retool-ecs-fargate

ActionIQ/retool-ecs-fargate/aws

Terraform Module HCL AWS

Terraform module for deploying Retool on-premise

Install

module "retool-ecs-fargate" {
source = "ActionIQ/retool-ecs-fargate/aws"
version = "3.23.1"
}
⭐ Source on GitHub 📦 Registry page

README

Retool AWS ECS Fargate Terraform module Terrafom module which creates an on-premise Retool deployment using AWS ECS Fargate. Inspired by the official Retool CloudFormation documentation. Build internal tools, remarkably fast. Deploying Retool on-premise Deploying Retool on-premise ensures that all access to internal data is managed within your own cloud environment. It also provides the flexibility to control how Retool is setup within your infrastructure, the ability to configure logging, and access to enable custom SAML SSO using providers like Okta and Active Directory.

Inputs (50)

NameTypeDescriptionDefault
retool_ecs_service_subnetlist(string)AWS VPC for Fargate and ALB to utilize required
availability_zoneslist(string)AWS VPC for Fargate and ALB to utilize required
retool_db_subnet_idslist(string)AWS VPC for Fargate and ALB to utilize required
retool_alb_subnetslist(string)AWS VPC for Fargate and ALB to utilize required
retool_jobs_runner_ecs_service_subnetlist(string)AWS VPC for Fargate and ALB to utilize required
vpc_idstringAWS VPC for Fargate and ALB to utilize required
postgresql_ssl_enabledboolEnable or disable postgresql SSLtrue
retool_task_container_node_envstringSet Retool task container environment"production"
retool_task_container_force_deploymentboolSet if Terraform should force deploy regardless if change has been detectedfalse
retool_task_container_portnumberRetool task listening port"3000"
retool_ecs_service_countnumberNumber of instances of the task definition to place and keep running"2"
retool_licencestringRetool license for self-hosting.""
database_namestringRetool postgresql database name"hammerhead_production"
retool_rds_sg_ingress_cidr_blockslist(string)Cidr block allowed to ingress the Retool RDS DB[ "0.0.0.0/0" ]
retool_task_container_cookie_insecureboolAllow cookies to be insecure e.g. not using Retool over httpstrue
retool_rds_sg_egress_cidr_blockslist(string)Cidr block allowed to egress the Retool RDS DB[ "0.0.0.0/0" ]
retool_ecs_tasks_logdriverstringSend log information to CloudWatch Logs"awslogs"
retool_task_network_modestringThe Docker networking mode to use for the containers in the task"awsvpc"
retool_task_cpunumberThe hard limit of CPU units to present for the task. It can be expressed as an i"1024"
retool_task_memorynumberThe hard limit of memory (in MiB) to present to the task. It can be expressed as"2048"
retool_jobs_runner_task_container_node_envstringSet Retool jobs runner task container environment"production"
aws_regionstringAWS Region to deploy resources"us-east-1"
retool_rds_cluster_engine_versionnumberAWS RDS Cluster engine version - this is despendent on var.retool_rds_cluster_en"12.16"
retool_custom_host_urlstringSpecify a custom hostname that will be used to create a custom url instead of thnull
retool_jobs_runner_task_cpunumberThe hard limit of CPU units to present for the task. It can be expressed as an i"1024"
alb_listener_ssl_policystringretool_alb_listener_ssl_policy"ELBSecurityPolicy-2016-08"
… and 10 more inputs

Outputs (3)

retool_alb_dns — Retool Application Load Balancer DNS FQDN
retool_url — Valid Retool URL to access on-premise deployment
stack_name — Uniquely generated stack name for Retool on-premise deployment

Resources (18)

aws_alb_listener_ruleaws_alb_target_groupaws_cloudwatch_log_groupaws_db_subnet_groupaws_ecs_clusteraws_ecs_serviceaws_ecs_task_definitionaws_iam_roleaws_lbaws_lb_listeneraws_rds_clusteraws_rds_cluster_instanceaws_route53_recordaws_secretsmanager_secretaws_secretsmanager_secret_versionaws_security_grouprandom_idrandom_password

Details

FrameworkTerraform Module
LanguageHCL
Version3.23.1
Cloud AWS
★ Stars1
Forks1
Total downloads5.9k
Inputs50
Outputs3
Resources18
Examples4
LicenseMIT
NamespaceActionIQ
Updated