-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: composer 3 serverless upgrade #182
base: main
Are you sure you want to change the base?
Conversation
…SC changes are poorly documented and lead to too much scope creep for this PR. Instead, just add an explicit firewall rule allowing egress to the PSA range
…DB, I can't find where the egress range to AlloyDB is defined.. Fixing this properly might require converting PSA to PSC.
For in-place upgrades: note that I've encountered some odd state behavior in Terraform. │ on ../../components/dpu-workflow/terraform/main.tf line 78, in resource "google_composer_environment" "composer_env": I tried a few things, not sure which did it but I eventually got it resolved:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall looks good - just a small question about leftover comments - if we're gonna leave commented code in, we should probably document why, otherwise we should probably get rid of it.
I also see alot of networking configuration removed - we don't need it? if not, great - I just want to make sure that this is not missing by accident.
Thanks for the review Eyal, I've removed a few stray comments you flagged, and am waiting on the results of a triggered workflow both in my own environment and the automated CI environment (which now does the full functional workflow after #184 !) to verify that the removed firewall/DNS resources can be removed safely for Composer 3. Once that is all green I'll nudge you again for the approval. |
…ise-knowledge-solution into composer-3-serverless-upgrade
…Composer (these files were revived by merge) and 2: remove hardcoding in dpu-subnet module
…ently from Composer 2 and require directpath ranges in firewall rules 34.126.0.0/18
…en when the restricted VIP is configured... Until I can better troubleshoot that behavior as part of VPCSC implementation, I'll leave this with private vip
…wn firewall issues can be triggered by background processes of Composer, but some might be triggered only during the workflow. The second test after workflow will help identify network-related failures in the previous stage
@eyalbenivri I've now confirmed that everything passes with Composer 3 after removing networking resources. I validated that none of the Composer 2 requirements for firewall and DNS apply to composer 3, but I did identify an undocumented network path requirement addressed by adding Anyway, it's green now, PTAL |
Composer 3 is now GA, which effectively treats it as serverless (all Composer resources are in a producer project) so that we have fewer networking resources to manage and fewer potential GKE-related vulnerabilities flagged by SHA scanners n our own project.
Using Composer 3 will reduce some flaky CI failures we get in Composer 2, where Composer 2 randomly assigns IP with a race condition that occasionally conflicts with IP assigned elsewhere in terraform. Because Composer 3 is in a separate producer project, there are fewer significantly IP resources and possibility for clash on our own project.
In addition to the Composer 3 upgrade, this led to some incidental networking fixes / cleanup to remove networking components and TF variables that were used in Composer 2 but not Composer 3