-
Notifications
You must be signed in to change notification settings - Fork 44
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(monitoring): disabling container insights #530
Conversation
ebbea93
to
539ede1
Compare
8c9be8a
to
34f79b1
Compare
34f79b1
to
e6e9af1
Compare
setting { | ||
name = "containerInsights" | ||
value = "enabled" | ||
value = "disabled" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
What does autoscaling trigger on then?
predefined_metric_type = "ECSServiceAverageCPUUtilization" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Disabling ContainerInsights
should not hurt the Fargate autoscaling, because for the autoscaling the AWS Predefined Scaling Metric
is used which is different from the ContainerInsights
.
We are using target_tracking_scaling_policy_configuration with the ECSServiceAverageCPUUtilization | ECSServiceAverageMemoryUtilization.
e6e9af1
to
24ec49c
Compare
Description
This PR disables AWS CloudWatch Container Insights for the ECS after the CPU #528 and Memory #529 metrics are migrated to the Prometheus and we don't need the Container Insights anymore.
The following changes are made:
Bumpci_workflows
tag to0.2.6
,containerInsights
todisable
.How Has This Been Tested?
Not tested.
Merging dependency policy 🚧
Due Diligence