Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

lock is held by gke**** cluster-autoscaler on GCP #5277

Closed
eyltl opened this issue Oct 27, 2022 · 5 comments
Closed

lock is held by gke**** cluster-autoscaler on GCP #5277

eyltl opened this issue Oct 27, 2022 · 5 comments
Labels
area/cluster-autoscaler kind/bug Categorizes issue or PR as related to a bug.

Comments

@eyltl
Copy link

eyltl commented Oct 27, 2022

Which component are you using?:
cluster-autoscaler

Which autoscaling component hosted in this repository (cluster-autoscaler, vertical-pod-autoscaler, addon-resizer, helm charts) is the bug in?
cluster-autoscaler

What version of the component are you using?:
appVersion: 1.21.0

chart version 9.10.7

What k8s version are you using (kubectl version)?:
1.21

What environment is this in?:
gke

What did you expect to happen?:
the held should be by cluster-autoscaler , and not by gke cluster autoscaler.

What happened instead?:
lock is held by gke-******

How to reproduce it (as minimally and precisely as possible):
restart cluster autoscaler pods.

@eyltl eyltl added the kind/bug Categorizes issue or PR as related to a bug. label Oct 27, 2022
@x13n
Copy link
Member

x13n commented Oct 28, 2022

Right, when GKE autoscaling is disabled, it should be possible to run OSS Cluster Autoscaler instead. One workaround would be to use --namespace flag and run CA in any namespace other than kube-system, so the leader election resource lock is not conflicting with GKE CA.

@eyltl
Copy link
Author

eyltl commented Nov 4, 2022

thank you, seems to solve the issue.
i also had to update the role and the rolebinding to the same namespace specified in the "--namespace" so the serviceaccount will have permission to get and update the configmap

@gjtempleton
Copy link
Member

@eyltl Sounds like your issue is resolved, are you happy for us to close this issue?

@eyltl
Copy link
Author

eyltl commented Dec 9, 2022

Yes
Thank you very much

@eyltl eyltl closed this as completed Dec 9, 2022
@ujjwal
Copy link

ujjwal commented Dec 31, 2023

thank you, seems to solve the issue. i also had to update the role and the rolebinding to the same namespace specified in the "--namespace" so the serviceaccount will have permission to get and update the configmap

I am running into the same issue, do you have steps on the updates to the role & role bindings?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/cluster-autoscaler kind/bug Categorizes issue or PR as related to a bug.
Projects
None yet
Development

No branches or pull requests

5 participants