HorizontalPodAutoscaler (HPA) support¶
Table of Contents¶
Introduction¶
autoscaling
option enables HPA scaling for relevant service components:
https://kubernetes.io/docs/tasks/run-application/horizontal-pod-autoscale/
Autoscaling is based on custom application metrics provided through Prometheus.
Pre-conditions¶
Read post-install steps before installation!
Resource requests¶
HPA controlled CPU pods SHOULD have appropriate resource requests or affinity rules (enabled in their subcharts and tested to work) so that k8s scheduler does not schedule too many of them on the same node(s). Otherwise they never reach ready state.
If you use different models than the default ones, update TGI and TEI resource requests to match model requirements.
Too large requests would not be a problem as long as pods still fit to available nodes. However, unless rules have been added to pods preventing them from being scheduled on same nodes, too small requests would be an issue:
Multiple inferencing instances interfere / slow down each other, especially if there are no NRI policies that provide further isolation
Containers can become non-functional when their actual resource usage crosses the specified limits
Prometheus metrics¶
Autoscaling requires k8s Prometheus installation and monitoring to be enabled in the top level chart. See monitoring instructions for details.
Prometheus-adapter¶
Prometheus-adapter is also needed, to provide k8s custom metrics based on collected service metrics: https://github.com/prometheus-community/helm-charts/tree/main/charts/prometheus-adapter
Install adapter after installing Prometheus:
$ prom_ns=monitoring # namespace for Prometheus/-adapter
$ kubectl get svc -n $prom_ns
$ helm install prometheus-adapter prometheus-community/prometheus-adapter --version 4.10.0 -n $prom_ns \
--set prometheus.url=http://prometheus-stack-kube-prom-prometheus.$prom_ns.svc \
--set prometheus.prometheusSpec.serviceMonitorSelectorNilUsesHelmValues=false
NOTE: the service name given above in prometheus.url
must match the listed Prometheus service name,
otherwise adapter cannot access it!
(Alternative for setting the above prometheusSpec
variable to false
is making sure that
prometheusRelease
value in top-level chart matches the release name given to the Prometheus
install i.e. when it differs from prometheus-stack
used above. That is used to annotate
created serviceMonitors with a label Prometheus requires when above option is true
.)
Gotchas¶
Why HPA is opt-in:
Installing custom metrics for HPA requires manual post-install steps, as Prometheus-operator and -adapter are missing support needed to automate that
Top level chart name needs to conform to Prometheus metric naming conventions, as it is also used as a metric name prefix (with dashes converted to underscores)
Unless pod resource requests, affinity rules, scheduling topology constraints and/or cluster NRI policies are used to better isolate CPU inferencing pods from each other, service instances scaled up on same node may never get to ready state
Current HPA rules are just examples, for efficient scaling they need to be fine-tuned for given setup performance (underlying HW, used models and data types, OPEA version etc)
Debugging missing custom metric issues is hard as logs rarely include anything helpful
Enable HPA¶
Install¶
ChatQnA includes pre-configured values files for scaling the services.
To enable HPA, add -f chatqna/hpa-values.yaml
option to your helm install
command line.
If CPU versions of TGI (and TEI) services are being scaled, resource requests and probe timings
suitable for CPU usage need to be used. chatqna/cpu-values.yaml
provides example of such constraints
which can be added (with -f
option) to your Helm install. As those values depend on the underlying HW,
used model, data type and image versions, the specified resource values may need to be updated.
Post-install¶
Above step created custom metrics config for Prometheus-adapter suitable for HPA use.
Take backup of existing custom metrics config before replacing it:
$ prom_ns=monitoring # Prometheus/-adapter namespace
$ name=$(kubectl -n $prom_ns get cm --selector app.kubernetes.io/name=prometheus-adapter -o name | cut -d/ -f2)
$ kubectl -n $prom_ns get cm/$name -o yaml > adapter-config.yaml.bak
Save generated config with values matching current adapter config:
$ chart=chatqna # OPEA chart release name
$ kubectl get cm/$chart-custom-metrics -o yaml | sed \
-e "s/name:.*custom-metrics$/name: $name/" \
-e "s/namespace: default$/namespace: $prom_ns/" \
> adapter-config.yaml
NOTE: if there are existing custom metric rules you need to retain, add them from saved
adapter-config.yaml.bak
to adapter-config.yaml
file now!
Overwrite current Prometheus-adapter configMap with generated one:
$ kubectl delete -n $prom_ns cm/$name
$ kubectl apply -f adapter-config.yaml
And restart it, so that it will use the new config:
$ selector=app.kubernetes.io/name=prometheus-adapter
$ kubectl -n $prom_ns delete $(kubectl -n $prom_ns get pod --selector $selector -o name)
Verify¶
After verifying that service metrics work, one can verify that HPA rules can access custom metrics based on them.
Verify that there are (TGI and/or TEI) custom metrics prefixed with chart name:
$ kubectl get --raw /apis/custom.metrics.k8s.io/v1beta1 | jq .resources[].name
And HPA rules have TARGET values for HPA controlled service deployments (instead of <unknown>
):
$ ns=default # OPEA namespace
$ kubectl -n $ns get hpa