AWS ECS on Fargate
This page provides steps to install Appsmith on AWS ECS using Fargate.
Prerequisites
- Amazon Web Services (AWS) account. If you don't have one, Create an AWS Account.
- An Amazon EC2 key pair. If you don't have one, Generate an SSH Key pair.
- An Application Load Balancer (ALB) - If you already have an ALB, follow these steps:
- Provision an Application Load Balancer, and ensure that port 80 and 443 are available to configure ECS service.
- Add an Amazon Security group with ports 80, and 443 accessible. If you don't have one, Create a Security Group.
- You will not be able to use the built-in MongoDB with EFS as it will cause the Appsmith instance to crash. Hence, ensure you have set up and can access an external MongoDB instance hosting MongoDB V5.0 or later. For more information, see External MongoDB.
Create EFS volume
Follow these steps to create an Elastic File System (EFS):
danger
Do not share the Elastic File System (EFS) across ECS services, as doing so will cause Appsmith services to crash.
- Navigate to the Elastic File System section of the AWS Management Console and click the Create file system button.
- Provide a meaningful name to your file system, configure the VPC settings as required, and click Create.
- Select the file system you created above from the list and switch to the Network tab.
- Click the Manage button, and assign the security group that allows NFS access on port 2049. If you don't have such a security group:
- Follow the Create a Security Group guide and include an inbound rule for NFS access on port 2049.
- Enable the port access by adding an inbound rule for the port
2049
for NFS access to the security group you created above. - Once created, attach this security group to your EFS.
Set up ECS Exec policy
Follow the below steps to set up a policy to allow ECS Exec capability:
-
Go to the IAM console and select Policies, and click the Create Policy button.
-
Choose JSON for the policy editor, and update the policy with the below details:
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ssmmessages:CreateControlChannel",
"ssmmessages:CreateDataChannel",
"ssmmessages:OpenControlChannel",
"ssmmessages:OpenDataChannel"
],
"Resource": "*"
}
]
} -
Click the Next button.
-
On the Review and Create screen, give a meaningful name to your policy and click the Create Policy button. Your policy is available in the list of policies.
Create ECS task role
Follow these steps to set up an ECS Task Role:
- Go to the IAM console, select Roles, and click the Create Role button.
- Trusted entity type - Select AWS service.
- Use case - Choose Elastic Container Service.
- In the Choose a use case for specified service setting, select Elastic Container Service Task for Use case.
- Click the Next button.
- On the Add permissions screen, search the policy name you created in the Set up ECS Exec policy section. Similarly, search for the
SecretsManagerReadWrite
policy and add it to the role. - On the Name, review, and create screen, give a meaningful name to the role, and click the Create Role button to create the role.