-
Notifications
You must be signed in to change notification settings - Fork 510
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pass registry-burst
and registry-qps
argument to kubelet
#1495
Comments
Hi @Jell and thanks for filing this issue. Do you have any sense for how high you'd like to set this? I'm wondering if a higher default makes sense or if we should just expose this as a setting. |
I'm not exactly sure how high we would want it, we'd have to experiment. But I would suspect probably at least a factor of 10, so something like 50 QPS to begin with. I think it's the kind of setting we'd probably appreciate being able to tweak though given it depends on the kind of registry and workload being deployed? Ideally I would be able to set that setting myself, then trigger a heavy load and raise the QPS until it handles the load, but not higher than. |
thanks for the quick reply and for looking into it btw! :) @jhaynes |
Hi @Jell. Thanks for your reply. Now I take responsibility on this issue. If you have updates or thoughts please leave comments. Thanks :) |
alright, will do thanks @gthao313 ! |
aright so we ended up testing with a custom build of bottlerocket, and those are the parameters we would want to be able to set ourselves and that worked for our use case (we managed to reach our needed throughput with those):
|
Hi @Jell . Thanks for your update. After investigating on those two arguments |
@gthao313 thanks! We would actually like to be able to set all the arguments I listed above, so in the CLI that would correspond to the following arguments:
|
also yes I think it's a good idea to keep the default for those 7 arguments, but just provide the means of tweaking them for improved performance. Although with regards to serialize-image-pulls, this could potentially be changed to false, as the documentation seem to indicate that it's only an issue with older docker versions and AUFS, which in bottlerocket's case should not be an issue? |
Sure thing! We'll support these arguments that you mentioned above. If you have any questions or updates, please let me know. |
awesome! thank you so much @gthao313 ❤️ |
Hi @Jell . Thanks for your patience. we have already exposed |
awesome sauce! Looking forward to the next release! :) Thanks a lot and for the very quick handling of the issue! |
We hit an issue when having bursts of traffic launching pods on a new node and hit a pull limit error due to the default registry-qps of 5, leading to us not being able to handle our production load.
What I'd like:
Being able to bump the registry-qps limit to fit our needs
Any alternatives you've considered:
Really not much we can do, our registry can handle the load but kubelet won't let us query it that fast.
This is a similar request to #1447
The text was updated successfully, but these errors were encountered: