Skip to content

Commit 9babd62

Browse files
authored
[AWS] Expose rabbit on private subnets (ITISFoundation#1032)
Since computational clusters run outside docker swarm cluster on AWS Deployments but still need to access RabbitMQ, we need to make it available on private subnets (within VPC). This does not mean public access since manager nodes are private on AWS Deployments. Related Issue(s): * ITISFoundation#1030
1 parent da95a91 commit 9babd62

File tree

3 files changed

+27
-14
lines changed

3 files changed

+27
-14
lines changed

services/simcore/docker-compose.deploy.aws.yml

Lines changed: 15 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,6 @@ services:
33
volumes:
44
- /docker/volumes/:/docker/volumes/
55

6-
76
dask-sidecar:
87
deploy:
98
placement:
@@ -24,6 +23,7 @@ services:
2423
postgres:
2524
deploy:
2625
replicas: 0
26+
2727
traefik:
2828
command:
2929
- "--api=true"
@@ -52,7 +52,7 @@ services:
5252
- "--entryPoints.traefik_monitor.address=:8080"
5353
- "--entryPoints.traefik_monitor.forwardedHeaders.insecure"
5454
- "--providers.swarm.endpoint=unix:///var/run/docker.sock"
55-
- "--providers.swarm.network=${SWARM_STACK_NAME}_default" # https://github.com/traefik/traefik/issues/7886
55+
- "--providers.swarm.network=${SWARM_STACK_NAME}_default" # https://github.com/traefik/traefik/issues/7886
5656
- "--providers.swarm.refreshSeconds=1"
5757
- "--providers.swarm.exposedByDefault=false"
5858
- "--providers.swarm.constraints=Label(`io.simcore.zone`, `${TRAEFIK_SIMCORE_ZONE}`)"
@@ -73,9 +73,17 @@ services:
7373
deploy:
7474
replicas: 3
7575

76+
rabbit:
77+
deploy:
78+
labels:
79+
- traefik.tcp.services.rabbit.loadBalancer.server.port=5672
80+
- traefik.tcp.routers.rabbit.entrypoints=rabbit
81+
- traefik.tcp.routers.rabbit.tls=false
82+
- traefik.tcp.routers.rabbit.rule=ClientIP(`10.0.0.0/8`) || ClientIP(`172.16.0.0/12`) || ClientIP(`192.168.0.0/16`)
83+
7684
volumes:
77-
efs_volume:
78-
driver_opts:
79-
type: nfs
80-
o: addr=${EFS_DNS_NAME},rw,nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2,noresvport
81-
device: :/
85+
efs_volume:
86+
driver_opts:
87+
type: nfs
88+
o: addr=${EFS_DNS_NAME},rw,nfsvers=4.1,rsize=1048576,wsize=1048576,hard,timeo=600,retrans=2,noresvport
89+
device: :/

services/simcore/docker-compose.yml.j2

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -631,13 +631,13 @@ services:
631631
labels:
632632
- traefik.enable=true
633633
- traefik.docker.network=${PUBLIC_NETWORK}
634-
- traefik.http.services.${PREFIX_STACK_NAME}_rabbit.loadbalancer.server.port=15672
635-
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/${PREFIX_STACK_NAME}_rabbit`)
636-
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit.entrypoints=https
637-
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit.tls=true
638-
- traefik.http.middlewares.${PREFIX_STACK_NAME}_rabbit_replace_regex.replacepathregex.regex=^/${PREFIX_STACK_NAME}_rabbit/(.*)$$
639-
- traefik.http.middlewares.${PREFIX_STACK_NAME}_rabbit_replace_regex.replacepathregex.replacement=/$${1}
640-
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit.middlewares=${PREFIX_STACK_NAME}_rabbit_replace_regex@swarm, ops_gzip@swarm
634+
- traefik.http.services.${PREFIX_STACK_NAME}_rabbit_console.loadbalancer.server.port=15672
635+
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit_console.rule=Host(`${MONITORING_DOMAIN}`) && PathPrefix(`/${PREFIX_STACK_NAME}_rabbit`)
636+
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit_console.entrypoints=https
637+
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit_console.tls=true
638+
- traefik.http.middlewares.${PREFIX_STACK_NAME}_rabbit_console_replace_regex.replacepathregex.regex=^/${PREFIX_STACK_NAME}_rabbit/(.*)$$
639+
- traefik.http.middlewares.${PREFIX_STACK_NAME}_rabbit_console_replace_regex.replacepathregex.replacement=/$${1}
640+
- traefik.http.routers.${PREFIX_STACK_NAME}_rabbit_console.middlewares=${PREFIX_STACK_NAME}_rabbit_console_replace_regex@swarm, ops_gzip@swarm
641641
update_config:
642642
parallelism: 2
643643
order: start-first

services/traefik/docker-compose.aws.yml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -23,6 +23,7 @@ services:
2323
- "--entryPoints.https.transport.respondingTimeouts.writeTimeout=21600s" #6h, for https://github.com/traefik/traefik/issues/10805
2424
- "--entryPoints.https.transport.respondingTimeouts.readTimeout=21600s" #6h, for https://github.com/traefik/traefik/issues/10805
2525
- "--entryPoints.smtp.address=:25"
26+
- "--entryPoints.rabbit.address=:5672"
2627
- "--providers.swarm.endpoint=unix:///var/run/docker.sock"
2728
- "--providers.swarm.exposedByDefault=false"
2829
- "--core.defaultRuleSyntax=v2"
@@ -34,6 +35,10 @@ services:
3435
- "--entryPoints.https.forwardedHeaders.insecure"
3536
- "--providers.file.directory=/etc/traefik/"
3637
- "--providers.file.watch=true"
38+
ports:
39+
- target: 5672
40+
published: 5672
41+
mode: host
3742
environment:
3843
- AWS_ACCESS_KEY_ID=${ROUTE53_DNS_CHALLANGE_ACCESS_KEY}
3944
- AWS_SECRET_ACCESS_KEY=${ROUTE53_DNS_CHALLANGE_SECRET_KEY}

0 commit comments

Comments
 (0)