-
Notifications
You must be signed in to change notification settings - Fork 15
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[LAB-337] Dedicated private IPFS node #567
Conversation
The latest updates on your projects. Learn more about Vercel for Git ↗︎
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The way things are forwarding to IPFS is clever.
@@ -0,0 +1,37 @@ | |||
- name: Provision Bacalhau Requester |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should probably be Provision IPFS
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for catching that.
protocol = "TCP_UDP" | ||
|
||
default_action { | ||
target_group_arn = aws_lb_target_group.labdao_ipfs_api_tg.arn |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It took me a bit to wrap my head around how this is working. Its probably worth putting a comment in here that we are forwarding traffic through to the IPFS node for this port only because the cli requires pinning certain files in IPFS. It seems like the thing we might forget and will confuse us later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
will do!
62f8fb7
to
e5a24b0
Compare
These changes now create and setup a dedicated IPFS node where both requester and compute now connect. Also using `private_ipfs=true` option you can make your IPFS deployment be private. Currently the swarm key for private IPFS is randomly generated at bootstrap time. Next step would be to have this key getting fetched from AWS SSM parameter store likely.
e5a24b0
to
daa1fac
Compare
These changes now create and setup a dedicated
IPFS node where both requester and compute now connect.
Also using
private_ipfs=true
option you can make yourIPFS deployment be private. Currently the swarm key for
private IPFS is randomly generated at bootstrap time.
Next step would be to have this key getting fetched from
AWS SSM parameter store likely.