• Cloud-Native Container ProductsCloud-Native Container Products
    • KubeSphere Enterprisehot
    • KubeSphere Virtualizationhot
    • KubeSphere Enterprise HCI
  • Cloud-Native ServiceCloud-Native Service
    • KubeSphere Backuphot
    • KubeSphere Litenew
    • KubeSphere Inspectornew
  • Public Cloud Container ServicePublic Cloud Container Service
    • KubeSphere on AWS
    • KubeSphere on DigitalOcean

Limits

Describes the limits of KSV.

Before you use KubeSphere Virtualization (KSV), we recommend that you understand the service limits to ensure smooth installation and use of this service. This topic describes the resource limits of KSV.

Hardware

Before you use KSV, take notice of the following hardware limits:

  • The server node on which KSV is installed must run on Linux, and the kernel version of Linux must be 4.0 or later. We recommend that you use one of the following OSs: Ubuntu 18.04, Ubuntu 20.04, CentOS 7.9, Unity Operating System (UOS), Kylin V10, and EulerOS.

  • The server node must support virtualization. If a server node does not support virtualization, KSV runs in emulation mode. In this mode, more resources can be consumed, and all VM-based modules are unavailable.

  • The server node must have at least one unformatted and unpartitioned disk, or one unformatted partition. The minimum disk or partition size must be 100 GB.

  • If you use CentOS, make sure SELinux is disabled.

For more information, see Install KSV in single-node mode and Install KSV in multi-node mode.

Nodes and VMs

KSV provides the following types of editions: Basic, Developer, and Enterprise. The maximum number of nodes and VMs supported varies based on editions. The following table describes the details.

EditionMax. number of nodesMax. number of VMs
Basic
3
9
Developer
10
90
Enterprise
Unlimited
Unlimited

For more information about editions, see Editions.

Roles and permissions

KSV provides a complete access control system to manage user permissions on resources and features. KSV uses role-based access control (RBAC) to grant users the permissions on specific features. The following table describes the details.

ModuleOperationLimit
Overview
Resource monitoring
The following monitoring metrics are available to user admin only: hardware-related metrics, available resource statistics, network overview, and virtual resource usage statistics.
Physical Resources
  • Node management
  • Physics network management
The modules related to physical nodes and physical networks are available to user admin only.
Virtual Resources
  • Project management
  • VM management
  • Disk management
  • Network management
  • SSH key management
  • Security group management
User admin can manage all virtual resources in the cluster. Common users such as project administrators and project operators can manage the virtual resources created on their own, and project viewers have read-only permissions on virtual resources in the projects to which they belong.
O&M Tools
  • Timer tasks and policies
  • Alerts
  • Logs
User admin can manage all timer tasks, timer policies, alerts, and logs in the cluster. Common users such as project administrators and project operators can manage the timer tasks and timer policies created on their own, as well as the alerts and logs generated in the projects to which they belong. Project viewers have read-only permissions on timer tasks, timer policies, alerts, and logs in the projects to which they belong.
Users
Project and member management
The Users module is available to user admin only.

KubeSphere ®️ © QingCloud Technologies 2022