Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Improve AWS "gotchas" list and discoverability of cloud-provider READMEs. #1746

Merged
merged 5 commits into from
Mar 5, 2019
Merged

Conversation

cablespaghetti
Copy link
Contributor

Better document the caveats of running a multi-az autoscaling group with the cluster autoscaler on AWS. Also help people find the cloud provider specific documentation rather than just the FAQ.

Fixes #1744.

@k8s-ci-robot k8s-ci-robot added the cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. label Mar 4, 2019
@k8s-ci-robot k8s-ci-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Mar 4, 2019
@bskiba
Copy link
Member

bskiba commented Mar 4, 2019

Thank you for this change!

I wonder now, this is about multi-zone ASGs, right? Wasn't our answer that Cluster Autoscaler shouldn't be used at all with ASGs spanning multiple zones, as it expects to have homogeneous node-groups to scale and you should always do what is described in third bullet - use an ASG per zone?
@aleksandra-malinowska @MaciekPytel

@cablespaghetti
Copy link
Contributor Author

I should probably change my setup to use multiple ASGs then and update the PR.

@cablespaghetti
Copy link
Contributor Author

Hopefully this better encourages recommended practice whilst still explaining what's going on to people with the same issue as me.

/assign @aleksandra-malinowska

@@ -142,8 +142,8 @@ If you'd like to scale node groups from 0, an `autoscaling:DescribeLaunchConfigu
```

## Common Notes and Gotchas:
- The `/etc/ssl/certs/ca-certificates.crt` should exist by default on your ec2 instance. If you use Amazon Linux 2 (EKS woker node AMI by default), use `/etc/ssl/certs/ca-bundle.crt` instead.
- Cluster autoscaler is not zone aware (for now), so if you wish to span multiple availability zones in your autoscaling groups beware that cluster autoscaler will not evenly distribute them. For more information, see https://github.com/kubernetes/contrib/pull/1552#discussion_r75532949.
- The `/etc/ssl/certs/ca-certificates.crt` should exist by default on your ec2 instance. If you use Amazon Linux 2 (EKS worker node AMI by default), use `/etc/kubernetes/pki/ca.crt` instead for the volume hostPath of your cluster-autoscaler manifest.
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

nit: "instead of the volume hostPath of your cluster-autoscaler manifest"

@bskiba
Copy link
Member

bskiba commented Mar 5, 2019

This looks great, thank you. One nit.

Signed-off-by: Sam Weston <[email protected]>
@cablespaghetti
Copy link
Contributor Author

cablespaghetti commented Mar 5, 2019 via email

@bskiba
Copy link
Member

bskiba commented Mar 5, 2019

/lgtm
/approve

@k8s-ci-robot k8s-ci-robot added the lgtm "Looks good to me", indicates that a PR is ready to be merged. label Mar 5, 2019
@k8s-ci-robot
Copy link
Contributor

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: bskiba

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@k8s-ci-robot k8s-ci-robot added the approved Indicates a PR has been approved by an approver from all required OWNERS files. label Mar 5, 2019
@k8s-ci-robot k8s-ci-robot merged commit ed0dd0c into kubernetes:master Mar 5, 2019
yaroslava-serdiuk pushed a commit to yaroslava-serdiuk/autoscaler that referenced this pull request Feb 22, 2024
* Don't deploy visibility by default

* Review Remarks

* Review Remarks

* Review Remarks
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
approved Indicates a PR has been approved by an approver from all required OWNERS files. cncf-cla: yes Indicates the PR's author has signed the CNCF CLA. lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants