Configure Minimum and Maximum CPU Constraints for a Namespace

    This page shows how to set minimum and maximum values for the CPU resources used by containers and Pods in a namespace. You specify minimum and maximum CPU values in a object. If a Pod does not meet the constraints imposed by the LimitRange, it cannot be created in the namespace.

    You need to have a Kubernetes cluster, and the kubectl command-line tool must be configured to communicate with your cluster. It is recommended to run this tutorial on a cluster with at least two nodes that are not acting as control plane hosts. If you do not already have a cluster, you can create one by using or you can use one of these Kubernetes playgrounds:

    You must have access to create namespaces in your cluster.

    Each node in your cluster must have at least 1.0 CPU available for Pods. See meaning of CPU to learn what Kubernetes means by “1 CPU”.

    Create a namespace

    Create a namespace so that the resources you create in this exercise are isolated from the rest of your cluster.

    Create a LimitRange and a Pod

    Here’s a manifest for an example :

    admin/resource/cpu-constraints.yaml

    1. kind: LimitRange
    2. metadata:
    3. name: cpu-min-max-demo-lr
    4. spec:
    5. limits:
    6. - max:
    7. cpu: "800m"
    8. min:
    9. cpu: "200m"
    10. type: Container

    Create the LimitRange:

    1. kubectl apply -f https://k8s.io/examples/admin/resource/cpu-constraints.yaml --namespace=constraints-cpu-example

    View detailed information about the LimitRange:

    1. kubectl get limitrange cpu-min-max-demo-lr --output=yaml --namespace=constraints-cpu-example

    The output shows the minimum and maximum CPU constraints as expected. But notice that even though you didn’t specify default values in the configuration file for the LimitRange, they were created automatically.

    1. limits:
    2. - default:
    3. cpu: 800m
    4. defaultRequest:
    5. cpu: 800m
    6. max:
    7. cpu: 800m
    8. cpu: 200m
    9. type: Container

    Now whenever you create a Pod in the constraints-cpu-example namespace (or some other client of the Kubernetes API creates an equivalent Pod), Kubernetes performs these steps:

    • If any container in that Pod does not specify its own CPU request and limit, the control plane assigns the default CPU request and limit to that container.

    • Verify that every container in that Pod specifies a CPU request that is greater than or equal to 200 millicpu.

    • Verify that every container in that Pod specifies a CPU limit that is less than or equal to 800 millicpu.

    Note: When creating a LimitRange object, you can specify limits on huge-pages or GPUs as well. However, when both default and defaultRequest are specified on these resources, the two values must be the same.

    Here’s a manifest for a Pod that has one container. The container manifest specifies a CPU request of 500 millicpu and a CPU limit of 800 millicpu. These satisfy the minimum and maximum CPU constraints imposed by the LimitRange for this namespace.

    1. apiVersion: v1
    2. metadata:
    3. name: constraints-cpu-demo
    4. spec:
    5. containers:
    6. - name: constraints-cpu-demo-ctr
    7. image: nginx
    8. resources:
    9. limits:
    10. cpu: "800m"
    11. requests:
    12. cpu: "500m"

    Create the Pod:

    1. kubectl apply -f https://k8s.io/examples/admin/resource/cpu-constraints-pod.yaml --namespace=constraints-cpu-example

    Verify that the Pod is running and that its container is healthy:

    View detailed information about the Pod:

    1. kubectl get pod constraints-cpu-demo --output=yaml --namespace=constraints-cpu-example

    The output shows that the Pod’s only container has a CPU request of 500 millicpu and CPU limit of 800 millicpu. These satisfy the constraints imposed by the LimitRange.

    1. resources:
    2. limits:
    3. cpu: 800m
    4. requests:
    5. cpu: 500m
    1. kubectl delete pod constraints-cpu-demo --namespace=constraints-cpu-example

    Attempt to create a Pod that exceeds the maximum CPU constraint

    Here’s a manifest for a Pod that has one container. The container specifies a CPU request of 500 millicpu and a cpu limit of 1.5 cpu.

    Configure Minimum and Maximum CPU Constraints for a Namespace - 图3

    1. apiVersion: v1
    2. kind: Pod
    3. metadata:
    4. name: constraints-cpu-demo-2
    5. spec:
    6. containers:
    7. - name: constraints-cpu-demo-2-ctr
    8. resources:
    9. cpu: "1.5"
    10. requests:
    11. cpu: "500m"

    Attempt to create the Pod:

    1. kubectl apply -f https://k8s.io/examples/admin/resource/cpu-constraints-pod-2.yaml --namespace=constraints-cpu-example

    The output shows that the Pod does not get created, because it defines an unacceptable container. That container is not acceptable because it specifies a CPU limit that is too large:

    1. Error from server (Forbidden): error when creating "examples/admin/resource/cpu-constraints-pod-2.yaml":
    2. pods "constraints-cpu-demo-2" is forbidden: maximum cpu usage per Container is 800m, but limit is 1500m.

    Attempt to create a Pod that does not meet the minimum CPU request

    Here’s a manifest for a Pod that has one container. The container specifies a CPU request of 100 millicpu and a CPU limit of 800 millicpu.

    Attempt to create the Pod:

    1. kubectl apply -f https://k8s.io/examples/admin/resource/cpu-constraints-pod-3.yaml --namespace=constraints-cpu-example

    The output shows that the Pod does not get created, because it defines an unacceptable container. That container is not acceptable because it specifies a CPU request that is lower than the enforced minimum:

    1. Error from server (Forbidden): error when creating "examples/admin/resource/cpu-constraints-pod-3.yaml":
    2. pods "constraints-cpu-demo-3" is forbidden: minimum cpu usage per Container is 200m, but request is 100m.

    Here’s a manifest for a Pod that has one container. The container does not specify a CPU request, nor does it specify a CPU limit.

    Configure Minimum and Maximum CPU Constraints for a Namespace - 图5

    1. apiVersion: v1
    2. kind: Pod
    3. metadata:
    4. name: constraints-cpu-demo-4
    5. spec:
    6. containers:
    7. - name: constraints-cpu-demo-4-ctr
    8. image: vish/stress

    Create the Pod:

    1. kubectl apply -f https://k8s.io/examples/admin/resource/cpu-constraints-pod-4.yaml --namespace=constraints-cpu-example

    View detailed information about the Pod:

    1. kubectl get pod constraints-cpu-demo-4 --namespace=constraints-cpu-example --output=yaml
    1. resources:
    2. limits:
    3. cpu: 800m
    4. requests:
    5. cpu: 800m

    Because that container did not specify its own CPU request and limit, the control plane applied the default CPU request and limit from the LimitRange for this namespace.

    At this point, your Pod may or may not be running. Recall that a prerequisite for this task is that your Nodes must have at least 1 CPU available for use. If each of your Nodes has only 1 CPU, then there might not be enough allocatable CPU on any Node to accommodate a request of 800 millicpu. If you happen to be using Nodes with 2 CPU, then you probably have enough CPU to accommodate the 800 millicpu request.

    Delete your Pod:

    Enforcement of minimum and maximum CPU constraints

    The maximum and minimum CPU constraints imposed on a namespace by a LimitRange are enforced only when a Pod is created or updated. If you change the LimitRange, it does not affect Pods that were created previously.

    Motivation for minimum and maximum CPU constraints

    As a cluster administrator, you might want to impose restrictions on the CPU resources that Pods can use. For example:

    • Each Node in a cluster has 2 CPU. You do not want to accept any Pod that requests more than 2 CPU, because no Node in the cluster can support the request.

    • A cluster is shared by your production and development departments. You want to allow production workloads to consume up to 3 CPU, but you want development workloads to be limited to 1 CPU. You create separate namespaces for production and development, and you apply CPU constraints to each namespace.

    Delete your namespace:

    What’s next

    For app developers