Skip to content

This project contains Terraform configuration files to provision infrastructure components required to deploy SAS Viya platform products products on Amazon AWS.

License

Notifications You must be signed in to change notification settings

sassoftware/viya4-iac-aws

SAS Viya 4 Infrastructure as Code (IaC) for Amazon Web Services (AWS)

Overview

This project contains Terraform scripts to provision the AWS cloud infrastructure resources that are required to deploy SAS Viya platform product offerings. Here is a list of resources that this project can create:

  • Amazon VPC and Security Group
  • Managed Amazon Elastic Kubernetes Service (EKS)
  • Amazon EKS managed node groups with required labels and taints
  • Infrastructure to deploy the SAS Viya platform CAS server in SMP or MPP mode
  • Amazon Elastic Block Storage (EBS) for NFS
  • Amazon Elastic File System (EFS)
  • Amazon FSx for NetApp ONTAP File System
  • Amazon Relational Database Service (RDS)

Architecture Diagram

This project helps you to automate the cluster-provisioning phase of SAS Viya platform deployment. To learn about all phases and options of the SAS Viya platform deployment process, see Getting Started with SAS Viya and Amazon Elastic Kubernetes Service in SAS® Viya® Platform Operations.

Once the cloud resources are provisioned, use the viya4-deployment project to deploy the SAS Viya platform in your cloud environment. For more information about SAS Viya platform requirements and documentation for the deployment process, refer to the SAS Viya platform Operations Guide.

Prerequisites

Use of these tools requires operational knowledge of the following technologies:

Technical Prerequisites

This project supports two options for running Terraform scripts:

  • Terraform installed on your local machine

  • Using a Docker container to run Terraform (Docker is required)

    For more information, see Docker Usage. Using Docker to run the Terraform scripts is recommended.

The following are also required:

  • Access to an AWS account with a user that is associated with the applied IAM Policy

    NOTE: The base IAM Policy document has been updated for the 7.2.0 release, you will need to adopt the updated permission list to take advantage of new features added to the viya4-iac-aws project code.

  • Subscription to Ubuntu 20.04 LTS - Focal

Terraform Requirements:

Docker Requirements:

Getting Started

Ubuntu 18.04 LTS is the operating system that is used on the jump server and NFS server VMs. Ubuntu creates the /mnt location as an ephemeral drive, so it cannot be used as the root location of the jump_rwx_filestore_path variable.

Clone this Project

Run the following commands from a terminal session:

# clone this repo
git clone https://github.com/sassoftware/viya4-iac-aws
cd viya4-iac-aws

Authenticate Terraform to Access AWS

In order to create and destroy AWS resources on your behalf, Terraform needs an AWS account that has sufficient permissions to perform all the actions defined in the Terraform manifest. See Authenticating Terraform to Access AWS for details.

Customize Input Values

Terraform scripts require variable definitions as input. Review and modify default values to meet your requirements. Create a file named terraform.tfvars to customize any input variable value documented in the CONFIG-VARS.md file.

To get started, you can copy one of the example variable definition files provided in the examples folder. For more information about the variables that are declared in each file, refer to the CONFIG-VARS.md file.

NOTE: You will need to update the cidr_blocks in the variables.tf file to allow traffic from your current network. Without these rules, access to the cluster will only be allowed via the AWS Console.

You have the option to specify variable definitions that are not included in terraform.tfvars or to use a variable definition file other than terraform.tfvars. See Advanced Terraform Usage for more information.

Create and Manage Cloud Resources

Create and manage the required cloud resources. Perform one of the following steps, based on whether you are using Docker:

Increase the Max Prepared Transactions for External Postgres Database

If you are using an external Postgres server, you will need to ensure that the max prepared transactions is at least 1024. You can verify this information by opening the AWS Console and navigating to the RDS Service. Select your Postgres instance, open the Configuration tab, and click on the link to the database's parameter group. Search for the 'max_prepared_transactions' parameter.

If the max prepared transactions is less than 1024, you will need to update the value. Click on the "Edit Parameters" button and change the value to 1024. Once you save your changes, you will need to wait for the database to apply the changes. This can be found back on the configuration tab. After it has been applied, you will need to reboot the database.

Troubleshooting

See the Troubleshooting page for information about possible issues that you might encounter.

Contributing

We welcome your contributions! See CONTRIBUTING.md for details on how to submit contributions to this project.

License

This project is licensed under the Apache 2.0 License.

Additional Resources

AWS Resources

Terraform Resources