Kubernetes pod autoscaler based on queue size in AWS SQS. It periodically retrieves the number of messages(Visible and inflight) in your queue and scales pods accordingly.
Setting up kube-sqs-autoscaler requires two steps:
- Deploying it as an incluster service in your cluster
- Adding AWS permissions so it can read the number of messages in your queues.
Deployin kube-sqs-autoscaler should be as simple as applying this deployment:
---
apiVersion: extensions/v1beta1
kind: Deployment
metadata:
name: kube-sqs-autoscaler
labels:
app: kube-sqs-autoscaler
spec:
replicas: 1
selector:
matchLabels:
app: kube-sqs-autoscaler
template:
metadata:
labels:
app: kube-sqs-autoscaler
spec:
containers:
- name: kube-sqs-autoscaler
image: Build and add your tag here
command:
- /kube-sqs-autoscaler
- --sqs-queue-url=https://sqs.your_aws_region.amazonaws.com/your_aws_account_number/your_queue_name # required
- --kubernetes-deployment=your-kubernetes-deployment-name # required
- --kubernetes-namespace=$(POD_NAMESPACE) # optional
- --aws-region=us-west-1 #required
- --poll-period=5s # optional
- --scale-down-cool-down=30s # optional
- --scale-up-cool-down=5m # optional
- --scale-up-messages=100 # optional
- --scale-down-messages=10 # optional
- --max-pods=5 # optional
- --min-pods=1 # optional
env:
- name: POD_NAMESPACE
valueFrom:
fieldRef:
fieldPath: metadata.namespace
resources:
requests:
memory: "200Mi"
cpu: "100m"
limits:
memory: "200Mi"
cpu: "100m"
volumeMounts:
- name: ssl-certs
mountPath: /etc/ssl/certs/ca-certificates.crt
readOnly: true
volumes:
- name: ssl-certs
hostPath:
path: "/etc/ssl/certs/ca-certificates.crt"
Next you want to attach this policy so kube-sqs-autoscaler can retreive SQS attributes:
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": "sqs:GetQueueAttributes",
"Resource": "arn:aws:sqs:your_aws_account_number:your_region:your_sqs_queue"
}]
}