File size: 15,257 Bytes
c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 c3d1c4c 9f51e70 |
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251 252 253 254 255 256 |
---
title: "App installation guide (with CDK or locally on Windows)"
format:
html:
toc: true # Enable the table of contents
toc-depth: 3 # Include headings up to level 2 (##)
toc-title: "On this page" # Optional: Title for your TOC
---
# Installation with CDK
This guide gives an overview of how to install the app in an AWS environment using the code in the 'cdk/' folder of this Github repo. The most important thing you need is some familiarity with AWS and how to use it via console or command line, as well as administrator access to at least one region. Then follow the below steps.
## Prerequisites
* Ensure you have an AWS Administrator account in your desired region to be able to deploy all the resources mentioned in cdk_stack.py.
* Install git on your computer from: [https://git-scm.com](https://git-scm.com)
* Install nodejs and npm: [https://docs.npmjs.com/downloading-and-installing-node-js-and-npm](https://docs.npmjs.com/downloading-and-installing-node-js-and-npm). If using Windows, it may be easiest to install from the .msi installer at the bottom of the page [here](https://nodejs.org/en/download/).
* Install AWS CDK v2: [https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html](https://docs.aws.amazon.com/cli/latest/userguide/getting-started-install.html)
* Bootstrap the environment with CDK in both your primary region, and `us-east-1` if installing CloudFront and associated WAF.
```bash
# Bootstrap your primary region
cdk bootstrap aws://<YOUR_AWS_ACCOUNT>/eu-west-1
# Bootstrap the us-east-1 region
cdk bootstrap aws://<YOUR_AWS_ACCOUNT>/us-east-1
```
* In command line, write:
```bash
git clone https://github.com/seanpedrick-case/doc_redaction.git
```
## Note on ACM Certificates
To get full HTTPS data transfer through the app, you will need an SSL certificate registered with AWS Certificate Manager.
You can either use the SSL certificate from a domain, or import an existing certificate into Certificate Manager. If you're not sure, ask your IT admin if you need help with this. If getting an SSL certificate for an existing domain, make sure to point the certificate to `*.<domain-name>`.
Update your DNS records to include the CNAME record given by AWS. After your stack has been created, you will also need to create a CNAME DNS record for your domain pointing to your load balancer DNS with a subdomain, e.g., `redaction.<domain-name>`.
## Steps to install the app using CDK
### 1. Create a python environment, load in packages from `requirements.txt`.
You need a `cdk.json` in the `cdk` folder. It should contain the following:
```json
{
"app": "<PATH TO PYTHON ENVIRONMENT FOLDER WHERE REQUIREMENTS HAVE BEEN LOADED>/python.exe app.py",
"context": {
"@aws-cdk/aws-apigateway:usagePlanKeyOrderInsensitiveId": true,
"@aws-cdk/core:stackRelativeExports": true,
"@aws-cdk/aws-rds:lowercaseDbIdentifier": true,
"@aws-cdk/aws-lambda:recognizeVersionProps": true,
"@aws-cdk/aws-lambda:recognizeLayerVersion": true,
"@aws-cdk/aws-cloudfront:defaultSecurityPolicyTLSv1.2_2021": true,
"@aws-cdk/aws-ecs:arnFormatIncludesClusterName": true,
"@aws-cdk/core:newStyleStackSynthesis": true,
"aws-cdk:enableDiffNoFail": true,
"@aws-cdk/aws-ec2:restrictDefaultSecurityGroup": true,
"@aws-cdk/aws-apigateway:disableCloudWatchRole": true,
"@aws-cdk/core:target-partitions": [
"aws",
"aws-cn"
]
}
}
```
### 2. Create a `cdk_config.env` file in the `config` subfolder.
Depending on which environment variables you put in this file, you can choose whether to install the app in a completely new VPC, or in an existing VPC. The following shows you example config files that you could use.
#### Deploying the app an a brand new VPC
Here as a minimum it would be useful to put the following details in the cdk_config.env file (below are all example values, other possible variables to use here can be seen in the `cdk` folder/`cdk_config.py`).
```ini
CDK_PREFIX=example-prefix # This prefix will be added to the name of most of the created elements in your stack
NEW_VPC_CIDR=10.0.0.0/24 # The CIDR range for your newly created VPC
AWS_REGION=<your-region> # Region where elements will be created
AWS_ACCOUNT_ID=1234567890 # AWS account ID that has administrator access that you will use for deploying the stack
CDK_FOLDER=C:/path_to_cdk_folder/ # The place where the cdk folder code is located
CONTEXT_FILE=C:/path_to_cdk_folder/cdk.context.json
COGNITO_USER_POOL_DOMAIN_PREFIX=redaction-12345 # The prefix of the login / user sign up domain that you want to use with Cognito login. Should not contain the terms amazon, aws, or cognito.
COGNITO_AUTH=1 # Do you want to do in-app authentication (username and password only, not necessary if you are using an SSL certificate as recommended below)
USE_CLOUDFRONT=True # Recommended. If you intend to use CloudFront as the front URL to your application load balancer (ALB). This has some extra security features that you won't get with just an ALB, e.g. limiting app access by country.
RUN_USEAST_STACK=False # Set this to True only if you have permissions to create a Cloudfront distribution and web ACL on top of it in the us-east-1 region. If you don't, the section below shows how you can create the CloudFront resource manually and map it to your application load balancer (as you should have permissions for that if you are admin in your region).
CLOUDFRONT_DOMAIN=<example>.cloudfront.net # If you already know the domain of the CloudFront distribution that you want to use, you can add this here.
# If you are using an SSL certificate with your ALB (highly recommended):
ACM_SSL_CERTIFICATE_ARN=<SSL Certificate ARN> # This is the ARN of the SSL certificate that you have installed in AWS Certificate Manager
SSL_CERTIFICATE_DOMAIN=redaction.example.com # This is the domain of the SSL certificate that you have installed in AWS Certificate Manager
```
**Note: If you are using an SSL certificate with Cognito login on the application load balancer (strongly advised), you can set COGNITO_AUTH to 0 above, as you don't need the second login step to get to the app**
#### In an existing VPC
From the above example, remove the variable 'NEW_VPC_CIDR' and replace with the below:
```ini
VPC_NAME=example-vpc-name # Name of the VPC within which all the other elements will be created
EXISTING_IGW_ID=igw-1234567890 # (optional) The ID for an existing internet gateway that you want to use instead of creating a new one
SINGLE_NAT_GATEWAY_ID=nat-123456789 # (optional) The ID for an existing NAT gateway that you want to use instead of creating a new one
```
##### Subnets
If you are using an existing VPC then you may want to deploy the app within existing subnets rather than creating new ones:
* If you define no subnets in environment variables, the app will try to use existing private and public subnets. Bear in mind the app may overlap with IP addresses assigned to existing AWS resources. It is advised to at least specify existing subnets that you know are available, or create your own using one of the below methods.
* If you want to use existing subnets, you can list them in the following environment variables:
```ini
PUBLIC_SUBNETS_TO_USE=["PublicSubnet1", "PublicSubnet2", "PublicSubnet3"]`
PRIVATE_SUBNETS_TO_USE=["PrivateSubnet1", "PrivateSubnet2", "PrivateSubnet3"]`
```
* If you want to create new subnets, you need to also specify CIDR blocks and availability zones for the new subnets. The app will check with you upon deployment whether these CIDR blocks are available before trying to create.
```ini
PUBLIC_SUBNET_CIDR_BLOCKS=['10.222.333.0/28', '10.222.333.16/28', '10.222.333.32/28']
PUBLIC_SUBNET_AVAILABILITY_ZONES=['eu-east-1a', 'eu-east-1b', 'eu-east-1c']
PRIVATE_SUBNET_CIDR_BLOCKS=['10.222.333.48/28', '10.222.333.64/28', '10.222.333.80/28']
PRIVATE_SUBNET_AVAILABILITY_ZONES=['eu-east-1a', 'eu-east-1b', 'eu-east-1c']
```
If you try to create subnets in invalid CIDR blocks / availability zones, the console output will tell you and it will show you the currently occupied CIDR blocks to help find a space for new subnets you want to create.
### 3. Deploy your AWS stack using cdk deploy --all
In command line in console, go to your `cdk` folder in the redaction app folder. Run `cdk deploy --all`. This should try to deploy the first stack in the `app.py` file.
Hopefully everything will deploy successfully and you will be able to see your new stack in CloudFormation in the AWS console.
### 4. Tasks for after CDK deployment
The CDK deployment will create all the AWS resources needed to run the redaction app. However, there are some objects in AWS
#### Run `post_cdk_build_quickstart.py`
The following tasks are done by the `post_cdk_build_quickstart.py` file that you can find in the `cdk` folder. You will need to run this when logged in with AWS SSO through command line. I will describe how to do this in AWS console just in case the `.py` file doesn't work for you.
##### Codebuild
You need to build CodeBuild project after stack has finished deploying your CDK stack, as there will be no container in ECR.
If you don't want to run the 'post_cdk_build_quickstart.py' file, in console, go to CodeBuild -> your project -> click Start build. Check the logs, the build should complete in about 6-7 minutes.
##### Create a `config.env` file and upload to S3
The 'post_cdk_build_quickstart' file will upload a config file to S3, as the Fargate task definition references a `config.env` file.
if you want to do this manually:
Create a `config.env` file to upload to the S3 bucket that has at least the following variables:
```ini
COGNITO_AUTH=1 # If you are using an SSL certificate with your application load balancer, you will be logging in there. Set this to 0 to turn off the default login screen.
RUN_AWS_FUNCTIONS=1 # This will enable the app to communicate with AWS services.
SESSION_OUTPUT_FOLDER=True # This will put outputs for each user in separate output folders.
```
* Then, go to S3 and choose the new `...-logs` bucket that you created. Upload the `config.env` file into this bucket.
##### Update Elastic Container Service
Now that the app container is in Elastic Container Registry, you can proceed to run the app on a Fargate server.
The 'post_cdk_build_quickstart.py' file will do this for you, but you can also try this in Console. In ECS, go to your new cluster, your new service, and select 'Update service'.
Select 'Force new deployment', and then set 'Desired number of tasks' to 1.
## Additional Manual Tasks
### Update DNS records for your domain (If using a domain for the SSL certificate)
If the SSL certificate you are using is associated with a domain, you will need to update the DNS records for your domain registered with the AWS SSL certificate. To do this, you need to create a CNAME DNS record for your domain pointing to your load balancer DNS from a subdomain of your main domain registration, e.g., `redaction.<domain-name>`.
### Create a user in Cognito
You will next need to a create a user in Cognito to be able to log into the app.
* Go to Cognito and create a user with your own email address. Generate a password.
* Go to Cognito -> App clients -> Login pages -> View login page.
* Enter the email and temporary password details that come in the email (don't include the last full stop!).
* Change your password on the screen that pops up. You should now be able to login to the app.
### Set Multi-Factor Authentication for Cognito logins(optional but recommended)
On the Cognito user pool page you can also enable MFA, if you are using an SSL certificate with Cognito login on the Application Load Balancer. Go to Cognito -> your user pool -> Sign in -> Multi-factor authentication.
### Create CloudFront distribution
**Note: this is only relevant if you set `RUN_USEAST_STACK` to 'False' during CDK deployment**
If you were not able to create a CloudFront distribution via CDK, you should be able to do it through console. I would advise using CloudFront as the front end to the app.
Create a new CloudFront distribution.
* **If you have used an SSL certificate in your CDK code:**
* **For Origin:**
* Choose the domain name associated with the certificate as the origin.
* Choose HTTPS only as the protocol.
* Keep everything else default.
* **For Behavior (modify default behavior):**
* Under Viewer protocol policy choose 'Redirect HTTP to HTTPS'.
* **If you have not used an SSL certificate in your CDK code:**
* **For Origin:**
* Choose your elastic load balancer as the origin. This will fill in the elastic load balancer DNS.
* Choose HTTP only as the protocol.
* Keep everything else default.
* **For Behavior (modify default behavior):**
* Under Viewer protocol policy choose 'HTTP and HTTPS'.
#### Security features
You can add security features to your CloudFront distribution (recommended). If you use WAF, you will also need to change the default settings to allow for file upload to the app.
* In your CloudFront distribution, under 'Security' -> Edit -> Enable security protections.
* Choose rate limiting (default is fine). Then click Create.
* In CloudFront geographic restrictions -> Countries -> choose an Allow list of countries.
* Click again on Edit.
* In AWS WAF protection enabled you should see a link titled 'View details of your configuration'.
* Go to Rules -> `AWS-AWSManagedRulesCommonRuleSet`, click Edit.
* Under `SizeRestrictions_BODY` choose rule action override 'Override to Allow'. This is needed to allow for file upload to the app.
### Change Cognito redirection URL to your CloudFront distribution
Go to Cognito -> your user pool -> App Clients -> Login pages -> Managed login configuration.
Ensure that the callback URL is:
* If not using an SSL certificate and Cognito login - `https://<CloudFront domain name>`
* If using an SSL certificate, you should have three:
* `https://<CloudFront domain name>`
* `https://<CloudFront domain name>/oauth2/idpresponse`
* `https://<CloudFront domain name>/oauth/idpresponse`
### Force traffic to come from specific CloudFront distribution (optional)
Note that this only potentially helps with security if you are not using an SSL certificate with Cognito login on your application load balancer.
Go to EC2 - Load Balancers -> Your load balancer -> Listeners -> Your listener -> Add rule.
* Add Condition -> Host header.
* Change Host header value to your CloudFront distribution without the `https://` or `http://` at the front.
* Forward to redaction target group.
* Turn on group stickiness for 12 hours.
* Next.
* Choose priority 1.
Then, change the default listener rule.
* Under Routing action change to 'Return fixed response'.
You should now have successfully installed the document redaction app in an AWS environment using CDK.
|