CDK patterns for serverless container with AWS Fargate
Inspired by Vijay Menon from the AWS blog post introduced in 2019, DualAlbFargateService
allows you to create one or many fargate services with both internet-facing ALB and internal ALB associated with all services. With this pattern, fargate services will be allowed to intercommunicat via internal ALB while external inbound traffic will be spread across the same service tasks through internet-facing ALB.
The sample below will create 3 fargate services associated with both external and internal ALBs. The internal ALB will have an alias(internal.svc.local
) auto-configured from Route 53 so services can communite through the private ALB endpoint.
new DualAlbFargateService(stack, 'Service', {
spot: true, // FARGATE_SPOT only cluster
tasks: [
{
task: orderTask,
desiredCount: 2,
internal: { port: 443, cert },
external: { port: 80 },
// customize the service autoscaling policy
scalingPolicy: {
maxCapacity: 20,
requestPerTarget: 1000,
targetCpuUtilization: 50,
},
},
{ task: customerTask, desiredCount: 2, internal: { port: 8080 } },
{ task: productTask, desiredCount: 2, internal: { port: 9090 } },
],
route53Ops: {
zoneName, // svc.local
externalAlbRecordName, // external.svc.local
internalAlbRecordName, // internal.svc.local
},
});
By enabling the spot
property, 100% fargate spot tasks will be provisioned to help you save up to 70%. Check more details about Fargate Spot. This is a handy catch-all flag to force all tasks to be FARGATE_SPOT
only.
To specify mixed strategy with partial FARGATE
and partial FARGATE_SPOT
, specify the capacityProviderStrategy
for individual tasks like
new DualAlbFargateService(stack, 'Service', {
tasks: [
{
task: customerTask,
internal: { port: 8080 },
desiredCount: 2,
capacityProviderStrategy: [
{
capacityProvider: 'FARGATE',
base: 1,
weight: 1,
},
{
capacityProvider: 'FARGATE_SPOT',
base: 0,
weight: 3,
},
],
},
],
});
The custom capacity provider strategy will be applied if capacityProviderStretegy
is specified, otherwise, 100% spot will be used when spot: true
. The default policy is 100% Fargate on-demand.
Simply turn on the enableExecuteCommand
property to enable the ECS Exec support for all services.
Specify the internal
or external
property to expose your service internally, externally or both.
The cert
property implies HTTPS
protocol.
new DualAlbFargateService(stack, 'Service', {
tasks: [
// this task is internal only
{ task: task1, internal: { port: 8080 } },
// this task is external only
{ task: task2, external: { port: 8081 } },
// this task is both external(HTTPS) and internal(HTTP) facing
{
task: task3,
external: { port: 443, cert: myAcmCert },
internal: { port: 8888 },
},
],
});
Please note if all tasks are defined as INTERNAL_ONLY
, no external ALB will be created. Similarly, no internal ALB
will be created if all defined as EXTERNAL_ONLY
.
By default, all tasks will be deployed in the private subnets. You will need the NAT gateway for the default route associated with the private subnets to ensure the task can successfully pull the container images.
However, you are allowed to specify vpcSubnets
to customize the subnet selection.
To deploy all tasks in public subnets, one per AZ:
new DualAlbFargateService(stack, 'Service', {
vpcSubnets: {
subnetType: ec2.SubnetType.PUBLIC,
onePerAz: true,
},
...
});
This will implicitly enable the auto assign public IP
for each fargate task so the task can successfully pull the container images from external registry. However, the ingress traffic will still be balanced via the external ALB.
To deploy all tasks in specific subnets:
new DualAlbFargateService(stack, 'Service', {
vpcSubnets: {
subnets: [
ec2.Subnet.fromSubnetId(stack, 'sub-1a', 'subnet-0e9460dbcfc4cf6ee'),
ec2.Subnet.fromSubnetId(stack, 'sub-1b', 'subnet-0562f666bdf5c29af'),
ec2.Subnet.fromSubnetId(stack, 'sub-1c', 'subnet-00ab15c0022872f06'),
],
},
...
});
This repository comes with a sample applicaiton with 3 services in Golang. On deployment, the Order
service will be exposed externally on external ALB port 80
and all requests to the Order
service will trigger sub-requests internally to another other two services(product
and customer
) through the internal ALB and eventually aggregate the response back to the client.
To deploy the sample application in you default VPC:
// install first
$ yarn install
// compile the ts to js
$ yarn build
$ npx cdk --app lib/integ.default.js -c use_default_vpc=1 diff
$ npx cdk --app lib/integ.default.js -c use_default_vpc=1 deploy
To deploy with HTTPS-only with existing ACM certificate in your default VPC:
$ npx cdk --app lib/integ.default.js deploy -c use_default_vpc=1 -c ACM_CERT_ARN=<YOUR_ACM_CERT_ARN>
On deployment complete, you will see the external ALB endpoint in the CDK output. cURL
the external HTTP endpoint and you should be able to see the aggregated response.
$ curl http://demo-Servi-EH1OINYDWDU9-1397122594.ap-northeast-1.elb.amazonaws.com
or
$ curl https://<YOUR_CUSTOM_DOMAIN_NAME>
{"service":"order", "version":"1.0"}
{"service":"product","version":"1.0"}
{"service":"customer","version":"1.0"}
Use the WordPress
construct to create a serverless WordPress service with AWS Fargate, Amazon EFS filesystem and Aurora serverless database. All credentials auto generated from the AWS Secret Manager and securely inject the credentials into the serverless container with the auto generated IAM task execution role.
new WordPress(stack, 'WP', {
auroraServerless: true,
spot: true,
enableExecuteCommand: true,
});