Kong - API-Gateway on Weaveworks-ECS AMI
-- Kong an open source API Gateway that runs in front of RESTful APIs.
-- Built on top of battle tested Nginx webserver
-- Scalable - Easy horizontal scaling
-- Modular - Can be extended via plugins
-- Minimal requirements - Can run on Cloud platforms, Containers, On-premise etc
-- Backed by Cassandra or Postgres
Weave with ECS
This repository
- Terraform modules and code to deploy a highly available Kong cluster in ECS
- Ansible Integration to demonstrate concepts for deploying Kong and Cassandra services
- A python utility that manages deployement on ECS rather than relying on Ansible's ECS module.
- Lack of ability to deploy a service across multiple cluster led to a custom utility
- Also demonstrate deploy and destroy time provisioners in Terraform
- Demostrate use of WeaveWorks networking in deploying the cluster and service discovery in ECS
- Demonstrate use of overlay network for ECS
- Demonstrate use of Cloudwatch-logs. A log group and stream is setup for log forwarding and aws logging driver is used.
- Demonstrate cloud-init with Terraform
Pre-requisites
- AWS account. Obviously!
- Terraform > 0.9.5
- Ansible >= 2.3
- Python 2.7
- Boto, Botocore
- Registerred Domain and Route53 Hosted zone ( Good to have else you have to change code )
- Related ACM certificates for your domain ( Good to have else you have to change code )
Deployment architecture
Deployment
What is deployed?
- VPC - Three private subnets and three public subnets
- Two ECS Clusters ( Kong and Cassandra in public and private subnets respectively)
- A bastion node.
- AWS Log group and log stream
- EBS Volumes of 50G attached to each Cassandra node using cloud-init
- Route53 entries based on choosen domain names and details provided to Terraform
Deployment procedure
- Ensure pre-requisites are met
- Decide a region where this needs to be deployed
- This guides a cluster in a region with 3 AZs. You can reduce the number in terraform.tfvars file
- Generate your ACM Certificates for the domain
- Ensure a private key is available in AWS
# Prepare your environment ( Terraform and Ansible )
# Change directory to terraform/environments/development
# We are considering a sample development environment
# Update secrets.tf file with your public key
$ cat secrets.tf
aws_key_name = "test-cluster-key"
aws_key_path = "~/.ssh/test-cluster-key.pem"
// Can be generated using
// ssh-keygen -y -f mykey.pem > mykey.pub
keypair_public_key = "ssh-rsa publickey" # Replace this with public key corresponding to your private key in AWS
# You can use any authentication procedures mentioned here https://www.terraform.io/docs/providers/aws/
$ export AWS_ACCESS_KEY_ID="anaccesskey"
$ export AWS_SECRET_ACCESS_KEY="asecretkey"
$ export AWS_DEFAULT_REGION="us-west-2"
terraform.tfvars for your infra
/*
Variables for deploying stack
--------------------------------
- ACM certificates have to pre-exist
*/
// General
region = "eu-central-1" #Select a region based on your preference
vpc_name = "kong-VPC"
vpc_cidr = "10.2.0.0/16"
// This is for generated ssh.cfg if you want to get into the instance
proxy_cidr = "10.2.*"
/*
Environment keyword is important
- This will become suffix for your clusters
- Ansible roles for deployments are called based on the environment
- For simplicity we keep this as development.
*/
environment = "development"
# AZs are combintation of az length + subnet cidrs
public_sub_cidr = ["10.2.0.0/24","10.2.1.0/24","10.2.2.0/24"]
private_sub_cidr = ["10.2.3.0/24","10.2.4.0/24","10.2.5.0/24"]
azs = ["eu-central-1a","eu-central-1b","eu-central-1c"]
// You can reduce the size if you do not want to incur cost
bastion_instance_type = "t2.micro"
ingress_instance_type = "t2.medium"
cassandra_instance_type = "t2.medium"
# Ansible auto ssh - used when you want to do host level
# configuration
ansible_ssh_user = "ec2-user"
ansible_user = "ansible"
// For public facing sites and ELBs
// Applications will be accessible from these IPs only
control_cidr = "52.45.0.0/16,138.5.0.0/16"
// ASG Size
cassandra_asg_max_size = 3
cassandra_asg_min_size = 3
cassandra_asg_desired_size = 3
# ECS KONG cluster
kong_asg_max_size = 3
kong_asg_min_size = 3
kong_asg_desired_size = 3
// Route53 - required
// main_zone_id = "*********" # If you plan to use the route53
// public_domain_name = "Mydomain.com"
// Same as vpc cidr. Can change upon vpc peering
private_sub_control_cidr ="10.2.0.0/16"
// AMIs to be used based on owner name and ami name regex
// Using Weave-ECS AMI
// ami_owner_name = OwnerId
ami_owner_name = "376248598259"
ami_name_regex = "Weaveworks*ECS*Image*"
// Cassandra EBS
cass_ebs_dev_name = "/dev/xvdf"
# This needs to be io1 for prod
cass_ebs_vol_type = "gp2"
cass_ebs_vol_size = 50
cass_data_dir = "/cassandra-data"
// Kong-external-elb
kong_elb_name = "kong-external"
kong_elb_sg_name = "kong-external-elb-sg"
kong_elb_healthy_threshold = 10
kong_elb_unhealthy_threshold = 2
kong_elb_timeout = 10
kong_elb_elb_health_target = "HTTP:8001/"
kong_elb_interval = "15"
// Certificate must be available in IAM or ACM and must match region being deployed in
kong_ssl_certificate_id = "ARNOFYOURCERT"
// Main-elb
main_elb_name = "main-elb"
main_elb_sg_name = "main-elb-sg"
main_elb_healthy_threshold = 10
main_elb_unhealthy_threshold = 2
main_elb_timeout = 10
main_elb_elb_health_target = "HTTP:8001/"
main_elb_interval = "15"
// Certificate must be available in IAM or ACM and must match region being deployed in
main_ssl_certificate_id = "ARNOFYOURCERT"
Plan and setup
terraform plan -var-file="secrets.tf"
# If successful then
terraform apply -varf-file="secrets.tf"
## There should be no manual intervention required.
Note
- Cost: This is beyond the scope of Free-tier since we use two ELBs and t2.medium instances. You can reduce t2.medium to micro and replace ELBs with your own loadbalancers but you will have to update the code
- Kong-limitation: A single node needs to be deployed first and then can be scaled due to limitation with Kong/kong#2139
- Cassandra: There is no concept of master - slave. However, for clustering it expects a pre-existing Seed Node. In order to achieve this, a Seed Node is deployed and then clients are added. Based on the choosen replication factor, there can be data replicated across all nodes
- Environment: The environment keyword is used to pickup a defined ansible role. If you change or add new environments, ensure that corresponding Yaml file exists in Ansible role
For information on Ecs utility : https://github.com/faizan82/ecs-orchestrate