aws-cdk-app
v0.1.0
Published
This AWS CDK project is designed to save time and reduce duplicated work when provisioning Amazon RDS instances. It automates the creation of AWS resources such as RDS secrets for CI, APP, and Readonly users, security groups, RDS proxy security groups, RD
Downloads
2
Readme
Overview
This AWS CDK project is designed to save time and reduce duplicated work when provisioning Amazon RDS instances. It automates the creation of AWS resources such as RDS secrets for CI, APP, and Readonly users, security groups, RDS proxy security groups, RDS proxy role, RDS database instance, RDS proxy, and RDS proxy target group. Additionally, the project provides output of the database related endpoints and names.
Prerequisites
Before you can use this AWS CDK project, you must have the following prerequisites installed and configured:
- AWS CLI
- Node.js and npm
- AWS CDK CLI
You must also have appropriate AWS credentials configured on your system.
Installation
Clone this repository to your local machine. Navigate to the root directory of the project in your terminal or command prompt. Run npm install to install the project dependencies.
The cdk.json
file tells the CDK Toolkit how to execute your app.
Usage
Modify the properties of the RdsStackProps interface to match your desired configuration for the RDS instance. Save the file.
In your terminal or command prompt, run the following command to provision the RDS instance:
cdk deploy
This will deploy the RDS instance and associated resources to your AWS account.
When the deployment is complete, the AWS CloudFormation console will display the output values for the stack. These values will include the endpoint and name of the RDS instance and other relevant information.
Cleanup
When you are finished with the RDS instance, you can remove it from your AWS account to avoid incurring additional charges. To do this, run the following command in your terminal or command prompt:
cdk destroy
This will remove all resources associated with the stack.
Useful commands
npm run build
compile typescript to jsnpm run watch
watch for changes and compilenpm run test
perform the jest unit testscdk deploy
deploy this stack to your default AWS account/regioncdk diff
compare deployed stack with current statecdk synth
emits the synthesized CloudFormation template
Naming conventions
Given {pascalDbName : 'CdkTestDb', snakeDbName : 'cdk-test-db'}
| Resources | Name | Notes |
| ------------- | ------------- | --------------|
| AWS::SecretsManager::Secret | cdk-test-db
-test
-RDS-ReadonlySecret | username: CdkTestDb_readonly
, password: uuidv4
, ssmUsername:/rds/cdk-test-db/test/readonly/username
, ssmPassword:/rds/cdk-test-db/test/readonly/username
|
| AWS::SecretsManager::Secret | cdk-test-db
-test
-RDS-CISecret | username: CdkTestDb_ci
, password: uuidv4
, ssmUsername:/rds/cdk-test-db/test/ci/username
, ssmPassword:/rds/cdk-test-db/test/ci/username
|
| AWS::SecretsManager::Secret | cdk-test-db
-test
-RDS-AppSecret | username: CdkTestDb_app
, password: uuidv4
, ssmUsername:/rds/cdk-test-db/test/app/username
, ssmPassword:/rds/cdk-test-db/test/app/username
|
| AWS::IAM::Role | CdkTestDb
RDSProxyRole |
| AWS::EC2::SecurityGroup | CdkTestDb
RDSProxySecurityGroup |
| AWS::EC2::SecurityGroup | CdkTestDb
RDSSecurityGroup |
| AWS::RDS::DBInstance | cdk-test-db
-test
| DBName: cdktestdbtest
DBInstanceIdentifier: cdk-test-db-test
, MasterUsername: CdkTestDb_ci
, MasterUserPassword: uuidv4
|
| AWS::RDS::DBProxy | cdk-test-db
-rds-proxy |
| AWS::RDS::DBProxyTargetGroup | default |
| Outputs|
CdkTestDbDatabaseProxy,
CdkTestDbDatabaseHost
, CdkTestDb
DatabasePort, CdkTestDb
DatabaseName |
8 digits will be added to resource name to make sure it's global unique
Issues
- Fn:Import value doesn't work properly in AWS-CDK, to resolve the problem, we would need to read the data from ssm or read from stack details
- RdsProxy IAMAuth is attached to Proxy rather than DBSecrets, so we can't have different IAMAuth configuration for the secrets under the RdsProxy
- To create the credential and put it into ssm, we would need to check its existence, fetch ssm will throw an exception and terminate the deployment processes even if we captured the exception. To avoid the exception being thrown, we have to read the parameter describes to check existence.
- DBProxyTargetGroup deployment can't be processed successfully, somehow we can't connect to the RDS properly, https://github.com/aws/aws-cdk/issues/8919, https://github.com/aws/aws-cdk/pull/12953
Conclusion
This AWS CDK project can save you significant time and effort when provisioning Amazon RDS instances. It automates the creation of resources and provides output values that can be used to configure your applications to use the new RDS instance. By using this project, you can quickly and easily provision RDS instances without having to manually create and configure each resource.