Configuring QoS Rate Limiting for Inter-Pod Access
Scenario
Bandwidth preemption occurs between different containers deployed on the same node, which may cause service jitter. You can configure QoS rate limiting for inter-pod access to prevent this problem.
Notes and Constraints
- Only clusters later than v1.19.10 are supported.
- Only clusters that use the Cloud Native Network 2.0 and VPC network models are supported.
- Only common containers (runC as the container runtime) are supported. Secure containers (Kata Containers as the container runtime) are not supported.
- Only the rate of access from pods to pods is limited. Access to nodes and external access are not affected.
Procedure
You can add annotations to a pod to specify its egress and ingress bandwidth.
apiVersion: v1
kind: Pod
metadata:
annotations:
kubernetes.io/ingress-bandwidth: 100M
kubernetes.io/egress-bandwidth: 100M
... - kubernetes.io/ingress-bandwidth: ingress bandwidth of the pod
- kubernetes.io/egress-bandwidth: egress bandwidth of the pod
If these two parameters are not specified, the bandwidth is not limited.
Last Article: Accessing a Container
Next Article: Pod Labels and Annotations
Did this article solve your problem?
Thank you for your score!Your feedback would help us improve the website.