-
Notifications
You must be signed in to change notification settings - Fork 361
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Issue/5004 #5468
Issue/5004 #5468
Conversation
…rd removing proxy.
…to promote re-use of definitions. Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
Signed-off-by: markjschreiber <markjschreiber@gmail.com>
…Add type declarations to public variables Signed-off-by: markjschreiber <markjschreiber@gmail.com>
…hrowing exception when `newFileSystem` method is called and s3 filesystem already exists [BA-6481]
@markjschreiber Thank you for this PR. I had a quick look at it and it looks pretty good. I just had a few questions.
Is this the only documentation on this requirement? Also, are you saying that that directory is now being auto-expanded in the underlying ECS image, or that a client needs to create an AMI to auto-expand that directory instead of EDIT: The README.md references a LaunchTemplate which provides a UserData script to an underlying AMI, but it's not linked anywhere. I think I've tracked it down to the document here: https://github.com/aws-samples/aws-genomics-workflows/blob/master/src/templates/aws-genomics-launch-template.template.yaml |
The EC2 workers contain a script that automatically expands that mount
users don't need to set that up. No custom AMI is required, in theory any
AMI that can work with ECS could be used.
…On Fri, Jul 17, 2020 at 7:35 PM Richard Davison ***@***.***> wrote:
@markjschreiber <https://github.com/markjschreiber>
1. Set up /var/lib/docker/docker to auto-expand as inputs are now read
directly into the container
Is this the only documentation on this requirement? Also, are you saying
that that directory is now being auto-expanded in the underlying ECS image,
or that a client needs to create an AMI to auto-expand that directory
instead of /cromwell_root? Also, is it /var/lib/docker/docker or
/var/lib/docker/containers?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#5468 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AF2E6EKVSIMWREHDRE7WZ43R4DN3TANCNFSM4LW5UP3A>
.
|
Is this a new feature of all new ECS Optimized Amazon Linux instances? |
No. The feature is due to a script that monitors disk storage and mounts
new disks into a btrfs filesystem. This isn’t standard for ECS.
…On Tue, Jul 21, 2020 at 4:08 PM Richard Davison ***@***.***> wrote:
@markjschreiber <https://github.com/markjschreiber>
The EC2 workers contain a script that automatically expands that mount
users don't need to set that up. No custom AMI is required, in theory any
AMI that can work with ECS could be used.
Is this a new feature of all new ECS Optimized Amazon Linux instances?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#5468 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AF2E6EM4MI3WWXI2AFZAK2LR4XYUHANCNFSM4LW5UP3A>
.
|
Sorry if I'm still not understanding. Is that script provided when you run cromwell? How are you supposed to get that script? I'm assuming you're referring to the EBS autoscaler? |
@markjschreiber : Oh! I think maybe I understand where the misunderstanding is. Could it be you're implying that the Cromwell server is correctly provisioning the worker nodes on behalf of the user? |
When you submit a job to Cromwell with AWS Batch configured as the backend
AWS Batch will deploy workers via ECS. Those workers will be deployed
according to a launch template that configures the EC2 workers including
downloading and starting the EBS auto expander on the EC2 as part of its
startup.
So it’s standard for the ECS cluster/ Batch compute environment used by
Cromwell but not standard for any other ECS node.
…On Wed, Jul 22, 2020 at 4:04 PM Richard Davison ***@***.***> wrote:
@markjschreiber <https://github.com/markjschreiber> : Oh! I think maybe I
understand where the misunderstanding is. Could it be you're implying that
the Cromwell *server* is correctly provisioning the worker nodes on
behalf of the user?
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#5468 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/AF2E6EKOXJKQMVJWYBPRYK3R45A6FANCNFSM4LW5UP3A>
.
|
…default-runtime-attributes for aws batch
Addresses issue 5004 and possibly several others with the AWS Batch backend. The changes allow for re-use of job definitions to prevent eventual consistency collisions. Other changes are largely simplifications or improvements to the backend that simplify the integration with AWS.
cromwell-aws-s3filesystem
package to use AWS SDKv2 removing the need for two versions of the SDK/var/lib/docker/docker
to auto-expand as inputs are now read directly into the container