Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

change: remove dev-only defaults #394

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

thearchitector
Copy link

@thearchitector thearchitector commented Mar 4, 2025

also add a random minio secret instead of pulling from vault

not super sure how to test changes here or why the pr checks are failing. spin up a new cluster?

add: random minio secret
lagoon:
env:
FIELD_AUTOCONFIRM_CONFIDENCE: 0.8
FIELD_CONFIG_PATH: "fields_config.yaml"
ask-my-docs:
Copy link
Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

im not convinced this is correct either since it means all clusters will spin up using our dev openai creds, which feels wrong

@ltellesfl
Copy link
Contributor

also add a random minio secret instead of pulling from vault

not super sure how to test changes here or why the pr checks are failing. spin up a new cluster?

Yes, by creating a new cluster using this branch

storage:
accessKey: <path:tools/argo/data/indico-dev/ins-dev/storage#access_key_id>
secretKey: <path:tools/argo/data/indico-dev/ins-dev/storage#secret_access_key>
accessKey: ${random_password.minio-username.result}
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks like the secrets being referenced here are AWS credentials to connect to a storage bucket. Is it okay to set these as minio:<random_password>?

Have you tested deploying a cluster with this change?

Copy link
Author

@thearchitector thearchitector Mar 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

they configure the root username & password for minio, not to an external s3 iam user

# TODO: enable this when we have a backup bucket
# 1 less than the hard limit of the weaviate node group type
GOMEMLIMIT: "31GiB"
# TODO: switch this to a dedicated weaviate backup bucket
backups:
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Whoops, looks like we'll need to change the backup configuration for Azure, it shouldn't be pointing to s3

Copy link
Author

@thearchitector thearchitector Mar 10, 2025

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

weaviate backs up to minio, not s3

given that we're getting rid of weaviate soon, i figured it didn't matter much

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants