-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: reverting cognito #16454
fix: reverting cognito #16454
Conversation
WalkthroughThe pull request introduces modifications to the Changes
Possibly related PRs
Suggested labels
Suggested reviewers
📜 Recent review detailsConfiguration used: .coderabbit.yaml 📒 Files selected for processing (1)
🚧 Files skipped from review as they are similar to previous changes (1)
Thank you for using CodeRabbit. We offer it for free to the OSS community and would appreciate your support in helping us grow. If you find it useful, would you consider giving us a shout-out on your favorite social media? 🪧 TipsChatThere are 3 ways to chat with CodeRabbit:
Note: Be mindful of the bot's finite context window. It's strongly recommended to break down tasks such as reading entire modules into smaller chunks. For a focused discussion, use review comments to chat about specific files and their changes, instead of using the PR comments. CodeRabbit Commands (Invoked using PR comments)
Other keywords and placeholders
Documentation and Community
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Actionable comments posted: 1
🧹 Outside diff range and nitpick comments (6)
charts/islandis/values.staging.yaml (3)
Line range hint
1024-1026
: Significant increase in api service resources and scaling.The following changes have been made to the api service configuration:
- CPU limit increased from 400m to 1200m
- Memory limit increased from 896Mi to 3200Mi
- Maximum replicas increased from 50 to 60
These changes substantially increase the resources allocated to the api service.
Please provide information on the reasons for this significant resource increase. Are there specific performance issues or expected load increases that necessitate these changes? Have you considered gradually scaling up the resources to find an optimal configuration?
Line range hint
1186-1188
: Increased maximum replicas for application-system-api service.The maximum number of replicas for the application-system-api service has been increased from 50 to 60.
Can you provide insights into the reasons for this increase in maximum replicas? Are there specific load patterns or performance requirements driving this change? Have you considered the potential impact on resource utilization and costs?
Line range hint
3730-3740
: Current web service configuration review.While there are no changes in this PR for the web service, it's worth noting that the current configuration maintains:
- A high number of maximum replicas (50)
- Significant resource allocations (1000m CPU, 768Mi memory limits)
Consider implementing a periodic review process for the web service's resource utilization and scaling patterns. This could help optimize the configuration over time, potentially reducing costs without compromising performance. Are there any monitoring tools in place to track the actual resource usage and traffic patterns for this service?
charts/islandis/values.dev.yaml (3)
Line range hint
1037-1039
: Approved: Increased maximum replicas for better scalabilityThe maximum number of replicas for the
api
service has been increased from 50 to 60. This change will allow for better scalability and handling of higher loads.To ensure optimal resource utilization:
- Monitor the actual resource usage and scaling patterns after this change.
- Consider setting up alerts for when the number of replicas approaches the new maximum.
- Review and adjust resource requests and limits if necessary to accommodate the potential increase in total resource usage.
Line range hint
1456-1458
: Approved: Increased maximum replicas for improved scalabilityThe maximum number of replicas for the
application-system-api
service has been increased from 60 to 70. This change aligns with the overall trend of scaling up services and will allow for better handling of increased loads.To ensure optimal performance and resource utilization:
- Monitor the actual resource usage and scaling patterns after this change.
- Set up alerts for when the number of replicas approaches the new maximum.
- Regularly review and adjust resource requests and limits to accommodate the potential increase in total resource usage.
- Consider load testing to ensure the system can handle the increased number of replicas effectively.
Line range hint
1724-1726
: Approved: Increased maximum replicas for worker scalabilityThe maximum number of replicas for the
application-system-api-worker
service has been increased from 3 to 5. This change will allow for better scalability of the worker service.To ensure optimal worker performance:
- Monitor the worker's task queue length and processing times to ensure the increased capacity is utilized effectively.
- Review the worker's resource usage patterns to confirm that the current resource allocations are sufficient for the increased number of replicas.
- Consider implementing or reviewing any rate limiting mechanisms to prevent overwhelming downstream services or databases with the increased worker capacity.
📜 Review details
Configuration used: .coderabbit.yaml
Review profile: CHILL
📒 Files selected for processing (6)
- apps/air-discount-scheme/api/infra/api.ts (1 hunks)
- apps/air-discount-scheme/backend/infra/air-discount-scheme-backend.ts (1 hunks)
- apps/air-discount-scheme/web/infra/web.ts (1 hunks)
- charts/islandis/values.dev.yaml (1 hunks)
- charts/islandis/values.prod.yaml (3 hunks)
- charts/islandis/values.staging.yaml (1 hunks)
🚧 Files skipped from review as they are similar to previous changes (3)
- apps/air-discount-scheme/api/infra/api.ts
- apps/air-discount-scheme/backend/infra/air-discount-scheme-backend.ts
- apps/air-discount-scheme/web/infra/web.ts
🧰 Additional context used
🔇 Additional comments (4)
charts/islandis/values.prod.yaml (3)
131-131
: Verify the security implications of disabling global auth for the backend service.The ingress annotation
nginx.ingress.kubernetes.io/enable-global-auth: 'false'
has been added to the air-discount-scheme-backend service, disabling global authentication. This change mirrors the one made to the API service and carries similar security considerations.Please ensure that:
- This change is intentional and necessary for the backend service.
- Appropriate authentication mechanisms are in place to secure the backend.
- Exposing the backend service without global auth does not introduce vulnerabilities.
You can use the following command to review the complete ingress configuration for this service:
kubectl get ingress -n air-discount-scheme -o yaml | sed -n '/air-discount-scheme-backend/,/---/p'
227-229
: Review and verify changes to web service ingress configuration.Two new annotations have been added to the air-discount-scheme-web service ingress:
nginx.ingress.kubernetes.io/enable-global-auth: 'false'
: This disables global authentication for the web service.nginx.ingress.kubernetes.io/proxy-buffer-size: '8k'
: This sets the proxy buffer size to 8k.Please confirm the following:
- The disabling of global auth is intentional and doesn't compromise the security of the web service.
- Alternative authentication methods are in place if needed.
- The 8k proxy buffer size is appropriate for the web service's needs and doesn't cause any performance issues.
You can use these commands to verify the current configuration and compare with other services:
# Check the full ingress configuration for the web service kubectl get ingress -n air-discount-scheme -o yaml | sed -n '/air-discount-scheme-web/,/---/p' # Compare proxy buffer sizes across different ingresses kubectl get ingress -A -o jsonpath='{range .items[*]}{.metadata.name}{"\t"}{.metadata.namespace}{"\t"}{.metadata.annotations.nginx\.ingress\.kubernetes\.io/proxy-buffer-size}{"\n"}{end}' | sort
45-45
: Verify the security implications of disabling global auth.A new ingress annotation
nginx.ingress.kubernetes.io/enable-global-auth: 'false'
has been added, which disables global authentication for this ingress. While this might be intentional, it could potentially expose the service if not properly secured through other means.Please confirm that:
- This change is intentional and necessary.
- Alternative authentication mechanisms are in place if required.
- The service is safe to be exposed without global auth.
You can use the following command to check other ingress configurations and compare:
charts/islandis/values.dev.yaml (1)
Line range hint
133-141
: Verify security implications of disabling global auth and exposing new endpointsThe following changes have been made to the
air-discount-scheme-backend
service:
- Global authentication has been disabled with the annotation
nginx.ingress.kubernetes.io/enable-global-auth: 'false'
.- New paths
/api/swagger
and/api/public
have been exposed.Please ensure that:
- Disabling global authentication is intentional and doesn't introduce security vulnerabilities.
- The newly exposed endpoints (
/api/swagger
and/api/public
) have appropriate security measures in place.To check the security implications, run the following commands:
...
Attach a link to issue if relevant
What
Specify what you're trying to achieve
Why
Specify why you need to achieve this
Screenshots / Gifs
Attach Screenshots / Gifs to help reviewers understand the scope of the pull request
Checklist:
Summary by CodeRabbit
New Features
/api/swagger
and/api/public
.Bug Fixes