Amazon web services ECS服务没有稳定下来

Amazon web services ECS服务没有稳定下来,amazon-web-services,docker,amazon-ec2,amazon-cloudformation,amazon-ecs,Amazon Web Services,Docker,Amazon Ec2,Amazon Cloudformation,Amazon Ecs,没有针对此问题的指针,因为回滚将删除堆栈 下面是CloudFormation模板,用于在默认公共子网中的ECS容器实例(DesiredCount:1)中启动Jenkins docker容器 Jenkins docker镜像在dockerhub中公开,dockerhub在ECS容器实例中启动 我们使用ECS优化的AMI映像(AMI-05958d7635caa4d04)ca-central-1区域,运行docker版本18.06.1 { "AWSTemplateFormatVersion"

没有针对此问题的指针,因为回滚将删除堆栈


下面是CloudFormation模板,用于在默认公共子网中的ECS容器实例(DesiredCount:1)中启动Jenkins docker容器

Jenkins docker镜像在dockerhub中公开,dockerhub在ECS容器实例中启动

我们使用ECS优化的AMI映像(
AMI-05958d7635caa4d04
ca-central-1
区域,运行docker版本
18.06.1

{
    "AWSTemplateFormatVersion": "2010-09-09",
    "Description": "Jenkins Stack",
    "Parameters":{
        "VpcId": {
            "Type": "AWS::EC2::VPC::Id",
            "Description": "The target VPC Id"
        },
        "SubnetId": {
            "Type": "AWS::EC2::Subnet::Id",
            "Description": "The target subnet Id"
        },
        "KeyName": {
            "Type": "String",
            "Description": "The key pair that is allowed SSH access"
        }
    },
    "Resources":{
        "EC2Instance":{
            "Type": "AWS::EC2::Instance",
            "Properties":{
                "ImageId": "ami-05958d7635caa4d04",
                "InstanceType": "t2.micro",
                "SubnetId": { "Ref": "SubnetId"},
                "KeyName": { "Ref": "KeyName"},
                "SecurityGroupIds": [ { "Ref": "EC2InstanceSecurityGroup"} ],
                "IamInstanceProfile": { "Ref" : "EC2InstanceProfile"},
                "UserData":{
                    "Fn::Base64": { "Fn::Join": ["", [
                        "#!/bin/bash\n",
                        "echo ECS_CLUSTER=", { "Ref": "EcsCluster" }, " >> /etc/ecs/ecs.config\n",
                        "groupadd -g 1000 jenkins\n",
                        "useradd -u 1000 -g jenkins jenkins\n",
                        "mkdir -p /ecs/jenkins_home\n",
                        "chown -R jenkins:jenkins /ecs/jenkins_home\n"
                    ] ] }
                },
                "Tags": [ { "Key": "Name", "Value": { "Fn::Join": ["", [ { "Ref": "AWS::StackName"}, "-instance" ] ]} }]
            }
        },
        "EC2InstanceSecurityGroup":{
            "Type": "AWS::EC2::SecurityGroup",
            "Properties": {
                "GroupDescription": { "Fn::Join": ["", [ { "Ref": "AWS::StackName" }, " ingress security group" ] ] },
                "VpcId": { "Ref": "VpcId" },
                "SecurityGroupIngress": [
                    {
                        "IpProtocol": "tcp",
                        "FromPort": "8080",
                        "ToPort": "8080",
                        "SourceSecurityGroupId": { "Ref": "ElbSecurityGroup"}
                    },
                    {
                        "IpProtocol": "tcp",
                        "FromPort": "22",
                        "ToPort": "22",
                        "CidrIp": "0.0.0.0/0"
                    }
                ]
            }
        },
        "EC2InstanceProfile": {
            "Type": "AWS::IAM::InstanceProfile",
            "Properties": {
                "Path": "/",
                "Roles": [ { "Ref": "EC2InstanceRole" } ]
            }
        },
        "EC2InstanceRole": {
            "Type": "AWS::IAM::Role",
            "Properties": {
                "AssumeRolePolicyDocument":{
                    "Version": "2012-10-17",
                    "Statement": [
                        {
                            "Effect": "Allow",
                            "Principal": { "Service": [ "ec2.amazonaws.com" ] },
                            "Action": [ "sts:AssumeRole" ]
                        }
                    ]
                },
                "Path": "/",
                "ManagedPolicyArns": [ "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role" ]
            }
        },
        "ElbSecurityGroup": {
            "Type": "AWS::EC2::SecurityGroup",
            "Properties": {
                "GroupDescription": { "Fn::Join": ["", [ { "Ref": "AWS::StackName" }, " ELB ingress security group" ] ] },
                "VpcId": { "Ref": "VpcId"},
                "SecurityGroupIngress": [
                    {
                        "IpProtocol": "tcp",
                        "FromPort": "80",
                        "ToPort": "80",
                        "CidrIp": "0.0.0.0/0"
                    }
                ],
                "Tags": [ { "Key": "Name", "Value": { "Fn::Join": ["", [ { "Ref": "AWS::StackName" }, "-elb-sg" ] ] } } ]
            }
        },
        "ElasticLoadBalancer": {
            "Type": "AWS::ElasticLoadBalancing::LoadBalancer",
            "Properties": {
                "CrossZone": "false",
                "SecurityGroups": [ { "Ref": "ElbSecurityGroup" } ],
                "Listeners": [
                    {
                        "LoadBalancerPort": "80",
                        "InstancePort": "8080",
                        "Protocol": "http"
                    }

                ],
                "Instances": [ { "Ref": "EC2Instance"} ],
                "Subnets": [ { "Ref": "SubnetId"} ]
            }
        },
        "EcsCluster": {
            "Type": "AWS::ECS::Cluster"
        },
        "EcsTaskDefinition": {
            "Type": "AWS::ECS::TaskDefinition",
            "Properties": {
                "ContainerDefinitions": [
                    {
                        "Name": "jenkins",
                        "Image": "someaccount/jenkins:ecs",
                        "Memory": 995,
                        "PortMappings": [ { "ContainerPort": 8080, "HostPort": 8080 } ],
                        "MountPoints": [
                            {
                                "SourceVolume": "docker",
                                "ContainerPath": "/var/run/docker.sock"
                            },
                            {
                                "SourceVolume": "jenkins_home",
                                "ContainerPath": "/var/jenkins_home"
                            }
                        ]
                    }


                ],
                "Volumes": [
                    {
                        "Name": "jenkins_home",
                        "Host": { "SourcePath": "/ecs/jenkins_home" }
                    },
                    {
                        "Name": "docker",
                        "Host": { "SourcePath": "/var/run/docker.sock" }
                    }
                ]
            }
        },
        "EcsService": {
            "Type": "AWS::ECS::Service",
            "Properties": {
                "Cluster": { "Ref": "EcsCluster" },
                "TaskDefinition": { "Ref": "EcsTaskDefinition" },
                "DesiredCount": 1
            }
        }
    },
    "Outputs":{
        "ElbDomainName": {
            "Description": "Public DNS name of Elastic Load Balancer",
            "Value": {
                "Fn::GetAtt": [
                    "ElasticLoadBalancer",
                    "DNSName"
                ]
            }
        },
        "EC2InstanceDomainName": {
            "Description": "Public DNS name of EC2 instance",
            "Value": {
                "Fn::GetAtt": [
                    "EC2Instance",
                    "PublicDnsName"
                ]
            }
        }
    }
}

以下是故障事件:

此错误在小时后发生

ECS实例处于活动状态,因此AMI映像(
AMI-05958d7635caa4d04
)看起来很好。但没有处于
运行
停止
状态的任务

为了解决ECS任务的故障,我尝试了
docker compose
方法:

version: '2'

volumes:
  jenkins_home:
    external: true

services:
  jenkins:
    image: someaccount/jenkins:ecs
    volumes:
      - jenkins_home:/var/jenkins_home
      - /var/run/docker.sock:/var/run/docker.sock
    ports:
      - "8080:8080"
我看到,
docker compose up-d
启动了我笔记本电脑中的容器


ECS实例(
t2.micro
)激活后,我尝试手动运行新任务,出现以下错误:

在Cloudformation tempate中,
Definition
具有
“内存”:995


当计算平台为Linux服务器(VM)时,我们分析日志并进行故障排除

如何解决这个问题?在公有云的ECS环境中

t2.micro
您尝试启动的实例的总内存容量为1 GiB

ECS将尝试将任务启动到您的集群中,但它将意识到它无法满足要求,因为您的容器实例没有足够的可用内存(操作系统进程消耗超过5 MiB的内存),并且您的任务需要
“内存”:995
,这正是问题所在

在这种情况下,调试容器本身不会有帮助,因为它(可能)没有任何问题。这仅仅是因为ECS调度程序无法满足启动任务的指定要求,因此除了失败并发出“有用”消息之外,它无法做任何其他事情


有各种各样的事情可能会导致调度程序无法启动任务,它应该总是给出有关问题的提示。在你的情况下,它“清楚”地表明你没有足够的内存。另外要寻找的是每个容器实例只能启动一次的守护进程任务(这是我偶然遇到的)

CFN stack创建ECS服务时,请您在AWS管理控制台中打开ECS服务,查看服务事件?看到这里有助于理解发生了什么。@MartinLöper你是在要求遵循这些步骤吗@MartinLöper当CFN stack创建ECS服务时,我观察到的一件事是,如果我在现有集群中手动启动我的任务。它给出
资源:内存
错误。。。查询updated@MartinLöper而不是ECS,现在我们使用的是kubenetes,你能对此发表评论吗?评论不用于扩展讨论;这段对话已经结束。我们现在使用的是kubenetes,而不是ECS,您对此有何评论?