You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. Run `terraform init` to install all requirements for the module.
29
+
30
+
3. Replace `ecs_retool_image` with your desired [Retool Version](https://docs.retool.com/docs/updating-retool-on-premise#retool-release-versions). The format should be `tryretool/backend:X.Y.Z`, where `X.Y.Z` is your desired version number. Version 2.111 or greater is needed for Workflows (2.117 or later strongly recommended for performance improvements).
31
+
32
+
4. Ensure that the default security settings in `security.tf` matches your specifications. If you need to tighten down access, pass in custom ingress and egress rules into `container_egress_rules`, `container_ingress_rules`, `alb_egress_rules`, and `alb_ingress_rules`.
33
+
34
+
5. Check through `variables.tf` for any other input variables that may be required. Set `launch_type` to `EC2` if not using Fargate.
35
+
36
+
6. Run `terraform plan` to view all planned changes to your account.
37
+
38
+
7. Run `terraform apply` to apply the changes and deploy Retool.
39
+
40
+
8. You should now find a Load Balancer in your AWS EC2 Console associated with the deployment. The instance address should now be running Retool.
41
+
42
+
## Common Configuration
43
+
44
+
### Instances
45
+
46
+
**EC2 Instance Size**
47
+
To configure the EC instance size, set the `instance_type` input variable (e.g. `t2.large`).
48
+
49
+
**RDS Instance Class**
50
+
To configure the RDS instance class, set the `instance_class` input variable (e.g. `db.m6g.large`).
51
+
52
+
## Advanced Configuration
53
+
**Bring your own Temporal Cluster**
54
+
To configure your own Temporal cluster, set the `use_existing_temporal_cluster` to `true` and configure your Temporal Cluster's Frontend service endpoint (and TLS if needed) using `temporal_cluster_config`. If configuring mTLS, we expect the cert and key values to be base64-encoded strings.
55
+
### Security Groups
56
+
57
+
To customize the ingress and egress rules on the security groups, you can override specific input variable defaults.
58
+
59
+
-`container_ingress_rules` controls the inbound rules for EC2 instances in autoscaling group or ECS services in Fargate
60
+
-`container_egress_rules` controls the outbound rules for EC2 instances in autoscaling group or ECS services in Fargate
61
+
-`alb_ingress_rules` controls the inbound rules for the Load Balancer
62
+
-`alb_egress_rules` controls the outbound rules for the Load Balancer
63
+
64
+
```
65
+
container_ingress_rules = [
66
+
{
67
+
description = "Global HTTP inbound"
68
+
from_port = "80"
69
+
to_port = "80"
70
+
protocol = "tcp"
71
+
cidr_blocks = ["0.0.0.0/0"]
72
+
ipv6_cidr_blocks = ["::/0"]
73
+
},
74
+
{
75
+
description = "Global HTTPS inbound"
76
+
from_port = "443"
77
+
to_port = "443"
78
+
protocol = "tcp"
79
+
cidr_blocks = ["0.0.0.0/0"]
80
+
ipv6_cidr_blocks = ["::/0"]
81
+
},
82
+
{
83
+
description = "SSH inbound"
84
+
from_port = "22"
85
+
to_port = "22"
86
+
protocol = "tcp"
87
+
cidr_blocks = ["0.0.0.0/0"]
88
+
ipv6_cidr_blocks = ["::/0"]
89
+
}
90
+
]
91
+
92
+
container_egress_rules = [
93
+
{
94
+
description = "Global outbound"
95
+
from_port = "0"
96
+
to_port = "0"
97
+
protocol = "-1"
98
+
cidr_blocks = ["0.0.0.0/0"]
99
+
ipv6_cidr_blocks = ["::/0"]
100
+
}
101
+
]
102
+
```
103
+
104
+
### Environment Variables
105
+
106
+
To add additional [Retool environment variables](https://docs.retool.com/docs/environment-variables) to your deployment, populate the `additional_env_vars` input variable into the module.
107
+
108
+
NOTE: The `additional_env_vars` will only work as type `map(string)`. Convert all booleans and numbers into strings, e.g.
0 commit comments