-
Notifications
You must be signed in to change notification settings - Fork 4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Default Azure VMSS min size to 0 if not provided #6858
Conversation
Welcome @rrangith! |
Hi @rrangith. Thanks for your PR. I'm waiting for a kubernetes member to verify that this patch is reasonable to test. If it is, they should reply with Once the patch is verified, the new status will be reflected by the I understand the commands that are listed here. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: rrangith The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
8d85380
to
7eb0bf0
Compare
/assign @jackfrancis @feiskyer I presented this at the SIG Autoscaling meeting and they suggested I reach out to you. Can I please get a review? |
@@ -315,7 +315,7 @@ func (m *AzureManager) getFilteredScaleSets(filter []labelAutoDiscoveryConfig) ( | |||
} | |||
spec := &dynamic.NodeGroupSpec{ | |||
Name: *scaleSet.Name, | |||
MinSize: 1, | |||
MinSize: 0, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would suggest default as 1. Can remove code that ignores vmss creation if min-size not provided.
PR needs rebase. Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository. |
The Kubernetes project currently lacks enough contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all PRs. This bot triages PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
closing in favour of #6863 |
What type of PR is this?
/kind feature
What this PR does / why we need it:
Currently the autoscaler will ignore a VMSS if no min size is provided. This PR changes the behaviour so it will instead default to 0. This is a safe minimum and will allow VMSS's without a
min
tag to be considered.Azure has a limit of 50 tags per resource https://learn.microsoft.com/en-us/azure/azure-resource-manager/management/tag-resources#limitations. This change will allow people to save 1 tag space if they are ok with the default of 0.
Alternatives Considered
An alternative approach to this problem is having a
min
andmax
as part of the autodiscovery tags, similar to how GCP does itautoscaler/cluster-autoscaler/main.go
Line 182 in cf606a1
min
andmax
could be optional for Azure and used as default values if a VMSS is missing itsmin
/max
tagsHere is the alternative PR #6863
Does this PR introduce a user-facing change?
Additional documentation e.g., KEPs (Kubernetes Enhancement Proposals), usage docs, etc.: