Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Issue/5004 #5468

Merged
merged 73 commits into from
Jun 18, 2020
Merged

Issue/5004 #5468

merged 73 commits into from
Jun 18, 2020

Conversation

markjschreiber
Copy link
Contributor

Addresses issue 5004 and possibly several others with the AWS Batch backend. The changes allow for re-use of job definitions to prevent eventual consistency collisions. Other changes are largely simplifications or improvements to the backend that simplify the integration with AWS.

  1. Added additional documentation
  2. Added additional server logging which is useful for diagnostics and has been requested by users
  3. Updated cromwell-aws-s3filesystem package to use AWS SDKv2 removing the need for two versions of the SDK
  4. Removed the requirement for a proxy container is the AWS worker
  5. Removed the need for a custom AMI for the EC2 workers
  6. Removed the need for a custom ECS agent
  7. Set up /var/lib/docker/docker to auto-expand as inputs are now read directly into the container

markjschreiber and others added 30 commits February 3, 2020 17:09
…to promote re-use of definitions.

Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
markjschreiber and others added 2 commits June 12, 2020 16:47
…Add type declarations to public variables

Signed-off-by: markjschreiber <markjschreiber@gmail.com>
…hrowing exception when `newFileSystem` method is called and s3 filesystem already exists [BA-6481]
@grsterin grsterin merged commit 88a35b1 into develop Jun 18, 2020
@grsterin grsterin deleted the issue/5004 branch June 18, 2020 23:35
@rdavison
Copy link

rdavison commented Jul 17, 2020

@markjschreiber Thank you for this PR. I had a quick look at it and it looks pretty good. I just had a few questions.

  1. Set up /var/lib/docker/docker to auto-expand as inputs are now read directly into the container

Is this the only documentation on this requirement? Also, are you saying that that directory is now being auto-expanded in the underlying ECS image, or that a client needs to create an AMI to auto-expand that directory instead of /cromwell_root? Also, is it /var/lib/docker/docker or /var/lib/docker/containers?

EDIT:

The README.md references a LaunchTemplate which provides a UserData script to an underlying AMI, but it's not linked anywhere. I think I've tracked it down to the document here: https://github.com/aws-samples/aws-genomics-workflows/blob/master/src/templates/aws-genomics-launch-template.template.yaml

@markjschreiber
Copy link
Contributor Author

markjschreiber commented Jul 20, 2020 via email

@rdavison
Copy link

@markjschreiber

The EC2 workers contain a script that automatically expands that mount
users don't need to set that up. No custom AMI is required, in theory any
AMI that can work with ECS could be used.

Is this a new feature of all new ECS Optimized Amazon Linux instances?

@markjschreiber
Copy link
Contributor Author

markjschreiber commented Jul 21, 2020 via email

@rdavison
Copy link

Sorry if I'm still not understanding. Is that script provided when you run cromwell? How are you supposed to get that script? I'm assuming you're referring to the EBS autoscaler?

@rdavison
Copy link

@markjschreiber : Oh! I think maybe I understand where the misunderstanding is. Could it be you're implying that the Cromwell server is correctly provisioning the worker nodes on behalf of the user?

@markjschreiber
Copy link
Contributor Author

markjschreiber commented Jul 22, 2020 via email

dfeinzeig added a commit to dfeinzeig/caper that referenced this pull request Nov 14, 2020
…default-runtime-attributes for aws batch
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 17, 2020
@nvanaja nvanaja mentioned this pull request Nov 17, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 17, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 18, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 18, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 18, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 18, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 20, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 24, 2020
nvanaja pushed a commit to nvanaja/cromwell that referenced this pull request Nov 24, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Community Contribution A pull request from the Cromwell open-source community ⭐ Two Thumbs-Up ⭐
Projects
None yet
Development

Successfully merging this pull request may close these issues.

AWS Batch Job Cross-talk Reuse job definitions
7 participants