-
Notifications
You must be signed in to change notification settings - Fork 0
/
cloudformation.yml
532 lines (530 loc) · 16.3 KB
/
cloudformation.yml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
AWSTemplateFormatVersion: 2010-09-09
Description: >
This template creates a play and learn sandbox environment with the following
resources:
- A tiered VPC with public and private subnets. - AN EKS cluster deployed
across two Availability Zones in a
Serverless deployment model via AWS Fargate.
- A pair of NAT gateways (one in each zone) to handle outbound traffic. - A
RDS PostgreSQL data backend. - An Elastic Container Registry.
Parameters:
EnvironmentName:
Description: >-
An environment name that will be prefixed to resource names. Use lower
cased alphabet characters only such as letters with no numbers, special
characters.
Type: String
Default: sandboxenv
MasterdbUsername:
Description: The master RDS postgres db username
Type: String
Default: senv_eks_rds_pstgsql_uname
MasterdbUserPassword:
Description: The master RDS postgres db password
Type: String
Default: senv_eks_rds_pstgsql_pword
VpcCIDR:
Description: Please enter the IP range (CIDR notation) for this VPC
Type: String
AllowedPattern: '((\d{1,3})\.){3}\d{1,3}/\d{1,2}'
Default: 10.192.0.0/16
PublicSubnet1CIDR:
Description: >-
Please enter the IP range (CIDR notation) for the public subnet in the
first Availability Zone
Type: String
AllowedPattern: '((\d{1,3})\.){3}\d{1,3}/\d{1,2}'
Default: 10.192.10.0/24
PublicSubnet2CIDR:
Description: >-
Please enter the IP range (CIDR notation) for the public subnet in the
second Availability Zone
Type: String
AllowedPattern: '((\d{1,3})\.){3}\d{1,3}/\d{1,2}'
Default: 10.192.11.0/24
PrivateSubnet1CIDR:
Description: >-
Please enter the IP range (CIDR notation) for the private subnet in the
first Availability Zone
Type: String
AllowedPattern: '((\d{1,3})\.){3}\d{1,3}/\d{1,2}'
Default: 10.192.20.0/24
PrivateSubnet2CIDR:
Description: >-
Please enter the IP range (CIDR notation) for the private subnet in the
second Availability Zone
Type: String
AllowedPattern: '((\d{1,3})\.){3}\d{1,3}/\d{1,2}'
Default: 10.192.21.0/24
PrivateSubnet3CIDR:
Description: >-
Please enter the IP range (CIDR notation) for the private subnet in the
second Availability Zone
Type: String
AllowedPattern: '((\d{1,3})\.){3}\d{1,3}/\d{1,2}'
Default: 10.192.22.0/24
PrivateSubnet4CIDR:
Description: >-
Please enter the IP range (CIDR notation) for the private subnet in the
second Availability Zone
Type: String
AllowedPattern: '((\d{1,3})\.){3}\d{1,3}/\d{1,2}'
Default: 10.192.23.0/24
InstanceType:
Type: String
Default: db.t3.micro
AllowedValues:
- db.t3.micro
- db.t2.micro
- db.m1.small
Resources:
VPC:
Type: 'AWS::EC2::VPC'
Properties:
CidrBlock: !Ref VpcCIDR
EnableDnsHostnames: true
Tags:
- Key: Name
Value: !Ref EnvironmentName
InternetGateway:
Type: 'AWS::EC2::InternetGateway'
Properties:
Tags:
- Key: Name
Value: !Ref EnvironmentName
InternetGatewayAttachment:
Type: 'AWS::EC2::VPCGatewayAttachment'
Properties:
InternetGatewayId: !Ref InternetGateway
VpcId: !Ref VPC
PublicSubnet1:
Type: 'AWS::EC2::Subnet'
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select
- 0
- !GetAZs ''
CidrBlock: !Ref PublicSubnet1CIDR
MapPublicIpOnLaunch: true
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Public Subnet (AZ1)'
PublicSubnet2:
Type: 'AWS::EC2::Subnet'
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select
- 1
- !GetAZs ''
CidrBlock: !Ref PublicSubnet2CIDR
MapPublicIpOnLaunch: true
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Public Subnet (AZ2)'
PrivateSubnet1:
Type: 'AWS::EC2::Subnet'
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select
- 0
- !GetAZs ''
CidrBlock: !Ref PrivateSubnet1CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Subnet (AZ1)'
PrivateSubnet2:
Type: 'AWS::EC2::Subnet'
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select
- 1
- !GetAZs ''
CidrBlock: !Ref PrivateSubnet2CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Subnet (AZ2)'
PrivateSubnet3:
Type: 'AWS::EC2::Subnet'
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select
- 0
- !GetAZs ''
CidrBlock: !Ref PrivateSubnet3CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Subnet (AZ1)'
PrivateSubnet4:
Type: 'AWS::EC2::Subnet'
Properties:
VpcId: !Ref VPC
AvailabilityZone: !Select
- 1
- !GetAZs ''
CidrBlock: !Ref PrivateSubnet4CIDR
MapPublicIpOnLaunch: false
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Subnet (AZ2)'
RDSDBSubnetGroup:
Type: 'AWS::RDS::DBSubnetGroup'
Properties:
DBSubnetGroupDescription: Subnet Group for RDS PostgreSQL
DBSubnetGroupName: !Ref EnvironmentName
SubnetIds:
- !Ref PrivateSubnet3
- !Ref PrivateSubnet4
NatGateway1EIP:
Type: 'AWS::EC2::EIP'
DependsOn: InternetGatewayAttachment
Properties:
Domain: vpc
NatGateway2EIP:
Type: 'AWS::EC2::EIP'
DependsOn: InternetGatewayAttachment
Properties:
Domain: vpc
NatGateway1:
Type: 'AWS::EC2::NatGateway'
Properties:
AllocationId: !GetAtt
- NatGateway1EIP
- AllocationId
SubnetId: !Ref PublicSubnet1
NatGateway2:
Type: 'AWS::EC2::NatGateway'
Properties:
AllocationId: !GetAtt
- NatGateway2EIP
- AllocationId
SubnetId: !Ref PublicSubnet2
PublicRouteTable:
Type: 'AWS::EC2::RouteTable'
Properties:
VpcId: !Ref VPC
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Public Routes'
DefaultPublicRoute:
Type: 'AWS::EC2::Route'
DependsOn: InternetGatewayAttachment
Properties:
RouteTableId: !Ref PublicRouteTable
DestinationCidrBlock: 0.0.0.0/0
GatewayId: !Ref InternetGateway
PublicSubnet1RouteTableAssociation:
Type: 'AWS::EC2::SubnetRouteTableAssociation'
Properties:
RouteTableId: !Ref PublicRouteTable
SubnetId: !Ref PublicSubnet1
PublicSubnet2RouteTableAssociation:
Type: 'AWS::EC2::SubnetRouteTableAssociation'
Properties:
RouteTableId: !Ref PublicRouteTable
SubnetId: !Ref PublicSubnet2
PrivateRouteTable1:
Type: 'AWS::EC2::RouteTable'
Properties:
VpcId: !Ref VPC
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Routes (AZ1)'
RDSPrivate1Route1:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable1
DestinationCidrBlock: !Ref PrivateSubnet3CIDR
NatGatewayId: !Ref NatGateway1
RDSPrivate1Route2:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable1
DestinationCidrBlock: !Ref PrivateSubnet4CIDR
NatGatewayId: !Ref NatGateway1
DefaultPrivateRoute1:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable1
DestinationCidrBlock: 0.0.0.0/0
NatGatewayId: !Ref NatGateway1
PrivateSubnet1RouteTableAssociation:
Type: 'AWS::EC2::SubnetRouteTableAssociation'
Properties:
RouteTableId: !Ref PrivateRouteTable1
SubnetId: !Ref PrivateSubnet1
PrivateRouteTable2:
Type: 'AWS::EC2::RouteTable'
Properties:
VpcId: !Ref VPC
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Routes (AZ2)'
RDSPrivate2Route1:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable2
DestinationCidrBlock: !Ref PrivateSubnet3CIDR
NatGatewayId: !Ref NatGateway2
RDSPrivate2Route2:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable2
DestinationCidrBlock: !Ref PrivateSubnet4CIDR
NatGatewayId: !Ref NatGateway2
DefaultPrivateRoute2:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable2
DestinationCidrBlock: 0.0.0.0/0
NatGatewayId: !Ref NatGateway2
PrivateSubnet2RouteTableAssociation:
Type: 'AWS::EC2::SubnetRouteTableAssociation'
Properties:
RouteTableId: !Ref PrivateRouteTable2
SubnetId: !Ref PrivateSubnet2
PrivateRouteTable3:
Type: 'AWS::EC2::RouteTable'
Properties:
VpcId: !Ref VPC
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Routes (AZ1)'
DefaultPrivateRoute3:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable3
DestinationCidrBlock: 0.0.0.0/0
NatGatewayId: !Ref NatGateway1
PrivateSubnet3RouteTableAssociation:
Type: 'AWS::EC2::SubnetRouteTableAssociation'
Properties:
RouteTableId: !Ref PrivateRouteTable3
SubnetId: !Ref PrivateSubnet3
PrivateRouteTable4:
Type: 'AWS::EC2::RouteTable'
Properties:
VpcId: !Ref VPC
Tags:
- Key: Name
Value: !Sub '${EnvironmentName} Private Routes (AZ2)'
DefaultPrivateRoute4:
Type: 'AWS::EC2::Route'
Properties:
RouteTableId: !Ref PrivateRouteTable4
DestinationCidrBlock: 0.0.0.0/0
NatGatewayId: !Ref NatGateway2
PrivateSubnet4RouteTableAssociation:
Type: 'AWS::EC2::SubnetRouteTableAssociation'
Properties:
RouteTableId: !Ref PrivateRouteTable4
SubnetId: !Ref PrivateSubnet4
EKSHostSecurityGroup:
Type: 'AWS::EC2::SecurityGroup'
Properties:
VpcId: !Ref VPC
GroupDescription: Access to the EKS hosts and the tasks/containers that run on them
SecurityGroupIngress:
- SourceSecurityGroupId: !Ref LoadBalancerSecurityGroup
IpProtocol: '-1'
Tags:
- Key: Name
Value: !Sub '${EnvironmentName}-EKS-Hosts'
LoadBalancerSecurityGroup:
Type: 'AWS::EC2::SecurityGroup'
Properties:
VpcId: !Ref VPC
GroupDescription: Access to the load balancer that sits in front of EKS
SecurityGroupIngress:
- CidrIp: 0.0.0.0/0
IpProtocol: '-1'
Tags:
- Key: Name
Value: !Sub '${EnvironmentName}-LoadBalancers'
RDSSecurityGroup:
Type: 'AWS::EC2::SecurityGroup'
Properties:
VpcId: !Ref VPC
GroupDescription: Access to the RDS Instance from EKS
SecurityGroupIngress:
- CidrIp: !Ref VpcCIDR
IpProtocol: '-1'
Tags:
- Key: Name
Value: !Sub '${EnvironmentName}-RDS-Hosts'
IAMRole:
Type: 'AWS::IAM::Role'
Properties:
Path: /
RoleName: !Sub '${EnvironmentName}-AmazonEKSFargatePodExecutionRole'
AssumeRolePolicyDocument: >-
{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"Service":"eks-fargate-pods.amazonaws.com"},"Action":"sts:AssumeRole"}]}
MaxSessionDuration: 3600
ManagedPolicyArns:
- 'arn:aws:iam::aws:policy/AmazonEKSFargatePodExecutionRolePolicy'
Description: >-
Allows access to other AWS service resources that are required to run
Amazon EKS pods on AWS Fargate.
Tags:
- Key: sandbox
Value: eks-postgres
IAMRole2:
Type: 'AWS::IAM::Role'
Properties:
Path: /
RoleName: !Sub '${EnvironmentName}-AmazonEKSClusterRole'
AssumeRolePolicyDocument: >-
{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"Service":"eks.amazonaws.com"},"Action":"sts:AssumeRole"}]}
MaxSessionDuration: 3600
ManagedPolicyArns:
- 'arn:aws:iam::aws:policy/AmazonEKSClusterPolicy'
Description: >-
Allows access to other AWS service resources that are required to
operate clusters managed by EKS.
ECRRepository:
Type: 'AWS::ECR::Repository'
Properties:
RepositoryName: !Ref EnvironmentName
EKSCluster:
Type: 'AWS::EKS::Cluster'
Properties:
Name: !Ref EnvironmentName
RoleArn: !GetAtt
- IAMRole2
- Arn
Version: '1.24'
ResourcesVpcConfig:
SecurityGroupIds:
- !Ref LoadBalancerSecurityGroup
SubnetIds:
- !Ref PublicSubnet1
- !Ref PublicSubnet2
EndpointPublicAccess: true
PublicAccessCidrs:
- 0.0.0.0/0
EndpointPrivateAccess: true
KubernetesNetworkConfig:
ServiceIpv4Cidr: 10.100.0.0/16
FargateProfile:
Type: 'AWS::EKS::FargateProfile'
Properties:
ClusterName: !Ref EKSCluster
FargateProfileName: !Ref EnvironmentName
PodExecutionRoleArn: !GetAtt
- IAMRole
- Arn
Selectors:
- Namespace: !Ref EnvironmentName
Labels:
- Key: key1
Value: value1
Subnets:
- !Ref PrivateSubnet1
- !Ref PrivateSubnet2
EKSAddon:
Type: 'AWS::EKS::Addon'
Properties:
AddonName: vpc-cni
AddonVersion: v1.11.4-eksbuild.1
ClusterName: !Ref EKSCluster
EKSAddon2:
Type: 'AWS::EKS::Addon'
Properties:
AddonName: kube-proxy
AddonVersion: v1.24.7-eksbuild.2
ClusterName: !Ref EKSCluster
EKSAddon3:
Type: 'AWS::EKS::Addon'
Properties:
AddonName: coredns
AddonVersion: v1.8.7-eksbuild.3
ClusterName: !Ref EKSCluster
RDSDBInstance:
Type: 'AWS::RDS::DBInstance'
Properties:
DBInstanceIdentifier: !Ref EnvironmentName
AllocatedStorage: 20
DBInstanceClass: !Ref InstanceType
Engine: postgres
MasterUsername: !Ref MasterdbUsername
MasterUserPassword: !Ref MasterdbUserPassword
DBName: !Ref EnvironmentName
PreferredBackupWindow: '10:17-10:47'
BackupRetentionPeriod: 0
AvailabilityZone: !GetAtt
- PrivateSubnet3
- AvailabilityZone
PreferredMaintenanceWindow: 'tue:08:00-tue:08:30'
MultiAZ: false
EngineVersion: '14.1'
AutoMinorVersionUpgrade: true
LicenseModel: postgresql-license
PubliclyAccessible: false
StorageType: gp2
Port: 5432
StorageEncrypted: false
CopyTagsToSnapshot: false
MonitoringInterval: 0
EnableIAMDatabaseAuthentication: false
EnablePerformanceInsights: false
DeletionProtection: false
DBSubnetGroupName: !Ref RDSDBSubnetGroup
VPCSecurityGroups:
- !Ref RDSSecurityGroup
OptionGroupName: 'default:postgres-14'
CACertificateIdentifier: rds-ca-2019
Outputs:
VPC:
Description: A reference to the created VPC
Value: !Ref VPC
PublicSubnets:
Description: A list of the public subnets
Value: !Join
- ','
- - !Ref PublicSubnet1
- !Ref PublicSubnet2
PrivateSubnets:
Description: A list of the private subnets
Value: !Join
- ','
- - !Ref PrivateSubnet1
- !Ref PrivateSubnet2
- !Ref PrivateSubnet3
PublicSubnet1:
Description: A reference to the public subnet in the 1st Availability Zone
Value: !Ref PublicSubnet1
PublicSubnet2:
Description: A reference to the public subnet in the 2nd Availability Zone
Value: !Ref PublicSubnet2
PrivateSubnet1:
Description: A reference to the first private subnet in the 1st Availability Zone
Value: !Ref PrivateSubnet1
PrivateSubnet2:
Description: A reference to the second private subnet in the 2nd Availability Zone
Value: !Ref PrivateSubnet2
PrivateSubnet3:
Description: A reference to the third private subnet in the 1st Availability Zone
Value: !Ref PrivateSubnet3
PrivateSubnet4:
Description: A reference to the fourth private subnet in the 2nd Availability Zone
Value: !Ref PrivateSubnet4
EKSHostSecurityGroup:
Description: A reference to the security group for EKS hosts
Value: !Ref EKSHostSecurityGroup
RDSSecurityGroup:
Description: A reference to the security group for RDS Instance
Value: !Ref RDSSecurityGroup
LoadBalancerSecurityGroup:
Description: A reference to the security group for load balancers
Value: !Ref LoadBalancerSecurityGroup
Cluster:
Description: A reference to the EKS cluster
Value: !Ref EKSCluster
FargateProfile:
Description: A reference to the EKS cluster Fargate Profile
Value: !Ref FargateProfile
RDSDatabase:
Description: A reference to the RDS PostgreSQL Database
Value: !Ref RDSDBInstance