Use Secrets Manager to interact with Fargate
You need to complete RDS Phase before you can continue below.
In this section, we will learn how to use the Secrets Manager service with AWS Fargate.
AWS Fargate is a compute engine
used for Amazon ECS (Elastic Container Service) service that allows us to instantiate Containers without having to manage to compute or must configure the VMs. This is a step forward to help us reduce the load on deciding which EC2 Instance Type is suitable to run our application as well as making decisions about Scaling. At that time, we will focus more on designing and building the current application.
The CloudFormation Template used for this exercise prepared us with the shell scripts needed to build Docker Image and Amazon ECR (Elastic Container Registry). The exercise will focus on Secrets Manager rather than on Docker, Amazon ECS, or Amazon ECR.
Regarding the architectural model, the prepared AWS resources will be linked as follows:
Contents
Access to Bastion Host with Session Manager
Start Session
button.Start Session
button.Before running the scripts, we need to make sure the account used is ec2-user
.
Proceed to switch to ec2-user
account with the following command:
sudo su - ec2-user
Build Docker Image
We proceed to build Docker Image using the shell script dockerbuild.sh
. This code will proceed to create Docker Image based on Dockerfile
prepared (by CloudFormation).
./dockerbuild.sh
Building the Docker Image will take a few minutes to complete.
After the process is complete, we check the Docker Image named with -ecrre-
format with the following command:
docker images
Once confirmed, we proceed to push this Docker Image to Amazon ECR using the shell script dockertagandpush.sh
.
./dockertagandpush.sh
Pushing the Docker Image to Amazon ECR will take a few minutes to complete.
Once the process is complete, we proceed to configure AWS Fargate based on Amazon ECR.
To configure AWS Fargate, we need to configure Task Definition first.
-ECSCluster-
.-TaskDefinition-
.Create new revision
button.Configure via JSON
button.SECRETNAME
with the Secret we created in the previous section.Save
button.Create
button to proceed with initialization.Actions
button, select Run Task
.Launch Type
: FargateCluster VPC
: Select a prepared VPC with a CIDR of 10.200.0.0/16
.Subnets
: Select all.Security Group
: Select a name with the following format -BastionSG-
.Run Task
button.After the Tasks are in RUNNING state, we proceed to access the Fargate Container. First of all, we need to make a note of the IP address of a Fargate Container.
From the Bastion Host, proceed to access the Fargate Container. When asked for a password, we use the value EC2UserPassword.
ssh <FARGATE_TASK_PRIVATE_IP>
In this part, we will use the new way through the shell script mysql.newway.sh
.
mysql.newway.sh
to access the RDS Database.
./mysql.newway.sh smdemo
use smdemo;
show tables;
select * from bookinfo;
quit;
After successfully accessing RDS Database from Fargate Container, we need to understand that there are many ways to access RDS Database, however, which option is secure and suitable for our application. we are the important thing.
For access from Bastion Host, we see the benefit of using shell script to access RDS Database, if we use the old hard-coded password
method then after perform the Secret Rotation process, this method will not work.
For access from Fargate Container:
First, we use Secrets Manager ARN as Environment Variable
in Task Definition, then Fargate Containers can easily know and make access to *Secret * created earlier.
On the Docker Image side, Dockerfile is used to enable the shell script startprocesses.sh
. This code will pass the Environment Variable
parameters inside the Fargate Container.
Fargate Containers can then use the value obtained from the Environment Variable
parameter TASKDEF_SECRET
to perform access to RDS Database.
The following is the code snippet for startprocesses.sh
.
touch /etc/profile.d/ecs.sh
chmod 644 /etc/profile.d/ecs.sh
env | \
grep "^TASKDEF_" | \
awk -F= '{printf "export %s=%c%s%c\n", $1, 39, $2, 39 }' \
>> /etc/profile.d/ecs.sh
Environment Variable
with the following command:env|grep TASKDEF_SECRET
TASKDEF_SECRET={
"username": "<DBUser>",
"password": "<DBPassword>",
"engine": "mysql",
"host": "<RDS_ENDPOINT>",
"port": 3306,
"dbname": "<RDS_DATABASE>",
"dbInstanceIdentifier": "<RDS_ID>"
}