-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Amazon EKS AMI creates containerd socket at diferent path #338
Comments
BTW, there is also awslabs/amazon-eks-ami#724 |
After making the following settings, it worked even if
|
What about default |
Hello, Setting The proper way to force activate a feature that's not autodetected is to use: In the Helm chart, this can be set through a custom This is available since Agent 7.29. We will update the Kubernetes distribution documentation with this information. |
Sorry, I certainly couldn't check the
I can check containerd metrics with this setting, but I can't seem to check |
@cw-sakamoto These metrics are coming from the Check the output of
If that's the case but you still don't see |
Looking at I can confirm metrics for |
@cw-sakamoto It's indeed not expected to only have 1 run. The issue is probably specific to your scenario, so a support ticket would be a good place to solve it. |
I also face similar issue as @cw-sakamoto , although my agent status looks [OK], I can't confirm metrics for kubenetes.{cpu,memory,filesystem,network}.*.
|
Describe what happened:
Amazon EKS AMI is currently creating the containerd socket at
/run/dockershim.sock
, the reason for that is thataws-cni-plugin
still points to that path, so they cannot at the moment just change to/run/containerd/containerd.sock
.Setting
criSocketPath: /run/dockershim.sock
works for CRI metrics, but not for containerd metrics.Describe what you expected:
containerd metrics to be available, maybe have a way to set a different mountPath for the criSocketPath inside datadog container so that it recognises it is a containerd socket.
Steps to reproduce the issue:
Spin up cluster on EKS and set
--container-runtime containerd
forbootstrap.sh
Additional environment details (Operating System, Cloud provider, etc):
EKS AMI v1.21.2-13+d2965f0db10712
The text was updated successfully, but these errors were encountered: