You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When enabled, overcommitment can be disabled per-project. For example, you can allow infrastructure components to be configured independently of overcommitment.
If required by your use case, you can disable overcommitment on any project that is not managed by Red Hat. For a list of projects that cannot be modified, see "Red Hat Managed resources" in _Support_.
13
16
14
-
To disable overcommitment in a project:
17
+
.Prerequisites
18
+
* You are logged in to the cluster using an account with cluster administrator or cluster editor permissions.
15
19
16
-
ifndef::openshift-rosa,openshift-dedicated[]
17
-
. Create or edit the namespace object file.
18
-
endif::openshift-rosa,openshift-dedicated[]
19
-
// Invalid value: "false": field is immutable, try updating the namespace
{product-title} administrators can control the level of overcommit and manage
29
24
container density on nodes. You can configure cluster-level overcommit using
30
25
the xref:#nodes-cluster-resource-override_nodes-cluster-overcommit[ClusterResourceOverride Operator]
31
26
to override the ratio between requests and limits set on developer containers.
32
27
In conjunction with xref:#nodes-cluster-node-overcommit_nodes-cluster-overcommit[node overcommit] and
33
28
xref:../../applications/deployments/managing-deployment-processes.adoc#deployments-setting-resources_deployment-operations[project memory and CPU limits and defaults], you can adjust the resource limit and request to achieve the desired level of overcommit.
34
-
endif::openshift-rosa,openshift-dedicated[]
35
-
ifdef::openshift-rosa,openshift-dedicated[]
36
-
{product-title} administrators can control the level of overcommit and manage
37
-
container density on nodes. You can configure cluster-level overcommit using
38
-
the xref:#nodes-cluster-resource-override_nodes-cluster-overcommit[ClusterResourceOverride Operator]
39
-
to override the ratio between requests and limits set on developer containers.
40
-
In conjunction with xref:#nodes-cluster-node-overcommit_nodes-cluster-overcommit[node overcommit], you can adjust the resource limit and request to achieve the desired level of overcommit.
41
-
endif::openshift-rosa,openshift-dedicated[]
42
29
43
30
[NOTE]
44
31
====
45
32
In {product-title}, you must enable cluster-level overcommit. Node overcommitment is enabled by default.
46
33
See xref:#nodes-cluster-overcommit-node-disable_nodes-cluster-overcommit[Disabling overcommitment for a node].
{product-title} administrators can manage container density on nodes by configuring pod placement behavior and per-project resource limits that overcommit cannot exceed.
40
+
41
+
Alternatively, administrators can disable project-level resource overcommitment on customer-created namespaces that are not managed by Red Hat.
48
42
49
-
// The following include statements pull in the module files that comprise
50
-
// the assembly. Include any combination of concept, procedure, or reference
51
-
// modules required to cover the user story. You can also include other
52
-
// assemblies.
43
+
For more information about container resource management, see Additional resources.
* xref:../../nodes/nodes/nodes-nodes-resources-configuring.adoc#nodes-nodes-resources-configuring-setting_nodes-nodes-resources-configuring[Allocating resources for nodes].
* xref:../../nodes/nodes/nodes-nodes-resources-configuring.adoc#nodes-nodes-resources-configuring-setting_nodes-nodes-resources-configuring[Allocating resources for nodes]
The following covers all resources managed or protected by the Service Reliability Engineering Platform (SRE-P) Team. Customers should not attempt to modify these resources because doing so can lead to cluster instability.
12
+
The following covers all {product-title} resources that are managed or protected by the Service Reliability Engineering Platform (SRE-P) Team. Customers should not attempt to modify these resources because doing so can lead to cluster instability.
0 commit comments