Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Google Cloud Kubernetes cluster + AWS Firewall Rules #9915

Merged
merged 6 commits into from
Nov 13, 2024

Conversation

stevenplatt
Copy link
Collaborator

Change Log

  • New Google Kubernetes Engine Cluster
    New cluster includes regular and spot instance node pools, as well as required firewall rules for ingress and egress on ports 40400-40499.

  • Additional security group for existing AWS Kubernetes Cluster
    Security group added to Kubernetes cluster to permit ingress and egress of ports 40400-40499.

Copy link
Contributor

github-actions bot commented Nov 12, 2024

Changes to public function bytecode sizes

Generated at commit: 8a676cf7d26c71e43be386fe84d0eeccea24ab13, compared to commit: 3889deffe372c94b2a38e465e89f6babbee18fec

🧾 Summary (100% most significant diffs)

Program Bytecode size in bytes (+/-) %
Token::public_dispatch +2,716 ❌ +7.94%
AvmTest::bulk_testing +1,724 ❌ +7.25%
AvmTest::public_dispatch +754 ❌ +1.23%

Full diff report 👇
Program Bytecode size in bytes (+/-) %
Token::public_dispatch 36,905 (+2,716) +7.94%
AvmTest::bulk_testing 25,509 (+1,724) +7.25%
AvmTest::public_dispatch 62,001 (+754) +1.23%

Copy link
Contributor

Changes to circuit sizes

Generated at commit: 8a676cf7d26c71e43be386fe84d0eeccea24ab13, compared to commit: 3889deffe372c94b2a38e465e89f6babbee18fec

🧾 Summary (100% most significant diffs)

Program ACIR opcodes (+/-) % Circuit size (+/-) %
rollup_base_public -2 ✅ -0.00% -4 ✅ -0.00%

Full diff report 👇
Program ACIR opcodes (+/-) % Circuit size (+/-) %
rollup_base_public 470,052 (-2) -0.00% 3,770,556 (-4) -0.00%

@@ -26,21 +26,69 @@ data "aws_availability_zones" "available" {
}
}

# Create security group for node traffic
resource "aws_security_group" "node_traffic" {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Do we also need to allow the node port (8080) and the ethereum port (8545) ?

@stevenplatt stevenplatt merged commit b36c137 into master Nov 13, 2024
65 checks passed
@stevenplatt stevenplatt deleted the srp/gke-kubernetes-cluster branch November 13, 2024 18:20
stevenplatt added a commit that referenced this pull request Nov 13, 2024
# Change Log

- **New Google Kubernetes Engine Cluster**
New cluster includes regular and spot instance node pools, as well as
required firewall rules for ingress and egress on ports `40400-40499`.

- **Additional security group for existing AWS Kubernetes Cluster**
Security group added to Kubernetes cluster to permit ingress and egress
of ports 40400-40499.
TomAFrench added a commit that referenced this pull request Nov 14, 2024
* master: (245 commits)
  chore: pull signed bitshifts from sync PR (#9939)
  chore: pull frontend changes from sync PR (#9935)
  feat: separate bytecode logs from unencrypted logs (#9891)
  git subrepo push --branch=master noir-projects/aztec-nr
  git_subrepo.sh: Fix parent in .gitrepo file. [skip ci]
  chore: replace relative paths to noir-protocol-circuits
  git subrepo push --branch=master barretenberg
  fix: token naming issue (#9950)
  feat: multiplier oracle (#9902)
  refactor: token refunds cleanup (#9943)
  chore: Use stack based recursion instead of function recursion (#9947)
  feat: parallelize DIE pass (#9933)
  feat(avm): Simulator enforces integral tag for DIV and field tag for FDIV (#9944)
  chore(avm): bugfixing witness generation for add, sub, mul for FF (#9938)
  feat: Google Cloud Kubernetes cluster + AWS Firewall Rules (#9915)
  chore: nuking ancient redundant test (#9941)
  fix: include 'master' version for aztec-up scripts (#9940)
  chore: fixing test contract fixture (#9909)
  refactor: token naming cleanup (#9904)
  chore: pull SSA parser from sync PR (#9928)
  ...
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants