fleet/infrastructure/dogfood/terraform/aws
Benjamin Edwards 4161ee5679
create vuln processing addon (#10526)
two things here:

1. create addon for use in new modular terraform
2. create vuln processing terraform for legacy terraform, but by default
its disabled
2023-03-29 08:57:10 -04:00
..
monitoring fix falling edge monitoring of loadbalancer 5XX alarm (#6346) 2022-06-23 09:41:08 -04:00
percona Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
remote-state Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
.terraform-version Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
.terraform.lock.hcl Remove unused code in dogfood (#10249) 2023-03-02 11:02:59 -05:00
ecs-iam.tf update deployment guide (#8447) 2022-10-26 15:52:54 -04:00
ecs-sgs.tf Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
ecs.tf add tf vars for cloudwatch log retention & rds snapshot backup retention (#6532) 2022-07-11 15:30:36 -04:00
firehose.tf Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
main.tf Remove unused code in dogfood (#10249) 2023-03-02 11:02:59 -05:00
outputs.tf add github action deploy via OIDC credentials (#5339) 2022-05-25 14:03:29 -04:00
r53.tf Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
rds.tf Add prevent destroy to rds via null resource (#9126) 2022-12-28 04:12:03 -05:00
readme.md Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
redis.tf update deployment guide (#8447) 2022-10-26 15:52:54 -04:00
s3.tf Reorg infrastructure and add changes for frontend's loadtesting environment (#4947) 2022-04-12 12:49:00 -04:00
variables.tf Prepare 4.29.0 (#10610) 2023-03-22 15:14:51 -05:00
vpc.tf update deployment guide (#8447) 2022-10-26 15:52:54 -04:00
vuln_processing.tf create vuln processing addon (#10526) 2023-03-29 08:57:10 -04:00

Terraform

Bootstrapping remote state

First we need to bootstrap our terraform remote state management. This lives outside the main project to avoid "chicken before the egg" issues. We are going to create the remote state S3 bucket and DynamoDB state locking table and then use hardcoded values in parent folder main.tf.

  1. cd remote-state
  2. terraform init
  3. terraform apply

Creating the Fleet infrastructure

Create a new tfvars file for example:

fleet_backend_cpu  = 512
fleet_backend_mem  = 4096 // 4GB needed for vuln processing
redis_instance     = "cache.t3.micro"
fleet_min_capacity = 2
fleet_max_capacity = 5

If you have a Fleet license key you can include it in the tfvars file which will enable the paid features.

fleet_license = "<your license key here"

To deploy the infrastructure:

  1. terraform init && terraform workspace new prod (workspace is optional terraform defaults to the default workspace)
  2. terraform plan -var-file=<your_tfvars_file>
  3. terraform apply -var-file=<your_tfvars_file>

To deploy cloudwatch alarms (requires infrastruture to be deployed)

  1. cd monitoring
  2. terraform init && terraform workspace new prod (workspace is optional terraform defaults to the default workspace)
  3. terraform plan -var-file=<your_tfvars_file>
  4. terraform apply -var-file=<your_tfvars_file>

Check out AWS Chatbot for a quick and easy way to hook up Cloudwatch Alarms into a Slack channel.

To deploy Percona PMM advanced MySQL monitoring

  1. See Percona deployment scenario for details
  2. Deploy infrastructure using percona directory
    1. Create tfvars file
    2. Add the required variables (vpc_id, subnets, etc.)
    3. run terraform apply -var-file=default.tfvars
  3. Add RDS Aurora MySQL by following this guide

Configuration

Typical settings to override in an existing environment:

module.vpc.vpc_id -- the VPC ID output from VPC module. If you are introducing fleet to an existing VPC, you could replace all instances with your VPC ID.

In this reference architecture we are placing ECS, RDS MySQL, and Redis (ElastiCache) in separate subnets, each associated to a route table, allowing communication between. This is not required, as long as Fleet can resolve the MySQL and Redis hosts, that should be adequate.

HTTPS

The ALB is in the public subnet with an ENI to bridge into the private subnet. SSL is terminated at the ALB and fleet serve is launched with FLEET_SERVER_TLS=false as an environment variable.

Replace cert_arn with the certificate ARN that applies to your environment. This is the certificate ARN used in the ALB HTTPS Listener.

Migrating the DB

After applying terraform run the following to migrate the database(<private_subnet_id> and <desired_security_group> can be obtained from the terraform output after applying, any value will suffice):

aws ecs run-task --cluster fleet-backend --task-definition fleet-migrate:<latest_version> --launch-type FARGATE --network-configuration "awsvpcConfiguration={subnets=[<private_subnet_id>],securityGroups=[<desired_security_group>]}"

Conecting a host

Use your Route53 entry as your fleet-url following these details.