diff --git a/README.md b/README.md index c46f52f..6f0d6de 100644 --- a/README.md +++ b/README.md @@ -3,3 +3,137 @@ [![Test](https://github.com/mergermarket/terraform-acuris-ecs-service/actions/workflows/test.yml/badge.svg)](https://github.com/mergermarket/terraform-acuris-ecs-service/actions/workflows/test.yml) An ECS service with an ALB target group, suitable for routing to from an ALB. + + +## Requirements + +| Name | Version | +|------|---------| +| [terraform](#requirement\_terraform) | >= 0.12 | + +## Providers + +| Name | Version | +|------|---------| +| [aws](#provider\_aws) | n/a | + +## Modules + +| Name | Source | Version | +|------|--------|---------| +| [ecs\_update\_monitor](#module\_ecs\_update\_monitor) | mergermarket/ecs-update-monitor/acuris | 2.3.5 | +| [service](#module\_service) | mergermarket/load-balanced-ecs-service-no-target-group/acuris | 2.2.7 | +| [service\_container\_definition](#module\_service\_container\_definition) | mergermarket/ecs-container-definition/acuris | 2.2.0 | +| [taskdef](#module\_taskdef) | mergermarket/task-definition-with-task-role/acuris | 2.1.0 | + +## Resources + +| Name | Type | +|------|------| +| [aws_appautoscaling_policy.task_scaling_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_policy) | resource | +| [aws_appautoscaling_scheduled_action.scale_back_up](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_scheduled_action) | resource | +| [aws_appautoscaling_scheduled_action.scale_down](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_scheduled_action) | resource | +| [aws_appautoscaling_target.ecs](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/appautoscaling_target) | resource | +| [aws_cloudwatch_log_group.stderr](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group) | resource | +| [aws_cloudwatch_log_group.stdout](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_group) | resource | +| [aws_cloudwatch_log_subscription_filter.kinesis_log_stderr_stream](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_subscription_filter) | resource | +| [aws_cloudwatch_log_subscription_filter.kinesis_log_stdout_stream](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/cloudwatch_log_subscription_filter) | resource | + +## Inputs + +| Name | Description | Type | Default | Required | +|------|-------------|------|---------|:--------:| +| [add\_datadog\_feed](#input\_add\_datadog\_feed) | Flag to control adding subscription filter to CW loggroup | `bool` | `true` | no | +| [allow\_overnight\_scaledown](#input\_allow\_overnight\_scaledown) | Allow service to be scaled down | `bool` | `true` | no | +| [application\_environment](#input\_application\_environment) | Environment specific parameters passed to the container | `map(string)` | `{}` | no | +| [application\_secrets](#input\_application\_secrets) | A list of application specific secret names that can be found in aws secrets manager | `list(string)` | `[]` | no | +| [assume\_role\_policy](#input\_assume\_role\_policy) | A valid IAM policy for assuming roles - optional | `string` | `""` | no | +| [common\_application\_environment](#input\_common\_application\_environment) | Environment parameters passed to the container for all environments | `map(string)` | `{}` | no | +| [container\_labels](#input\_container\_labels) | Additional docker labels to apply to the container. | `map(string)` | `{}` | no | +| [container\_mountpoint](#input\_container\_mountpoint) | Map containing 'sourceVolume', 'containerPath' and 'readOnly' (optional) to map a volume into a container. | `map(string)` | `{}` | no | +| [container\_port\_mappings](#input\_container\_port\_mappings) | JSON document containing an array of port mappings for the container defintion - if set port is ignored (optional). | `string` | `""` | no | +| [cpu](#input\_cpu) | CPU unit reservation for the container | `string` | n/a | yes | +| [deployment\_maximum\_percent](#input\_deployment\_maximum\_percent) | The maximumPercent parameter represents an upper limit on the number of your service's tasks that are allowed in the RUNNING or PENDING state during a deployment, as a percentage of the desiredCount (rounded down to the nearest integer). | `string` | `"200"` | no | +| [deployment\_minimum\_healthy\_percent](#input\_deployment\_minimum\_healthy\_percent) | The minimumHealthyPercent represents a lower limit on the number of your service's tasks that must remain in the RUNNING state during a deployment, as a percentage of the desiredCount (rounded up to the nearest integer). | `string` | `"100"` | no | +| [deployment\_timeout](#input\_deployment\_timeout) | Timeout to wait for the deployment to be finished [seconds]. | `number` | `600` | no | +| [desired\_count](#input\_desired\_count) | The number of instances of the task definition to place and keep running. | `string` | `"3"` | no | +| [ecs\_cluster](#input\_ecs\_cluster) | The ECS cluster | `string` | `"default"` | no | +| [env](#input\_env) | Environment name | `any` | n/a | yes | +| [health\_check\_grace\_period\_seconds](#input\_health\_check\_grace\_period\_seconds) | Seconds to ignore failing load balancer health checks on newly instantiated tasks to prevent premature shutdown, up to 2147483647. Default 0. | `string` | `"0"` | no | +| [image\_id](#input\_image\_id) | ECR image\_id for the ecs container | `string` | `""` | no | +| [is\_test](#input\_is\_test) | For testing only. Stops the call to AWS for sts | `bool` | `false` | no | +| [log\_subscription\_arn](#input\_log\_subscription\_arn) | To enable logging to a kinesis stream | `string` | `""` | no | +| [memory](#input\_memory) | The memory reservation for the container in megabytes | `string` | n/a | yes | +| [multiple\_target\_group\_arns](#input\_multiple\_target\_group\_arns) | Mutiple target group ARNs to allow connection to multiple loadbalancers | `list(any)` | `[]` | no | +| [name\_suffix](#input\_name\_suffix) | Set a suffix that will be applied to the name in order that a component can have multiple services per environment | `string` | `""` | no | +| [network\_configuration\_security\_groups](#input\_network\_configuration\_security\_groups) | needed for network\_mode awsvpc | `list(any)` | `[]` | no | +| [network\_configuration\_subnets](#input\_network\_configuration\_subnets) | needed for network\_mode awsvpc | `list(any)` | `[]` | no | +| [network\_mode](#input\_network\_mode) | The Docker networking mode to use for the containers in the task | `string` | `"bridge"` | no | +| [nofile\_soft\_ulimit](#input\_nofile\_soft\_ulimit) | The soft ulimit for the number of files in container | `string` | `"4096"` | no | +| [overnight\_scaledown\_end\_hour](#input\_overnight\_scaledown\_end\_hour) | When to bring service back to full strength (Hour in UTC) | `string` | `"06"` | no | +| [overnight\_scaledown\_min\_count](#input\_overnight\_scaledown\_min\_count) | Minimum task count overnight | `string` | `"0"` | no | +| [overnight\_scaledown\_start\_hour](#input\_overnight\_scaledown\_start\_hour) | From when a service can be scaled down (Hour in UTC) | `string` | `"22"` | no | +| [pack\_and\_distinct](#input\_pack\_and\_distinct) | Enable distinct instance and task binpacking for better cluster utilisation. Enter 'true' for clusters with auto scaling groups. Enter 'false' for clusters with no ASG and instant counts less than or equal to desired tasks | `string` | `"false"` | no | +| [platform\_config](#input\_platform\_config) | Platform configuration | `map(string)` | `{}` | no | +| [platform\_secrets](#input\_platform\_secrets) | A list of common secret names for "the platform" that can be found in secrets manager | `list(string)` | `[]` | no | +| [port](#input\_port) | The port that container will be running on | `string` | n/a | yes | +| [privileged](#input\_privileged) | Gives the container privileged access to the host | `bool` | `false` | no | +| [release](#input\_release) | Metadata about the release | `map(string)` | n/a | yes | +| [scaling\_metrics](#input\_scaling\_metrics) | A list of maps defining the scaling of the services tasks - for more info see below | `list(any)` | `[]` | no | +| [secrets](#input\_secrets) | Secret credentials fetched using credstash | `map(string)` | `{}` | no | +| [stop\_timeout](#input\_stop\_timeout) | The duration is seconds to wait before the container is forcefully killed. Default 30s, max 120s. | `string` | `"none"` | no | +| [target\_group\_arn](#input\_target\_group\_arn) | The ALB target group for the service. | `string` | `""` | no | +| [task\_role\_policy](#input\_task\_role\_policy) | IAM policy document to apply to the tasks via a task role | `string` | `"{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:GetCallerIdentity\",\n \"Effect\": \"Allow\",\n \"Resource\": \"*\"\n }\n ]\n}\n"` | no | +| [taskdef\_volume](#input\_taskdef\_volume) | Map containing 'name' and 'host\_path' used to add a volume mapping to the taskdef. | `map(string)` | `{}` | no | + +## Outputs + +| Name | Description | +|------|-------------| +| [full\_service\_name](#output\_full\_service\_name) | n/a | +| [stderr\_name](#output\_stderr\_name) | n/a | +| [stdout\_name](#output\_stdout\_name) | n/a | +| [task\_role\_arn](#output\_task\_role\_arn) | n/a | +| [task\_role\_name](#output\_task\_role\_name) | n/a | +| [taskdef\_arn](#output\_taskdef\_arn) | n/a | + +## Scaling Metrics + +Setting this variable to a lis tof maps. Each map defines a seperate scaling policy + +| Param | Description | +|-------|-------------| +| name | (Required) Must be unique | +| metric | (Required) Name of the metric to use for scaling - see below for allowed values| +| target_value | (Required) Value of the above metric that scaling will maintain | +| disable_scale_in | (Optional) Whether scale in by the target tracking policy is disabled. If the value is true, scale in is disabled and the target tracking policy won't remove capacity from the scalable resource.| +| scale_in_cooldown | (Optional) Amount of time, in seconds, after a scale in activity completes before another scale in activity can start | +| scale_out_cooldown | (Optional) Amount of time, in seconds, after a scale out activity completes before another scale out activity can start. | + +### Allowed Metrics +* ECSServiceAverageCPUUtilization +* ECSServiceAverageMemoryUtilization +* ALBRequestCountPerTarget + +### Example +``` + scaling_metrics = [ + { + name = "cpu" + metric = "ECSServiceAverageCPUUtilization" + target_value = 10 + disable_scale_in = false + scale_in_cooldown = 180 + scale_out_cooldown = 90 + }, + { + name = "memory" + metric = "ECSServiceAverageMemoryUtilization" + target_value = 10 + disable_scale_in = false + scale_in_cooldown = 180 + scale_out_cooldown = 90 + } + ] +``` + \ No newline at end of file diff --git a/main.tf b/main.tf index 296c41c..c1ce4f9 100644 --- a/main.tf +++ b/main.tf @@ -122,7 +122,6 @@ resource "aws_cloudwatch_log_subscription_filter" "kinesis_log_stderr_stream" { } resource "aws_appautoscaling_target" "ecs" { - count = var.allow_overnight_scaledown ? 1 : 0 min_capacity = var.desired_count max_capacity = var.desired_count resource_id = "service/${var.ecs_cluster}/${local.full_service_name}" @@ -133,9 +132,9 @@ resource "aws_appautoscaling_target" "ecs" { resource "aws_appautoscaling_scheduled_action" "scale_down" { count = var.env != "live" && var.allow_overnight_scaledown ? 1 : 0 name = "scale_down-${local.full_service_name}" - service_namespace = aws_appautoscaling_target.ecs[0].service_namespace - resource_id = aws_appautoscaling_target.ecs[0].resource_id - scalable_dimension = aws_appautoscaling_target.ecs[0].scalable_dimension + service_namespace = aws_appautoscaling_target.ecs.service_namespace + resource_id = aws_appautoscaling_target.ecs.resource_id + scalable_dimension = aws_appautoscaling_target.ecs.scalable_dimension schedule = "cron(*/30 ${var.overnight_scaledown_start_hour}-${var.overnight_scaledown_end_hour - 1} ? * * *)" scalable_target_action { @@ -147,9 +146,9 @@ resource "aws_appautoscaling_scheduled_action" "scale_down" { resource "aws_appautoscaling_scheduled_action" "scale_back_up" { count = var.env != "live" && var.allow_overnight_scaledown ? 1 : 0 name = "scale_up-${local.full_service_name}" - service_namespace = aws_appautoscaling_target.ecs[0].service_namespace - resource_id = aws_appautoscaling_target.ecs[0].resource_id - scalable_dimension = aws_appautoscaling_target.ecs[0].scalable_dimension + service_namespace = aws_appautoscaling_target.ecs.service_namespace + resource_id = aws_appautoscaling_target.ecs.resource_id + scalable_dimension = aws_appautoscaling_target.ecs.scalable_dimension schedule = "cron(10 ${var.overnight_scaledown_end_hour} ? * MON-FRI *)" scalable_target_action { @@ -157,3 +156,26 @@ resource "aws_appautoscaling_scheduled_action" "scale_back_up" { max_capacity = var.desired_count } } + +resource "aws_appautoscaling_policy" "task_scaling_policy" { + for_each = { + for index, scale in var.scaling_metrics: + scale.metric => scale + } + name = each.value.name + policy_type = "TargetTrackingScaling" + resource_id = aws_appautoscaling_target.ecs.resource_id + scalable_dimension = aws_appautoscaling_target.ecs.scalable_dimension + service_namespace = aws_appautoscaling_target.ecs.service_namespace + + target_tracking_scaling_policy_configuration { + disable_scale_in = each.value.disable_scale_in + scale_in_cooldown = each.value.scale_in_cooldown + scale_out_cooldown = each.value.scale_out_cooldown + target_value = each.value.target_value + + predefined_metric_specification { + predefined_metric_type = each.value.metric + } + } +} \ No newline at end of file diff --git a/variables.tf b/variables.tf index 410fe62..24d60aa 100644 --- a/variables.tf +++ b/variables.tf @@ -49,8 +49,8 @@ variable "cpu" { variable "privileged" { description = "Gives the container privileged access to the host" - type = bool - default = false + type = bool + default = false } variable "memory" { @@ -84,7 +84,7 @@ variable "target_group_arn" { variable "multiple_target_group_arns" { description = "Mutiple target group ARNs to allow connection to multiple loadbalancers" - type = list + type = list(any) default = [] } @@ -202,26 +202,26 @@ variable "network_mode" { variable "network_configuration_subnets" { description = "needed for network_mode awsvpc " - type = list + type = list(any) default = [] } variable "network_configuration_security_groups" { description = "needed for network_mode awsvpc " - type = list + type = list(any) default = [] } variable "add_datadog_feed" { description = "Flag to control adding subscription filter to CW loggroup" - type = bool - default = true + type = bool + default = true } variable "pack_and_distinct" { description = "Enable distinct instance and task binpacking for better cluster utilisation. Enter 'true' for clusters with auto scaling groups. Enter 'false' for clusters with no ASG and instant counts less than or equal to desired tasks" - type = string - default = "false" + type = string + default = "false" } variable "stop_timeout" { @@ -240,3 +240,9 @@ variable "deployment_timeout" { type = number default = 600 } + +variable "scaling_metrics" { + description = "Allow service to be scaled down" + type = list(any) + default = [] +}