retool-ecs-fargate
ActionIQ/retool-ecs-fargate/aws
Terraform module for deploying Retool on-premise
Install
README
Retool AWS ECS Fargate Terraform module Terrafom module which creates an on-premise Retool deployment using AWS ECS Fargate. Inspired by the official Retool CloudFormation documentation. Build internal tools, remarkably fast. Deploying Retool on-premise Deploying Retool on-premise ensures that all access to internal data is managed within your own cloud environment. It also provides the flexibility to control how Retool is setup within your infrastructure, the ability to configure logging, and access to enable custom SAML SSO using providers like Okta and Active Directory.
Inputs (50)
| Name | Type | Description | Default |
|---|---|---|---|
| retool_ecs_service_subnet | list(string) | AWS VPC for Fargate and ALB to utilize | required |
| availability_zones | list(string) | AWS VPC for Fargate and ALB to utilize | required |
| retool_db_subnet_ids | list(string) | AWS VPC for Fargate and ALB to utilize | required |
| retool_alb_subnets | list(string) | AWS VPC for Fargate and ALB to utilize | required |
| retool_jobs_runner_ecs_service_subnet | list(string) | AWS VPC for Fargate and ALB to utilize | required |
| vpc_id | string | AWS VPC for Fargate and ALB to utilize | required |
| postgresql_ssl_enabled | bool | Enable or disable postgresql SSL | true |
| retool_task_container_node_env | string | Set Retool task container environment | "production" |
| retool_task_container_force_deployment | bool | Set if Terraform should force deploy regardless if change has been detected | false |
| retool_task_container_port | number | Retool task listening port | "3000" |
| retool_ecs_service_count | number | Number of instances of the task definition to place and keep running | "2" |
| retool_licence | string | Retool license for self-hosting. | "" |
| database_name | string | Retool postgresql database name | "hammerhead_production" |
| retool_rds_sg_ingress_cidr_blocks | list(string) | Cidr block allowed to ingress the Retool RDS DB | [
"0.0.0.0/0"
] |
| retool_task_container_cookie_insecure | bool | Allow cookies to be insecure e.g. not using Retool over https | true |
| retool_rds_sg_egress_cidr_blocks | list(string) | Cidr block allowed to egress the Retool RDS DB | [
"0.0.0.0/0"
] |
| retool_ecs_tasks_logdriver | string | Send log information to CloudWatch Logs | "awslogs" |
| retool_task_network_mode | string | The Docker networking mode to use for the containers in the task | "awsvpc" |
| retool_task_cpu | number | The hard limit of CPU units to present for the task. It can be expressed as an i | "1024" |
| retool_task_memory | number | The hard limit of memory (in MiB) to present to the task. It can be expressed as | "2048" |
| retool_jobs_runner_task_container_node_env | string | Set Retool jobs runner task container environment | "production" |
| aws_region | string | AWS Region to deploy resources | "us-east-1" |
| retool_rds_cluster_engine_version | number | AWS RDS Cluster engine version - this is despendent on var.retool_rds_cluster_en | "12.16" |
| retool_custom_host_url | string | Specify a custom hostname that will be used to create a custom url instead of th | null |
| retool_jobs_runner_task_cpu | number | The hard limit of CPU units to present for the task. It can be expressed as an i | "1024" |
| alb_listener_ssl_policy | string | retool_alb_listener_ssl_policy | "ELBSecurityPolicy-2016-08" |
| … and 10 more inputs | |||
Outputs (3)
retool_alb_dns — Retool Application Load Balancer DNS FQDNretool_url — Valid Retool URL to access on-premise deploymentstack_name — Uniquely generated stack name for Retool on-premise deploymentResources (18)
Topics & Tags
Details
Similar packages
Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,