Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(monitoring): disabling container insights #530

Merged
merged 1 commit into from
Apr 3, 2024

Conversation

geekbrother
Copy link
Contributor

@geekbrother geekbrother commented Feb 21, 2024

Description

This PR disables AWS CloudWatch Container Insights for the ECS after the CPU #528 and Memory #529 metrics are migrated to the Prometheus and we don't need the Container Insights anymore.

The following changes are made:

  • Bump ci_workflows tag to 0.2.6,
  • Changing ECS containerInsights to disable.

How Has This Been Tested?

Not tested.

Merging dependency policy 🚧

Due Diligence

  • Breaking change
  • Requires a documentation update
  • Requires a e2e/integration test update

@geekbrother geekbrother self-assigned this Feb 21, 2024
@geekbrother geekbrother force-pushed the feat/prometheus_mem_usage branch 2 times, most recently from ebbea93 to 539ede1 Compare February 23, 2024 10:33
@geekbrother geekbrother force-pushed the feat/disable_container_insights branch from 8c9be8a to 34f79b1 Compare February 23, 2024 10:46
@geekbrother geekbrother changed the base branch from feat/prometheus_mem_usage to master February 23, 2024 10:48
@geekbrother geekbrother force-pushed the feat/disable_container_insights branch from 34f79b1 to e6e9af1 Compare February 23, 2024 10:48
@geekbrother geekbrother marked this pull request as ready for review February 23, 2024 10:54
setting {
name = "containerInsights"
value = "enabled"
value = "disabled"
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

What does autoscaling trigger on then?

predefined_metric_type = "ECSServiceAverageCPUUtilization"

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Disabling ContainerInsights should not hurt the Fargate autoscaling, because for the autoscaling the AWS Predefined Scaling Metric is used which is different from the ContainerInsights.
We are using target_tracking_scaling_policy_configuration with the ECSServiceAverageCPUUtilization | ECSServiceAverageMemoryUtilization.

@geekbrother geekbrother marked this pull request as draft March 5, 2024 09:36
@geekbrother geekbrother force-pushed the feat/disable_container_insights branch from e6e9af1 to 24ec49c Compare April 3, 2024 10:06
@geekbrother geekbrother marked this pull request as ready for review April 3, 2024 10:11
@geekbrother geekbrother merged commit b2fc9e6 into master Apr 3, 2024
13 of 19 checks passed
@geekbrother geekbrother deleted the feat/disable_container_insights branch April 3, 2024 10:12
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants