CloudFormation Template -Deploying AWS Fargate service using AWS Elastic Container Service

Introduction:

The following AWS CloudFormation template defines a robust infrastructure deployment for a serverless application using Amazon Elastic Container Service (ECS) and AWS Fargate. AWS CloudFormation simplifies the provisioning and management of AWS resources, making it easier to deploy complex applications with scalability and reliability in mind.

This template allows for the creation of ECS services, suitable for hosting containerized applications, with a specific focus on a “Temporal Worker” service. The template is designed with flexibility in mind, allowing customization through parameters and conditional resource creation based on user-defined criteria.

Here’s a breakdown of the key components and resources in your CloudFormation template:

The CloudFormation template is written in YAML format and appears to define resources for deploying an AWS Fargate service using AWS Elastic Container Service (ECS). Below is a breakdown of the template’s key components:

  1. Parameters: These are input parameters that can be customized when you deploy the CloudFormation stack. They include:
  • EnvironmentName: A string parameter to specify the environment (e.g., "dev" or "production").

  • NetworkStackName: The name of an existing CloudFormation stack containing networking resources.

  • EcsStackName: The name of an existing CloudFormation stack containing ECS resources.

  • Various parameters related to the ECS service, such as container port, CPU, memory, image, desired count, and min/max containers.

  • SetupTemporalWorkers: A string parameter that specifies if workers need to be set up (default is 'false').

2. Conditions: These are used to conditionally create or configure resources based on the value of a parameter. In this template, the SetupTemporalWorkers condition is used to determine whether certain resources are created. It checks if the SetupTemporalWorkers parameter is set to 'true'.

3. Resources: These are the AWS resources that will be created or managed by the CloudFormation stack. Some of the notable resources include:

  • IAM roles (TemporalWorkerExecutionRole, TemporalWorkerTaskRole, TemporalWorkerAutoScalingRole, TemporalWorkerECSTaskRole) for various purposes, including ECS task execution and auto-scaling.

  • ECS task definition (TemporalWorkerTaskDefinition) specifying container details and configurations.

  • CloudWatch Logs group (TemporalWorkerCloudwatchLogsGroup) for log storage.

  • ECS service (TemporalWorkerService) defining the Fargate service's parameters, such as the desired count and network configuration.

  • Auto Scaling target (TemporalWorkerAutoScalingTarget) and scaling policies (TemporalWorkerCPUAutoScalingPolicy and TemporalWorkerMemoryAutoScalingPolicy) to dynamically adjust the number of containers based on CPU and memory utilization.

  • EC2 security group (TemporalWorkerContainerSecurityGroup) for the ECS containers.

The template is structured to conditionally create these resources based on the value of the SetupTemporalWorkers parameter, allowing flexibility in deploying the workers when needed.

Deployment Steps

Follow these steps to upload and create the CloudFormation stack using the AWS Management Console:

  1. Sign in to the AWS Management Console: Log in to your AWS account if you haven’t already.

2. Navigate to CloudFormation: Go to the AWS CloudFormation service from the AWS Management Console.

3. Click the “Create stack” button.

4. Upload the CloudFormation template file (YAML).

Yaml file :

AWSTemplateFormatVersion: '2010-09-09'
Transform: AWS::Serverless-2016-10-31
Parameters:
  EnvironmentName:
    Type: String
  NetworkStackName:
    Description: Name of an active CloudFormation stack of networking resources
    Type: String
    MinLength: '1'
    MaxLength: '255'
    AllowedPattern: '^[a-zA-Z][-a-zA-Z0-9]*$'
  EcsStackName:
    Description: Name of an active CloudFormation stack of ECS resources
    Type: String
    MinLength: '1'
    MaxLength: '255'
    AllowedPattern: '^[a-zA-Z][-a-zA-Z0-9]*$'
  TemporalWorkerServiceName:
    Type: String
    Description: A name for the service
  TemporalWorkerContainerPort:
    Type: Number
    Default: 7233
    Description: Port number the application inside the docker container is binding to
  TemporalWorkerContainerCpu:
    Type: Number
    Description: CPU to give the container. 1024 is 1 CPU
    Default: 512
    AllowedValues: [256, 512, 1024]
  TemporalWorkerContainerMemory:
    Type: Number
    Description: Memory in megabytes to give the container
    Default: 256
    AllowedValues: [256, 512, 1024, 2048]
  TemporalWorkerContainerImage:
    Type: String
    Description: ECR Image URI and Tag
  TemporalWorkerDesiredCount:
    Type: Number
    Default: 2
    Description: Number of copies of the service task to run
  TemporalWorkerMinContainers:
    Type: Number
    Default: 1
  TemporalWorkerMaxContainers:
    Type: Number
    Default: 6
  SetupTemporalWorkers:
    Description: Specifies if workers need to be set up
    Type: String
    Default: 'false'
Conditions:
  SetupTemporalWorkers: !Equals [!Ref SetupTemporalWorkers, 'true']
Resources:
  TemporalWorkerExecutionRole:
    Type: AWS::IAM::Role
    Condition: SetupTemporalWorkers
    Properties:
      RoleName: !Sub '${EnvironmentName}${TemporalWorkerServiceName}ExecutionRole'
      AssumeRolePolicyDocument:
        Statement:
          - Effect: Allow
            Principal:
              Service: ecs-tasks.amazonaws.com
            Action: 'sts:AssumeRole'
      ManagedPolicyArns:
        - 'arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy'
  TemporalWorkerTaskRole:
    Type: AWS::IAM::Role
    Condition: SetupTemporalWorkers
    Properties:
      RoleName: !Sub '${EnvironmentName}${TemporalWorkerServiceName}TaskRole'
      AssumeRolePolicyDocument:
        Statement:
          - Effect: Allow
            Principal:
              Service: ecs-tasks.amazonaws.com
            Action: 'sts:AssumeRole'
  TemporalWorkerAutoScalingRole:
    Type: AWS::IAM::Role
    Condition: SetupTemporalWorkers
    Properties:
      RoleName: !Sub '${EnvironmentName}${TemporalWorkerServiceName}AutoScalingRole'
      AssumeRolePolicyDocument:
        Statement:
          - Effect: Allow
            Principal:
              Service: ecs-tasks.amazonaws.com
            Action: 'sts:AssumeRole'
      ManagedPolicyArns:
        - 'arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceAutoscaleRole'
  TemporalWorkerTaskDefinition:
    Type: AWS::ECS::TaskDefinition
    Condition: SetupTemporalWorkers
    Properties:
      Family: !Ref TemporalWorkerServiceName
      Cpu: !Ref TemporalWorkerContainerCpu
      Memory: !Ref TemporalWorkerContainerMemory
      NetworkMode: awsvpc
      RequiresCompatibilities: [FARGATE]
      ExecutionRoleArn: !GetAtt TemporalWorkerExecutionRole.Arn
      TaskRoleArn: !Ref TemporalWorkerECSTaskRole
      ContainerDefinitions:
        - Name: !Ref TemporalWorkerServiceName
          Cpu: !Ref TemporalWorkerContainerCpu
          Memory: !Ref TemporalWorkerContainerMemory
          Image: !Ref TemporalWorkerContainerImage
          StopTimeout: 60
          PortMappings:
            - ContainerPort: !Ref TemporalWorkerContainerPort
              HostPort: !Ref TemporalWorkerContainerPort
          Environment:
            - Name: NODE_ENV
              Value: !Ref EnvironmentName
          LogConfiguration:
            LogDriver: awslogs
            Options:
              awslogs-group: !Ref TemporalWorkerCloudwatchLogsGroup
              awslogs-region: !Sub '${AWS::Region}'
              awslogs-stream-prefix: ecs
  TemporalWorkerCloudwatchLogsGroup:
    Type: AWS::Logs::LogGroup
    Condition: SetupTemporalWorkers
    DeletionPolicy: Delete
    UpdateReplacePolicy: Delete
    Properties:
      LogGroupName: !Sub '/ecs/${EnvironmentName}-${TemporalWorkerServiceName}-lg'
  TemporalWorkerECSTaskRole:
    Type: AWS::IAM::Role
    Condition: SetupTemporalWorkers
    Properties:
      RoleName: !Sub '${EnvironmentName}${TemporalWorkerServiceName}ECSTaskRole'
      AssumeRolePolicyDocument:
        Statement:
          - Action: sts:AssumeRole
            Effect: Allow
            Principal:
              Service: ecs-tasks.amazonaws.com
      Policies:
        - PolicyName: !Sub '${EnvironmentName}${TemporalWorkerServiceName}PolicyName'
          PolicyDocument:
            Statement:
              - Effect: Allow
                Action: [secretsmanager:GetSecretValue]
                Resource: !Sub arn:${AWS::Partition}:ses:${AWS::Region}:${AWS::AccountId}:identity/*
              - Effect: Allow
                Action:
                  - secretsmanager:DescribeSecret
                  - secretsmanager:GetSecretValue
                  - secretsmanager:ListSecretVersionIds
                  - secretsmanager:ListSecrets
                Resource: !Sub arn:${AWS::Partition}:secretsmanager:${AWS::Region}:${AWS::AccountId}:secret:${EnvironmentName}-dm-temporal-visit*
              - Effect: Allow
                Action:
                  - secretsmanager:DescribeSecret
                  - secretsmanager:GetSecretValue
                  - secretsmanager:ListSecretVersionIds
                  - secretsmanager:ListSecrets
                Resource: !Sub arn:${AWS::Partition}:secretsmanager:${AWS::Region}:${AWS::AccountId}:secret:AmazonMSK_*
  TemporalWorkerService:
    Type: AWS::ECS::Service
    Condition: SetupTemporalWorkers
    Properties:
      ServiceName: !Sub ${EnvironmentName}-${TemporalWorkerServiceName}
      Cluster: !ImportValue: !Sub ${EcsStackName}-ClusterName
      LaunchType: FARGATE
      DeploymentConfiguration:
        MaximumPercent: 200
        MinimumHealthyPercent: 75
      DesiredCount: !Ref TemporalWorkerDesiredCount
      NetworkConfiguration:
        AwsvpcConfiguration:
          AssignPublicIp: DISABLED
          Subnets:
            - !ImportValue: !Sub ${NetworkStackName}-PrivateSubnet1Id
            - !ImportValue: !Sub ${NetworkStackName}-PrivateSubnet2Id
      TaskDefinition: !Ref TemporalWorkerTaskDefinition
      PlatformVersion: '1.4.0'
  TemporalWorkerAutoScalingTarget:
    Type: AWS::ApplicationAutoScaling::ScalableTarget
    Condition: SetupTemporalWorkers
    Properties:
      MinCapacity: !Ref TemporalWorkerMinContainers
      MaxCapacity: !Ref TemporalWorkerMaxContainers
      ResourceId:
        Fn::Join: ['/', ['service', !ImportValue: !Sub '${EcsStackName}-ClusterName', !GetAtt TemporalWorkerService.Name]]
      ScalableDimension: ecs:service:DesiredCount
      ServiceNamespace: ecs
      RoleARN: !GetAtt TemporalWorkerAutoScalingRole.Arn
  TemporalWorkerCPUAutoScalingPolicy:
    Type: AWS::ApplicationAutoScaling::ScalingPolicy
    Condition: SetupTemporalWorkers
    Properties:
      PolicyName: !Sub "${EnvironmentName}-${TemporalWorkerServiceName}-CPUAutoScalingPolicy"
      PolicyType: TargetTrackingScaling
      ScalingTargetId: !Ref TemporalWorkerAutoScalingTarget
      TargetTrackingScalingPolicyConfiguration:
        PredefinedMetricSpecification:
          PredefinedMetricType: ECSServiceAverageCPUUtilization
        ScaleInCooldown: 300
        ScaleOutCooldown: 300
        TargetValue: 60.0
  TemporalWorkerMemoryAutoScalingPolicy:
    Type: AWS::ApplicationAutoScaling::ScalingPolicy
    Condition: SetupTemporalWorkers
    Properties:
      PolicyName: !Sub "${EnvironmentName}-${TemporalWorkerServiceName}-MemoryAutoScalingPolicy"
      PolicyType: TargetTrackingScaling
      ScalingTargetId: !Ref TemporalWorkerAutoScalingTarget
      TargetTrackingScalingPolicyConfiguration:
        PredefinedMetricSpecification:
          PredefinedMetricType: ECSServiceAverageMemoryUtilization
        ScaleInCooldown: 300
        ScaleOutCooldown: 300
        TargetValue: 75.0
  TemporalWorkerContainerSecurityGroup:
    Type: AWS::EC2::SecurityGroup
    Condition: SetupTemporalWorkers
    Properties:
      GroupDescription: !Join ['-', [!GetAtt TemporalWorkerService.Name, ContainerSecurityGroup]]
      VpcId: !ImportValue: !Sub ${NetworkStackName}-VpcId
      SecurityGroupEgress:
        - IpProtocol: '-1'
          CidrIp: 0.0.0.0/0
          Description: Allow all outbound traffic

5. Specify Stack Details:

  • Enter a Stack name for your deployment.

  • Provide parameter values as needed.

  • Review and acknowledge the capabilities .

  • You can set additional stack options or tags if necessary.

6. Review and Create:

  • Review the stack details and configuration.

  • Click “Create stack” to initiate the deployment.

7. Monitor Stack Creation:

  • The CloudFormation stack creation process will begin.

  • Monitor the stack events in the AWS Management Console.

Conclusion:

In conclusion, the provided AWS CloudFormation template serves as a powerful blueprint for orchestrating a serverless application infrastructure on AWS. By utilizing ECS and Fargate, it leverages containerization to provide a scalable and efficient deployment environment. The flexibility inherent in this template, with configurable parameters and conditional resource creation, allows users to adapt the infrastructure to their specific needs, whether it’s for development, production, or any other environment.

0
Subscribe to my newsletter

Read articles from Mahira Technology Private Limited directly inside your inbox. Subscribe to the newsletter, and don't miss out.

Written by

Mahira Technology Private Limited
Mahira Technology Private Limited

A leading tech consulting firm specializing in innovative solutions. Experts in cloud, DevOps, automation, data analytics & more. Trusted technology partner.