makes no sense to specify both `requests`
|
||||||
and `limits` for the same extended resource in a quota. So for extended resources, only quota items
|
and `limits` for the same extended resource in a quota. So for extended resources, only quota items
|
||||||
with prefix `requests.` is allowed for now.
|
with prefix `requests.` are allowed.
|
||||||
|
|
||||||
Take the GPU resource as an example, if the resource name is `nvidia.com/gpu`, and you want to
|
Take the GPU resource as an example, if the resource name is `nvidia.com/gpu`, and you want to
|
||||||
limit the total number of GPUs requested in a namespace to 4, you can define a quota as follows:
|
limit the total number of GPUs requested in a namespace to 4, you can define a quota as follows:
|
||||||
|
|
||||||
* `requests.nvidia.com/gpu: 4`
|
* `requests.nvidia.com/gpu: 4`
|
||||||
|
|
||||||
See [Viewing and Setting Quotas](#viewing-and-setting-quotas) for more detail information.
|
See [Viewing and Setting Quotas](#viewing-and-setting-quotas) for more details.
|
||||||
|
|
||||||
|
|
||||||
## Storage Resource Quota
|
## Storage Resource Quota
|
||||||
|
|
||||||
You can limit the total sum of [storage resources](/docs/concepts/storage/persistent-volumes/) that can be requested in a given namespace.
|
You can limit the total sum of [storage resources](/docs/concepts/storage/persistent-volumes/)
|
||||||
|
that can be requested in a given namespace.
|
||||||
|
|
||||||
In addition, you can limit consumption of storage resources based on associated storage-class.
|
In addition, you can limit consumption of storage resources based on associated storage-class.
|
||||||
|
|
||||||
| Resource Name | Description |
|
| Resource Name | Description |
|
||||||
| --------------------- | ----------------------------------------------------------- |
|
| ------------- | ----------- |
|
||||||
| `requests.storage` | Across all persistent volume claims, the sum of storage requests cannot exceed this value. |
|
| `requests.storage` | Across all persistent volume claims, the sum of storage requests cannot exceed this value. |
|
||||||
| `persistentvolumeclaims` | The total number of [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
|
| `persistentvolumeclaims` | The total number of [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
|
||||||
| `<storage-class-name>.storageclass.storage.k8s.io/requests.storage` | Across all persistent volume claims associated with the `<storage-class-name>`, the sum of storage requests cannot exceed this value. |
|
| `<storage-class-name>.storageclass.storage.k8s.io/requests.storage` | Across all persistent volume claims associated with the `<storage-class-name>`, the sum of storage requests cannot exceed this value. |
|
||||||
| `<storage-class-name>.storageclass.storage.k8s.io/persistentvolumeclaims` | Across all persistent volume claims associated with the `<storage-class-name>`, the total number of [persistent volume claims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
|
| `<storage-class-name>.storageclass.storage.k8s.io/persistentvolumeclaims` | Across all persistent volume claims associated with the `<storage-class-name>`, the total number of [persistent volume claims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
|
||||||
|
|
||||||
For example, if an operator wants to quota storage with `gold` storage class separate from `bronze` storage class, the operator can
|
For example, if you want to quota storage with `gold` StorageClass separate from
|
||||||
define a quota as follows:
|
a `bronze` StorageClass, you can define a quota as follows:
|
||||||
|
|
||||||
* `gold.storageclass.storage.k8s.io/requests.storage: 500Gi`
|
* `gold.storageclass.storage.k8s.io/requests.storage: 500Gi`
|
||||||
* `bronze.storageclass.storage.k8s.io/requests.storage: 100Gi`
|
* `bronze.storageclass.storage.k8s.io/requests.storage: 100Gi`
|
||||||
|
@ -136,7 +143,7 @@ define a quota as follows:
|
||||||
In release 1.8, quota support for local ephemeral storage is added as an alpha feature:
|
In release 1.8, quota support for local ephemeral storage is added as an alpha feature:
|
||||||
|
|
||||||
| Resource Name | Description |
|
| Resource Name | Description |
|
||||||
| ------------------------------- |----------------------------------------------------------- |
|
| ------------- | ----------- |
|
||||||
| `requests.ephemeral-storage` | Across all pods in the namespace, the sum of local ephemeral storage requests cannot exceed this value. |
|
| `requests.ephemeral-storage` | Across all pods in the namespace, the sum of local ephemeral storage requests cannot exceed this value. |
|
||||||
| `limits.ephemeral-storage` | Across all pods in the namespace, the sum of local ephemeral storage limits cannot exceed this value. |
|
| `limits.ephemeral-storage` | Across all pods in the namespace, the sum of local ephemeral storage limits cannot exceed this value. |
|
||||||
| `ephemeral-storage` | Same as `requests.ephemeral-storage`. |
|
| `ephemeral-storage` | Same as `requests.ephemeral-storage`. |
|
||||||
|
@ -169,7 +176,8 @@ Here is an example set of resources users may want to put under object count quo
|
||||||
* `count/cronjobs.batch`
|
* `count/cronjobs.batch`
|
||||||
|
|
||||||
If you define a quota this way, it applies to Kubernetes' APIs that are part of the API server, and
|
If you define a quota this way, it applies to Kubernetes' APIs that are part of the API server, and
|
||||||
to any custom resources backed by a CustomResourceDefinition. If you use [API aggregation](/docs/concepts/extend-kubernetes/api-extension/apiserver-aggregation/) to
|
to any custom resources backed by a CustomResourceDefinition. If you use
|
||||||
|
[API aggregation](/docs/concepts/extend-kubernetes/api-extension/apiserver-aggregation/) to
|
||||||
add additional, custom APIs that are not defined as CustomResourceDefinitions, the core Kubernetes
|
add additional, custom APIs that are not defined as CustomResourceDefinitions, the core Kubernetes
|
||||||
control plane does not enforce quota for the aggregated API. The extension API server is expected to
|
control plane does not enforce quota for the aggregated API. The extension API server is expected to
|
||||||
provide quota enforcement if that's appropriate for the custom API.
|
provide quota enforcement if that's appropriate for the custom API.
|
||||||
|
@ -186,7 +194,7 @@ There is another syntax only to set the same type of quota for certain resources
|
||||||
The following types are supported:
|
The following types are supported:
|
||||||
|
|
||||||
| Resource Name | Description |
|
| Resource Name | Description |
|
||||||
| ------------------------------- |--------------------------------------------------------------------------------------------------------------------------------------------------------------------|
|
| ------------- | ----------- |
|
||||||
| `configmaps` | The total number of ConfigMaps that can exist in the namespace. |
|
| `configmaps` | The total number of ConfigMaps that can exist in the namespace. |
|
||||||
| `persistentvolumeclaims` | The total number of [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
|
| `persistentvolumeclaims` | The total number of [PersistentVolumeClaims](/docs/concepts/storage/persistent-volumes/#persistentvolumeclaims) that can exist in the namespace. |
|
||||||
| `pods` | The total number of Pods in a non-terminal state that can exist in the namespace. A pod is in a terminal state if `.status.phase in (Failed, Succeeded)` is true. |
|
| `pods` | The total number of Pods in a non-terminal state that can exist in the namespace. A pod is in a terminal state if `.status.phase in (Failed, Succeeded)` is true. |
|
||||||
|
@ -494,7 +502,7 @@ spec:
|
||||||
|
|
||||||
If operators want to disallow using `namespaces` and `namespaceSelector` by default, and
|
If operators want to disallow using `namespaces` and `namespaceSelector` by default, and
|
||||||
only allow it for specific namespaces, they could configure `CrossNamespacePodAffinity`
|
only allow it for specific namespaces, they could configure `CrossNamespacePodAffinity`
|
||||||
as a limited resource by setting the kube-apiserver flag --admission-control-config-file
|
as a limited resource by setting the kube-apiserver flag `--admission-control-config-file`
|
||||||
to the path of the following configuration file:
|
to the path of the following configuration file:
|
||||||
|
|
||||||
```yaml
|
```yaml
|
||||||
|
@ -527,7 +535,7 @@ then it requires that every incoming container specifies an explicit limit for t
|
||||||
|
|
||||||
## Viewing and Setting Quotas
|
## Viewing and Setting Quotas
|
||||||
|
|
||||||
Kubectl supports creating, updating, and viewing quotas:
|
kubectl supports creating, updating, and viewing quotas:
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
kubectl create namespace myspace
|
kubectl create namespace myspace
|
||||||
|
@ -619,7 +627,7 @@ services 0 10
|
||||||
services.loadbalancers 0 2
|
services.loadbalancers 0 2
|
||||||
```
|
```
|
||||||
|
|
||||||
Kubectl also supports object count quota for all standard namespaced resources
|
kubectl also supports object count quota for all standard namespaced resources
|
||||||
using the syntax `count/<resource>.<group>`:
|
using the syntax `count/<resource>.<group>`:
|
||||||
|
|
||||||
```shell
|
```shell
|
||||||
|
@ -671,7 +679,7 @@ restrictions around nodes: pods from several namespaces may run on the same node
|
||||||
|
|
||||||
## Limit Priority Class consumption by default
|
## Limit Priority Class consumption by default
|
||||||
|
|
||||||
It may be desired that pods at a particular priority, eg. "cluster-services",
|
It may be desired that pods at a particular priority, such as "cluster-services",
|
||||||
should be allowed in a namespace, if and only if, a matching quota object exists.
|
should be allowed in a namespace, if and only if, a matching quota object exists.
|
||||||
|
|
||||||
With this mechanism, operators are able to restrict usage of certain high
|
With this mechanism, operators are able to restrict usage of certain high
|
||||||
|
@ -721,7 +729,8 @@ and it is to be created in a namespace other than `kube-system`.
|
||||||
|
|
||||||
## {{% heading "whatsnext" %}}
|
## {{% heading "whatsnext" %}}
|
||||||
|
|
||||||
- See [ResourceQuota design doc](https://git.k8s.io/design-proposals-archive/resource-management/admission_control_resource_quota.md) for more information.
|
- See [ResourceQuota design document](https://git.k8s.io/design-proposals-archive/resource-management/admission_control_resource_quota.md)
|
||||||
|
for more information.
|
||||||
- See a [detailed example for how to use resource quota](/docs/tasks/administer-cluster/quota-api-object/).
|
- See a [detailed example for how to use resource quota](/docs/tasks/administer-cluster/quota-api-object/).
|
||||||
- Read [Quota support for priority class design doc](https://git.k8s.io/design-proposals-archive/scheduling/pod-priority-resourcequota.md).
|
- Read [Quota support for priority class design document](https://git.k8s.io/design-proposals-archive/scheduling/pod-priority-resourcequota.md).
|
||||||
- See [LimitedResources](https://github.com/kubernetes/kubernetes/pull/36765)
|
- See [LimitedResources](https://github.com/kubernetes/kubernetes/pull/36765).
|
||||||
|
|
Loading…
Reference in New Issue