Last active
March 16, 2024 05:46
-
-
Save AndrewBestbier/bb43ae98ca42a9cdb083598f59ba2d35 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
provider "aws" { | |
version = "~> 2.0" | |
region = "eu-west-2" | |
} | |
# Providing a reference to our default VPC | |
resource "aws_default_vpc" "default_vpc" { | |
} | |
# Providing a reference to our default subnets | |
resource "aws_default_subnet" "default_subnet_a" { | |
availability_zone = "eu-west-2a" | |
} | |
resource "aws_default_subnet" "default_subnet_b" { | |
availability_zone = "eu-west-2b" | |
} | |
resource "aws_default_subnet" "default_subnet_c" { | |
availability_zone = "eu-west-2c" | |
} | |
resource "aws_ecr_repository" "my_first_ecr_repo" { | |
name = "my-first-ecr-repo" | |
} | |
resource "aws_ecs_cluster" "my_cluster" { | |
name = "my-cluster" # Naming the cluster | |
} | |
resource "aws_ecs_task_definition" "my_first_task" { | |
family = "my-first-task" # Naming our first task | |
container_definitions = <<DEFINITION | |
[ | |
{ | |
"name": "my-first-task", | |
"image": "${aws_ecr_repository.my_first_ecr_repo.repository_url}", | |
"essential": true, | |
"portMappings": [ | |
{ | |
"containerPort": 3000, | |
"hostPort": 3000 | |
} | |
], | |
"memory": 512, | |
"cpu": 256 | |
} | |
] | |
DEFINITION | |
requires_compatibilities = ["FARGATE"] # Stating that we are using ECS Fargate | |
network_mode = "awsvpc" # Using awsvpc as our network mode as this is required for Fargate | |
memory = 512 # Specifying the memory our container requires | |
cpu = 256 # Specifying the CPU our container requires | |
execution_role_arn = "${aws_iam_role.ecsTaskExecutionRole.arn}" | |
} | |
resource "aws_iam_role" "ecsTaskExecutionRole" { | |
name = "ecsTaskExecutionRole" | |
assume_role_policy = "${data.aws_iam_policy_document.assume_role_policy.json}" | |
} | |
data "aws_iam_policy_document" "assume_role_policy" { | |
statement { | |
actions = ["sts:AssumeRole"] | |
principals { | |
type = "Service" | |
identifiers = ["ecs-tasks.amazonaws.com"] | |
} | |
} | |
} | |
resource "aws_iam_role_policy_attachment" "ecsTaskExecutionRole_policy" { | |
role = "${aws_iam_role.ecsTaskExecutionRole.name}" | |
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy" | |
} | |
resource "aws_alb" "application_load_balancer" { | |
name = "test-lb-tf" # Naming our load balancer | |
load_balancer_type = "application" | |
subnets = [ # Referencing the default subnets | |
"${aws_default_subnet.default_subnet_a.id}", | |
"${aws_default_subnet.default_subnet_b.id}", | |
"${aws_default_subnet.default_subnet_c.id}" | |
] | |
# Referencing the security group | |
security_groups = ["${aws_security_group.load_balancer_security_group.id}"] | |
} | |
# Creating a security group for the load balancer: | |
resource "aws_security_group" "load_balancer_security_group" { | |
ingress { | |
from_port = 80 | |
to_port = 80 | |
protocol = "tcp" | |
cidr_blocks = ["0.0.0.0/0"] # Allowing traffic in from all sources | |
} | |
egress { | |
from_port = 0 | |
to_port = 0 | |
protocol = "-1" | |
cidr_blocks = ["0.0.0.0/0"] | |
} | |
} | |
resource "aws_lb_target_group" "target_group" { | |
name = "target-group" | |
port = 80 | |
protocol = "HTTP" | |
target_type = "ip" | |
vpc_id = "${aws_default_vpc.default_vpc.id}" # Referencing the default VPC | |
} | |
resource "aws_lb_listener" "listener" { | |
load_balancer_arn = "${aws_alb.application_load_balancer.arn}" # Referencing our load balancer | |
port = "80" | |
protocol = "HTTP" | |
default_action { | |
type = "forward" | |
target_group_arn = "${aws_lb_target_group.target_group.arn}" # Referencing our tagrte group | |
} | |
} | |
resource "aws_ecs_service" "my_first_service" { | |
name = "my-first-service" # Naming our first service | |
cluster = "${aws_ecs_cluster.my_cluster.id}" # Referencing our created Cluster | |
task_definition = "${aws_ecs_task_definition.my_first_task.arn}" # Referencing the task our service will spin up | |
launch_type = "FARGATE" | |
desired_count = 3 # Setting the number of containers to 3 | |
load_balancer { | |
target_group_arn = "${aws_lb_target_group.target_group.arn}" # Referencing our target group | |
container_name = "${aws_ecs_task_definition.my_first_task.family}" | |
container_port = 3000 # Specifying the container port | |
} | |
network_configuration { | |
subnets = ["${aws_default_subnet.default_subnet_a.id}", "${aws_default_subnet.default_subnet_b.id}", "${aws_default_subnet.default_subnet_c.id}"] | |
assign_public_ip = true # Providing our containers with public IPs | |
security_groups = ["${aws_security_group.service_security_group.id}"] # Setting the security group | |
} | |
} | |
resource "aws_security_group" "service_security_group" { | |
ingress { | |
from_port = 0 | |
to_port = 0 | |
protocol = "-1" | |
# Only allowing traffic in from the load balancer security group | |
security_groups = ["${aws_security_group.load_balancer_security_group.id}"] | |
} | |
egress { | |
from_port = 0 | |
to_port = 0 | |
protocol = "-1" | |
cidr_blocks = ["0.0.0.0/0"] | |
} | |
} |
Could aws_ecs_cluster
be provisioned to a non-default VPC? Thanks.
The "503 Error service not available" can be overcome by reducing the number of tasks per service, rather than 3 , try with 1.
Could
aws_ecs_cluster
be provisioned to a non-default VPC? Thanks.
did you get an answer to this?
docker build -t my_first_ecr_repo . --platform=linux/amd64
This fixed my 503 Error! Thank you @udayfop :)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
If you are using MacBook pro-m1 or any mac
build docker image with platform
docker build -t my_first_ecr_repo . --platform=linux/amd64