-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Increase API size #135
Increase API size #135
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Will you also do staging? Not a true blocker since I think we'll rebuild the images on main after this is merged anyway, but I don't want to forget.
ff7e023
to
cb60e60
Compare
I'm not entirely sure how to re-run terraform tasks from here, but one did fail for staging. I think maybe that failed due to something else happening in Terraform at the same time; @cecilia-donnelly do you see anything about the change to staging that you would expect to cause an error? |
You know, @slifty, this is a real problem that only shows up on staging! @fenn-cs 's automated test script creates a subnet in Permanent's AWS that conflicts with the subnet search for staging, which is why this doesn't work. We ran into this a few months ago, too. Last time I deleted the conflicting subnet since Fon wasn't running his tests then and had deleted the relevant instances. We could (1) do that again and bring it back up with the script afterward, (2) do that and also change the script so it uses a non-conflicting subnet, or (3) make the search in |
@cecilia-donnelly I vote for 2 -- it sounds like a bug in the test scripts that should be resolved. @fenn-cs is this something you are able to knock out so we can get this merged? |
@slifty Yeah early next week, but if it's urgent I can check it out this weekend. |
@slifty So I started by doing 1) above which is deleting the subnets, using I have looked into how to make it "smart" and found the cidrsubnet which I have played with locally and realized the addressed calculated are still pretty predictable and is not all that "smart". So,
I want us to test this, by you repeating the action, so I can see if the For now, there is not conflict and the deployment can continue. Further contextHere is the problematic section: resource "aws_vpc" "mainvpc" {
cidr_block = "10.0.0.0/16"
enable_dns_support = true
enable_dns_hostnames = true
}
resource "aws_subnet" "public" {
vpc_id = aws_vpc.mainvpc.id
cidr_block = "10.0.0.0/24"
availability_zone = "us-west-2a"
tags = {
Name = "Default subnet for us-west-2a"
}
} Here is what it should look like with resource "aws_vpc" "mainvpc" {
cidr_block = "10.0.0.0/16"
enable_dns_support = true
enable_dns_hostnames = true
}
resource "aws_subnet" "public" {
vpc_id = aws_vpc.mainvpc.id
cidr_block = cidrsubnet(aws_vpc.mainvpc.cidr_block, 8, 1) // The last paramameter as "0" leads to the exact same conflicting address
availability_zone = "us-west-2a"
tags = {
Name = "Default subnet for us-west-2a"
}
} |
As part of our work exploring the impact of the sftp service, we identified the need to increase the perfomance capability of the API server in order to handle the volume of API calls made by SFTP users [1]. Amazon provides a range of instance sizes. This choice increases the CPU capacity of the machine without expanding the memory capacity. This is because our initial benchmarks seemed to be pinning CPU usage but not putting a particularly large dent in memory. [1] PermanentOrg/sftp-service#268
cb60e60
to
fd7d058
Compare
This PR increase the API machine to double the amount of processor capacity.
Resolves PermanentOrg/sftp-service#268