-
Notifications
You must be signed in to change notification settings - Fork 233
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
feat: Aztec multi cloud deployment (#9980)
# Change Log - **Working Aztec multi cloud deployment** - Additional firewall rules have been added to expose ethereum nodes in AWS and Cloud. - Test `multicloud-demo.yaml` helm values file is included for testing deployments. - Load balancers are renamed to not use Helm helper functions, due to these values not being readable during terraform tests. - Updated Google Cloud node sizes - so accommodate beefy provers testing ## Testing These changes were testing by issuing a `terraform apply` command, and connecting to nodes to confirm block confirmations were happening, as well as prover bids were being sent from nodes in Google Cloud to AWS.
- Loading branch information
1 parent
202870a
commit d29bcf6
Showing
15 changed files
with
413 additions
and
122 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,31 @@ | ||
# deployment syntax: helm upgrade --install srp-test . -n srp-test --create-namespace --values "./values/multicloud-demo.yaml" | ||
|
||
telemetry: | ||
enabled: false | ||
otelCollectorEndpoint: http://metrics-opentelemetry-collector.metrics:4318 | ||
|
||
validator: | ||
replicas: 1 | ||
validatorKeys: | ||
- 0xac0974bec39a17e36ba4a6b4d238ff944bacb478cbed5efcae784d7bf4f2ff80 | ||
validatorAddresses: | ||
- 0xf39Fd6e51aad88F6F4ce6aB8827279cffFb92266 | ||
validator: | ||
disabled: false | ||
|
||
bootNode: | ||
validator: | ||
disabled: true | ||
|
||
proverNode: | ||
realProofs: false | ||
|
||
proverAgent: | ||
replicas: 1 | ||
realProofs: false | ||
bb: | ||
hardwareConcurrency: 16 | ||
|
||
aztec: | ||
slotDuration: 36 | ||
epochDuration: 32 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,112 @@ | ||
# security_groups.tf | ||
|
||
resource "aws_security_group" "node_traffic" { | ||
name_prefix = "eks-node-traffic" | ||
description = "Security group for EKS node UDP and TCP traffic" | ||
vpc_id = module.vpc.vpc_id # Fixed VPC reference to use the vpc module output | ||
|
||
# Ingress UDP rules | ||
ingress { | ||
from_port = 40400 | ||
to_port = 40499 | ||
protocol = "udp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow incoming UDP traffic for original port range" | ||
} | ||
|
||
ingress { | ||
from_port = 8080 | ||
to_port = 8080 | ||
protocol = "udp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow incoming UDP traffic on port 8080" | ||
} | ||
|
||
ingress { | ||
from_port = 8545 | ||
to_port = 8545 | ||
protocol = "udp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow incoming UDP traffic on port 8545" | ||
} | ||
|
||
# Ingress TCP rules | ||
ingress { | ||
from_port = 40400 | ||
to_port = 40499 | ||
protocol = "tcp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow incoming TCP traffic for original port range" | ||
} | ||
|
||
ingress { | ||
from_port = 8080 | ||
to_port = 8080 | ||
protocol = "tcp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow incoming TCP traffic on port 8080" | ||
} | ||
|
||
ingress { | ||
from_port = 8545 | ||
to_port = 8545 | ||
protocol = "tcp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow incoming TCP traffic on port 8545" | ||
} | ||
|
||
# Egress UDP rules | ||
egress { | ||
from_port = 40400 | ||
to_port = 40499 | ||
protocol = "udp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow outgoing UDP traffic for original port range" | ||
} | ||
|
||
egress { | ||
from_port = 8080 | ||
to_port = 8080 | ||
protocol = "udp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow outgoing UDP traffic on port 8080" | ||
} | ||
|
||
egress { | ||
from_port = 8545 | ||
to_port = 8545 | ||
protocol = "udp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow outgoing UDP traffic on port 8545" | ||
} | ||
|
||
# Egress TCP rules | ||
egress { | ||
from_port = 40400 | ||
to_port = 40499 | ||
protocol = "tcp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow outgoing TCP traffic for original port range" | ||
} | ||
|
||
egress { | ||
from_port = 8080 | ||
to_port = 8080 | ||
protocol = "tcp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow outgoing TCP traffic on port 8080" | ||
} | ||
|
||
egress { | ||
from_port = 8545 | ||
to_port = 8545 | ||
protocol = "tcp" | ||
cidr_blocks = ["0.0.0.0/0"] | ||
description = "Allow outgoing TCP traffic on port 8545" | ||
} | ||
|
||
tags = { | ||
Name = "${var.cluster_name}-node-traffic" | ||
Project = var.cluster_name | ||
} | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,51 @@ | ||
# Create ingress firewall rules for UDP | ||
resource "google_compute_firewall" "udp_ingress" { | ||
name = "allow-udp-ingress-custom" | ||
network = "default" | ||
allow { | ||
protocol = "udp" | ||
ports = ["40400-40499", "8080", "8545"] | ||
} | ||
direction = "INGRESS" | ||
source_ranges = ["0.0.0.0/0"] | ||
target_tags = ["gke-node"] | ||
} | ||
|
||
# Create egress firewall rules for UDP | ||
resource "google_compute_firewall" "udp_egress" { | ||
name = "allow-udp-egress-custom" | ||
network = "default" | ||
allow { | ||
protocol = "udp" | ||
ports = ["40400-40499", "8080", "8545"] | ||
} | ||
direction = "EGRESS" | ||
destination_ranges = ["0.0.0.0/0"] | ||
target_tags = ["gke-node"] | ||
} | ||
|
||
# Create ingress firewall rules for TCP | ||
resource "google_compute_firewall" "tcp_ingress" { | ||
name = "allow-tcp-ingress-custom" | ||
network = "default" | ||
allow { | ||
protocol = "tcp" | ||
ports = ["40400-40499", "8080", "8545"] | ||
} | ||
direction = "INGRESS" | ||
source_ranges = ["0.0.0.0/0"] | ||
target_tags = ["gke-node"] | ||
} | ||
|
||
# Create egress firewall rules for TCP | ||
resource "google_compute_firewall" "tcp_egress" { | ||
name = "allow-tcp-egress-custom" | ||
network = "default" | ||
allow { | ||
protocol = "tcp" | ||
ports = ["40400-40499", "8080", "8545"] | ||
} | ||
direction = "EGRESS" | ||
destination_ranges = ["0.0.0.0/0"] | ||
target_tags = ["gke-node"] | ||
} |
Oops, something went wrong.