mirror of https://github.com/status-im/consul.git
Merge pull request #11050 from hashicorp/ecs-beta-doc-prep
docs: ECS docs for beta
This commit is contained in:
commit
770c67a7e3
|
@ -7,26 +7,25 @@ description: >-
|
|||
|
||||
# Architecture
|
||||
|
||||
The following diagram shows the main components of the Consul architecture when deployed to an ECS cluster:
|
||||
|
||||
![Consul on ECS Architecture](/img/consul-ecs-arch.png)
|
||||
|
||||
As shown above there are two main components to the architecture.
|
||||
|
||||
1. **Consul Server task:** Runs the Consul server.
|
||||
1. **Consul servers:** Production-ready Consul server cluster
|
||||
1. **Application tasks:** Runs user application containers along with two helper containers:
|
||||
1. **Consul Client:** The Consul client container runs Consul. The Consul client communicates
|
||||
1. **Consul client:** The Consul client container runs Consul. The Consul client communicates
|
||||
with the Consul server and configures the Envoy proxy sidecar. This communication
|
||||
is called _control plane_ communication.
|
||||
1. **Sidecar Proxy:** The sidecar proxy container runs [Envoy](https://envoyproxy.io/). All requests
|
||||
1. **Sidecar proxy:** The sidecar proxy container runs [Envoy](https://envoyproxy.io/). All requests
|
||||
to and from the application container(s) run through the sidecar proxy. This communication
|
||||
is called _data plane_ communication.
|
||||
1. **ACL Controller:** Automatically provisions Consul ACL tokens for Consul clients and service mesh services
|
||||
in an ECS Cluster.
|
||||
|
||||
For more information about how Consul works in general, see Consul's [Architecture Overview](/docs/architecture).
|
||||
|
||||
In addition to the long-running Consul Client and Sidecar Proxy containers, there
|
||||
are also two initialization containers that run:
|
||||
|
||||
1. `discover-servers`: This container runs at startup and uses the AWS API to determine the IP address of the Consul server task.
|
||||
1. `mesh-init`: This container runs at startup and sets up initial configuration for Consul and Envoy.
|
||||
In addition to the long-running Consul client and sidecar proxy containers, the `mesh-init` container runs
|
||||
at startup and sets up initial configuration for Consul and Envoy.
|
||||
|
||||
### Task Startup
|
||||
|
||||
|
@ -34,12 +33,27 @@ This diagram shows the timeline of a task starting up and all its containers:
|
|||
|
||||
![Task Startup Timeline](/img/ecs-task-startup.png)
|
||||
|
||||
- **T0:** ECS starts the task. The `discover-servers` container starts looking for the Consul server task’s IP.
|
||||
It waits for the Consul server task to be running on ECS, looks up its IP and then writes the address to a file.
|
||||
Then the container exits.
|
||||
- **T1:** Both the `consul-client` and `mesh-init` containers start:
|
||||
- `consul-client` starts up and uses the server IP to join the cluster.
|
||||
- **T0:** ECS starts the task. The `consul-client` and `mesh-init` containers start:
|
||||
- `consul-client` uses the `retry-join` option to join the Consul cluster
|
||||
- `mesh-init` registers the service for this task and its sidecar proxy into Consul. It runs `consul connect envoy -bootstrap` to generate Envoy’s bootstrap JSON file and write it to a shared volume. After registration and bootstrapping, `mesh-init` exits.
|
||||
- **T2:** The `sidecar-proxy` container starts. It runs Envoy by executing `envoy -c <path-to-bootstrap-json>`.
|
||||
- **T3:** The `sidecar-proxy` container is marked as healthy by ECS. It uses a health check that detects if its public listener port is open. At this time, the user’s application containers are started since all the Consul machinery is ready to service requests.
|
||||
- **T4:** Consul marks the service as healthy by running the health checks specified in the task Terraform. The service will now receive traffic. At this time the only running containers are `consul-client`, `sidecar-proxy` and the user’s application container(s).
|
||||
- **T1:** The `sidecar-proxy` container starts. It runs Envoy by executing `envoy -c <path-to-bootstrap-json>`.
|
||||
- **T2:** The `sidecar-proxy` container is marked as healthy by ECS. It uses a health check that detects if its public listener port is open. At this time, your application containers are started since all Consul machinery is ready to service requests. The only running containers are `consul-client`, `sidecar-proxy`, and your application container(s).
|
||||
|
||||
### Automatic ACL Token Provisioning
|
||||
|
||||
Consul ACL tokens secure communication between agents and services.
|
||||
The following containers in a task require an ACL token:
|
||||
|
||||
- `consul-client`: The Consul client uses a token to authorize itself with Consul servers.
|
||||
All `consul-client` containers share the same token.
|
||||
- `mesh-init`: The `mesh-init` container uses a token to register the service with Consul.
|
||||
This token is unique for the Consul service, and is shared by instances of the service.
|
||||
|
||||
The ACL controller automatically creates ACL tokens for mesh-enabled tasks in an ECS cluster.
|
||||
The `acl-controller` Terraform module creates the ACL controller task. The controller creates the
|
||||
ACL token used by `consul-client` containers at startup and then watches for tasks in the cluster. It checks tags
|
||||
to determine if the task is mesh-enabled. If so, it creates the service ACL token for the task, if the
|
||||
token does not yet exist.
|
||||
|
||||
The ACL controller stores all ACL tokens in AWS Secrets Manager, and tasks are configured to pull these
|
||||
tokens from AWS Secrets Manager when they start.
|
||||
|
|
|
@ -1,230 +1,40 @@
|
|||
---
|
||||
layout: docs
|
||||
page_title: Install - AWS ECS
|
||||
page_title: Installation - AWS ECS
|
||||
description: >-
|
||||
Install Consul Service Mesh on AWS ECS (Elastic Container Service).
|
||||
---
|
||||
|
||||
# Install
|
||||
# Installation
|
||||
|
||||
Installing Consul on ECS is a multi-part process:
|
||||
|
||||
1. [**Terraform:**](#terraform) Your tasks must be specified in Terraform using [`ecs_task_definition`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_task_definition)
|
||||
and [`ecs_service`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_service) resources.
|
||||
1. [**Consul Server:**](#consul-server) You must deploy the Consul server onto the cluster using the [`dev-server` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/dev-server).
|
||||
1. [**Task IAM Role:**](#task-iam-role) Modify task IAM role to add `ecs:ListTasks` and `ecs:DescribeTasks` permissions.
|
||||
1. [**Task Module:**](#task-module) You can then take your `ecs_task_definition` resources and copy their configuration into a new [`mesh-task` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task)
|
||||
resource that will add the necessary containers to the task definition.
|
||||
1. [**Task Module:**](#task-module) Define the [`mesh-task` Terraform module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task)
|
||||
to create a task definition with the necessary sidecar containers for your application to join the service mesh.
|
||||
1. [**Routing:**](#routing) With your tasks as part of the mesh, you must specify their upstream
|
||||
services and change the URLs the tasks are using so that they're making requests
|
||||
through the service mesh.
|
||||
services and change the URLs the tasks are using so that they're making requests through the service mesh.
|
||||
1. [**Bind Address:**](#bind-address) Now that all communication is flowing through the service mesh,
|
||||
you should change the address your application is listening on to `127.0.0.1`
|
||||
so that it only receives requests through the sidecar proxy.
|
||||
|
||||
-> **NOTE:** This page assumes you're familiar with ECS. See [What is Amazon Elastic Container Service](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/Welcome.html) for more details.
|
||||
|
||||
## Terraform
|
||||
|
||||
Your tasks must first be specified in Terraform using [`ecs_task_definition`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_task_definition)
|
||||
and [`ecs_service`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_service) resources so that
|
||||
they can later be converted to use the [`mesh-task` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task).
|
||||
|
||||
For example, your tasks should be defined with Terraform similar to the following:
|
||||
|
||||
```hcl
|
||||
resource "aws_ecs_task_definition" "my_task" {
|
||||
family = "my_task"
|
||||
requires_compatibilities = ["FARGATE"]
|
||||
network_mode = "awsvpc"
|
||||
cpu = 256
|
||||
memory = 512
|
||||
execution_role_arn = "arn:aws:iam::111111111111:role/execution-role"
|
||||
task_role_arn = "arn:aws:iam::111111111111:role/task-role"
|
||||
container_definitions = jsonencode(
|
||||
[{
|
||||
name = "example-client-app"
|
||||
image = "docker.io/org/my_task:v0.0.1"
|
||||
essential = true
|
||||
portMappings = [
|
||||
{
|
||||
containerPort = 9090
|
||||
hostPort = 9090
|
||||
protocol = "tcp"
|
||||
}
|
||||
]
|
||||
cpu = 0
|
||||
mountPoints = []
|
||||
volumesFrom = []
|
||||
}]
|
||||
)
|
||||
}
|
||||
|
||||
resource "aws_ecs_service" "my_task" {
|
||||
name = "my_task"
|
||||
cluster = "arn:aws:ecs:us-east-1:111111111111:cluster/my-cluster"
|
||||
task_definition = aws_ecs_task_definition.my_task.arn
|
||||
desired_count = 1
|
||||
network_configuration {
|
||||
subnets = ["subnet-abc123"]
|
||||
}
|
||||
launch_type = "FARGATE"
|
||||
}
|
||||
```
|
||||
|
||||
## Consul Server
|
||||
|
||||
With your tasks defined in Terraform, you're ready to run the Consul server
|
||||
on ECS.
|
||||
|
||||
-> **NOTE:** This is a development-only Consul server. It has no persistent
|
||||
storage and so will lose any data when it restarts. This should only be
|
||||
used for test workloads. In the future, we will support Consul servers
|
||||
running in HashiCorp Cloud Platform and on EC2 VMs for production workloads.
|
||||
|
||||
In order to deploy the Consul server, use the `dev-server` module:
|
||||
|
||||
```hcl
|
||||
module "dev_consul_server" {
|
||||
source = "hashicorp/consul/aws-ecs//modules/dev-server"
|
||||
version = "<latest version>"
|
||||
|
||||
ecs_cluster_arn = var.ecs_cluster_arn
|
||||
subnet_ids = var.subnet_ids
|
||||
lb_vpc_id = var.vpc_id
|
||||
load_balancer_enabled = true
|
||||
lb_subnets = var.lb_subnet_ids
|
||||
lb_ingress_rule_cidr_blocks = var.lb_ingress_rule_cidr_blocks
|
||||
log_configuration = {
|
||||
logDriver = "awslogs"
|
||||
options = {
|
||||
awslogs-group = aws_cloudwatch_log_group.log_group.name
|
||||
awslogs-region = var.region
|
||||
awslogs-stream-prefix = "consul-server"
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
data "aws_security_group" "vpc_default" {
|
||||
name = "default"
|
||||
vpc_id = var.vpc_id
|
||||
}
|
||||
|
||||
resource "aws_security_group_rule" "ingress_from_server_alb_to_ecs" {
|
||||
type = "ingress"
|
||||
from_port = 8500
|
||||
to_port = 8500
|
||||
protocol = "tcp"
|
||||
source_security_group_id = module.dev_consul_server.lb_security_group_id
|
||||
security_group_id = data.aws_security_group.vpc_default.id
|
||||
}
|
||||
|
||||
output "consul_server_url" {
|
||||
value = "http://${module.dev_consul_server.lb_dns_name}:8500"
|
||||
}
|
||||
```
|
||||
|
||||
-> **NOTE:** The documentation for all possible inputs can be found in the [module reference
|
||||
docs](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/dev-server?tab=inputs).
|
||||
|
||||
The example code above will create a Consul server ECS task and Application Load
|
||||
Balancer for the Consul UI. You can then use the output `consul_server_url` as
|
||||
the URL to the Consul server.
|
||||
|
||||
## Task IAM Role
|
||||
|
||||
Your tasks must have an IAM role that allows them to list and describe
|
||||
other tasks. This is required in order for the tasks to find the IP
|
||||
address of the Consul server.
|
||||
|
||||
The specific permissions needed are:
|
||||
|
||||
1. `ecs:ListTasks` on resource `*`.
|
||||
1. `ecs:DescribeTasks` on all tasks in this account and region. You can either
|
||||
use `*` for simplicity or scope it to the region and account, e.g. `arn:aws:ecs:us-east-1:1111111111111:task/*`. If
|
||||
your account is configured to use the new, [longer ECS task ARN format](https://docs.aws.amazon.com/AmazonECS/latest/userguide/ecs-account-settings.html#ecs-resource-ids)
|
||||
then you can further scope `ecs:DescribeTasks` down to tasks in a specific cluster, e.g. `arn:aws:ecs:us-east-1:1111111111111:task/MY_CLUSTER_NAME/*`.
|
||||
|
||||
The IAM role's ARN will be passed into the `mesh-task` module in the next step
|
||||
via the `task_role_arn` input.
|
||||
|
||||
-> **NOTE:** There are two IAM roles needed by ECS Tasks: Execution roles and
|
||||
Task roles. Here we are referring to the Task role, not the Execution role.
|
||||
The Execution role is used by ECS itself whereas the Task role defines the
|
||||
permissions for the containers running in the task.
|
||||
|
||||
Terraform for creating the IAM role might look like:
|
||||
|
||||
```hcl
|
||||
data "aws_caller_identity" "this" {}
|
||||
|
||||
resource "aws_iam_role" "this_task" {
|
||||
name = "this_task"
|
||||
assume_role_policy = jsonencode({
|
||||
Version = "2012-10-17"
|
||||
Statement = [
|
||||
{
|
||||
Action = "sts:AssumeRole"
|
||||
Effect = "Allow"
|
||||
Sid = ""
|
||||
Principal = {
|
||||
Service = "ecs-tasks.amazonaws.com"
|
||||
}
|
||||
},
|
||||
]
|
||||
})
|
||||
|
||||
inline_policy {
|
||||
name = "this_task"
|
||||
policy = jsonencode({
|
||||
Version = "2012-10-17"
|
||||
Statement = [
|
||||
{
|
||||
Effect = "Allow"
|
||||
Action = [
|
||||
"ecs:ListTasks",
|
||||
]
|
||||
Resource = "*"
|
||||
},
|
||||
{
|
||||
Effect = "Allow"
|
||||
Action = [
|
||||
"ecs:DescribeTasks"
|
||||
]
|
||||
Resource = [
|
||||
"arn:aws:ecs:${var.region}:${data.aws_caller_identity.this.account_id}:task/*",
|
||||
]
|
||||
}
|
||||
]
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
```
|
||||
|
||||
## Task Module
|
||||
|
||||
In order to add the necessary sidecar containers for your task to join the mesh,
|
||||
you must use the [`mesh-task` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task).
|
||||
|
||||
The module will reference the same inputs as your old ECS task definition but it will
|
||||
create a new version of the task definition with additional containers.
|
||||
|
||||
The `mesh-task` module is used as follows:
|
||||
you must use the [`mesh-task` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task):
|
||||
|
||||
```hcl
|
||||
module "my_task" {
|
||||
source = "hashicorp/consul/aws-ecs//modules/mesh-task"
|
||||
version = "<latest version>"
|
||||
|
||||
family = "my_task"
|
||||
execution_role_arn = "arn:aws:iam::111111111111:role/execution-role"
|
||||
task_role_arn = "arn:aws:iam::111111111111:role/task-role"
|
||||
family = "my_task"
|
||||
container_definitions = [
|
||||
{
|
||||
name = "example-client-app"
|
||||
image = "docker.io/org/my_task:v0.0.1"
|
||||
essential = true
|
||||
name = "example-client-app"
|
||||
image = "docker.io/org/my_task:v0.0.1"
|
||||
essential = true
|
||||
portMappings = [
|
||||
{
|
||||
containerPort = 9090
|
||||
|
@ -238,71 +48,30 @@ module "my_task" {
|
|||
}
|
||||
]
|
||||
|
||||
port = "9090"
|
||||
consul_server_service_name = module.dev_consul_server.ecs_service_name
|
||||
port = "9090"
|
||||
retry_join = "<address of the Consul server>"
|
||||
}
|
||||
```
|
||||
|
||||
All possible inputs are documented on the [module reference documentation](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task?tab=inputs)
|
||||
All possible inputs are documented on the [module reference documentation](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task?tab=inputs),
|
||||
however there are some important inputs worth highlighting:
|
||||
|
||||
- `family` is used as the [task definition family](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task_definition_parameters.html#family)
|
||||
but it's also used as the name of the service that gets registered in Consul.
|
||||
- `container_definitions` accepts an array of [container definitions](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/task_definition_parameters.html#container_definitions).
|
||||
These are your application containers and this should be set to the same value as what you
|
||||
were passing into the `container_definitions` key in the `aws_ecs_task_definition` resource
|
||||
without the `jsonencode() function`.
|
||||
|
||||
For example, if your original task definition looked like:
|
||||
|
||||
```hcl
|
||||
resource "aws_ecs_task_definition" "my_task" {
|
||||
...
|
||||
container_definitions = jsonencode(
|
||||
[
|
||||
{
|
||||
name = "example-client-app"
|
||||
image = "docker.io/org/my_task:v0.0.1"
|
||||
essential = true
|
||||
...
|
||||
}
|
||||
]
|
||||
)
|
||||
}
|
||||
```
|
||||
|
||||
Then you would remove the `jsonencode()` function and use the rest of the value
|
||||
as the input for the `mesh-task` module:
|
||||
|
||||
```hcl
|
||||
module "my_task" {
|
||||
source = "hashicorp/consul/aws-ecs//modules/mesh-task"
|
||||
version = "<latest version>"
|
||||
|
||||
...
|
||||
container_definitions = [
|
||||
{
|
||||
name = "example-client-app"
|
||||
image = "docker.io/org/my_task:v0.0.1"
|
||||
essential = true
|
||||
...
|
||||
}
|
||||
]
|
||||
}
|
||||
```
|
||||
|
||||
This is where you include application containers.
|
||||
- `port` is the port that your application listens on. This should be set to a
|
||||
string, not an integer, i.e. `port = "9090"`, not `port = 9090`.
|
||||
- `consul_server_service_name` should be set to the name of the ECS service for
|
||||
the Consul dev server. This is an output of the `dev-server` module so it
|
||||
can be referenced, e.g. `consul_server_service_name = module.dev_consul_server.ecs_service_name`.
|
||||
- `retry_join` is passed to the [`-retry-join`](/docs/agent/options#_retry_join) option for the Consul agent. This tells
|
||||
the agent the location of your Consul server so that it can join the Consul cluster.
|
||||
|
||||
The `mesh-task` module will create a new version of your task definition with the
|
||||
necessary sidecar containers added so you can delete your existing `aws_ecs_task_definition`
|
||||
resource.
|
||||
-> **NOTE:** If your tasks run in a public subnet, they must have `assign_public_ip = true`
|
||||
in their [`network_configuration`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_service#network_configuration) block so that ECS can pull the Docker images.
|
||||
|
||||
Your `aws_ecs_service` resource can remain unchanged except for the `task_definition`
|
||||
input which should reference the new module's output of the task definition's ARN:
|
||||
## ECS Service
|
||||
|
||||
To define an ECS Service, reference the mesh-task module's `task_definition_arn` output value
|
||||
in your `aws_ecs_service` resource:
|
||||
|
||||
```hcl
|
||||
resource "aws_ecs_service" "my_task" {
|
||||
|
@ -311,9 +80,6 @@ resource "aws_ecs_service" "my_task" {
|
|||
}
|
||||
```
|
||||
|
||||
-> **NOTE:** If your tasks run in a public subnet, they must have `assign_public_ip = true`
|
||||
in their [`network_configuration`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_service#network_configuration) block so that ECS can pull the Docker images.
|
||||
|
||||
After running `terraform apply`, you should see your tasks registered in
|
||||
the Consul UI.
|
||||
|
||||
|
@ -327,11 +93,9 @@ proxy to listen on a different port for each upstream service your application
|
|||
needs to call. You then must modify your application to make requests to the sidecar
|
||||
proxy on that port.
|
||||
|
||||
For example, say my application `web` wants to make calls to my other application
|
||||
For example, if your application `web` makes calls to another application called `backend`, then you would first configure the `mesh-task` module's upstream(s):
|
||||
`backend`.
|
||||
|
||||
First, I must configure the `mesh-task` module's upstreams:
|
||||
|
||||
```hcl
|
||||
module "web" {
|
||||
family = "web"
|
||||
|
@ -344,19 +108,19 @@ module "web" {
|
|||
}
|
||||
```
|
||||
|
||||
I set the `destination_name` to the name of the upstream service (in this case `backend`),
|
||||
and I set `local_bind_port` to an unused port. This is the port that the sidecar proxy
|
||||
will listen on and any requests to this port will be forwarded over to the `destination_name`.
|
||||
This does not have to be the port that `backend` is listening on because the service mesh
|
||||
will handle routing the request to the right port.
|
||||
- Set the `destination_name` to the name of the upstream service (in this case `backend`)
|
||||
- Set `local_bind_port` to an unused port. This is the port that the sidecar proxy
|
||||
will listen on. Any requests to this port will be forwarded over to the `destination_name`.
|
||||
This does not have to be the port that `backend` is listening on because the service mesh
|
||||
will handle routing the request to the right port.
|
||||
|
||||
If you have multiple upstream services they'll each need to be listed here.
|
||||
If you have multiple upstream services they each need to be listed here.
|
||||
|
||||
Next, I must configure my application to make requests to `localhost:8080` when
|
||||
Next, configure your application to make requests to `localhost:8080` when
|
||||
it wants to call the `backend` service.
|
||||
|
||||
For example, if my service allows configuring the URL for `backend` via the
|
||||
`BACKEND_URL` environment variable, I would set:
|
||||
For example, if your service allows configuring the URL for `backend` via the
|
||||
`BACKEND_URL` environment variable, you would set:
|
||||
|
||||
```hcl
|
||||
module "web" {
|
||||
|
@ -387,7 +151,7 @@ module "web" {
|
|||
|
||||
To ensure that your application only receives traffic through the service mesh,
|
||||
you must change the address that your application is listening on to only the loopback address
|
||||
(also known as `localhost`, `lo` and `127.0.0.1`)
|
||||
(also known as `localhost`, `lo`, and `127.0.0.1`)
|
||||
so that only the sidecar proxy running in the same task can make requests to it.
|
||||
|
||||
If your application is listening on all interfaces, e.g. `0.0.0.0`, then other
|
||||
|
@ -415,6 +179,7 @@ python manage.py runserver "127.0.0.1:8080"
|
|||
|
||||
## Next Steps
|
||||
|
||||
- Configure a secure [Production Installation](/docs/ecs/get-started/production-installation).
|
||||
- Now that your applications are running in the service mesh, read about
|
||||
other [Service Mesh features](/docs/connect).
|
||||
- View the [Architecture](/docs/ecs/architecture) documentation to understand
|
||||
|
|
|
@ -0,0 +1,115 @@
|
|||
---
|
||||
layout: docs
|
||||
page_title: Migrate Existing Tasks - AWS ECS
|
||||
description: >-
|
||||
Migrate Existing Tasks
|
||||
---
|
||||
|
||||
# Migrate Existing Tasks
|
||||
|
||||
This topic describes how to migrate your existing ECS Tasks to use our [`mesh-task` Terraform module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task).
|
||||
|
||||
## Define Tasks in Terraform
|
||||
|
||||
Your tasks must first be specified in Terraform using the [`ecs_task_definition`](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/ecs_task_definition)
|
||||
resource so that they can then be converted to use the [`mesh-task` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task).
|
||||
|
||||
For example, your tasks should be defined with Terraform similar to the following:
|
||||
|
||||
```hcl
|
||||
resource "aws_ecs_task_definition" "my_task" {
|
||||
family = "my_task"
|
||||
requires_compatibilities = ["FARGATE"]
|
||||
network_mode = "awsvpc"
|
||||
cpu = 256
|
||||
memory = 512
|
||||
execution_role_arn = "arn:aws:iam::111111111111:role/execution-role"
|
||||
task_role_arn = "arn:aws:iam::111111111111:role/task-role"
|
||||
container_definitions = jsonencode(
|
||||
[{
|
||||
name = "example-client-app"
|
||||
image = "docker.io/org/my_task:v0.0.1"
|
||||
essential = true
|
||||
portMappings = [
|
||||
{
|
||||
containerPort = 9090
|
||||
hostPort = 9090
|
||||
protocol = "tcp"
|
||||
}
|
||||
]
|
||||
cpu = 0
|
||||
mountPoints = []
|
||||
volumesFrom = []
|
||||
}]
|
||||
)
|
||||
}
|
||||
|
||||
resource "aws_ecs_service" "my_task" {
|
||||
name = "my_task"
|
||||
cluster = "arn:aws:ecs:us-east-1:111111111111:cluster/my-cluster"
|
||||
task_definition = aws_ecs_task_definition.my_task.arn
|
||||
desired_count = 1
|
||||
network_configuration {
|
||||
subnets = ["subnet-abc123"]
|
||||
}
|
||||
launch_type = "FARGATE"
|
||||
}
|
||||
```
|
||||
|
||||
## Convert to the `mesh-task` Module
|
||||
|
||||
In order to add the necessary sidecar containers for your task to join the mesh,
|
||||
you must use the [`mesh-task` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task).
|
||||
|
||||
The `mesh-task` module uses inputs similar to your old ECS task definition but
|
||||
creates a new version of the task definition with additional containers.
|
||||
|
||||
The `mesh-task` module is used as follows:
|
||||
|
||||
```hcl
|
||||
module "my_task" {
|
||||
source = "hashicorp/consul/aws-ecs//modules/mesh-task"
|
||||
version = "<latest version>"
|
||||
|
||||
family = "my_task"
|
||||
container_definitions = [
|
||||
{
|
||||
name = "example-client-app"
|
||||
image = "docker.io/org/my_task:v0.0.1"
|
||||
essential = true
|
||||
portMappings = [
|
||||
{
|
||||
containerPort = 9090
|
||||
hostPort = 9090
|
||||
protocol = "tcp"
|
||||
}
|
||||
]
|
||||
cpu = 0
|
||||
mountPoints = []
|
||||
volumesFrom = []
|
||||
}
|
||||
]
|
||||
|
||||
port = "9090"
|
||||
retry_join = "<address of the Consul server>"
|
||||
}
|
||||
```
|
||||
|
||||
The main differences are:
|
||||
|
||||
- You must remove the `execution_role_arn` and `task_role_arn` fields. The `mesh-task` module will create the task and execution roles.
|
||||
- You must set the `port` field to the port that your application listens on.
|
||||
If your application has no listening port, set `outbound_only = true` and remove the `port` field.
|
||||
- You must add the `retry_join` field. This specifies the location of your Consul servers so that your task can join the mesh.
|
||||
- You must remove the `jsonencode()` function from the `container_definitions` field.
|
||||
|
||||
The `mesh-task` module will create a new version of your task definition with the
|
||||
necessary sidecar containers added so you can delete your existing `aws_ecs_task_definition`
|
||||
resource.
|
||||
|
||||
## Next Steps
|
||||
|
||||
Now that your task(s) are migrated to the `mesh-task` module,
|
||||
|
||||
- Start at the [ECS Service section](/docs/ecs/get-started/install#ecs-service) of the Installation Guide to continue installing Consul on ECS.
|
||||
- Refer to the [`mesh-task` reference documentation](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task?tab=inputs) for all available inputs to your mesh tasks.
|
|
@ -0,0 +1,108 @@
|
|||
---
|
||||
layout: docs
|
||||
page_title: Production Installation - AWS ECS
|
||||
description: >-
|
||||
Production Installation of the Consul Service Mesh on AWS ECS (Elastic Container Service).
|
||||
---
|
||||
|
||||
# Production Installation
|
||||
|
||||
For a production-ready installation of Consul on ECS, you will need to make sure that the cluster is secured.
|
||||
A secure Consul cluster should include the following:
|
||||
|
||||
1. [TLS Encryption](/docs/security/encryption#rpc-encryption-with-tls) for RPC communication between Consul clients and servers.
|
||||
1. [Gossip Encryption](/docs/security/encryption#gossip-encryption) for encrypting gossip traffic.
|
||||
1. [Access Control (ACLs)](/docs/security/acl) for authentication and authorization for Consul clients and services on the mesh.
|
||||
|
||||
-> **NOTE:** This page assumes that you have already configured your Consul server with the above features.
|
||||
|
||||
## Deploy ACL Controller
|
||||
|
||||
Before deploying your service, you will need to deploy the [ACL controller](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/acl-controller) so that it can provision the necessary tokens
|
||||
for tasks on the service mesh. To learn more about the ACL Controller, please see [Automatic ACL Token Provisioning](/docs/ecs/architecture#automatic-acl-token-provisioning).
|
||||
|
||||
To deploy the controller, you will first need store an ACL token with `acl:write` privileges
|
||||
and a CA certificate for the Consul server in AWS Secrets Manager.
|
||||
|
||||
```hcl
|
||||
resource "aws_secretsmanager_secret" "bootstrap_token" {
|
||||
name = "bootstrap-token"
|
||||
}
|
||||
|
||||
resource "aws_secretsmanager_secret_version" "bootstrap_token" {
|
||||
secret_id = aws_secretsmanager_secret.bootstrap_token.id
|
||||
secret_string = "<bootstrap token>"
|
||||
}
|
||||
|
||||
resource "aws_secretsmanager_secret" "ca_cert" {
|
||||
name = "server-ca-cert"
|
||||
}
|
||||
|
||||
resource "aws_secretsmanager_secret_version" "ca_cert" {
|
||||
secret_id = aws_secretsmanager_secret.ca_cert.id
|
||||
secret_string = "<CA certificate for the Consul server's HTTPS endpoint>"
|
||||
}
|
||||
```
|
||||
|
||||
Use the [`acl-controller` terraform module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/acl-controller?tab=inputs) to deploy the controller:
|
||||
|
||||
```hcl
|
||||
module "acl_controller" {
|
||||
source = "hashicorp/consul/aws-ecs//modules/acl-controller"
|
||||
consul_bootstrap_token_secret_arn = aws_secretsmanager_secret.bootstrap_token.arn
|
||||
consul_server_http_addr = "https://consul-server.example.com:8501"
|
||||
consul_server_ca_cert_arn = aws_secretsmanager_secret.ca_cert.arn
|
||||
ecs_cluster_arn = "arn:aws:ecs:my-region:111111111111:cluster/consul-ecs"
|
||||
region = "my-region"
|
||||
subnets = ["subnet-abcdef123456789"]
|
||||
name_prefix = "consul-ecs"
|
||||
}
|
||||
```
|
||||
|
||||
The `name_prefix` parameter is used to prefix any secrets that the ACL controller will
|
||||
update in AWS Secrets Manager.
|
||||
|
||||
-> **NOTE:** Make sure that the `name_prefix` is unique for each ECS cluster where you are
|
||||
deploying this controller.
|
||||
|
||||
## Deploy Services
|
||||
|
||||
Once the ACL controller is up and running, you will be able to deploy services on the mesh using the [`mesh-task` module](https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/submodules/mesh-task).
|
||||
Start with the basic configuration for the [Task Module](/docs/ecs/get-started/install#task-module) and specify additional settings to make the configuration production-ready.
|
||||
|
||||
First, you will need to create an AWS Secrets Manager secret for the gossip encryption key that the Consul clients
|
||||
should use.
|
||||
|
||||
```hcl
|
||||
resource "aws_secretsmanager_secret" "gossip_key" {
|
||||
name = "gossip-encryption-key"
|
||||
}
|
||||
|
||||
resource "aws_secretsmanager_secret_version" "gossip_key" {
|
||||
secret_id = aws_secretsmanager_secret.gossip_key.id
|
||||
secret_string = "<Gossip encryption key>"
|
||||
}
|
||||
```
|
||||
|
||||
Next, add the following configurations to enable secure deployment. Note that the `acl_secret_name_prefix`
|
||||
should be the same as the `name_prefix` you provide to the ACL controller module.
|
||||
|
||||
```hcl
|
||||
module "my_task" {
|
||||
source = "hashicorp/consul/aws-ecs//modules/mesh-task"
|
||||
family = "my_task"
|
||||
|
||||
...
|
||||
|
||||
tls = true
|
||||
consul_server_ca_cert_arn = aws_secretsmanager_secret.ca_cert.arn
|
||||
gossip_key_secret_arn = aws_secretsmanager_secret.gossip_key.arn
|
||||
|
||||
acls = true
|
||||
consul_client_token_secret_arn = module.acl_controller.client_token_secret_arn
|
||||
acl_secret_name_prefix = "consul-ecs"
|
||||
}
|
||||
```
|
||||
|
||||
Now you can deploy your services! Follow the rest of the steps in the [Installation instructions](/docs/ecs/get-started/install#task-module)
|
||||
to deploy and connect your services.
|
|
@ -7,16 +7,10 @@ description: >-
|
|||
|
||||
# Requirements
|
||||
|
||||
Currently, the following requirements must be met in order to install Consul on ECS:
|
||||
The following requirements must be met in order to install Consul on ECS:
|
||||
|
||||
1. **Terraform:** The tasks that you want to add to the service mesh must first be modeled in Terraform.
|
||||
1. **Launch Type:** Only the Fargate launch type is currently supported.
|
||||
1. **Subnets:** ECS Tasks can run in private or public subnets. Tasks must have [network access](https://aws.amazon.com/premiumsupport/knowledge-center/ecs-pull-container-api-error-ecr/) to Amazon ECR to pull images.
|
||||
1. **Consul Servers:** Currently, Consul servers must run inside ECS on Fargate using the `dev-server` Terraform module. This is a development/testing only server that does not support persistent storage. In the future, we will support production-ready Consul servers running in HashiCorp Cloud Platform and on EC2 VMs.
|
||||
|
||||
## Future Improvements
|
||||
|
||||
- Support EC2 launch type.
|
||||
- Support production-ready Consul servers running outside of ECS in HashiCorp Cloud Platform or EC2.
|
||||
- Support Consul TLS, ACLs, and Gossip Encryption.
|
||||
- Support Consul service health checks.
|
||||
1. **Launch Type:** Fargate and EC2 launch types are supported.
|
||||
1. **Subnets:** ECS Tasks can run in private or public subnets. Tasks must have [network access](https://aws.amazon.com/premiumsupport/knowledge-center/ecs-pull-container-api-error-ecr/) to Amazon ECR or other public container registries to pull images.
|
||||
1. **Consul Servers:** You can use your own Consul servers running on virtual machines or use [HashiCorp Cloud Platform Consul](https://www.hashicorp.com/cloud-platform) to host the servers for you. For development purposes or testing, you may use the `dev-server` [Terraform module](https://github.com/hashicorp/terraform-aws-consul-ecs/tree/main) that runs the Consul server as an ECS task. The `dev-server` does not support persistent storage.
|
||||
1. **ACL Controller:** If you are running a secure Consul installation with ACLs enabled, configure the ACL controller.
|
||||
|
|
|
@ -8,8 +8,8 @@ description: >-
|
|||
|
||||
# AWS ECS
|
||||
|
||||
-> **Tech Preview:** This functionality is currently in Tech Preview and is
|
||||
not yet ready for production use.
|
||||
-> **Beta:** This functionality is currently in beta and is
|
||||
not recommended for use in production environments. Refer to the [consul-ecs project road map](https://github.com/hashicorp/consul-ecs/projects/1) for information about upcoming features and enhancements.
|
||||
|
||||
Consul can be deployed on [AWS ECS](https://aws.amazon.com/ecs/) (Elastic Container Service) using our official
|
||||
Terraform modules.
|
||||
|
|
|
@ -556,7 +556,7 @@
|
|||
]
|
||||
},
|
||||
{
|
||||
"title": "AWS ECS <sup>Tech Preview</sup>",
|
||||
"title": "AWS ECS <sup>BETA</sup>",
|
||||
"routes": [
|
||||
{
|
||||
"title": "Overview",
|
||||
|
@ -566,16 +566,28 @@
|
|||
"title": "Get Started",
|
||||
"routes": [
|
||||
{
|
||||
"title": "Example Installation",
|
||||
"title": "Example Installation on ECS Fargate",
|
||||
"href": "https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/examples/dev-server-fargate"
|
||||
},
|
||||
{
|
||||
"title": "Example Installation on ECS EC2",
|
||||
"href": "https://registry.terraform.io/modules/hashicorp/consul-ecs/aws/latest/examples/dev-server-ec2"
|
||||
},
|
||||
{
|
||||
"title": "Requirements",
|
||||
"path": "ecs/get-started/requirements"
|
||||
},
|
||||
{
|
||||
"title": "Install",
|
||||
"title": "Installation",
|
||||
"path": "ecs/get-started/install"
|
||||
},
|
||||
{
|
||||
"title": "Production Installation",
|
||||
"path": "ecs/get-started/production-installation"
|
||||
},
|
||||
{
|
||||
"title": "Migrate Existing Tasks",
|
||||
"path": "ecs/get-started/migrate-existing-tasks"
|
||||
}
|
||||
]
|
||||
},
|
||||
|
|
Binary file not shown.
Before Width: | Height: | Size: 89 KiB After Width: | Height: | Size: 75 KiB |
Binary file not shown.
Before Width: | Height: | Size: 15 KiB After Width: | Height: | Size: 10 KiB |
Loading…
Reference in New Issue