Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add warning about AWS EC2 't2' instance type #18258

Merged
merged 1 commit into from
Dec 10, 2015
Merged

Add warning about AWS EC2 't2' instance type #18258

merged 1 commit into from
Dec 10, 2015

Conversation

antoineco
Copy link
Contributor

Adds a warning about using t2 instance type on AWS, which is the default instance type atm.

fixes (explains / warns about) #17488

@k8s-bot
Copy link

k8s-bot commented Dec 6, 2015

Can one of the admins verify that this patch is reasonable to test? (reply "ok to test", or if you trust the user, reply "add to whitelist")

If this message is too spammy, please complain to ixdy.

1 similar comment
@k8s-bot
Copy link

k8s-bot commented Dec 6, 2015

Can one of the admins verify that this patch is reasonable to test? (reply "ok to test", or if you trust the user, reply "add to whitelist")

If this message is too spammy, please complain to ixdy.

@k8s-github-robot
Copy link

Labelling this PR as size/S

@k8s-github-robot k8s-github-robot added the size/S Denotes a PR that changes 10-29 lines, ignoring generated files. label Dec 6, 2015
@justinsb
Copy link
Member

justinsb commented Dec 7, 2015

@antoineco thanks for tracking this one down. Do you think we should just use bigger default sizes? I normally run m3.medium or m3.large myself. I personally think that while it's nice to be able to try k8s out for cheap while spending a minimal amount of money, if you get a bad impression as a result that's a poor trade-off for everyone. And I think for production most people should be running the m3 class instead of the t2.

@antoineco
Copy link
Contributor Author

I think most AWS users are already aware of the risk involved by running steady loads on t2 class instances, and I don't believe anybody would seriously consider this class for production. However it's good to warn users because I'm certainly not the only person who'll get surprised by such a situation.

The graphs I posted show the load in a development cluster, which receives close to no traffic except the one generated by the devs. At some point we were running enough containers to make k8s components consume around 15% of the instances CPU constantly (not only the master). This worked just fine during a week and a half and suddenly broke without notice.

How to gain awareness of your cloud provider's quirks the hard way :)

@brendandburns
Copy link
Contributor

LGTM.

@brendandburns brendandburns added lgtm "Looks good to me", indicates that a PR is ready to be merged. ok-to-merge labels Dec 10, 2015
@k8s-github-robot
Copy link

@k8s-bot ok to test
@k8s-bot test this

pr builder appears to be missing, activating due to 'lgtm' label.

@k8s-bot
Copy link

k8s-bot commented Dec 10, 2015

GCE e2e build/test failed for commit 926148c.

@wojtek-t
Copy link
Member

@k8s-bot test this please

@k8s-bot
Copy link

k8s-bot commented Dec 10, 2015

GCE e2e test build/test passed for commit 926148c.

@k8s-github-robot
Copy link

Automatic merge from submit-queue

k8s-github-robot pushed a commit that referenced this pull request Dec 10, 2015
Auto commit by PR queue bot
@k8s-github-robot k8s-github-robot merged commit 0f39921 into kubernetes:master Dec 10, 2015
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lgtm "Looks good to me", indicates that a PR is ready to be merged. size/S Denotes a PR that changes 10-29 lines, ignoring generated files.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

8 participants