-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dev #126
base: main
Are you sure you want to change the base?
Dev #126
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
Warning Rate limit exceeded@dudizimber has exceeded the limit for the number of commits or files that can be reviewed per hour. Please wait 24 minutes and 56 seconds before requesting another review. ⌛ How to resolve this issue?After the wait time has elapsed, a review can be triggered using the We recommend that you space out your commits to avoid hitting the rate limit. 🚦 How do rate limits work?CodeRabbit enforces hourly rate limits for each developer per organization. Our paid plans have higher rate limits than the trial, open-source and free plans. In all cases, we re-allow further reviews after a brief timeout. Please see our FAQ for further information. 📒 Files selected for processing (1)
WalkthroughThis pull request updates Grafana configuration manifests in both development and production environments, revises an observability rule, and modifies the Victoriametrics configuration. The allowed domains in both Grafana files now include "falkordb.cloud" and "falkordb.com," and user sign-up is enabled. The production manifest introduces additional authentication attributes, such as updated OAuth scopes, role management policies, and group permissions. The observability rule file has been renamed for consistency, and the Victoriametrics configuration has been significantly altered, including the addition of a new access control field. Changes
Possibly related PRs
Suggested reviewers
Poem
Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
CodeRabbit Configuration File (
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (2)
observability/rules/containerrestarts.rules.yml (1)
5-8
: Ensure Consistent Naming Convention for the Container Restart RuleThe metadata name has been updated to
"k8s.rules.containerrestarts"
on line 5, while the group name on line 8 still reads"k8s.rules.container_restarts"
. For clarity and consistency—and as noted in the PR summary—please verify if the group name should also be updated to match the new naming convention.argocd/ctrl_plane/prod/manifests/grafana.yaml (1)
74-84
: Update Grafana Google Authentication ConfigurationThe authentication configuration has been comprehensively updated:
- Scopes (line 74): Now include
openid
,profile
, and an additional cloud identity scope.- Allowed Domains (line 77): Expanded to
"falkordb.cloud,falkordb.com"
.- Sign-up (line 78): Enabled by setting
allow_sign_up
to"true"
.- Role Management Attributes (lines 79-84): New fields such as
role_attribute_path
,skip_org_role_sync
,hosted_domain
,allow_assign_grafana_admin
,allowed_groups
, andauto_login
have been introduced.One point to verify is the logical expression in the
role_attribute_path
(line 79). Its current structure:role_attribute_path: email=="david.zimberknopf@falkordb.com" && 'Admin' || contains(groups[*], 'devops@falkordb.com') && 'Admin' || 'Viewer'relies on the operator precedence of
&&
and||
. Consider adding explicit parentheses to ensure that the intended evaluation order is maintained.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (3)
argocd/ctrl_plane/dev/manifests/grafana.yaml
(1 hunks)argocd/ctrl_plane/prod/manifests/grafana.yaml
(1 hunks)observability/rules/containerrestarts.rules.yml
(1 hunks)
🔇 Additional comments (1)
argocd/ctrl_plane/dev/manifests/grafana.yaml (1)
77-78
: Align Development Grafana Configuration with Production StandardsThe
allowed_domains
field has been updated to"falkordb.cloud,falkordb.com"
andallow_sign_up
is now set to"true"
in the development manifest. These changes mirror the production configuration improvements—just ensure that such access policies are appropriate within the development environment.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (3)
argocd/ctrl_plane/dev/victoriametrics.yaml
(1 hunks)argocd/ctrl_plane/prod/victoriametrics.yaml
(1 hunks)tofu/gcp/observability_stack/control_plane/infra/main.tf
(1 hunks)
⏰ Context from checks skipped due to timeout of 90000ms (2)
- GitHub Check: Analyze (javascript-typescript)
- GitHub Check: Analyze (javascript-typescript)
🔇 Additional comments (4)
argocd/ctrl_plane/prod/victoriametrics.yaml (2)
93-93
: New Field: unauthorizedUserAccessSpec AddedThe addition of
unauthorizedUserAccessSpec: []
under thevmauth
spec enhances flexibility for future unauthorized access configurations. Ensure that an empty default is appropriate and that it aligns with the system’s intended access control mechanisms.
96-98
: Ingress Allow-HTTP Annotation UpdateThe change of the ingress annotation
kubernetes.io/ingress.allow-http
from"false"
to"true"
now permits HTTP traffic. This update may expose the service if TLS termination is not enforced upstream. Please verify that allowing HTTP in production is intentional and in line with security policies.argocd/ctrl_plane/dev/victoriametrics.yaml (2)
93-93
: New Field: unauthorizedUserAccessSpec Added in DevAdding
unauthorizedUserAccessSpec: []
under thevmauth
spec in the dev manifest ensures consistency with production for future unauthorized access configuration. Confirm that an empty array is the desired default.
94-98
: Ingress Allow-HTTP Discrepancy Verification in DevIn the dev configuration, the ingress annotation
kubernetes.io/ingress.allow-http
remains"false"
, which differs from the production setting. Please confirm that this discrepancy is intentional to reflect different environment requirements.
@@ -100,7 +100,7 @@ module "gke" { | |||
enable_private_nodes = true | |||
http_load_balancing = true | |||
|
|||
default_max_pods_per_node = 110 | |||
default_max_pods_per_node = 25 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Critical Parameter Change: Verify the new default_max_pods_per_node value.
Changing default_max_pods_per_node
from the previously expected value (likely 110) to 25 drastically reduces the number of pods that can be scheduled on each node. Given the overall infrastructure requirements, especially considering updated Grafana configurations that might influence workload behavior, please confirm that this lower threshold is intentional and sufficient for your expected workloads. It may be beneficial to add documentation or comments explaining the rationale behind this change.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 0
🧹 Nitpick comments (2)
argocd/ctrl_plane/prod/victoriametrics.yaml (1)
93-98
: Verify Access Control Configuration Enhancement.
The newunauthorizedUserAccessSpec
field under thevmauth
section—featuringdiscover_backend_ips: true
and a URL mapping withsrc_paths
and an array forurl_prefix
—adds enhanced granularity for backend IP discovery and request routing. Please verify that the type (an array forurl_prefix
) and the configuration align with the downstream consumers’ expectations and overall security policies.argocd/ctrl_plane/dev/victoriametrics.yaml (1)
93-98
: Validate Development Access Control Enhancements.
The newunauthorizedUserAccessSpec
field withdiscover_backend_ips: true
and the defined URL mapping now targets the development endpoint (https://vmauth.observability.dev.internal.falkordb.cloud
). Confirm that this configuration is intended for the development setup and that it does not inadvertently expose sensitive operations.
📜 Review details
Configuration used: CodeRabbit UI
Review profile: CHILL
Plan: Pro
📒 Files selected for processing (2)
argocd/ctrl_plane/dev/victoriametrics.yaml
(1 hunks)argocd/ctrl_plane/prod/victoriametrics.yaml
(1 hunks)
🔇 Additional comments (2)
argocd/ctrl_plane/prod/victoriametrics.yaml (1)
103-103
: Review Ingress HTTP Setting in Production.
Changingkubernetes.io/ingress.allow-http
from"false"
to"true"
enables HTTP traffic. Ensure that this change has been thoroughly assessed for security implications in the production environment and that it meets the operational requirements.argocd/ctrl_plane/dev/victoriametrics.yaml (1)
104-104
: Confirm Ingress HTTP Configuration for Development.
The ingress annotationkubernetes.io/ingress.allow-http
remains set to"false"
in the development configuration, which differs from the production setting. Please confirm that this discrepancy is intentional, reflecting differing security or testing requirements between environments.
This reverts commit 29b452f.
fix #123
Summary by CodeRabbit
New Features
Refactor
Chores