-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathmain.tf
278 lines (236 loc) · 6.29 KB
/
main.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
locals {
alb_port_forward = 80
ecs_host_port = 0 # ECS가 포트 동적할당
}
# VPC
module "vpc_main" {
source = "./modules/vpc"
name = var.project_name
cidr = var.vpc_cidr
public_subnets = var.public_subnets
private_subnets = var.private_subnets
az_names = var.az_names
tags = {}
}
# ECR
module "ecr" {
source = "./modules/ecr"
name = var.project_name
}
# Route53 - Hosted Zone
module "route53_zone" {
source = "./modules/route53/zone"
name = var.domain_name
}
# ACM
module "acm" {
source = "./modules/acm"
domain_name = var.sub_domain
}
# ALB - SG, DNS
module "alb_sg" {
source = "./modules/security_group"
name = var.project_name
vpc_id = module.vpc_main.vpc_id
inbound_rule = var.alb_inbound_rule
outbound_rule = var.outbound_rule
}
module "alb" {
source = "./modules/alb"
name = var.project_name
tags = {}
forwarding_port = local.alb_port_forward
acm_arn = module.acm.arn
vpc_id = module.vpc_main.vpc_id
security_group_id = module.alb_sg.id
subnet_ids = module.vpc_main.public_subnets_ids
}
module "alb_dns" {
source = "./modules/route53/record"
domain_name = var.api_server_domain
record_type = "A"
hosted_zone_id = module.route53_zone.zone_id
target_dns_name = module.alb.alb_dns_name
target_zone_id = module.alb.alb_zone_id
}
# ECS - ALB 연결, sg(inbound - ALB sg)
locals {
ecs_container_name = "${var.project_name}-ecs-container"
}
module "ecs_instance_sg" {
source = "./modules/security_group"
name = "${var.project_name}-ecs-instance-ec2-sg"
vpc_id = module.vpc_main.vpc_id
inbound_rule = var.ecs_instance_inbound_rule
outbound_rule = var.outbound_rule
}
resource "aws_cloudwatch_log_group" "ecs_log_group" {
name = "${var.project_name}-ecs-cw"
retention_in_days = 7
}
module "ecs" {
source = "./modules/ecs"
name = var.project_name
tags = {}
vpc_id = module.vpc_main.vpc_id
ecr_url = module.ecr.url
cloudwatch_log_group_name = aws_cloudwatch_log_group.ecs_log_group.name
subnet_ids = module.vpc_main.public_subnets_ids
instance_security_group_id = module.ecs_instance_sg.id
container_name = local.ecs_container_name
container_port = local.alb_port_forward
host_port = local.ecs_host_port
key_pair_name = "${var.project_name}_key_pair"
alb_target_group_arn = module.alb.target_group_arn
depends_on = [ module.alb ]
}
module "ecs_instance_eip" {
source = "./modules/eip"
instance_id = module.ecs.ecs_instance_id
depends_on = [ module.ecs ]
}
# ECS - CodePipeLine Artifact bucket
resource "aws_s3_bucket" "codepipeline_bucket" {
bucket = "${var.project_name}-codepipeline-bucket"
force_destroy = true
}
# ECS - CodePipeLine 자동배포
locals {
# 아티팩트를 저장할 S3 버킷의 하위디렉터리를 지정
source_output_artifact_name = "source_output"
build_output_artifact_name = "build_output"
}
module "codebuild" {
source = "./modules/code_suite/code_build"
name = var.project_name
artifact_bucket_arn = aws_s3_bucket.codepipeline_bucket.arn
container_name = local.ecs_container_name
ecr_repo_uri = module.ecr.url
ecs_cluster_name = module.ecs.ecs_cluster_name
ecs_service_name = module.ecs.ecs_service_name
}
module "codepipeline_iam_role" {
source = "./modules/code_suite/code_pipeline/iam"
name = var.project_name
artifact_bucket_arn = aws_s3_bucket.codepipeline_bucket.arn
code_build_arn = module.codebuild.arn
ecr_arn = module.ecr.arn
}
resource "aws_codepipeline" "codepipeline" {
name = "${var.project_name}-code-pipeline"
role_arn = module.codepipeline_iam_role.codepipeline_role_arn
artifact_store {
location = aws_s3_bucket.codepipeline_bucket.bucket
type = "S3"
}
stage {
name = "Source"
action {
name = "Source"
category = "Source"
owner = "AWS"
provider = "ECR"
version = "1"
input_artifacts = [ ]
# 해당 디렉터리에 imageDetail.json 파일이 저장
output_artifacts = [ local.source_output_artifact_name ]
configuration = {
RepositoryName = "${module.ecr.repo_name}"
ImageTag = "latest"
}
}
}
stage {
name = "Build"
action {
name = "Build"
category = "Build"
owner = "AWS"
provider = "CodeBuild"
version = "1"
input_artifacts = [local.source_output_artifact_name]
output_artifacts = [local.build_output_artifact_name]
# Code Build project 넣기
configuration = {
ProjectName = module.codebuild.id
}
}
}
# S3, ECR, ECS 로의 접근 권한 필요
stage {
name = "Deploy"
action {
name = "Deploy"
category = "Deploy"
owner = "AWS"
provider = "ECS"
version = "1"
input_artifacts = [local.build_output_artifact_name]
configuration = {
ClusterName: module.ecs.ecs_cluster_name
ServiceName: module.ecs.ecs_service_name
FileName: "imagedefinitions.json"
}
}
}
}
# EventBridge - CodePipleLine Trigger
module "eventbridge_codepipeline_role" {
source = "./modules/event_bridge"
name = var.project_name
codepipeline_arn = aws_codepipeline.codepipeline.arn
depends_on = [ aws_codepipeline.codepipeline ]
}
resource "aws_cloudwatch_event_rule" "ecr_push" {
name = "${var.project_name}-trigger-event-rule"
description = "ECR push Rule"
event_pattern = <<EOF
{
"detail-type": [
"ECR Image Action"
],
"source": [
"aws.ecr"
],
"detail": {
"action-type": [
"PUSH"
],
"image-tag": [
"latest"
],
"repository-name": [
"${module.ecr.repo_name}"
],
"result": [
"SUCCESS"
]
}
}
EOF
}
resource "aws_cloudwatch_event_target" "codepipeline" {
rule = aws_cloudwatch_event_rule.ecr_push.name
target_id = "DeployToECS"
arn = aws_codepipeline.codepipeline.arn
role_arn = module.eventbridge_codepipeline_role.eventbridge_codepipeline_role_arn
}
# RDS
module "rds_sg" {
source = "./modules/security_group"
name = "${var.project_name}-rds"
vpc_id = module.vpc_main.vpc_id
inbound_rule = var.db_inbound_rule
outbound_rule = var.outbound_rule
}
module "db" {
source = "./modules/rds"
project_name = var.project_name
db_subnet_ids = module.vpc_main.private_subnets_ids
db_sg_id = module.rds_sg.id
db_az_name = var.az_names[0]
db_name = var.db_name
db_username = var.db_username
db_password = var.db_password
}
# S3 - Image bucket