DevOps

Shared Resources for Your Terraformed Docker Environment on AWS

In Part 1 of this series, we laid the groundwork for Terraforming infrastructure on Amazon. Today we’ll define our actual infrastructure consisting of networks, servers, etc. Have fun!

Shared Resources Declaration

Since our service depends on underlying resources like the VPC and EC2 instances, we’ll create the shared environment first. Make sure you’re in the my-terraform-environment/shared/ folder before proceeding.

We’ll start with core ECS-related resources. We need to look up the most recent ECS optimized AMI, create the ECS cluster, and create the necessary IAM Roles for services and instances to use to support ECS.

001
002
003
004
005
006
007
008
009
010
011
012
013
014
015
016
017
018
019
020
021
022
023
024
025
026
027
028
029
030
031
032
033
034
035
036
037
038
039
040
041
042
043
044
045
046
047
048
049
050
051
052
053
054
055
056
057
058
059
060
061
062
063
064
065
066
067
068
069
070
071
072
073
074
075
076
077
078
079
080
081
082
083
084
085
086
087
088
089
090
091
092
093
094
095
096
097
098
099
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
// shared/main.tf
/*
 * Determine most recent ECS optimized AMI
 */
data "aws_ami" "ecs_ami" {
 most_recent = true
 owners      = ["amazon"]
 
 filter {
   name   = "name"
   values = ["amzn-ami-*-amazon-ecs-optimized"]
 }
}
 
/*
 * Create ECS cluster
 */
resource "aws_ecs_cluster" "ecs_cluster" {
 name = "ecs-cluster"
}
 
/*
 * Create ECS IAM Instance Role and Policy
 * Use random id in naming of roles to prevent collisions
 * should other ECS clusters be created in same AWS account
 * using this same code.
 */
resource "random_id" "code" {
 byte_length = 4
}
 
resource "aws_iam_role" "ecsInstanceRole" {
 name               = "ecsInstanceRole-${random_id.code.hex}"
 assume_role_policy = <<EOF
{
 "Version": "2008-10-17",
 "Statement": [
   {
     "Sid": "",
     "Effect": "Allow",
     "Principal": {
       "Service": "ec2.amazonaws.com"
     },
     "Action": "sts:AssumeRole"
   }
 ]
}
EOF
 
}
 
resource "aws_iam_role_policy" "ecsInstanceRolePolicy" {
 name   = "ecsInstanceRolePolicy-${random_id.code.hex}"
 role   = "${aws_iam_role.ecsInstanceRole.id}"
 policy = <<EOF
{
 "Version": "2012-10-17",
 "Statement": [
   {
     "Effect": "Allow",
     "Action": [
       "ecs:CreateCluster",
       "ecs:DeregisterContainerInstance",
       "ecs:DiscoverPollEndpoint",
       "ecs:Poll",
       "ecs:RegisterContainerInstance",
       "ecs:StartTelemetrySession",
       "ecs:Submit*",
       "ecr:GetAuthorizationToken",
       "ecr:BatchCheckLayerAvailability",
       "ecr:GetDownloadUrlForLayer",
       "ecr:BatchGetImage",
       "logs:CreateLogStream",
       "logs:PutLogEvents"
     ],
     "Resource": "*"
   }
 ]
}
EOF
 
}
 
/*
 * Create ECS IAM Service Role and Policy
 */
resource "aws_iam_role" "ecsServiceRole" {
 name               = "ecsServiceRole-${random_id.code.hex}"
 assume_role_policy = <<EOF
{
 "Version": "2008-10-17",
 "Statement": [
   {
     "Sid": "",
     "Effect": "Allow",
     "Principal": {
       "Service": "ecs.amazonaws.com"
     },
     "Action": "sts:AssumeRole"
   }
 ]
}
EOF
 
}
 
resource "aws_iam_role_policy" "ecsServiceRolePolicy" {
 name   = "ecsServiceRolePolicy-${random_id.code.hex}"
 role   = "${aws_iam_role.ecsServiceRole.id}"
 policy = <<EOF
{
 "Version": "2012-10-17",
 "Statement": [
   {
     "Effect": "Allow",
     "Action": [
       "ec2:AuthorizeSecurityGroupIngress",
       "ec2:Describe*",
       "elasticloadbalancing:DeregisterInstancesFromLoadBalancer",
       "elasticloadbalancing:DeregisterTargets",
       "elasticloadbalancing:Describe*",
       "elasticloadbalancing:RegisterInstancesWithLoadBalancer",
       "elasticloadbalancing:RegisterTargets"
     ],
     "Resource": "*"
   }
 ]
}
EOF
 
}
 
resource "aws_iam_instance_profile" "ecsInstanceProfile" {
 name = "ecsInstanceProfile-${random_id.code.hex}"
 role = "${aws_iam_role.ecsInstanceRole.name}"
}

Dynamically looking up the current ECS-optimized AMI like this is a goldmine in itself. Before Terraform, I had to look this up on a webpage on a regular basis to keep my cluster instances current and it was a pain. With a dynamic lookup like this, running terraform plan every so often will identify if a new AMI is available and if any resources depending on it will need to be updated and/or replaced.

It is a good idea to run a terraform plan periodically to ensure there are no errors in your code. At this point, running terraform plan should have output similar to:

01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
$ terraform plan
Refreshing Terraform state in-memory prior to plan...
The refreshed state will be used to calculate this plan, but will not be
persisted to local or remote state storage.
 
data.aws_ami.ecs_ami: Refreshing state...
 
------------------------------------------------------------------------
 
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
  + create
 
Terraform will perform the following actions:
 
  + aws_ecs_cluster.ecs_cluster
      id:                    <computed>
      name:                  "ecs-cluster"
 
  + aws_iam_instance_profile.ecsInstanceProfile
      id:                    <computed>
      arn:                   <computed>
      create_date:           <computed>
      name:                  "ecsInstanceProfile-${random_id.code.hex}"
      path:                  "/"
      role:                  "${aws_iam_role.ecsInstanceRole.name}"
      roles.#:               <computed>
      unique_id:             <computed>
 
  + aws_iam_role.ecsInstanceRole
      id:                    <computed>
      arn:                   <computed>
      assume_role_policy:    "{\n \"Version\": \"2008-10-17\",\n \"Statement\": [\n   {\n     \"Sid\": \"\",\n     \"Effect\": \"Allow\",\n     \"Principal\": {\n       \"Service\": \"ec2.amazonaws.com\"\n     },\n     \"Action\": \"sts:AssumeRole\"\n   }\n ]\n}\n"
      create_date:           <computed>
      force_detach_policies: "false"
      name:                  "ecsInstanceRole-${random_id.code.hex}"
      path:                  "/"
      unique_id:             <computed>
 
  + aws_iam_role.ecsServiceRole
      id:                    <computed>
      arn:                   <computed>
      assume_role_policy:    "{\n \"Version\": \"2008-10-17\",\n \"Statement\": [\n   {\n     \"Sid\": \"\",\n     \"Effect\": \"Allow\",\n     \"Principal\": {\n       \"Service\": \"ecs.amazonaws.com\"\n     },\n     \"Action\": \"sts:AssumeRole\"\n   }\n ]\n}\n"
      create_date:           <computed>
      force_detach_policies: "false"
      name:                  "ecsServiceRole-${random_id.code.hex}"
      path:                  "/"
      unique_id:             <computed>
 
  + aws_iam_role_policy.ecsInstanceRolePolicy
      id:                    <computed>
      name:                  "ecsInstanceRolePolicy-${random_id.code.hex}"
      policy:                "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n   {\n     \"Effect\": \"Allow\",\n     \"Action\": [\n       \"ecs:CreateCluster\",\n       \"ecs:DeregisterContainerInstance\",\n       \"ecs:DiscoverPollEndpoint\",\n       \"ecs:Poll\",\n       \"ecs:RegisterContainerInstance\",\n       \"ecs:StartTelemetrySession\",\n       \"ecs:Submit*\",\n       \"ecr:GetAuthorizationToken\",\n       \"ecr:BatchCheckLayerAvailability\",\n       \"ecr:GetDownloadUrlForLayer\",\n       \"ecr:BatchGetImage\",\n       \"logs:CreateLogStream\",\n       \"logs:PutLogEvents\"\n     ],\n     \"Resource\": \"*\"\n   }\n ]\n}\n"
      role:                  "${aws_iam_role.ecsInstanceRole.id}"
 
  + aws_iam_role_policy.ecsServiceRolePolicy
      id:                    <computed>
      name:                  "ecsServiceRolePolicy-${random_id.code.hex}"
      policy:                "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n   {\n     \"Effect\": \"Allow\",\n     \"Action\": [\n       \"ec2:AuthorizeSecurityGroupIngress\",\n       \"ec2:Describe*\",\n       \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n       \"elasticloadbalancing:DeregisterTargets\",\n       \"elasticloadbalancing:Describe*\",\n       \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n       \"elasticloadbalancing:RegisterTargets\"\n     ],\n     \"Resource\": \"*\"\n   }\n ]\n}\n"
      role:                  "${aws_iam_role.ecsServiceRole.id}"
 
  + random_id.code
      id:                    <computed>
      b64:                   <computed>
      b64_std:               <computed>
      b64_url:               <computed>
      byte_length:           "4"
      dec:                   <computed>
      hex:                   <computed>
 
 
Plan: 7 to add, 0 to change, 0 to destroy.
 
------------------------------------------------------------------------
 
Note: You didn't specify an "-out" parameter to save this plan, so Terraform
can't guarantee that exactly these actions will be performed if
"terraform apply" is subsequently run.
 
Releasing state lock. This may take a few moments...

At this time, the plan is to create seven new resources. The output from Terraform is color coded to help recognize what will be created, changed, destroyed, or read. Green for created (or destroyed and created if needed), yellow if it will be changed in place, red if it will be deleted, and cyan for data resources that will be read.

Next up, we’ll create the VPC and look up the default security group that is created automatically by AWS so that we can assign other resources to it for intra-VPC communications.

01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
// shared/main.tf
/*
 * Create VPC
 */
resource "aws_vpc" "vpc" {
 cidr_block = "10.0.0.0/16"
 
 tags = {
   Name = "vpc-terraform"
 }
}
 
/*
 * Get default security group for reference later
 */
data "aws_security_group" "vpc_default_sg" {
 name   = "default"
 vpc_id = "${aws_vpc.vpc.id}"
}

Now that we have a VPC, we need to set up public and private subnets in multiple availability zones. Terraform has an ability to loop over lists and create multiple instances of a resource. For most resources, you can set a count attribute to specify how many of that instance should be created.

If a single instance is normally referenced with the naming format of resource_type.resource_name.attribute, for references that are created with count > 1 you must also specify the index of the instance you want to reference, such as resource_type.resource_name.index.attribute (for example, aws_subnet.private_subnet.0.id).

When we create our subnets below, we’ll do a little Terraform-fu to generate subnets for as many availability zones as are specified in the var var.aws_zones.

01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
// shared/main.tf
/*
 * Create public and private subnets for each availability zone
 */
resource "aws_subnet" "public_subnet" {
 count             = "${length(var.aws_zones)}"
 vpc_id            = "${aws_vpc.vpc.id}"
 availability_zone = "${element(var.aws_zones, count.index)}"
 cidr_block        = "10.0.${(count.index + 1) * 10}.0/24"
 
 tags {
   Name = "public-${element(var.aws_zones, count.index)}"
 }
}
 
resource "aws_subnet" "private_subnet" {
 count             = "${length(var.aws_zones)}"
 vpc_id            = "${aws_vpc.vpc.id}"
 availability_zone = "${element(var.aws_zones, count.index)}"
 cidr_block        = "10.0.${(count.index + 1) * 11}.0/24"
 
 tags {
   Name = "private-${element(var.aws_zones, count.index)}"
 }
}

Given var.aws_zones = [“us-east-1c”, “us-east-1d”, “us-east-1e”], this will create six subnets: three public and three private.

!Sign up for a free Codeship Account

A VPC requires an Internet Gateway for the public subnets to be able to route out to the internet and a NAT gateway for private subnets to be able to do the same. We need to create these resources and set up routing tables for each of the six subnets to properly use them.

We’ll also allocate an Elastic IP (static IP address) to assign to our NAT instance so that our private subnet traffic “comes” from the same IP address. While we’re at it, we’ll designate that any of our private subnets can be used for hosting RDS instances by creating a DB subnet group.

01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
// shared/main.tf
/*
 * Create internet gateway for VPC
 */
resource "aws_internet_gateway" "internet_gateway" {
 vpc_id = "${aws_vpc.vpc.id}"
}
 
/*
 * Create NAT gateway and allocate Elastic IP for it
 */
resource "aws_eip" "gateway_eip" {}
 
resource "aws_nat_gateway" "nat_gateway" {
 allocation_id = "${aws_eip.gateway_eip.id}"
 subnet_id     = "${aws_subnet.public_subnet.0.id}"
 depends_on    = ["aws_internet_gateway.internet_gateway"]
}
 
/*
 * Routes for private subnets to use NAT gateway
 */
resource "aws_route_table" "nat_route_table" {
 vpc_id = "${aws_vpc.vpc.id}"
}
 
resource "aws_route" "nat_route" {
 route_table_id         = "${aws_route_table.nat_route_table.id}"
 destination_cidr_block = "0.0.0.0/0"
 nat_gateway_id         = "${aws_nat_gateway.nat_gateway.id}"
}
 
resource "aws_route_table_association" "private_route" {
 count          = "${length(var.aws_zones)}"
 subnet_id      = "${element(aws_subnet.private_subnet.*.id, count.index)}"
 route_table_id = "${aws_route_table.nat_route_table.id}"
}
 
/*
 * Routes for public subnets to use internet gateway
 */
resource "aws_route_table" "igw_route_table" {
 vpc_id = "${aws_vpc.vpc.id}"
}
 
resource "aws_route" "igw_route" {
 route_table_id         = "${aws_route_table.igw_route_table.id}"
 destination_cidr_block = "0.0.0.0/0"
 gateway_id             = "${aws_internet_gateway.internet_gateway.id}"
}
 
resource "aws_route_table_association" "public_route" {
 count          = "${length(var.aws_zones)}"
 subnet_id      = "${element(aws_subnet.public_subnet.*.id, count.index)}"
 route_table_id = "${aws_route_table.igw_route_table.id}"
}
 
/*
 * Create DB Subnet Group for private subnets
 */
resource "aws_db_subnet_group" "db_subnet_group" {
 name       = "db-subnet"
 subnet_ids = ["${aws_subnet.private_subnet.*.id}"]
}

With our ECS cluster and network in place, we can create an auto-scaling group to launch EC2 instances into the ECS cluster. The ECS-optimized AMI looks for the ECS cluster name in the file /etc/ecs/ecs.config, so we need to create our instances with a simple shell script in the User Data field to put the ECS cluster name in place on startup. For this, we’ll use a template file and a data resource to render it for use. Create a file named shared/user-data.sh with the following contents:

1
2
#!/bin/bash
echo ECS_CLUSTER=${ecs_cluster_name} >> /etc/ecs/ecs.config

Now add the following to the shared/main.tf file:

01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
// shared/main.tf
/*
 * Generate user_data from template file
 */
data "template_file" "user_data" {
 template = "${file("${path.module}/user-data.sh")}"
 
 vars {
   ecs_cluster_name = "${aws_ecs_cluster.ecs_cluster.name}"
 }
}
 
/*
 * Create Launch Configuration
 */
resource "aws_launch_configuration" "as_conf" {
 image_id             = "${data.aws_ami.ecs_ami.id}"
 instance_type        = "t2.micro"
 security_groups      = ["${data.aws_security_group.vpc_default_sg.id}"]
 iam_instance_profile = "${aws_iam_instance_profile.ecsInstanceProfile.id}"
 
 root_block_device {
   volume_size = "8"
 }
 
 user_data = "${data.template_file.user_data.rendered}"
 
 lifecycle {
   create_before_destroy = true
 }
}
 
/*
 * Create Auto Scaling Group
 */
resource "aws_autoscaling_group" "asg" {
 name                      = "asg-ecs-enviroment"
 availability_zones        = "${var.aws_zones}"
 vpc_zone_identifier       = ["${aws_subnet.private_subnet.*.id}"]
 min_size                  = "3"
 max_size                  = "3"
 desired_capacity          = "3"
 launch_configuration      = "${aws_launch_configuration.as_conf.id}"
 health_check_type         = "EC2"
 health_check_grace_period = "120"
 default_cooldown          = "30"
 
 lifecycle {
   create_before_destroy = true
 }
}

The services Terraform environment will need several values from the shared environment so we need to define them as outputs. Edit the outputs.tf file and add the following:

01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
// shared/outputs.tf
output "aws_zones" {
 value = ["${var.aws_zones}"]
}
 
output "db_subnet_group_name" {
 value = "${aws_db_subnet_group.db_subnet_group.name}"
}
 
output "ecs_cluster_name" {
 value = "${aws_ecs_cluster.ecs_cluster.name}"
}
 
output "ecsServiceRole_arn" {
 value = "${aws_iam_role.ecsServiceRole.arn}"
}
 
output "private_subnet_ids" {
 value = ["${aws_subnet.private_subnet.*.id}"]
}
 
output "public_subnet_ids" {
 value = ["${aws_subnet.public_subnet.*.id}"]
}
 
output "vpc_default_sg_id" {
 value = "${data.aws_security_group.vpc_default_sg.id}"
}
 
output "vpc_id" {
 value = "${aws_vpc.vpc.id}"
}

That concludes the shared resources definition, so let’s go ahead and run another terraform plan to check that everything looks okay, and then run terraform apply.

001
002
003
004
005
006
007
008
009
010
011
012
013
014
015
016
017
018
019
020
021
022
023
024
025
026
027
028
029
030
031
032
033
034
035
036
037
038
039
040
041
042
043
044
045
046
047
048
049
050
051
052
053
054
055
056
057
058
059
060
061
062
063
064
065
066
067
068
069
070
071
072
073
074
075
076
077
078
079
080
081
082
083
084
085
086
087
088
089
090
091
092
093
094
095
096
097
098
099
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
$ terraform plan
Refreshing Terraform state in-memory prior to plan...
……
Plan: 30 to add, 0 to change, 0 to destroy.
……
Releasing state lock. This may take a few moments…
 
$ terraform apply
data.aws_ami.ecs_ami: Refreshing state...
random_id.code: Creating...
  b64:         "" => "<computed>"
  b64_std:     "" => "<computed>"
  b64_url:     "" => "<computed>"
  byte_length: "" => "4"
  dec:         "" => "<computed>"
  hex:         "" => "<computed>"
random_id.code: Creation complete after 0s (ID: lbOvJw)
aws_ecs_cluster.ecs_cluster: Creating...
  name: "" => "ecs-cluster"
aws_iam_role.ecsServiceRole: Creating...
  arn:                   "" => "<computed>"
  assume_role_policy:    "" => "{\n \"Version\": \"2008-10-17\",\n \"Statement\": [\n   {\n     \"Sid\": \"\",\n     \"Effect\": \"Allow\",\n     \"Principal\": {\n       \"Service\": \"ecs.amazonaws.com\"\n     },\n     \"Action\": \"sts:AssumeRole\"\n   }\n ]\n}\n"
  create_date:           "" => "<computed>"
  force_detach_policies: "" => "false"
  name:                  "" => "ecsServiceRole-95b3af27"
  path:                  "" => "/"
  unique_id:             "" => "<computed>"
aws_eip.gateway_eip: Creating...
  allocation_id:     "" => "<computed>"
  association_id:    "" => "<computed>"
  domain:            "" => "<computed>"
  instance:          "" => "<computed>"
  network_interface: "" => "<computed>"
  private_ip:        "" => "<computed>"
  public_ip:         "" => "<computed>"
  vpc:               "" => "<computed>"
aws_iam_role.ecsInstanceRole: Creating...
  arn:                   "" => "<computed>"
  assume_role_policy:    "" => "{\n \"Version\": \"2008-10-17\",\n \"Statement\": [\n   {\n     \"Sid\": \"\",\n     \"Effect\": \"Allow\",\n     \"Principal\": {\n       \"Service\": \"ec2.amazonaws.com\"\n     },\n     \"Action\": \"sts:AssumeRole\"\n   }\n ]\n}\n"
  create_date:           "" => "<computed>"
  force_detach_policies: "" => "false"
  name:                  "" => "ecsInstanceRole-95b3af27"
  path:                  "" => "/"
  unique_id:             "" => "<computed>"
aws_vpc.vpc: Creating...
  assign_generated_ipv6_cidr_block: "" => "false"
  cidr_block:                       "" => "10.0.0.0/16"
  default_network_acl_id:           "" => "<computed>"
  default_route_table_id:           "" => "<computed>"
  default_security_group_id:        "" => "<computed>"
  dhcp_options_id:                  "" => "<computed>"
  enable_classiclink:               "" => "<computed>"
  enable_classiclink_dns_support:   "" => "<computed>"
  enable_dns_hostnames:             "" => "<computed>"
  enable_dns_support:               "" => "true"
  instance_tenancy:                 "" => "<computed>"
  ipv6_association_id:              "" => "<computed>"
  ipv6_cidr_block:                  "" => "<computed>"
  main_route_table_id:              "" => "<computed>"
  tags.%:                           "" => "1"
  tags.Name:                        "" => "vpc-terraform"
aws_ecs_cluster.ecs_cluster: Creation complete after 0s (ID: arn:aws:ecs:us-east-1:462818068088:cluster/ecs-cluster)
data.template_file.user_data: Refreshing state...
aws_iam_role.ecsInstanceRole: Creation complete after 0s (ID: ecsInstanceRole-95b3af27)
aws_iam_role_policy.ecsInstanceRolePolicy: Creating...
  name:   "" => "ecsInstanceRolePolicy-95b3af27"
  policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n   {\n     \"Effect\": \"Allow\",\n     \"Action\": [\n       \"ecs:CreateCluster\",\n       \"ecs:DeregisterContainerInstance\",\n       \"ecs:DiscoverPollEndpoint\",\n       \"ecs:Poll\",\n       \"ecs:RegisterContainerInstance\",\n       \"ecs:StartTelemetrySession\",\n       \"ecs:Submit*\",\n       \"ecr:GetAuthorizationToken\",\n       \"ecr:BatchCheckLayerAvailability\",\n       \"ecr:GetDownloadUrlForLayer\",\n       \"ecr:BatchGetImage\",\n       \"logs:CreateLogStream\",\n       \"logs:PutLogEvents\"\n     ],\n     \"Resource\": \"*\"\n   }\n ]\n}\n"
  role:   "" => "ecsInstanceRole-95b3af27"
aws_iam_instance_profile.ecsInstanceProfile: Creating...
  arn:         "" => "<computed>"
  create_date: "" => "<computed>"
  name:        "" => "ecsInstanceProfile-95b3af27"
  path:        "" => "/"
  role:        "" => "ecsInstanceRole-95b3af27"
  roles.#:     "" => "<computed>"
  unique_id:   "" => "<computed>"
aws_iam_role.ecsServiceRole: Creation complete after 0s (ID: ecsServiceRole-95b3af27)
aws_iam_role_policy.ecsServiceRolePolicy: Creating...
  name:   "" => "ecsServiceRolePolicy-95b3af27"
  policy: "" => "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n   {\n     \"Effect\": \"Allow\",\n     \"Action\": [\n       \"ec2:AuthorizeSecurityGroupIngress\",\n       \"ec2:Describe*\",\n       \"elasticloadbalancing:DeregisterInstancesFromLoadBalancer\",\n       \"elasticloadbalancing:DeregisterTargets\",\n       \"elasticloadbalancing:Describe*\",\n       \"elasticloadbalancing:RegisterInstancesWithLoadBalancer\",\n       \"elasticloadbalancing:RegisterTargets\"\n     ],\n     \"Resource\": \"*\"\n   }\n ]\n}\n"
  role:   "" => "ecsServiceRole-95b3af27"
aws_iam_role_policy.ecsServiceRolePolicy: Creation complete after 1s (ID: ecsServiceRole-95b3af27:ecsServiceRolePolicy-95b3af27)
aws_iam_role_policy.ecsInstanceRolePolicy: Creation complete after 1s (ID: ecsInstanceRole-95b3af27:ecsInstanceRolePolicy-95b3af27)
aws_eip.gateway_eip: Creation complete after 1s (ID: eipalloc-25f39d17)
aws_iam_instance_profile.ecsInstanceProfile: Creation complete after 1s (ID: ecsInstanceProfile-95b3af27)
aws_vpc.vpc: Creation complete after 3s (ID: vpc-d82a38a1)
aws_internet_gateway.internet_gateway: Creating...
  vpc_id: "" => "vpc-d82a38a1"
data.aws_security_group.vpc_default_sg: Refreshing state...
aws_subnet.public_subnet[0]: Creating...
  assign_ipv6_address_on_creation: "" => "false"
  availability_zone:               "" => "us-east-1c"
  cidr_block:                      "" => "10.0.10.0/24"
  ipv6_cidr_block:                 "" => "<computed>"
  ipv6_cidr_block_association_id:  "" => "<computed>"
  map_public_ip_on_launch:         "" => "false"
  tags.%:                          "" => "1"
  tags.Name:                       "" => "public-us-east-1c"
  vpc_id:                          "" => "vpc-d82a38a1"
aws_subnet.private_subnet[0]: Creating...
  assign_ipv6_address_on_creation: "" => "false"
  availability_zone:               "" => "us-east-1c"
  cidr_block:                      "" => "10.0.11.0/24"
  ipv6_cidr_block:                 "" => "<computed>"
  ipv6_cidr_block_association_id:  "" => "<computed>"
  map_public_ip_on_launch:         "" => "false"
  tags.%:                          "" => "1"
  tags.Name:                       "" => "private-us-east-1c"
  vpc_id:                          "" => "vpc-d82a38a1"
aws_subnet.private_subnet[1]: Creating...
  assign_ipv6_address_on_creation: "" => "false"
  availability_zone:               "" => "us-east-1d"
  cidr_block:                      "" => "10.0.22.0/24"
  ipv6_cidr_block:                 "" => "<computed>"
  ipv6_cidr_block_association_id:  "" => "<computed>"
  map_public_ip_on_launch:         "" => "false"
  tags.%:                          "" => "1"
  tags.Name:                       "" => "private-us-east-1d"
  vpc_id:                          "" => "vpc-d82a38a1"
aws_route_table.nat_route_table: Creating...
  propagating_vgws.#: "" => "<computed>"
  route.#:            "" => "<computed>"
  vpc_id:             "" => "vpc-d82a38a1"
aws_subnet.private_subnet[2]: Creating...
  assign_ipv6_address_on_creation: "" => "false"
  availability_zone:               "" => "us-east-1e"
  cidr_block:                      "" => "10.0.33.0/24"
  ipv6_cidr_block:                 "" => "<computed>"
  ipv6_cidr_block_association_id:  "" => "<computed>"
  map_public_ip_on_launch:         "" => "false"
  tags.%:                          "" => "1"
  tags.Name:                       "" => "private-us-east-1e"
  vpc_id:                          "" => "vpc-d82a38a1"
aws_subnet.public_subnet[1]: Creating...
  assign_ipv6_address_on_creation: "" => "false"
  availability_zone:               "" => "us-east-1d"
  cidr_block:                      "" => "10.0.20.0/24"
  ipv6_cidr_block:                 "" => "<computed>"
  ipv6_cidr_block_association_id:  "" => "<computed>"
  map_public_ip_on_launch:         "" => "false"
  tags.%:                          "" => "1"
  tags.Name:                       "" => "public-us-east-1d"
  vpc_id:                          "" => "vpc-d82a38a1"
aws_subnet.public_subnet[2]: Creating...
  assign_ipv6_address_on_creation: "" => "false"
  availability_zone:               "" => "us-east-1e"
  cidr_block:                      "" => "10.0.30.0/24"
  ipv6_cidr_block:                 "" => "<computed>"
  ipv6_cidr_block_association_id:  "" => "<computed>"
  map_public_ip_on_launch:         "" => "false"
  tags.%:                          "" => "1"
  tags.Name:                       "" => "public-us-east-1e"
  vpc_id:                          "" => "vpc-d82a38a1"
aws_route_table.igw_route_table: Creating...
  propagating_vgws.#: "" => "<computed>"
  route.#:            "" => "<computed>"
  vpc_id:             "" => "vpc-d82a38a1"
aws_launch_configuration.as_conf: Creating...
  associate_public_ip_address:               "" => "false"
  ebs_block_device.#:                        "" => "<computed>"
  ebs_optimized:                             "" => "<computed>"
  enable_monitoring:                         "" => "true"
  iam_instance_profile:                      "" => "ecsInstanceProfile-95b3af27"
  image_id:                                  "" => "ami-9eb4b1e5"
  instance_type:                             "" => "t2.micro"
  key_name:                                  "" => "<computed>"
  name:                                      "" => "<computed>"
  root_block_device.#:                       "" => "1"
  root_block_device.0.delete_on_termination: "" => "true"
  root_block_device.0.iops:                  "" => "<computed>"
  root_block_device.0.volume_size:           "" => "8"
  root_block_device.0.volume_type:           "" => "<computed>"
  security_groups.#:                         "" => "1"
  security_groups.3222359879:                "" => "sg-22259851"
  user_data:                                 "" => "6a9e54d9d2d8048547951c51c5adf62d234bc1a3"
aws_route_table.nat_route_table: Creation complete after 1s (ID: rtb-7a613801)
aws_route_table.igw_route_table: Creation complete after 1s (ID: rtb-e66d349d)
aws_internet_gateway.internet_gateway: Creation complete after 2s (ID: igw-e9817490)
aws_subnet.public_subnet[1]: Creation complete after 2s (ID: subnet-05a7514e)
aws_route.igw_route: Creating...
  destination_cidr_block:     "" => "0.0.0.0/0"
  destination_prefix_list_id: "" => "<computed>"
  egress_only_gateway_id:     "" => "<computed>"
  gateway_id:                 "" => "igw-e9817490"
  instance_id:                "" => "<computed>"
  instance_owner_id:          "" => "<computed>"
  nat_gateway_id:             "" => "<computed>"
  network_interface_id:       "" => "<computed>"
  origin:                     "" => "<computed>"
  route_table_id:             "" => "rtb-e66d349d"
  state:                      "" => "<computed>"
aws_subnet.private_subnet[0]: Creation complete after 2s (ID: subnet-77cff95b)
aws_subnet.public_subnet[2]: Creation complete after 2s (ID: subnet-ebac68d4)
aws_subnet.private_subnet[2]: Creation complete after 2s (ID: subnet-51b6726e)
aws_subnet.public_subnet[0]: Creation complete after 2s (ID: subnet-e8cff9c4)
aws_route_table_association.public_route[1]: Creating...
  route_table_id: "" => "rtb-e66d349d"
  subnet_id:      "" => "subnet-05a7514e"
aws_nat_gateway.nat_gateway: Creating...
  allocation_id:        "" => "eipalloc-25f39d17"
  network_interface_id: "" => "<computed>"
  private_ip:           "" => "<computed>"
  public_ip:            "" => "<computed>"
  subnet_id:            "" => "subnet-e8cff9c4"
aws_route_table_association.public_route[0]: Creating...
  route_table_id: "" => "rtb-e66d349d"
  subnet_id:      "" => "subnet-e8cff9c4"
aws_route_table_association.public_route[2]: Creating...
  route_table_id: "" => "rtb-e66d349d"
  subnet_id:      "" => "subnet-ebac68d4"
aws_subnet.private_subnet[1]: Creation complete after 2s (ID: subnet-2da45266)
aws_route_table_association.private_route[2]: Creating...
  route_table_id: "" => "rtb-7a613801"
  subnet_id:      "" => "subnet-51b6726e"
aws_route_table_association.private_route[1]: Creating...
  route_table_id: "" => "rtb-7a613801"
  subnet_id:      "" => "subnet-2da45266"
aws_db_subnet_group.db_subnet_group: Creating...
  arn:                   "" => "<computed>"
  description:           "" => "Managed by Terraform"
  name:                  "" => "db-subnet"
  name_prefix:           "" => "<computed>"
  subnet_ids.#:          "" => "3"
  subnet_ids.3804843734: "" => "subnet-77cff95b"
  subnet_ids.4208861625: "" => "subnet-51b6726e"
  subnet_ids.633931707:  "" => "subnet-2da45266"
aws_route_table_association.private_route[0]: Creating...
  route_table_id: "" => "rtb-7a613801"
  subnet_id:      "" => "subnet-77cff95b"
aws_route_table_association.public_route[0]: Creation complete after 0s (ID: rtbassoc-dc8eaca6)
aws_route_table_association.public_route[1]: Creation complete after 0s (ID: rtbassoc-2396b459)
aws_route_table_association.public_route[2]: Creation complete after 0s (ID: rtbassoc-448eac3e)
aws_route_table_association.private_route[2]: Creation complete after 0s (ID: rtbassoc-e991b393)
aws_route_table_association.private_route[0]: Creation complete after 0s (ID: rtbassoc-0e92b074)
aws_route_table_association.private_route[1]: Creation complete after 0s (ID: rtbassoc-578cae2d)
aws_route.igw_route: Creation complete after 0s (ID: r-rtb-e66d349d1080289494)
aws_db_subnet_group.db_subnet_group: Creation complete after 1s (ID: db-subnet)
aws_launch_configuration.as_conf: Creation complete after 10s (ID: terraform-006cb0894f43b7f99761fc5636)
aws_autoscaling_group.asg: Creating...
  arn:                            "" => "<computed>"
  default_cooldown:               "" => "30"
  desired_capacity:               "" => "3"
  force_delete:                   "" => "false"
  health_check_grace_period:      "" => "120"
  health_check_type:              "" => "EC2"
  launch_configuration:           "" => "terraform-006cb0894f43b7f99761fc5636"
  load_balancers.#:               "" => "<computed>"
  max_size:                       "" => "3"
  metrics_granularity:            "" => "1Minute"
  min_size:                       "" => "3"
  name:                           "" => "asg-terraform-006cb0894f43b7f99761fc5636"
  protect_from_scale_in:          "" => "false"
  target_group_arns.#:            "" => "<computed>"
  vpc_zone_identifier.#:          "" => "3"
  vpc_zone_identifier.3804843734: "" => "subnet-77cff95b"
  vpc_zone_identifier.4208861625: "" => "subnet-51b6726e"
  vpc_zone_identifier.633931707:  "" => "subnet-2da45266"
  wait_for_capacity_timeout:      "" => "10m"
aws_nat_gateway.nat_gateway: Still creating... (10s elapsed)
aws_autoscaling_group.asg: Still creating... (10s elapsed)
aws_nat_gateway.nat_gateway: Still creating... (20s elapsed)
aws_autoscaling_group.asg: Still creating... (20s elapsed)
aws_nat_gateway.nat_gateway: Still creating... (30s elapsed)
aws_autoscaling_group.asg: Still creating... (30s elapsed)
aws_nat_gateway.nat_gateway: Still creating... (40s elapsed)
aws_autoscaling_group.asg: Still creating... (40s elapsed)
aws_nat_gateway.nat_gateway: Still creating... (50s elapsed)
aws_autoscaling_group.asg: Still creating... (50s elapsed)
aws_nat_gateway.nat_gateway: Still creating... (1m0s elapsed)
aws_autoscaling_group.asg: Still creating... (1m0s elapsed)
aws_nat_gateway.nat_gateway: Still creating... (1m10s elapsed)
aws_autoscaling_group.asg: Still creating... (1m10s elapsed)
aws_nat_gateway.nat_gateway: Still creating... (1m20s elapsed)
aws_autoscaling_group.asg: Creation complete after 1m19s (ID: asg-terraform-006cb0894f43b7f99761fc5636)
aws_nat_gateway.nat_gateway: Still creating... (1m30s elapsed)
aws_nat_gateway.nat_gateway: Creation complete after 1m38s (ID: nat-0fad1218a735c4ded)
aws_route.nat_route: Creating...
  destination_cidr_block:     "" => "0.0.0.0/0"
  destination_prefix_list_id: "" => "<computed>"
  egress_only_gateway_id:     "" => "<computed>"
  gateway_id:                 "" => "<computed>"
  instance_id:                "" => "<computed>"
  instance_owner_id:          "" => "<computed>"
  nat_gateway_id:             "" => "nat-0fad1218a735c4ded"
  network_interface_id:       "" => "<computed>"
  origin:                     "" => "<computed>"
  route_table_id:             "" => "rtb-7a613801"
  state:                      "" => "<computed>"
aws_route.nat_route: Creation complete after 0s (ID: r-rtb-7a6138011080289494)
 
Apply complete! Resources: 30 added, 0 changed, 0 destroyed.
Releasing state lock. This may take a few moments...
 
Outputs:
 
aws_zones = [
    us-east-1c,
    us-east-1d,
    us-east-1e
]
db_subnet_group_name = db-subnet
ecsServiceRole_arn = arn:aws:iam::462818068088:role/ecsServiceRole-95b3af27
ecs_cluster_name = ecs-cluster
private_subnet_ids = [
    subnet-77cff95b,
    subnet-2da45266,
    subnet-51b6726e
]
public_subnet_ids = [
    subnet-e8cff9c4,
    subnet-05a7514e,
    subnet-ebac68d4
]
vpc_default_sg_id = sg-22259851
vpc_id = vpc-d82a38a1

And just like that, the ECS cluster is ready for services to be deployed. Taking a look in AWS web console we can see there are three instances available and zero services running:

Just for fun and also to show another very cool feature of Terraform, let’s completely destroy everything we just created and recreate it.

01
02
03
04
05
06
07
08
09
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
$ terraform destroy
……
An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
  - destroy
 
Terraform will perform the following actions:
 
  - aws_autoscaling_group.asg
 
  - aws_db_subnet_group.db_subnet_group
 
  - aws_ecs_cluster.ecs_cluster
 
  - aws_eip.gateway_eip
 
  - aws_iam_instance_profile.ecsInstanceProfile
 
  - aws_iam_role.ecsInstanceRole
 
  - aws_iam_role.ecsServiceRole
 
  - aws_iam_role_policy.ecsInstanceRolePolicy
 
  - aws_iam_role_policy.ecsServiceRolePolicy
 
  - aws_internet_gateway.internet_gateway
 
  - aws_launch_configuration.as_conf
 
  - aws_nat_gateway.nat_gateway
 
  - aws_route.igw_route
 
  - aws_route.nat_route
 
  - aws_route_table.igw_route_table
 
  - aws_route_table.nat_route_table
 
  - aws_route_table_association.private_route[0]
 
  - aws_route_table_association.private_route[1]
 
  - aws_route_table_association.private_route[2]
 
  - aws_route_table_association.public_route[0]
 
  - aws_route_table_association.public_route[1]
 
  - aws_route_table_association.public_route[2]
 
  - aws_subnet.private_subnet[0]
 
  - aws_subnet.private_subnet[1]
 
  - aws_subnet.private_subnet[2]
 
  - aws_subnet.public_subnet[0]
 
  - aws_subnet.public_subnet[1]
 
  - aws_subnet.public_subnet[2]
 
  - aws_vpc.vpc
 
  - random_id.code
 
 
Plan: 0 to add, 0 to change, 30 to destroy.
 
Do you really want to destroy?
  Terraform will destroy all your managed infrastructure, as shown above.
  There is no undo. Only 'yes' will be accepted to confirm.
 
  Enter a value: yes
……
Destroy complete! Resources: 30 destroyed.
 
$ terraform apply
data.aws_ami.ecs_ami: Refreshing state...
random_id.code: Creating...
....
Apply complete! Resources: 30 added, 0 changed, 0 destroyed.
....

Beautiful. With just two commands, we can destroy everything and recreate it.

Summing It Up

Today we did a lot of work. Well, to be honest we did a lot of configuring and let the robots in our computers do the work. And that is exactly how I like it. To have done all of that work manually in the AWS console would have taken hours.

In the next post, we’ll complete this tutorial by defining the actual Docker service to build on this shared environment and have something to play with.

Published on Web Code Geeks with permission by Phillip Shipley, partner at our WCG program. See the original article here: Shared Resources for Your Terraformed Docker Environment on AWS

Opinions expressed by Web Code Geeks contributors are their own.

Phillip Shipley

Phillip Shipley is the IT Applications Development manager at SIL International, Inc. He spends the majority of his work time developing web applications and has a particular passion for APIs and integration. When he’s not building software, he’s probably building LEGO with his son.
Subscribe
Notify of
guest


This site uses Akismet to reduce spam. Learn how your comment data is processed.

0 Comments
Oldest
Newest Most Voted
Inline Feedbacks
View all comments
Back to top button