Seqera Enterprise v24.1
Seqera Platform Enterprise version 24.1 introduces three new features: Data Studios (in public preview), Data Explorer, and managed identities. A number of bug fixes and performance enhancements are included in this major release.
Data Studios
Data Studios closes the loop from development to deployment and insights, allowing you to create, manage, and share notebook environments in Seqera with the click of a button. Data Studios makes it seamless to work across teams with multi-user support, built-in authentication, and automatic snapshots as you work.
- Host a combination of container images and compute environments for interactive analysis using your preferred tools, like Jupyter notebooks, RStudio, and Visual Studio Code IDEs.
- Checkpoints provide a stable point-in-time snapshot.
- Collaborate and share data in real time.
Data Studios is available as a public preview. Contact support to request access to this feature.
Data Explorer
Data Explorer allows you to browse and interact with remote data repositories from organization workspaces in Seqera Platform. It supports AWS S3, Azure Blob Storage, and Google Cloud Storage repositories.
Data Explorer is now Generally Available (GA) and supports multi-file and multi-folder download. This allows users to download entire datasets of pipeline results to share with their team.
Extended data roles
User roles provide flexibility for admins to provide users with the permissions they need, without compromising security. The Connect user role has been added to the existing user roles with functionality related to Data Studios:
- Connect: Open a connection to a running data studio session and interact with the contents.
- Maintain: Create, update, start, stop, configure, and delete data studio sessions.
- View: List, search, and view the status, configuration, and details of data studios.
- Launch: Open a connection to a running data studio session and interact with the contents.
See User roles for more information.
Managed identities
Managed identities offer significant advantages for High-Performance Computing (HPC) environments by enabling granular access control for individual workspace users. Unlike traditional SSH credentials that grant all workspace users access to HPC clusters with the same service account, managed identities ensure each user’s activity is logged under their own credentials.
See Managed identities for more information.
Other feature improvements
- A redesigned pipeline launch form provides an improved workflow and an interface to create and edit run parameters as raw JSON/YAML. Enable the new launch form per workspace via environment variable.
- Retrieve reports from primary compute environment on Nextflow CLI runs. See Configure reports for Nextflow CLI runs for more information.
- The standard email login can be disabled via
tower.yml
or an environment variable, provided an alternative OIDC provider is set up first. See Basic configuration for more information.
Breaking changes
MariaDB driver: New MySQL connection parameter required
MariaDB driver 3.x requires a special parameter in the connection URL to connect to a MySQL database:
jdbc:mysql://<domain>:<port>/tower?permitMysqlScheme=true
All deployments using a MySQL database (regardless of version: 5.6, 5.7, or 8) should be updated accordingly when upgrading to Platform version 24.1 or later.
MariaDB driver: No truncation support for MySQL 5.6
The MariaDB driver has dropped support for the jdbcCompliantTruncation
parameter, which was true by default and set the STRICT_TRANS_TABLES
SQL mode. The STRICT_TRANS_TABLES
mode produces an error when the value of a VARCHAR column exceeds its limit, instead of truncating it to fit. Most common installations of MySQL 5.7 and 8 already include this mode at the server level, but the Docker container version of MySQL 5.6 does not.
The SQL mode must be set explicitly through the connection URL for deployments still using MySQL 5.6:
jdbc:mysql://<domain>:<port>/tower?permitMysqlScheme=true&sessionVariables=sql_mode='STRICT_TRANS_TABLES,NO_ENGINE_SUBSTITUTION'
Micronaut property key changes
The property that determines the expiration time of the JWT access token (used for authenticating web sessions and Nextflow-Platform interactions) has changed:
Previous | New |
---|---|
micronaut.security.token.jwt.generator.access-token.expiration | micronaut.security.token.generator.access-token.expiration |
Enterprise deployments that have customized this value previously will need to adopt the new format.
Upgrade steps
- This version includes an update to the Platform Enterprise H8 cache. Do not start the upgrade while any pipelines are in a
running
state as active run data may be lost. - This version requires a database schema update. Make a backup of your Platform database prior to upgrade.
- If you are upgrading from a version older than 23.4.1, update your installation to version 23.4.4 first, before updating to 24.1 with the steps below.
- For recommended Platform memory settings, add the following environment variable to your Platform configuration values (
tower.env
,configmap.yml
, etc.):JAVA_OPTS: -Xms1000M -Xmx2000M -XX:MaxDirectMemorySize=800m -Dio.netty.maxDirectMemory=0 -Djdk.nio.maxCachedBufferSize=262144
- See Upgrade installation for database backup and installation upgrade guidance.
Docker Compose deployments require downtime while upgrading services. Restarting the application may take several minutes. See Docker compose deployment for more information.
For Kubernetes deployments, apply the 24.1 tower-cron.yml
to your cron pod and wait for the cron pod to be running before applying the tower-svc.yml
to your backend pod and restarting the service. If the cron pod update is interrupted, you may need to restore the instance from your DB backup and start again. See Kubernetes deployment for more information.
For custom deployments with third-party services such as ArgoCD, contact support for assistance during upgrade.