Skip to content

Commit 06cf046

Browse files
authored
Update k8s-best-practices-requests-limits.adoc
1 parent 47221fa commit 06cf046

File tree

1 file changed

+4
-4
lines changed

1 file changed

+4
-4
lines changed

modules/k8s-best-practices-requests-limits.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -8,23 +8,23 @@ Kubernetes provides mechanisms for defining resource usage per container:
88
99
See: link:https://docs.openshift.com/container-platform/latest/nodes/clusters/nodes-cluster-resource-configure.html#nodes-cluster-resource-configure-resource-quotas_nodes-cluster-resource-configure[OpenShift Resource Quotas Per Project]
1010

11-
== Risks with Resource Limits
11+
*Risks with Resource Limits*
1212

1313
While limits can prevent runaway resource usage, they also introduce risk when misapplied, especially for CPU and memory.
1414

15-
=== CPU Limits Cause Throttling
15+
CPU Limits Cause Throttling
1616

1717
* Limits can throttle workloads even if unused CPU is available.
1818
* This leads to hangs, timeouts, and degraded performance.
1919
* CPU requests (without limits) often provide better fairness and stability.
2020
21-
=== Memory Limits Cause OOMKills
21+
Memory Limits Cause OOMKills
2222

2323
* Limits on memory are strict—when exceeded, containers are killed.
2424
* Difficult to predict worst-case memory usage for infrastructure components.
2525
* Can result in crash loops, degraded service, and unrecoverable clusters.
2626
27-
=== Why Limits are a Problem for Cluster Components
27+
Why Limits are a Problem for Cluster Components
2828

2929
Unlike with user workloads, setting resource limits for cluster components presents several challenges and is strongly discouraged:
3030

0 commit comments

Comments
 (0)