Tower Enterprise v23.2
Feature updates and improvements
AWS Fargate support
Leveraging the Fusion file system, you can now run the Nextflow head job of your pipelines with the AWS Fargate container service. Fargate is a serverless compute engine compatible with Amazon ECS that enables users to run containers without the need to provision servers or clusters in advance. The scalable Fargate container service can help speed up pipeline launch and reduce cloud-related costs by minimizing the time for cloud infrastructure to be deployed.
Other improvements
- Added support for Graviton architecture in AWS Batch compute environments.
- Allow Launcher users to create, edit, and upload datasets.
- Harmonize list sorting in Compute environments and Credentials list pages.
- Updated Enable GPU label, sublabel and add warning when activated.
- Set workflow status to unknown when job status is also in an unknown state.
- Added support for AWS SES (Simple Email Service) as an alternative to SMTP.
- Added ability to edit the names of Tower entities:
- Organizations
- Workspaces
- Compute environments
- Pipelines
- Actions
- Updated runs list page with new status badges and improved layout.
- Added support for mobile screen layout in runs list page.
- Allow advanced settings in the AWS ECS config field.
- Increase the AWS Batch Memory / CPUs ratio to 4GB.
Bug fixes
- Disabled Resume option for runs that cannot be resumed.
- Fixed task detail modal width.
- Reserved word checks are now case-insensitive.
- Fixed support for AWS SSE encryption for Nextflow head job.
- Fixed race condition causing the "No workflow runs" notice to display incorrectly.
- Fixed Pipeline form page breaking during tab reload.
- Fixed an issue resolving Workspace in the Admin panel when several workspaces exist with the same name in different organizations.
- Fixed AWS Batch allocation strategy:
BEST_FIT_PROGRESSIVEfor on-demand CEs andSPOT_CAPACITY_OPTIMIZEDfor spot CEs. - Token creation unique name check is now case-insensitive.
- Fixed issue propagating
before:search keywords from Dashboard to runs page. - Fixed issue with the "copy to clipboard" button using a legacy tooltip implementation.
- Fixed incorrect units displayed for
syscrandsyscwin task details modal.
Breaking changes and warnings
Breaking changes and instructions listed here apply when updating from Tower version 23.1. If you are updating from an earlier version, see the release notes of previous versions for a complete picture of changes that may affect you.
Updated AWS permissions policies
Several new Tower features over the last few releases require updated AWS IAM permissions policies. Retrieve and apply the latest policy files here.
Wave requires container registry credentials
The Wave containers service uses container registry credentials in Tower to authenticate to your (public or private) container registries. This is separate from your existing cloud provider credentials stored in Tower.
This means that, for example, AWS ECR (Elastic Container Registry) authentication requires an ECR container registry credential if you are running a compute environment with Wave enabled, even if your existing AWS credential in Tower has IAM access to your ECR.
See the relevant container registry credentials page for provider-specific instructions.
Upgrade steps
This Tower version requires a database schema update. Follow these steps to update your DB instance and the Tower installation.
!!! warning ""
To ensure no data loss, the database volume must be persistent on the local machine. Use the volumes key in the db or redis section of your docker-compose.yml file to specify a local path to the DB or Redis instance.
-
Make a backup of the Tower database.
-
Download and update your container versions.
-
Redeploy the Tower application:
docker compose:
- To migrate the database schema, restart the application with
docker compose down, thendocker compose up.
kubernetes:
- Update the cron service with
kubectl apply -f tower-cron.yml. This will automatically migrate the database schema. - Update the frontend and backend services with
kubectl apply -f tower-srv.yml.
custom deployment:
- Run the
/migrate-db.shscript provided in thebackendcontainer. This will migrate the database schema. - Deploy Tower following your usual procedures.
- To migrate the database schema, restart the application with
Nextflow launcher image
If you must host your nf-launcher container image on a private image registry:
-
Copy the nf-launcher image to your private registry.
-
Update your
tower.envwith the launch container environment variable:TOWER_LAUNCH_CONTAINER=<FULL_PATH_TO_YOUR_PRIVATE_IMAGE>
!!! warning ""
If you're using AWS Batch, you will need to configure a custom job definition and populate the TOWER_LAUNCH_CONTAINER with the job definition name instead.
Sharing feedback
Share your feedback via support.seqera.io.