-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Analytics service #361
Analytics service #361
Conversation
Right now, .env and ETHERUEM_RPC (typo) is required. Maybe we can set a Would just be nice to have no extra config/env needed for test runs. |
Tables []types.Table | ||
} | ||
|
||
func LoadDefaultAWSConfig() (*aws.Config, error) { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Near-term, we can set AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY in the env. Longer-term, we can tighten things up with a Fargate service deployment of the crawler (so we can make the analytics resources like buckets and tables private) and just add the service security group to those resources. The users service has a similar approach now.
The go.work did fix the VSCode extension issue, beautiful. |
I will remove the .env as i only needed it when developing. The crawler expects a url and it will determine the network so we can make the crawler use dev resource for goerli and prod for mainnet (now its hardcoded to dev resource) |
The analytics service introspects AWS Glue to find the bucket and the table provisioned by the CDK. This allows using the analytics service for different versions. @shanejearley we just have to make sure we preserve the resources for some time if we want to keep previous runs.
Added a
go.work
file at the root and the crawler (with the streamer) as a module. This allows running the crawler from the rootRun
Test
go test github.com/consensusnetworks/crawler
TODO:
This PR is in progress, I will merge it after resolving some questions with Liz.