Consider a Kubernetes cluster with 3 worker nodes having a memory of 10GB each. Suppose the developers end up deploying some pods by mistake which consumes almost all the cpu and memory available in the node. Hence causing resource contention in the others application pods which serves traffic from consumers. This could also be caused when hackers inject high resource consuming pods intentionally into the system.

Bharat Dwarkani shared on Jul 12, 2020
image
itnext.io
bookmarks
share
visibility0
visibility0 share bookmarks
add