AWS Deployment
This deployment runs Veraison services and a Keycloak instance on EC2 instances behind load balancers. An RDS instance running Postgres is used for key-value stores, and a memcached instance is used for session management.
Dependencies
This deployment depends on the debian
deployment (which, in turn, depends on
the native
deployment). Please see its
README for the dependencies list.
Additionally, the following dependencies are required specifically for AWS deployment:
curl
: used to transfer the Debian package to the EC2 node.openssl
: used to generate TLS certs (note: unlike withnative
deployment, where pre-generated certs may optionally be used, cert generation is mandatory for this deployment, as the certs must be specific to the created EC2 instance).packer
: used to build AMI images using temporary EC2 instances.psql
: Postgres client used to initialise the stores (may be packaged on its own or as part ofpostgres
, depending on the platform).- A number of Python packages used by the deployment script. Please see requirements.txt for details.
curl
and openssl
should be available from your OS's package manager. Python
dependencies are installable via pip
/PyPI
. For packer
, please see its
documentation.
Bootstrap
To simplify dependency installation, the deployment script implements bootstrap for Arch, Ubuntu, and MacOSX (using homebrew).
git clone https://github.com/veraison/services.git
cd services/deployments/aws
make bootstrap
(this will only work on the above-mentioned platforms).
AWS account
You need an existing AWS account. Please see boto3
documentation
for how to configure aws
CLI to access this account.
The AWS credentials will also need to available to packer
tool. Where
packer
looks for them is described by packer
docs.
The simplest way to configure credentials is probably via Single Sign On (SSO).
- Run
and follow the interactive wizard to specify configuration.aws configure sso
- Make sure the configuration works by doing
You will need to periodically re-do this step when your current login expires (usually around once a day).aws sso login
- Create
AWS_PROFILE
environment variable pointing to profile created in step (1).export AWS_PROFILE=<YOU PROFILE NAME>
The steps above are not the only way to establish AWS credentials. Please refer to the documentation linked above for alternatives.
Domain and certificate
Finally, you need a domain registered in Route53, with a corresponding certificate created in ACM. If you already have a domain with a different registrar, you will need to transfer it to Route53.
The certificate MUST cover subdomains as well. For example, if you have
registered my-domain.com
in Route53, the certificate should have
*.my-domain.com
in its Subject Alternative Names.
For creating a new domain, please see Register a new domain or Transferring registration for a domain. For information on setting up a certificate in ACM please see AWS Certificate Manager
Quickstart
Before creating a deployment, you need to provide account-specific configuration that specifies the IDs of the VPC and subnets that will be used for the deployment as well as the CIDR that will be granted access to the deployment. Please use misc/arm.cfg for an example.
Once the account-specific config file is created, define AWS_ACCOUNT_CFG
environment variable to point to it and execute make deploy
to create the
deployment.
export AWS_ACCOUNT_CFG=misc/arm.cfg # replace with path to your config
make deploy
note
This could take a while -- in the order of 45 minutes, depending on how responsive AWS is.
Deployment can be accessed via CLI front end:
source env/env.bash # for bash, or alternatively, env/env.zsh for Zsh users
veraison status
This should display the DNS name and IP address of the instance and show Veraison services as active and running.
To make sure the deployment works, you can run through end-to-end flow.
For example
# env/env.bash must be sourced
../../end-to-end/end-to-end-aws provision
# followed by
../../end-to-end/end-to-end-aws verify rp
Finally, to remove the deployment, you can run
make really-clean
Deployment overview
Veraison is deployed into a dedicated VPC created within the AWS region
specified by VERAISON_AWS_REGION
inside deployment.cfg
(the region must
contain at least two availability zones). The address space for the VPC is
determined by VERAISON_VPC_CIDR
. It must be large enough to accommodate four
subnets of equal size, with a subnet being large enough to hold the expected
number of instances (at least /16
CIDR is recommended).
The VPC spans two availability zones, each containing a public and a private subnet. The public subnets host load balancers for Veraison services and Keycloak. The first public subnet also hosts the sentinel EC2 instance which is used to configure RDS database. The private subnets host auto-scaled service instances, keycloak instance, and the RDS instance.
The deployment adds three subdomains to the domain registered in route 53 -- one each for the services load balancer, keycloak load balancer, and the sentinel instance.
Deployment bring up and tear down
make
calls shown above just invoke deployment.sh
with an appropriate
command. make bootstrap
calls deployment.sh bootstrap
, make deploy
calls
deployment.sh bringup
, and make really-clean
calls deployment.sh teardown
.
deployment.sh
loads the environment from deployment.cfg
and the additional
file specified by AWS_ACCOUNT_CFG
, and executes the function associated with
the specified command, which, in turn, calls through to the bin/veraison
script.
The first time veraison
script is invoked, --deployment-name
should be
specified before the subcommand to indicate which deployment the script's
subcommand should apply to. The script will remember it for future invocations,
so there is no need to specify it again unless you want to switch the current
deployment. deployment.sh
take the value for this flag from
VERAISON_AWS_DEPLOYMENT
environment variable (specified inside
deployment.cfg
).
Bring up
The bring up function creates the deployment. The deployment is created in
stages, with each stage corresponding to a subcommand of the veraison
script.
The bring up stages are:
veraison configure --init [...]
veraison create-deb
veraison create-key-pair
veraison create-vpc-stack
veraison create-sentinel-image
veraison create-rds-stack
veraison update-security-groups
veraison setup-rds
veraison create-signing-key
veraison create-services-image
veraison create-keycloak-image
veraison create-services-stack
configure
configure
command is used to configure the deployment. It has optional
arguments to specify individual configuration points for the deployment. (use
veraison configure --help
to list them). Configuration will be cached locally
and used by subsequent commands.
The --init
flag indicates that this is an initial configuration for the
deployment. Any arguments not specified by this command will be set to default
values (or an error will be raised if no defaults exist). Without --init
flag,
only the specified parameters will configured (this can be used to update an
existing configuration).
create-deb
This is used to create a Debian package for Veraison services using the debian deployment. This is used to create the services image later.
create-key-pair
This creates an AWS key pair that will be used to configure access to EC2 instances.
create-sentinel-image
Creates an AMI image for the sentinel instance. The instance will be
provisioned with its own version of veraison
script which can be found
here. The sentinel will be used to mediate access to
the RDS instance, which will not be directly accessible outside the VPC.
create-rds-stack
This creates the RDS and sentinel instances via a CloudFormation stack.
update-security-groups
This updates the sentinel instance's security group with your current public IP
address, which will enable SSH access to the instance. If your current address
is covered by VERAISON_AWS_ADMIN_CIDR
, then this can be skipped.
If your ISP periodically changes your IP address, you may need to re-run this command in the future.
setup-rds
This initializes the RDS instance for use by Veraison services.
create-signing-key
Create a new signing key in JWK format and upload it to AWS Secrets Manager.
create-services-image and create-keycloak-image
This creates AMI images that will be used by the various EC2 instances in the
deployment. Both of these need configuration for connecting to the RDS
instance, which is why the must be created after setup-rds
.
create-services-stack
Finally, this creates the load balancers, auto-scaling groups, etc to complete the deployment. This also creates CNAME records for subdomains under the Route 53 domain associated with the deployment.
Teardown
Teardown, like bring up, invokes a number of veraison
subcommands:
veraison delete-stack services
veraison delete-stack rds
veraison delete-stack vpc
veraison delete-image keycloak
veraison delete-image services
veraison delete-image sentinel
veraison delete-signing-key
veraison delete-key-pair
veraison delete-deb
This is more-or-less a reverse of what was done during bring up and should be self-explanatory.
Managing the deployment
In addition to containing the commands used during deployment bring up and
teardown, veraison
script also acts as a CLI front-end for the deployment.
veraison status
This shows a brief overview of the current state of the deployment -- which images have been created, which stacks have been deployed, and the currently running instances.
veraison cache
This dumps the local cache associated with the deployment. This includes the
settings configured earlier using veraison configure
, as well as various
outputs from bring up stages. Notably this contains keycloak_admin_password
,
which will allow you to log into the Keycloak web interface.
veraison stores
This shows the contents of the K-V stores used by the services. This includes endorsements and trust anchors provisioned via the provisioning API, and policies uploaded via the management API.
veraison clear-store
This will empty the stores of all existing values. This can be useful during testing.
veraison shell
This opens an interactive shell on the sentinel instance. This can be used to examine and debug the internal state of the deployment (aside from the API endpoints, the sentinel is the only thing accessible outside the VPC).
veraison dbshell
This opens an interactive Postgres shell on the RDS instance (via the
sentinel). The instance is used both for the Veraison services' K-Stores
(veraison
database -- should be the default), and for Keycloak (keycloak
database).
veraison follow [-s FROM] SERVICE_NAME
This outputs the last 10 minutes (by default) of logs from the specified service and continues to print out new log entries in (near) real-time until stopped with CTRL-C. How far back event history is printed can be changed via -s/--start option which can take either an absolute date (in one of the common formats) or relative time. E.g.
# follow VTS service going back 2 hours
veraison follow -s 2h vts
# follow verification events since yesterday
veraison follow --start yesterday verification
# follow provisioning events since 20th July 2024 (note the US date ordering)
veraison follow --start 7/20/2024 provisioning
veraison follow --start 2024-07-20 provisioning
# follow VTS service going back 3 days
veraison follow --start "3 days ago" provisioning
The maximum unit of time for relative time is weeks (e.g. 2w
or 2 weeks
). If
you want a longer time period you have to convert it into days/weeks, or specify
and absolute starting date.
veraison get-logs [-S SERVICE] [-s FROM] [-e TO] OUTPUT_DIRECTORY
This retrieves logs from CloudWatch and writes them to files in the specified
output directory. The files are called {service}-stdout.log
. If the output
directory doesn't exist, it will be created (along with intermediate
directories, if necessary). It's possible to specify a service using -S
option, in which case only logs for the services will be obtained. The option
may be specified multiple times. It is possible to restrict the time period for
which the logs will be obtained using -s/--start
and -e/--end
options.
Parameters for these options should be in the same format as for --start
option for follow
command (see above). There is also a shorter alias logs
for
this command. E.g.
# Obtain logs for all services writing them into files in "veraison-logs"
# subdirectory under current directory (creating it if necessary).
veraison get-logs ./veraison-logs
# Obtain VTS log for today writing it into ./veraison-logs/vts-stdout.log
veraison get-logs -S vts -s today veraison-logs
# Obtain logs for provisioning and verification services spanning time
# period from 10th December 2024 until yesterday
veraison logs -S provisioning -S verification -s 2024-12-10 \
-e yesterday veraison-logs
As with follow
command, the maximum time unit is weeks.
veraison delete-logs
Completely delete logs from CloudWatch. This is mostly useful for debugging.
This command is also aliased as clear-logs
.
veraison restart-cwagent
Restarts CloudWatch agent running on service EC2 instances. This is necessary
if something happens to the log groups in CloudWatch -- the agent will not
upload events until restarted. (note: delete-logs
command does this
automatically, so there is normally no need to use this command unless you,
e.g., manually delete the log groups in AWS web console).