Skip to content

Commit

Permalink
Update README.md doc-2156 (#5189)
Browse files Browse the repository at this point in the history
  • Loading branch information
RachelHooley authored Dec 18, 2024
1 parent cd7f115 commit 3a57570
Showing 1 changed file with 21 additions and 3 deletions.
24 changes: 21 additions & 3 deletions src/docs/faqs/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -839,14 +839,18 @@ Then [create or update](https://github.com/spotinst/spotinst-sdk-python/blob/v2/
</details>

<details style="background:#f2f2f2; padding:6px; margin:10px 0px 0px 0px">
<summary markdown="span" style="color:#7632FE; font-weight:600" id="oceanssar">AKS, EKS, GKE: Should I get frequent <i>SelfSubjectAccessReview</i> requests after upgrading to Ocean Controller Version 2?</summary>
<summary markdown="span" style="color:#7632FE; font-weight:600" id="ocinsttax">GKE: Why can't I spin new spot instances (InstanceTaxonomies)?</summary>

<div style="padding-left:16px">

You can get this message if the instance type is not compatible with the boot disk type:

After you upgrade to Ocean Controller Version 2, you may get many SIEM alerts due to <i>SelfSubjectAccessReview</i> requests to your API server. This is expected behavior.
```ERROR, Can't Spin Instance: Name: sin-xxxx. Code: Error, Message: [pd-standard] features and [instance_type: VIRTUAL_MACHINE family: COMPUTE_OPTIMIZED generation: GEN_3 cpu_vendor: INTEL architecture: X86_64 ] InstanceTaxonomies are not compatible for creating instance.```

[Compare the machine family](https://cloud.google.com/compute/docs/machine-resource#machine_type_comparison) and PD-standard disk type to decide which is appropriate for your workload.

Contact support to decide on the selected instance type for launching and to remove the problematic instance type or family from the allowlist.

With the Version 2 Ocean Controller, Spot gets reports for any custom resource you gave it access to through the controller cluster role. For example, an Argo Rollouts custom resource or a VerticalPodAutoscaler for rightsizing. These require Spot to list the custom resources in the cluster and make sure there's read access. This happens when the controller starts up and on a regular basis when it's running.

</div>

Expand Down Expand Up @@ -874,6 +878,20 @@ This will let you manually increase the target of the cluster and the nodes will

</div>

</details>

<details style="background:#f2f2f2; padding:6px; margin:10px 0px 0px 0px">
<summary markdown="span" style="color:#7632FE; font-weight:600" id="oceanssar">AKS, EKS, GKE: Should I get frequent <i>SelfSubjectAccessReview</i> requests after upgrading to Ocean Controller Version 2?</summary>

<div style="padding-left:16px">


After you upgrade to Ocean Controller Version 2, you may get many SIEM alerts due to <i>SelfSubjectAccessReview</i> requests to your API server. This is expected behavior.

With the Version 2 Ocean Controller, Spot gets reports for any custom resource you gave it access to through the controller cluster role. For example, an Argo Rollouts custom resource or a VerticalPodAutoscaler for rightsizing. These require Spot to list the custom resources in the cluster and make sure there's read access. This happens when the controller starts up and on a regular basis when it's running.

</div>

</details>

<details style="background:#f2f2f2; padding:6px; margin:10px 0px 0px 0px">
Expand Down

0 comments on commit 3a57570

Please sign in to comment.