Skip to content

Commit 620f780

Browse files
fix nit layout and broken link (#5450)
1 parent 570f67a commit 620f780

File tree

2 files changed

+3
-2
lines changed

2 files changed

+3
-2
lines changed

website/content/en/docs/best-practices/managing-resources.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -26,8 +26,8 @@ namespace without specifying at least resource requests for CPU and Memory of it
2626
the system or quota may reject Pod creation.
2727
Check the following statements obtained from K8s docs:
2828

29-
- > If a LimitRange is activated in a namespace for computing resources like CPU and memory, users must specify requests or limits for those values. Otherwise, the system may reject Pod creation. ([Reference][k8s-limit-range]).
30-
- > If quota is enabled in a namespace for compute resources like cpu and memory, users must specify requests or limits for those values; otherwise, the quota system may reject pod creation. ([Reference][k8s-resources-quotas]).
29+
- > _"If a LimitRange is activated in a namespace for computing resources like CPU and memory, users must specify requests or limits for those values. Otherwise, the system may reject Pod creation."_ ([Reference][k8s-limit-range]).
30+
- > _"If quota is enabled in a namespace for compute resources like cpu and memory, users must specify requests or limits for those values; otherwise, the quota system may reject pod creation."_ ([Reference][k8s-resources-quotas]).
3131
3232
In an effort to support clusters with the above configuration, to ensure safe operations and avoid negatively
3333
impacting other workloads: Operators should **always** include reasonable memory and CPU resource requests for their own deployment as well as for operands they deploy.

website/content/en/docs/best-practices/multi-tenancy.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -50,6 +50,7 @@ and further information.
5050
[olm-docs]: /docs/olm-integration/
5151
[ocp-route]: https://docs.openshift.com/container-platform/4.9/rest_api/network_apis/route-route-openshift-io-v1.html#route-route-openshift-io-v1
5252
[ocp-ingress-doc]: https://docs.openshift.com/container-platform/4.9/networking/ingress-operator.html#nw-ingress-sharding-route-labels_configuring-ingress
53+
[k8s-ingress-controllers]: https://kubernetes.io/docs/concepts/services-networking/ingress-controllers/
5354
[ocp-blog]: https://rcarrata.com/openshift/ocp4_route_sharding/
5455
[k8s-network-policy]: https://kubernetes.io/docs/concepts/services-networking/network-policies/
5556
[ingress-class]: https://kubernetes.io/docs/concepts/services-networking/ingress/#ingress-class

0 commit comments

Comments
 (0)