In my post laying out Six priorities for Ops in a serverless world, the number one priority was automation—and I suggested that readers “Study up on DevOps deployment orchestration tools such as AWS CloudFormation.” Well, this post is designed to help you do just that.
Before we start, though, it might help to know more about AWS CloudFormation. Here’s how AWS describes it:
What is AWS CloudFormation?
AWS CloudFormation provides a common language for you to describe and provision all the infrastructure resources in your cloud environment. CloudFormation allows you to use a simple text file to model and provision, in an automated and secure manner, all the resources needed for your applications across all regions and accounts. This file serves as the single source of truth for your cloud environment.
A single file? Sounds too good to be true—but it’s not!
CloudFormation lets you create whole environments of AWS services, including Amazon Virtual Private Cloud (Amazon VPC), Amazon EC2, Amazon S3, Amazon EC2 security groups, and many more. And you can use these CloudFormation templates repeatedly, making it super easy to launch a complex environment with just a few clicks.
Now that you know what CloudFormation is, let’s walk through a simple example of using it to launch an Amazon Linux v2 T2 instance that automatically installs the New Relic infrastructure monitoring agent. The purpose of this post is to provide you with an example you can use to design your CloudFormation scripts.
AWS CloudFormation deployment features
While there’s a lot to choose from, here are some of the most important CloudFormation deployment features:
Infrastructure as Code (IaC): CloudFormation allows you to define your infrastructure using code, which brings the benefits of version control, code review, and collaboration.
Change sets: Change Sets provide a way to preview proposed changes to a CloudFormation stack before executing them. This helps prevent unintended modifications to your infrastructure.
Rollback on failure: CloudFormation automatically rolls back changes if an update to a stack fails, reverting your infrastructure to its previous state.
Stack policies: You can use stack policies to prevent accidental updates or deletions of critical resources, ensuring the stability and security of your infrastructure.
Nested stacks: Nested Stacks allow you to break down complex templates into smaller, manageable units. This feature is particularly useful for large-scale applications with multiple components.
Drift detection: CloudFormation Drift Detection helps you identify discrepancies between the expected template configuration and the actual state of deployed resources.
Before you start your AWS CloudFormation deployment
Before we get started, though, there’s one thing I need to warn you about. Most of what goes into writing an AWS CloudFormation document is pretty straightforward. However, when you get to the part where you are writing your scripts in either BASH or Windows PowerShell, be aware that you are also wrapping that code within JSON. This means you need to do two levels of debugging: one for JSON and another for the BASH or PowerShell script.
Another tip: If you can, create the BASH or PowerShell script in a live environment first. Make sure it works, then take that working script and add it to your JSON document. You’ll still need to replace some of the code with parameters where necessary, but at least you’ll reduce the debugging as much as possible.
With that in mind, let’s dive in.
10 step CloudFormation template tutorial
1. From the AWS Console, open CloudFormation (located in the Management Tools section).
2. Create a new stack: select Create Stack:
https://kupsand.s3.amazonaws.com/NewRelic/NR-Infra-CloudFormation.json
4. Select Next, and in the Specify stack details interface, give this stack a name that makes sense for your needs, for example, NR-infrastructure
.
5. Then enter the AWS Configurations Items for Key Name (your key pair), Instance Type, and SSH Location.
Note: It’s not mandatory for this tutorial, but it’s a good idea to lock down the SSH location for better security. The 0.0.0.0/0 in this example screenshot is open to the whole world.
6. After you finish inputting the AWS Configuration Items, you’ll add your New Relic ingest-license key (required). You can find this ingest-license key under API keys in the New Relic console.
Then paste it in here:
7. Next, you’ll complete the New Relic optional configuration items. Set the Display Name appropriate for your instance. See our infrastructure agent configuration settings documentation for more information. You can modify your CloudFormation script to include other available parameters if you’d like.
8. Finally, set any other New Relic optional custom configuration items you want to use.
9. When you finish the configuration section, select Next. You’ll be prompted to set some additional optional settings. These include tags (name your instance with the Name/[name] key/value pair), permissions, stack failure options, and other advanced options. Add or select any items you wish, and then select Next.
10. CloudFormation opens a review screen containing all the items you’ve entered. Select Submit to build your CloudFormation stack. (Note that at this point, Amazon will charge you for the AWS resources—an EC2 instance—used when you create a stack from this template.)
Wrap it up
This example launches an Amazon Linux v2 EC2 instance attached to a Security Group that opens up ports 80 (HTTP) and 22 (SSH). This instance also configures and installs the New Relic infrastructure monitoring agent.
Head to your New Relic console to see your new instance displayed there. It takes just about one minute!
You can also see the instance metadata available to filter and chart. Notice the custom attributes are also available.
다음 단계
As you grow your environment, you can expand upon the CloudFormation template. It makes a great foundation. Or use parts of my template in your own AWS CloudFormation templates. Just be sure to copy the New Relic-specific items from the parameters, metadata, parameter labels, and EC2 instance/user data sections.
Finally, in case you missed it earlier, the AWS CloudFormation/New Relic infrastructure template is located at s3.amazonaws.com/kupsand/NewRelic/NR-Infra-CloudFormation.json.
이 블로그에 표현된 견해는 저자의 견해이며 반드시 New Relic의 견해를 반영하는 것은 아닙니다. 저자가 제공하는 모든 솔루션은 환경에 따라 다르며 New Relic에서 제공하는 상용 솔루션이나 지원의 일부가 아닙니다. 이 블로그 게시물과 관련된 질문 및 지원이 필요한 경우 Explorers Hub(discuss.newrelic.com)에서만 참여하십시오. 이 블로그에는 타사 사이트의 콘텐츠에 대한 링크가 포함될 수 있습니다. 이러한 링크를 제공함으로써 New Relic은 해당 사이트에서 사용할 수 있는 정보, 보기 또는 제품을 채택, 보증, 승인 또는 보증하지 않습니다.