Skip to content

A collection of Terraform scripts for deploying DuraCloud to AWS

License

Notifications You must be signed in to change notification settings

TexasDigitalLibrary/duracloud-aws-deployer

 
 

Repository files navigation

duracloud-aws-deployer

A set of terraform scripts for automatically deploying a DuraCloud to AWS.

Note: only one DuraCloud stack of resources is supported per AWS account. For multiple DuraCloud environments you must use dedicated AWS accounts per environment.

Requirements

terraform 1.3.5 (https://www.terraform.io/downloads.html)

Install terraform environment manager:

brew install tfenv

Install the required version of terraform

tfenv install 1.3.5

Clone the Repo

git clone https://github.com/duracloud/duracloud-aws-deployer
cd duracloud-aws-deployer

Set up an aws profile

Then set up an aws profile in ~/.aws/config (c.f. https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-profiles.html)

Create your terraform state bucket and lock table

export AWS_REGION=your-aws-region
export AWS_PROFILE=your-aws-profile

aws s3 mb s3://<terraform-state-bucket>

aws dynamodb create-table \
  --table-name <terraform-lock-table> \
  --attribute-definitions AttributeName=LockID,AttributeType=S \
  --key-schema AttributeName=LockID,KeyType=HASH \
  --provisioned-throughput ReadCapacityUnits=1,WriteCapacityUnits=1

Configure your secrets

Set up the following key value pairs in the AWS parameter store replacing with your secret values.

export AWS_REGION=your-aws-region
export AWS_PROFILE=your-aws-profile
aws ssm put-parameter --name "duracloud_artifact_bucket" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_config_bucket" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_master_database_password" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_sumo_access_id" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_sumo_access_key" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_mill_db_user" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_mill_db_password" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_account_db_user"--value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_account_db_password" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_notification_recipients" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_notification_recipients_non_tech" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_notification_user" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_notification_password" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_notification_sender" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_notification_from_address" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_notification_admin_address" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_mc_host" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_mc_domain" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "duracloud_certificate_arn" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "recaptcha_sitekey" --value="<value>" --region $AWS_REGION --type SecureString
aws ssm put-parameter --name "recaptcha_secret" --value="<value>" --region $AWS_REGION --type SecureString

Create a new environment by copying the sample.

This will create a set of directories with sample tfvar files and symbolic links to the *.tf files.

ENV=my-env
cp -aR env/sample env/$ENV

Configure the backends

Open the following files and fill the missing values ./env/$ENV/shared/backend.tf ./env/$ENV/management-console/backend.tf ./env/$ENV/duracloud/backend.tf ./env/$ENV/mill/backend.tf

Customize the non-sensitive parameters in the tfvars files

Open the following files and fill in appropriate values: ./env/$ENV/shared/shared.auto.tfvar ./env/$ENV/management-console/manage-console.auto.tfvar ./env/$ENV/duracloud/duracloud.auto.tfvar ./env/$ENV/mill/mill.auto.tfvar

Create shared resources

cd env/$ENV/shared
terraform init
terraform apply

Import old database (ie mysql < database.sql) or create your database.

Create artifact bucket

aws s3 cp <duracloud_zip> s3://<duracloud arifact bucket>/

Create the mill

cd env/$ENV/mill
terraform init
terraform apply

Create Management Console

cd env/$ENV/management-console
terraform init
terraform apply

Create DuraCloud

#upload your DuraCloud zip file.
aws s3 cp <duracloud_zip> s3://<duracloud arifact bucket>/

cd env/$ENV/duracloud
terraform init
terraform apply

About

A collection of Terraform scripts for deploying DuraCloud to AWS

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • HCL 86.1%
  • Smarty 13.9%