Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Help configure Keda HPA based on AWS/EC2 CloudWatch CPUUtilization trigger type #17

Open
AAber opened this issue Jul 14, 2020 · 0 comments
Labels

Comments

@AAber
Copy link

AAber commented Jul 14, 2020

This is what I have so far:

kind: Secret
metadata:
  name: keda-aws-secrets
data:
  AWS_ACCESS_KEY_ID: XXXXXXXXXXXXXXXXXXXX
  AWS_SECRET_ACCESS_KEY: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
---
apiVersion: keda.k8s.io/v1alpha1
kind: TriggerAuthentication
metadata:
  name: keda-trigger-auth-aws-credentials
  namespace: keda
spec:
  secretTargetRef:
  - parameter: awsAccessKeyID     # Required.
    name: keda-aws-secrets        # Required.
    key: AWS_ACCESS_KEY_ID        # Required.
  - parameter: awsSecretAccessKey # Required.
    name: keda-aws-secrets        # Required.
    key: AWS_SECRET_ACCESS_KEY    # Required.
---
apiVersion: keda.k8s.io/v1alpha1
kind: ScaledObject
metadata:
  name: aws-cloudwatch-cpu-scaledobject
  namespace: keda
  labels:
    test: gateway-app
spec:
  scaleTargetRef:
    deploymentName: gateway-app
  triggers:
  - type: aws-cloudwatch
    metadata:
      namespace: AWS/EC2
      dimensionName: AutoScalingGroupName
      dimensionValue: eksctl-us-east-1-app-spot-ng-XXXXXXXXXXXXX
      metricName: CPUUtilization
      statistic: Average
      period: "180"
      evaluationPeriods: "1"
      threshold: "80"
      comparisonOperator: GreaterThanThreshold
      alarmActions: scaleUp
      awsRegion: "us-east-1"
    authentication/Ref:
      name: keda-trigger-auth-aws-credentials````

I saw the SQS trigger type sample but I don't know what metadata to use for the aws-cloudwatch trigger type.
Please advise if possible and how to configure.

Thanks.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

1 participant