Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ECS PoC - isolate multiple services by roles and agent-pools #22

Closed
wants to merge 597 commits into from

Conversation

ppresto
Copy link

@ppresto ppresto commented Aug 20, 2021

Hi Andy, I'm not sure if this is applicable to your repo, but wanted to contribute back my PoC changes just in case. Thanks for providing such a great base to start with!!

The demo was built to address the following:

  • Automate workspace creation for (TF admin, IAM, Sentinel, ECS Platform, and service teams)
  • manage credentials from a single IAM workspace (roles, agent tokens, SSM) with remote state.
  • enable sentinel policies
  • isolate services by agent-pool
  • serviceA - team can NOT use assume-role in tf code. ECS pulls role and service team ws never needs to see it
  • serviceB - same as original demo using assume-role in tf code. Sentinel policies enforce only serviceB role can be used.

FYI: I didn't add the webhook notification IaC, used a default of 2 tasks per service.

@ppresto ppresto closed this by deleting the head repository Jan 4, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant