테라폼으로 인프라를 구성하면 인프라를 손쉽게 지우고 다시 생성할 수 있다. AWS 또한 테라폼을 통해 인프라를 구성할 수 있어 실습하면서 배워보았고 실습한 결과를 공유하려 한다.
테라폼을 통해서 아래와 같은 인프라 구성
우선 AWS 콘솔을 통해 직접 리소스를 만들어본 다음, 테라폼으로 작성해보는 방식으로 진행했다.
테라폼 최종 결과 깃허브:
선수조건:
- 테라폼 설치
- AWS CLI 자격 증명
- 테라폼 튜토리얼 을 해본 뒤 보면 이해가 잘 된다!
인스턴스 생성을 위해 VPN, Routing Table, Subnet 등의 환경을 구성한다.
테라폼의 버전 등의 테라폼 자체 설정을 해준다.
terraform {
required_providers {
aws = {
source = "hashicorp/aws"
version = "4.67.0"
}
}
# required_version = ">= 1.3.7"
}
VPN, IGW 를 생성한다.
data "aws_availability_zones" "available" {
state = "available"
}
resource "aws_vpc" "new_vpc" {
cidr_block = "10.1.0.0/16"
enable_dns_hostnames = true
enable_dns_support = true
instance_tenancy = "default"
tags = {
Name = "TRF-VPC"
}
}
resource "aws_internet_gateway" "new_igw" {
vpc_id = aws_vpc.new_vpc.id
tags = {
Name = "TRF-IGW"
}
}
라우팅 테이블을 구성한다.
resource "aws_route_table" "public_rtb" {
vpc_id = aws_vpc.new_vpc.id
route {
cidr_block = "0.0.0.0/0"
gateway_id = aws_internet_gateway.new_igw.id
}
tags = {
Name = "TRF-PUBC-RTB"
}
}
resource "aws_route_table" "private_rtb" {
vpc_id = aws_vpc.new_vpc.id
tags = {
Name = "TRF-PRIV-RTB"
}
route {
cidr_block = "0.0.0.0/0"
nat_gateway_id = aws_nat_gateway.ngw.id
}
}
서브넷 구성을 생성한다.
resource "aws_subnet" "public_subnet_1a" {
vpc_id = aws_vpc.new_vpc.id
cidr_block = "10.1.0.0/20"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[0]
tags = {
Name = "TRF-PUBLIC-SUBNET-1A"
}
}
resource "aws_subnet" "private_subnet_1a" {
vpc_id = aws_vpc.new_vpc.id
cidr_block = "10.1.128.0/20"
availability_zone = data.aws_availability_zones.available.names[0]
tags = {
Name = "TRF-PRIVATE-SUBNET-1A"
}
}
resource "aws_subnet" "public_subnet_2c" {
vpc_id = aws_vpc.new_vpc.id
cidr_block = "10.1.16.0/20"
map_public_ip_on_launch = true
availability_zone = data.aws_availability_zones.available.names[2]
tags = {
Name = "TRF-PUBLIC-SUBNET-2C"
}
}
resource "aws_subnet" "private_subnet_2c" {
vpc_id = aws_vpc.new_vpc.id
cidr_block = "10.1.144.0/20"
availability_zone = data.aws_availability_zones.available.names[2]
tags = {
Name = "TRF-PRIVATE-SUBNET-2C"
}
}
# 어떤 서브넷이 어떤 라우팅 테이블을 가지는지를 정의함
resource "aws_route_table_association" "public_subnet_1a_association" {
subnet_id = aws_subnet.public_subnet_1a.id
route_table_id = aws_route_table.public_rtb.id
}
resource "aws_route_table_association" "public_subnet_2c_association" {
subnet_id = aws_subnet.public_subnet_2c.id
route_table_id = aws_route_table.public_rtb.id
}
resource "aws_route_table_association" "private_subnet_1a_association" {
subnet_id = aws_subnet.private_subnet_1a.id
route_table_id = aws_route_table.private_rtb.id
}
resource "aws_route_table_association" "private_subnet_2c_association" {
subnet_id = aws_subnet.private_subnet_2c.id
route_table_id = aws_route_table.private_rtb.id
}
nat-gateway 생성
resource "aws_eip" "eip" {
vpc = true
lifecycle {
create_before_destroy = true
}
}
resource "aws_nat_gateway" "ngw" {
allocation_id = aws_eip.eip.id
subnet_id = aws_subnet.public_subnet_1a.id
tags = {
Name = "gw NAT"
}
depends_on = [aws_internet_gateway.new_igw]
}
보안 그룹 설정
# vi terra-ec2.tf
resource "aws_security_group" "backend" {
name = var.backend_sg_name
vpc_id = "${aws_vpc.new_vpc.id}"
ingress {
from_port = 80
to_port = 80
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
ingress {
from_port = 443
to_port = 443
protocol = "tcp"
cidr_blocks = ["0.0.0.0/0"]
}
ingress {
from_port = 22
to_port = 22
protocol = "tcp"
cidr_blocks = ["211.184.118.141/32"] # 내 IP
}
ingress {
from_port = -1
to_port = -1
protocol = "icmp"
cidr_blocks = ["0.0.0.0/0"]
}
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
tags = {
Name = "TRF-SG-backend"
}
}
resource "aws_security_group" "db" {
name = var.db_sg_name
vpc_id = "${aws_vpc.new_vpc.id}"
ingress {
from_port = 3306
to_port = 3306
protocol = "tcp"
security_groups = [aws_security_group.backend.id]
}
egress {
from_port = 0
to_port = 0
protocol = "-1"
cidr_blocks = ["0.0.0.0/0"]
}
tags = {
Name = "TRF-SG-db"
}
}
EC2
를 생성한다.
# EC2 생성
resource "aws_instance" "backend" {
ami = "ami-0970cc54a3aa77466"
instance_type = "t2.micro"
subnet_id = "${aws_subnet.public_subnet_1a.id}"
vpc_security_group_ids = [aws_security_group.backend.id]
key_name = "key"
user_data = <<-EOT
#!/bin/bash
echo "Hello, World" > index.html
nohup busybox httpd -f -p 80 &
EOT
tags = {
Name = "terraform-example"
}
}
MYSQL DB
를 생성
# DB 서브넷 그룹 생성
resource "aws_db_subnet_group" "dbsubg" {
name = "sprint-db-subg"
subnet_ids = [
aws_subnet.private_subnet_1a.id,
aws_subnet.private_subnet_2c.id
]
tags = {
"Name" = "sprint-db-subg"
}
}
# DB 생성
resource "aws_db_instance" "db" {
allocated_storage = 20
db_name = "test"
engine = "mysql"
engine_version = "8.0"
instance_class = "db.t3.micro"
username = "sori"
password = "dltkddbs"
identifier = "trf-rds"
skip_final_snapshot = true
vpc_security_group_ids = [aws_security_group.db.id]
availability_zone = aws_subnet.private_subnet_1a.availability_zone
db_subnet_group_name = aws_db_subnet_group.dbsubg.name
tags = {
"Name" = "TRF-MYSQL"
}
}
타겟 그룹 생성
resource "aws_lb_target_group" "backend" {
name = "tf-backend-lb-tg"
port = 80
protocol = "HTTP"
target_type = "instance"
vpc_id = aws_vpc.new_vpc.id
health_check {
interval = 10
matcher = "200-299"
path = "/"
}
}
resource "aws_lb_target_group_attachment" "test" {
target_group_arn = aws_lb_target_group.backend.arn
target_id = aws_instance.backend.id
port = 80
}
Application Load Balancer
및 리스너
생성
# ALB 생성
resource "aws_lb" "alb" {
name = "trf-alb"
internal = false
load_balancer_type = "application"
security_groups = [aws_security_group.backend.id]
subnets = [
aws_subnet.public_subnet_1a.id,
aws_subnet.public_subnet_2c.id
]
}
# 리스너 생성
resource "aws_lb_listener" "backend" {
load_balancer_arn = aws_lb.alb.arn
port = "80"
protocol = "HTTP"
default_action {
type = "forward"
target_group_arn = aws_lb_target_group.backend.arn
}
}
Auto-Scaling Group 생성
# EC2 템플릿 생성
resource "aws_launch_configuration" "as_conf" {
name_prefix = "terraform-lc-backend"
image_id = "ami-0970cc54a3aa77466"
instance_type = "t2.micro"
key_name = "key"
user_data = <<-EOT
#!/bin/bash
echo "Hello, World" > index.html
nohup busybox httpd -f -p 80 &
EOT
security_groups = [aws_security_group.backend.id]
lifecycle {
create_before_destroy = true
}
}
# Auto-Scaling 그룹 생성
resource "aws_autoscaling_group" "bar" {
name = "terraform-asg-backend"
launch_configuration = aws_launch_configuration.as_conf.name
vpc_zone_identifier = [aws_subnet.public_subnet_1a.id, aws_subnet.public_subnet_2c.id]
min_size = 2
max_size = 4
desired_capacity = 3
health_check_grace_period = 120
health_check_type = "ELB"
target_group_arns = [aws_lb_target_group.backend.arn]
lifecycle {
create_before_destroy = true
}
}
다음의 순서대로 실행하여 배포를 진행한다.
terraform init
terraform plan
terraform apply
테라폼 모듈 을 통해서 보다 가독성 좋게 IaC 를 생성할 수 있지만 아직 알지 못해 진행하지 못했다. 다음에는 테라폼 모듈
을 적용해서 진행해보려 한다.