Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[EKS] [request]: Container Insights to support tainted nodes #507

Closed
samuelthan opened this issue Oct 3, 2019 · 1 comment
Closed

[EKS] [request]: Container Insights to support tainted nodes #507

samuelthan opened this issue Oct 3, 2019 · 1 comment
Labels
EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue

Comments

@samuelthan
Copy link

Tell us about your request
AWS Container Insights to support tainted EKS nodes

Which service(s) is this request for?
EKS

Tell us about the problem you're trying to solve. What are you trying to do, and why is it hard?
When a EKS nodes is tainted, no other pods can be scheduled into nodes unless tolerance is applied.
Container Insights implementation which includes cloudwatch-agents with a non-system namespace is not abled to be scheduled into the tainted node due to such restriction.

Are you currently working around this issue?
Not use tainted feature in kubernetes. not a good workaraound at the moment.

@samuelthan samuelthan added the Proposed Community submitted issue label Oct 3, 2019
@ellenthsu ellenthsu added the EKS Amazon Elastic Kubernetes Service label Nov 6, 2019
@ivanmp91
Copy link

I think this would be really nice! Especially if you're running datastores inside k8s and you want to isolate those pods to be running on specific node groups.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
EKS Amazon Elastic Kubernetes Service Proposed Community submitted issue
Projects
None yet
Development

No branches or pull requests

4 participants