You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
2. Run `terraform init` to install all requirements for the module.
28
+
29
+
3. Replace `ecs_retool_image` with your desired [Retool Version](https://docs.retool.com/docs/updating-retool-on-premise#retool-release-versions). The format should be `tryretool/backend:X.Y.Z`, where `X.Y.Z` is your desired version number. Version 2.111 or greater is needed for Workflows (2.117 or later strongly recommended for performance improvements).
30
+
31
+
4. Ensure that the default security settings in `security.tf` matches your specifications. If you need to tighten down access, pass in custom ingress and egress rules into `container_egress_rules`, `container_ingress_rules`, `alb_egress_rules`, and `alb_ingress_rules`.
32
+
33
+
5. Check through `variables.tf` for any other input variables that may be required. Set `launch_type` to `EC2` if not using Fargate.
34
+
35
+
6. Run `terraform plan` to view all planned changes to your account.
36
+
37
+
7. Run `terraform apply` to apply the changes and deploy Retool.
38
+
39
+
8. You should now find a Load Balancer in your AWS EC2 Console associated with the deployment. The instance address should now be running Retool.
40
+
41
+
## Common Configuration
42
+
43
+
### Instances
44
+
45
+
**EC2 Instance Size**
46
+
To configure the EC instance size, set the `instance_type` input variable (e.g. `t2.large`).
47
+
48
+
**RDS Instance Class**
49
+
To configure the RDS instance class, set the `instance_class` input variable (e.g. `db.m6g.large`).
50
+
51
+
## Advanced Configuration
52
+
53
+
### Security Groups
54
+
55
+
To customize the ingress and egress rules on the security groups, you can override specific input variable defaults.
56
+
57
+
-`container_ingress_rules` controls the inbound rules for EC2 instances in autoscaling group or ECS services in Fargate
58
+
-`container_egress_rules` controls the outbound rules for EC2 instances in autoscaling group or ECS services in Fargate
59
+
-`alb_ingress_rules` controls the inbound rules for the Load Balancer
60
+
-`alb_egress_rules` controls the outbound rules for the Load Balancer
61
+
62
+
```
63
+
container_ingress_rules = [
64
+
{
65
+
description = "Global HTTP inbound"
66
+
from_port = "80"
67
+
to_port = "80"
68
+
protocol = "tcp"
69
+
cidr_blocks = ["0.0.0.0/0"]
70
+
ipv6_cidr_blocks = ["::/0"]
71
+
},
72
+
{
73
+
description = "Global HTTPS inbound"
74
+
from_port = "443"
75
+
to_port = "443"
76
+
protocol = "tcp"
77
+
cidr_blocks = ["0.0.0.0/0"]
78
+
ipv6_cidr_blocks = ["::/0"]
79
+
},
80
+
{
81
+
description = "SSH inbound"
82
+
from_port = "22"
83
+
to_port = "22"
84
+
protocol = "tcp"
85
+
cidr_blocks = ["0.0.0.0/0"]
86
+
ipv6_cidr_blocks = ["::/0"]
87
+
}
88
+
]
89
+
90
+
container_egress_rules = [
91
+
{
92
+
description = "Global outbound"
93
+
from_port = "0"
94
+
to_port = "0"
95
+
protocol = "-1"
96
+
cidr_blocks = ["0.0.0.0/0"]
97
+
ipv6_cidr_blocks = ["::/0"]
98
+
}
99
+
]
100
+
```
101
+
102
+
### Environment Variables
103
+
104
+
To add additional [Retool environment variables](https://docs.retool.com/docs/environment-variables) to your deployment, populate the `additional_env_vars` input variable into the module.
105
+
106
+
NOTE: The `additional_env_vars` will only work as type `map(string)`. Convert all booleans and numbers into strings, e.g.
0 commit comments