You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Check the Pod's memory cgroups on the node where the workload is running. In the following example, [`crictl`](https://github.com/kubernetes-sigs/cri-tools/blob/master/docs/crictl.md)
147
+
Check the Pod's memory cgroups on the node where the workload is running. In the following example,
Copy file name to clipboardExpand all lines: content/en/docs/reference/access-authn-authz/admission-controllers.md
+18-14Lines changed: 18 additions & 14 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -666,6 +666,7 @@ plugins:
666
666
{{< /tabs >}}
667
667
668
668
#### Configuration Annotation Format
669
+
669
670
`PodNodeSelector`uses the annotation key `scheduler.alpha.kubernetes.io/node-selector` to assign node selectors to namespaces.
670
671
671
672
```yaml
@@ -678,6 +679,7 @@ metadata:
678
679
```
679
680
680
681
#### Internal Behavior
682
+
681
683
This admission controller has the following behavior:
682
684
683
685
1. If the `Namespace` has an annotation with a key `scheduler.alpha.kubernetes.io/node-selector`, use its value as the
@@ -746,27 +748,29 @@ metadata:
746
748
747
749
### Priority {#priority}
748
750
749
-
The priority admission controller uses the `priorityClassName` field and populates the integer value of the priority. If the priority class is not found, the Pod is rejected.
751
+
The priority admission controller uses the `priorityClassName` field and populates the integer value of the priority.
752
+
If the priority class is not found, the Pod is rejected.
750
753
751
754
### ResourceQuota {#resourcequota}
752
755
753
756
This admission controller will observe the incoming request and ensure that it does not violate any of the constraints
754
757
enumerated in the `ResourceQuota` object in a `Namespace`. If you are using `ResourceQuota`
755
758
objects in your Kubernetes deployment, you MUST use this admission controller to enforce quota constraints.
756
759
757
-
See the [resourceQuota design doc](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_resource_quota.md) and the [example of Resource Quota](/docs/concepts/policy/resource-quotas/) for more details.
760
+
See the [resourceQuota design doc](https://git.k8s.io/community/contributors/design-proposals/resource-management/admission_control_resource_quota.md)
761
+
and the [example of Resource Quota](/docs/concepts/policy/resource-quotas/) for more details.
If you enable the `PodOverhead` [feature gate](/docs/reference/command-line-tools-reference/feature-gates/), and define a RuntimeClass with [Pod overhead](/docs/concepts/scheduling-eviction/pod-overhead/) configured, this admission controller checks incoming
764
-
Pods. When enabled, this admission controller rejects any Pod create requests that have the overhead already set.
765
-
For Pods that have a RuntimeClass is configured and selected in their `.spec`, this admission controller sets `.spec.overhead` in the Pod based on the value defined in the corresponding RuntimeClass.
766
-
767
-
{{< note >}}
768
-
The `.spec.overhead` field for Pod and the `.overhead` field for RuntimeClass are both in beta. If you do not enable the `PodOverhead` feature gate, all Pods are treated as if `.spec.overhead` is unset.
769
-
{{< /note >}}
767
+
If you define a RuntimeClass with [Pod overhead](/docs/concepts/scheduling-eviction/pod-overhead/)
768
+
configured, this admission controller checks incoming Pods.
769
+
When enabled, this admission controller rejects any Pod create requests
770
+
that have the overhead already set.
771
+
For Pods that have a RuntimeClass configured and selected in their `.spec`,
772
+
this admission controller sets `.spec.overhead` in the Pod based on the value
773
+
defined in the corresponding RuntimeClass.
770
774
771
775
See also [Pod Overhead](/docs/concepts/scheduling-eviction/pod-overhead/)
772
776
for more information.
@@ -823,11 +827,11 @@ If you disable the ValidatingAdmissionWebhook, you must also disable the
823
827
group/version via the `--runtime-config` flag (both are on by default in
824
828
versions 1.9 and later).
825
829
826
-
827
830
## Is there a recommended set of admission controllers to use?
828
831
829
-
Yes. The recommended admission controllers are enabled by default (shown [here](/docs/reference/command-line-tools-reference/kube-apiserver/#options)), so you do not need to explicitly specify them. You can enable additional admission controllers beyond the default set using the `--enable-admission-plugins` flag (**order doesn't matter**).
832
+
Yes. The recommended admission controllers are enabled by default
0 commit comments