Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Operational Awareness] Configuration for max-payload-size in HTTP client used by the Kubernetes client has be verified #517

Open
1 task
tobiscr opened this issue Nov 21, 2024 · 0 comments
Labels
area/control-plane Related to all activities around Kyma Control Plane kind/feature Categorizes issue or PR as related to a new feature.

Comments

@tobiscr
Copy link
Contributor

tobiscr commented Nov 21, 2024

Description

As result or the operational awareness workshop, we agreed to review the configuration of the HTTP client used by the Kubernetes library. Goal is to ensure that an oversized response from the Kubernetes API will not lead to an OOM situation in KIM - therefore the maximal payload-size has to be set to a proper value (e.g. 5MB).

AC:

  • Review the maximal payload size used by the HTTP client of the Kuberentes library in KIM. Ensure the max. payload size is set to 5 MB.

Reasons

Avoid KIM instability or OOM situations if Kubernetes API server replies an unexpected huge payload.

Attachments

@tobiscr tobiscr added kind/feature Categorizes issue or PR as related to a new feature. area/control-plane Related to all activities around Kyma Control Plane labels Nov 21, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/control-plane Related to all activities around Kyma Control Plane kind/feature Categorizes issue or PR as related to a new feature.
Projects
None yet
Development

No branches or pull requests

1 participant