Files
k8s-configs/clusters/k8s-avroid-office.prod.local/namespaces/example/example.yaml
Rustam Tagaev da6bf80454 [DO-1496] add limits and network-policy (!4)
схлопнул networkpolicy limits и namespace в один файл и назвал его так же как namespace

Co-authored-by: Rustam Tagaev <rustam.tagaev@avroid.tech>
Reviewed-on: https://git.avroid.tech/K8s/k8s-configs/pulls/4
Reviewed-by: Denis Patrakeev <denis.patrakeev@avroid.team>
Co-authored-by: Rustam Tagaev <rustam.tagaev@avroid.team>
Co-committed-by: Rustam Tagaev <rustam.tagaev@avroid.team>
2025-01-31 10:49:39 +03:00

52 lines
1.1 KiB
YAML

---
# создаем namespace
apiVersion: v1
kind: Namespace
metadata:
name: example
labels:
name: example
app.kubernetes.io/managed-by: manual
annotations:
scheduler.alpha.kubernetes.io/node-selector: "nodetype=worker"
---
# выделяем лимиты на текущий namespace
apiVersion: v1
kind: ResourceQuota
metadata:
name: example
namespace: example
labels:
app.kubernetes.io/managed-by: manual
spec:
hard:
configmaps: "100"
limits.cpu: "16"
limits.memory: 32Gi
persistentvolumeclaims: "1"
pods: "100"
replicationcontrollers: "0"
requests.cpu: "8"
requests.memory: "24Gi"
requests.storage: "2Gi"
resourcequotas: "1"
secrets: "100"
services: "100"
services.loadbalancers: "0"
services.nodeports: "0"
---
# запрещаем все для текущего namespace
apiVersion: networking.k8s.io/v1
kind: NetworkPolicy
metadata:
name: deny-all
namespace: example
spec:
podSelector: {}
policyTypes:
- Ingress
- Egress
ingress: []
egress: []