Terraform module for deploying the compute services needed to run dragondrop.cloud within your AWS cloud environment.
Available for consumption via HashiCorp's Public Module Registry: https://registry.terraform.io/modules/dragondrop-cloud/dragondrop-compute/aws/latest
Terraform code for deploying the compute resources needed to run dragondrop.cloud within your AWS environment.
Cloud architecture diagram of the infrastructure created by this module.
Name | Type | Purpose |
---|---|---|
s3_state_bucket_name_ | string | Optional name of the S3 bucket used for storing Terraform state. The ECS Fargate task created by the module will have read access to this bucket. |
https_trigger_lambda_name_ | string | Name of the lambda function created by the Module which services as an HTTPS endpoint. |
region | string | AWS region into which resources should be deployed. |
service_account_name | string | Name of the service account with exclusively ECS Task invocation privileges that serves as the service account for compute created by the module. |
tags | map(string) | An optional mapping of tags to add to resources created by the module. |
This module defines the compute resources needed to run dragondrop within your own cloud environment.
It defines a Lambda Function that can evoke the longer running dragondrop engine living in a provisioned ECS Fargate Task.
The url for this lambda function is output and should be passed to a dragondrop Job definition as that Job's "HTTPS Url".
The ECS Fargate Task hosts dragondrop's proprietary container. All environment variables that need to be configured are references to secrets within AWS Parameter Store, and can be customized like any other secret.
This module creates two new roles with minimized IAM permissions:
-
"dragondrop-lambda-https-trigger" which has the minimum permissions needed to evoke the created Fargate Task. The Lambda function created by this module is granted this role.
-
"dragondrop-fargate-runner", an IAM role with Secret Accessor privileges on only the secrets referenced by the Fargate task as environment variables. Also has read-only access to then entire AWS account, and optional read-access to the s3 bucket containing Terraform state files. The ECS Fargate task created by this module is granted this role.
dragondrop.cloud is a provider of IAC automation solutions that are self-hosted within customer's cloud environment. For more information or to schedule a demo, please visit our website.
A Module is a reusable, best-practices definition for the deployment of cloud infrastructure. A Module is written using Terraform and includes documentation, and examples. It is maintained both by the open source community and companies that provide commercial support.
If you notice a problem or would like some additional functionality, please open a detailed issue describing the problem or open a pull request.
Please see LICENSE for details on this module's license.
Copyright © 2023 dragondrop.cloud, Inc.