|
| 1 | +resource "aws_security_group" "this" { |
| 2 | + name = "${var.server_type}-service-${var.environment}" |
| 3 | + description = "Security Group for communication with ECS Service" |
| 4 | + vpc_id = var.network_params.vpc_id |
| 5 | + lifecycle { |
| 6 | + ignore_changes = [description] |
| 7 | + } |
| 8 | +} |
| 9 | + |
| 10 | +resource "aws_security_group_rule" "egress_all" { |
| 11 | + type = "egress" |
| 12 | + from_port = 0 |
| 13 | + to_port = 0 |
| 14 | + protocol = "-1" |
| 15 | + cidr_blocks = ["0.0.0.0/0"] |
| 16 | + security_group_id = aws_security_group.this.id |
| 17 | +} |
| 18 | + |
| 19 | +resource "aws_ecs_service" "this" { |
| 20 | + name = "mavis-${var.environment}-${var.server_type}" |
| 21 | + cluster = var.cluster_id |
| 22 | + task_definition = aws_ecs_task_definition.this.arn |
| 23 | + desired_count = var.desired_count |
| 24 | + launch_type = "FARGATE" |
| 25 | + enable_execute_command = true |
| 26 | + health_check_grace_period_seconds = 60 |
| 27 | + |
| 28 | + network_configuration { |
| 29 | + subnets = var.network_params.subnets |
| 30 | + security_groups = [aws_security_group.this.id] |
| 31 | + } |
| 32 | + deployment_controller { |
| 33 | + type = var.deployment_controller |
| 34 | + } |
| 35 | + dynamic "deployment_circuit_breaker" { |
| 36 | + for_each = var.deployment_controller == "ECS" ? [1] : [] |
| 37 | + content { |
| 38 | + enable = true |
| 39 | + rollback = true |
| 40 | + } |
| 41 | + } |
| 42 | + dynamic "load_balancer" { |
| 43 | + for_each = var.loadbalancer != null ? [1] : [] |
| 44 | + content { |
| 45 | + target_group_arn = var.loadbalancer.target_group_arn |
| 46 | + container_name = var.container_name |
| 47 | + container_port = var.loadbalancer.container_port |
| 48 | + } |
| 49 | + } |
| 50 | + deployment_minimum_healthy_percent = 100 |
| 51 | + deployment_maximum_percent = 200 |
| 52 | + lifecycle { |
| 53 | + ignore_changes = [ |
| 54 | + task_definition, |
| 55 | + load_balancer, |
| 56 | + # desired_count TODO: Uncomment once we include autoscaling |
| 57 | + ] |
| 58 | + create_before_destroy = true |
| 59 | + } |
| 60 | +} |
| 61 | + |
| 62 | +resource "aws_ecs_task_definition" "this" { |
| 63 | + family = "mavis-${var.server_type}-task-definition-${var.environment}" |
| 64 | + requires_compatibilities = ["FARGATE"] |
| 65 | + network_mode = "awsvpc" |
| 66 | + cpu = var.task_config.cpu |
| 67 | + memory = var.task_config.memory |
| 68 | + execution_role_arn = var.task_config.execution_role_arn |
| 69 | + task_role_arn = var.task_config.task_role_arn |
| 70 | + container_definitions = jsonencode([ |
| 71 | + { |
| 72 | + name = var.container_name |
| 73 | + image = var.task_config.docker_image |
| 74 | + essential = true |
| 75 | + portMappings = [ |
| 76 | + { |
| 77 | + containerPort = 4000 |
| 78 | + hostPort = 4000 |
| 79 | + } |
| 80 | + ] |
| 81 | + environment = concat(var.task_config.environment, [{ name = "SERVER_TYPE", value = var.server_type }]) |
| 82 | + secrets = var.task_config.secrets |
| 83 | + logConfiguration = { |
| 84 | + logDriver = "awslogs" |
| 85 | + options = { |
| 86 | + awslogs-group = var.task_config.log_group_name |
| 87 | + awslogs-region = var.task_config.region |
| 88 | + awslogs-stream-prefix = "${var.environment}-${var.server_type}-logs" |
| 89 | + } |
| 90 | + } |
| 91 | + healthCheck = { |
| 92 | + command = var.task_config.health_check_command |
| 93 | + interval = 30 |
| 94 | + timeout = 5 |
| 95 | + retries = 3 |
| 96 | + startPeriod = 10 |
| 97 | + } |
| 98 | + } |
| 99 | + ]) |
| 100 | +} |
0 commit comments