Page Menu
Home
Phorge
Search
Configure Global Search
Log In
Files
F33309859
D8583.1768805981.diff
No One
Temporary
Actions
View File
Edit File
Delete File
View Transforms
Subscribe
Flag For Later
Award Token
Size
4 KB
Referenced Files
None
Subscribers
None
D8583.1768805981.diff
View Options
diff --git a/services/terraform/remote/aws_ecs.tf b/services/terraform/remote/aws_ecs.tf
new file mode 100644
--- /dev/null
+++ b/services/terraform/remote/aws_ecs.tf
@@ -0,0 +1,124 @@
+resource "aws_ecs_cluster" "comm_services" {
+ name = "comm-services-ecs-cluster"
+
+ configuration {
+ execute_command_configuration {
+ logging = "DEFAULT"
+ }
+ }
+
+ service_connect_defaults {
+ namespace = aws_service_discovery_http_namespace.comm_services.arn
+ }
+}
+
+# Namespace for services to be able to communicate with each other
+# by their hostnames. Similiar to docker compose network.
+resource "aws_service_discovery_http_namespace" "comm_services" {
+ name = "comm-services-ecs-cluster"
+ tags = {
+ # This tag was added by AWS Console because this resource
+ # was auto-created along with the cluster.
+ # It should be left as-is until we need a custom namespace.
+ "AmazonECSManaged" = "true"
+ }
+}
+
+# ECS-Optimized Amazon Linux 2 x86_64
+data "aws_ami" "al2_x86_ecs" {
+ most_recent = true
+ owners = ["amazon"]
+
+ filter {
+ name = "name"
+ values = ["amzn2-ami-ecs-hvm-2.0.20230705-x86_64-ebs"]
+ }
+}
+
+# Autoscaling configuration
+resource "aws_launch_template" "ecs_services" {
+ name_prefix = "services-ecs-ec2-"
+ image_id = data.aws_ami.al2_x86_ecs.id
+ instance_type = "t3.small"
+
+ iam_instance_profile {
+ name = aws_iam_role.ecs_instance_role.name
+ }
+
+ metadata_options {
+ # Enable IDMSv2
+ http_tokens = "required"
+ http_endpoint = "enabled"
+ instance_metadata_tags = "enabled"
+
+ # This option is required for apps inside ECS containers to be able
+ # to connect to AWS API. Rust AWS SDK fails with timeout errors without it.
+ http_put_response_hop_limit = 4
+ }
+
+ user_data = base64encode(<<-EOT
+ #!/bin/bash
+ echo ECS_CLUSTER=${aws_ecs_cluster.comm_services.name} >> /etc/ecs/ecs.config;
+ EOT
+ )
+}
+
+resource "aws_autoscaling_group" "ecs_services" {
+ name = "services-ecs-ec2-asg"
+ min_size = 0
+ max_size = 3
+
+ # NOTE: desired_capacity is managed by ECS Capacity Provider
+ # This value sets only initial number of instances
+ desired_capacity = 1
+ lifecycle { ignore_changes = [desired_capacity] }
+
+ launch_template {
+ id = aws_launch_template.ecs_services.id
+ version = "$Latest"
+ }
+
+ vpc_zone_identifier = [
+ aws_subnet.public_a.id,
+ aws_subnet.public_b.id,
+ aws_subnet.public_c.id,
+ ]
+
+ # NOTE: This tag is required for ECS Capacity Provider to work
+ # See https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_capacity_provider
+ tag {
+ key = "AmazonECSManaged"
+ value = true
+ propagate_at_launch = true
+ }
+
+ # This name is set to all instances so we can easily distinguish them
+ # in the console.
+ tag {
+ key = "Name"
+ value = "ECS - Comm Services"
+ propagate_at_launch = true
+ }
+}
+
+resource "aws_ecs_capacity_provider" "ecs_ec2" {
+ name = "services-capacity-provider"
+
+ auto_scaling_group_provider {
+ auto_scaling_group_arn = aws_autoscaling_group.ecs_services.arn
+
+ managed_scaling {
+ status = "ENABLED"
+ target_capacity = 100
+ }
+ }
+}
+
+resource "aws_ecs_cluster_capacity_providers" "ecs_ec2" {
+ cluster_name = aws_ecs_cluster.comm_services.name
+ capacity_providers = [
+ "FARGATE",
+ "FARGATE_SPOT",
+ aws_ecs_capacity_provider.ecs_ec2.name
+ ]
+}
diff --git a/services/terraform/remote/aws_iam.tf b/services/terraform/remote/aws_iam.tf
new file mode 100644
--- /dev/null
+++ b/services/terraform/remote/aws_iam.tf
@@ -0,0 +1,26 @@
+### General AWS Utility IAM resources
+
+# Docs: https://docs.aws.amazon.com/AmazonECS/latest/developerguide/instance_IAM_role.html
+resource "aws_iam_role" "ecs_instance_role" {
+ name = "ecsInstanceRole"
+ description = "Allows EC2 instances to call AWS services on your behalf."
+ assume_role_policy = jsonencode({
+ Version = "2012-10-17"
+ Statement = [
+ {
+ Action = "sts:AssumeRole"
+ Effect = "Allow"
+ Principal = {
+ Service = "ec2.amazonaws.com"
+ }
+ }
+ ]
+ })
+
+ managed_policy_arns = [
+ "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role",
+ # Let instances download Docker images from ECR
+ "arn:aws:iam::aws:policy/AmazonEC2ContainerRegistryReadOnly"
+ ]
+}
+
File Metadata
Details
Attached
Mime Type
text/plain
Expires
Mon, Jan 19, 6:59 AM (17 h, 48 m)
Storage Engine
blob
Storage Format
Raw Data
Storage Handle
5954367
Default Alt Text
D8583.1768805981.diff (4 KB)
Attached To
Mode
D8583: [services][terraform] Set up ECS cluster
Attached
Detach File
Event Timeline
Log In to Comment