Beginning with AWS CloudFormation – Part 3

Welcome (or welcome back) folks.  In this post we are going to look at chaining resources together.  Previously we deployed a VPC, but now we want to put stuff in it.  We’ll be using the subnet resource today, and here is the CloudFormation doc link to it:

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ec2-subnet.html

Rather than re-hash what we’ve already done in the other posts, let’s just take a quick run through creating a CloudFormation template to deploy a subnet resource.  Looking at the documentation you can see the required pieces for a subnet are the CIDR block and the VPC ID.  The VPC ID essentially serves as your resource target.

If you were to deploy a single CloudFormation template that created both the VPC and the subnet, you might guess by now that you would simply define the VPC resource, and then define the subnet resource using “Ref”: “vpcResourceName” as the VPC ID. Using the skills we already covered you should be able to accomplish this.  You can chain together multiple resources in a single template this way without too much fuss.  However, this isn’t always the recommended thing to do, especially with reusable parts.  In other words, I don’t really want to have the same resource created in every single template I use, especially if I’ve gone to a lot of trouble with parameter inputs and customization.  Then I’ve got to remember where I’ve used it when I make a change.

We are going to do something a little different in this post.  First, I’m going to create a VPC manually, because you won’t always want to create a new VPC with each deployment.  In fact, you will likely rarely be creating VPCs in your stacks.  So let’s just create one with the console:

1create_vpc

Pretty basic.  This is a new VPC with the name CFTest and a CIDR block of 172.10.0.0/16.  If I check this out in the console, I can see the VPC ID value as well.  I’ll note this ID down.

2vpc_info

Now I’m creating a new template, either with the designer or as a text file.  This template will take some input, create a new subnet, and then output the subnet ID.  If you are using the designer you can simply click the Template tab at the bottom and paste this whole thing in there.  Note: if you are following along you will want to replace the Default: value with your VPC ID.

{
    "AWSTemplateFormatVersion": "2010-09-09",
    "Parameters": {
        "myVPCName": {
            "Default": "vpc-e456f39f",
            "Description": "VPC target for subnet",
            "Type": "String"
        },
        "myCidrBlock": {
            "Description": "CIDR Block for Subnet",
            "Type": "String"
        }
    },
    "Resources": {
        "mySubnet": {
            "Type": "AWS::EC2::Subnet",
            "Properties": {
                "CidrBlock": {"Ref": "myCidrBlock"},
                "VpcId": {"Ref": "myVPCName"}
            }
        }
    },
    "Outputs": {
        "mySubnetId": { "Value": { "Ref": "mySubnet" }  
    } 
}

If using the designer, once you have this entered, save the template but save it in an S3 bucket.  It will create a new S3 bucket for you to use and show you URL location of it.  Copy this URL!

5templatesaveS3

If you aren’t using the designer simply upload your text file into an S3 bucket location.  Let’s run this stack to make sure it works.  Here are my Parameter inputs.  Note that if you used a default value for the VPC ID it should be pre-populated, although you can still enter your own custom VPC ID if you want.

3stackdeploy

And once it finishes you should see your subnet in the console.  Perfect.

4subnetcreated

Back in CloudFormation choose this stack and then delete it.  It will delete the subnet it created.

What we are going for here is a reusable component, right?  At this moment, we have a template that will create a subnet resource for us.  The thing we are wanting to do is called nesting, or having a stack that calls another stack. We do that by using the CloudFormation stack resource.  In CloudFormation, stacks are resources just like VPCs, subnets, etc.

Here is some doc on nesting:

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-nested-stacks.html

And here is the documentation for stack resources:

https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-stack.html

You can chain stacks together multiple times, but we are going to keep it simple and just have a simple top level stack that calls the subnet stack.

Again back in the designer or in a text file, you will want to create something that looks like this, obviously replacing the S3 TemplateURL with your own.  This should be a completely separate template from the subnet template earlier!

{
    "AWSTemplateFormatVersion": "2010-09-09",
    "Resources": {
        "mySubnetStack": {
            "Type": "AWS::CloudFormation::Stack",
            "Properties": {
                "TemplateURL": "https://s3-external-1.amazonaws.com/cf-templates-dbp227s8qkrv-us-east-1/2018061ur6-subnet.templatehziulmqnqe5",
                "Parameters": {
                    "myCidrBlock": "172.10.20.0/24",
                    "myVPCName": "vpc-e456f39f"
                }
            }
        }
    },
    "Outputs": {
        "mySubnetId": { "Value": {"Fn::GetAtt": [ "mySubnetStack", "Outputs.mySubnetId"]}} 
    }
}

Again if you’ve followed along this should be more of the same.  We are creating a stack resource, referencing the location of the template file in S3.  We are also passing in the parameters needed to create the subnet – not in the Parameters section of the template but as a property of the subnet stack.  The only real oddity is the output which is referencing the stack output as an attribute.  So we use the Fn::GetAtt intrinsic function to reference and output this attribute.  You need to think of the subnet stack in this case as a resource and not as a template.

When we execute this stack, notice that our output is a little more interesting.  See how we actually have two stacks showing?  The outer parent and the child stack which is marked Nested.

6nestedstackinprogress

But other than that, the result is more or less the same.  There is an output in both the child and parent stacks that shows the subnet ID:

7subnetIdout

And we can view this subnet in the VPC:

8subnetinfo

With this ability to reuse CloudFormation templates, you can do some surprisingly powerful things.  Play around and see where it can help you out when deploying to AWS.

Be Deliberately Thankful

peaceful

Warning: non-technical post ahead!

I wanted to take a moment and relate a simple story to you.  I was driving this evening and was stopping at a light where I saw a car pulling up to the road from an adjacent McDonald’s.  In other words, they were obviously about to pull out in roughly the same place I would be stopping at the light.  I stopped short to give them room to pull out ahead of me when the light turned green (the car in front of me was a little too far back for them to pull out at the moment).

Continue reading

AWS Containers – ECS, Fargate, and EKS

Those of you who have perused my blog last year (or talked to me in person) know that I’m pretty stoked about containers.  I think they are very cool conceptually and can bring a lot of value to streamlining the development process.

AWS has several options for containers and I wanted to do a VERY high level run through these to distinguish them a bit and maybe whet your appetite to dive into them a little more.

Continue reading

Beginning with AWS CloudFormation – Part 2

In this post we are going to build on the previous template and add the ability to take input and produce output.  Sometimes you want to strictly define inputs in your template, but sometimes you want the ability for people to give their own values instead of writing tons of very specific templates for unique workflows.  And we will also start looking at intrinsic functions as well, so plenty of good content here.

Continue reading

Beginning with AWS CloudFormation – Part 1

One of my few new goals for this year is to get back to blogging regularly about stuff I’m learning or interested in.  Keep a look out here for (hopefully!) more content this year than previous years which might have had just a handful of posts.

AWS CloudFormation is a utility that allows you to define AWS “infrastructure” as code in text files called Templates.  You can use it to deploy almost anything via JSON or YAML scripts.  The deployed resources are collectively called stacks.  There are other IaC options here as well, like Terraform, but I think it is handy to know the native toolset as well.  Plus if you are going for AWS certifications you’ll need to be familiar with it.

Continue reading

VMworld 2017 – PKS: Pivotal Container Services

The big announcement during the 2nd general session at VMworld was around Pivotal Container Services, or PKS, which is an on-prem, managed kubernetes offering.  PKS is targeted at customers who want a private kubernetes environment, operated at scale, and enterprise grade (meaning manageable, upgradeable, etc.).

I wanted to provide some context around several things that I think a lot of people aren’t aware of.  I’m going to try to define all the acronyms as well, as this gets confusing fast.  Give it a couple of reads if you have to! Continue reading

VMworld 2017 Day 2 – VMware Cloud on AWS

The hits just keep on coming here at VMworld 2017.  Lots of big announcements and great sessions today.  VMware Cloud on AWS is a big focus this year and you can expect to see continued integration points between VMware and Amazon (as well as other cloud providers). Continue reading

VMworld 2017 Day 1 – VMware Cloud Management Platform

My first session at VMworld 2017 was “What’s New and What’s Next for VMware Cloud Management Platform.”  There are a ton of great sessions and overlap at this conference, but I thought this would be a good one to attend (and blog on) as they touched on a lot of things VMware is doing outside of itself.

A big issue in the tech field today is that the world is moving “open.”  Open source, open APIs, commodity hardware, etc.  Customers are very wary of vendor lock-in that prevents them from either using new solutions or moving to other solutions later.

VMware has clearly recognized this, as a primary focus of late is cloud and product interoperability.  This is huge for a massive company like VMware who has TONS of proprietary stuff. Continue reading

Exploring Docker Networking – Ports and Forwarding

whale20logo332_5

If you’ve followed along in my other network posts about bridge and the rest of the default networks, you may have noticed that I keep spinning up CentOS containers.  This is well and good for demos and instructional purposes but you might have also noticed that they don’t really do anything.  I mean they exist, but that isn’t why you run things in your environment.  You don’t have a bunch of server OSes spun up doing nothing, right?  RIGHT?

Well, we hope not anyway.  Ideally your server actually does something like hosts an app, database, or webserver.  In this post we are going to explore some aspects of bridge networking and get a little more into the underpinnings of Docker.  And in order do that, hey we need a container that actually does something! Continue reading

Exploring Docker Networking – Host, None, and MACVLAN

whale20logo332_5

As with our previous post on bridge, the intent here is to explore the remaining standard (mostly non-swarm) network configurations.  Those configurations are host, none, and the newer MACVLAN.

Unlike bridge these are non-default configurations which means you must manually specify the network somewhere.  In our case we are just going to explicitly list the network when we run the container.  We will also explore the configuration elements that we looked at earlier.   Continue reading