Deploying OpenIAM with Terraform

This guide describes how to deploy OpenIAM with Helm and Terraform.

Prerequisites

  1. Install Terraform. If it is not already installed (visit terraform.io for other distributions).

  2. Modify terraform.tfvars. Set the value of the ‘app_name’ variable IN terraform.tfvars to be the same as the APP_NAMEvariable inenv.sh`.

Setting common variables in terraform.tfvars

A description of common variables, not specific to any cloud provider, are given in the table below.

Variable NameRequiredDescription
app_nameYThis MUST be equal to the APP_NAME variable in env.sh.
helm_versionYYour helm version. Should be equal to the output of `helm version -c --short
app_nameYA unique identifier of your application.
replica_count_mapYThis is a map that determines how many replicas and which application gets them. None of the values should be greater than replica_count, or the total number of available nodes.
database.flywayBaselineVersionYFlyway baseline version. Set this to another value if needed.
database.flywayCommandYFlyway command to run. Possible options are repair or migrate.
database.typeYThis is the type of database that you are using. Possible options are MariaDB, Postgres, Oracle, or MSSQL.
database.hibernateY (when using Oracle or MSSQL)
N otherwise
Required for Oracle and MSSQL Databases. If not using one of the specified DBs, please, ignore a variable.
The complete list of docs can be found here.
Example values:
  • org.hibernate.dialect.Oracle10gDialect (the most common value for Oracle).
  • org.hibernate.dialect.SQLServer2008Dialect (the most common value for MSSQL).
In production environments, it is recommended that you specify the logging level as either WARN or ERROR. If you set the logging level as DEBUG, a lot of information is generated, which can lead to system overload and disk space issues.
database.root.passwordY - in AWS
Y - when using OpenIAM's MariaDB or Postgres images
N - otherwise
The root password to the database.
database.openiam.userYUsername to the OpenIAM database.
database.openiam.passwordYPassword to the OpenIAM database.
database.openiam.database_nameYOpenIAM database name.
database.openiam.schema_nameYOpenIAM schema name.
database.activiti.userYUsername to the Activiti database.
database.activiti.passwordYPassword to the Activiti database.
database.activiti.database_nameYActiviti database name.
database.activiti.schema_nameYActiviti schema name.
redis.passwordYRedis password. Can be left blank.
rabbitmq.userYRabbitMQ username.
rabbitmq.passwordYRabbitMQ password.
rabbitmq.cookie_nameYRabbitMQ cookie name.
rabbitmq.memory.memoryHighWatermarkYRabbitMQ memory high watermark.
rabbitmq.memory.requestYRabbitMQ requested pod memory.
rabbitmq.memory.limitYRabbitMQ limit pod memory.
rabbitmq.serviceTypeYService Type. Set to LoadBalancer to expose externally or set to ClusterIP to set internally.
rabbitmq.tls.enabledYIs TLS Communication Enabled for RabbitMQ? If yes, set to true. Otherwise, set to false.
rabbitmq.tls.failIfNoPeerCertYWhen set to true, TLS RabbitMQ connection will be rejected if client fails to provide a certificate.
rabbitmq.tls.sslOptionsVerifyYShould peer verification be enabled? Default is verify_peer.
rabbitmq.jksKeyPasswordYPassword used to generate JKS file, if RabbitMQ TLS Communication is enabled.
logging.level.bashYLogging level of bash scripts. TRACE and DEBUG are equivalent, and both force bash to run with the -x argument.
logging.level.appYFor production use please change log level to warn or error. Debug will generate a lot of information. possible values ERROR, WARN, INFO, DEBUG, or TRACE.
rproxy.https.disabledNrProxy by default uses https. You can set this variable to 1 to disable https.
rproxy.https.protocolNSSL Protocols options. If not set, the Apache 2.4 defaults will be used.
For example, you can disable everything except TLSv1.2 and allow only ciphers with high encryption like so:
protocol="-ALL -TLSv1 -TLSv1.1 +TLSv1.2"
cipherSuite="HIGH:!MEDIUM:!aNULL:!MD5:!RC4"
rproxy.https.cipherSuiteNSSL Ciphersuite options. If not set, Apache 2.4 defaults will be used. For example, to disable everything except TLSv1.2 and allow only ciphers with high encryption use:
protocol="-ALL -TLSv1 -TLSv1.1 +TLSv1.2"
cipherSuite="HIGH:!MEDIUM:!aNULL:!MD5:!RC4"
rproxy.https.hostNIf https uses non-default(443) port, specify full https host name for redirects from http to https. For example:
host=https://node1.openiam.com:8001
rproxy.defaultUriYFor example, if user hit http://demo.openiamdemo.com/ they will be redirected to http://demo.openiamdemo.com/selfservice/ by default, instead of showing Eror 404 (not found).
rproxy.disableConfigureNThis variable is set to 1 by default. It allows configuring content provider on first access. However, after that, it is possible to set it to 0 to disable configuring the content provider using the /webconsole/setup URL.
rproxy.verboseNrProxy debug options. Set any value to enable or keep empty to disable debug logging.
rproxy.debug.baseNDebug option. Enables baseline debugging.
rproxy.debug.esbNDebug option. Enables debugging on calls to the ESB.
rproxy.debug.authNDebug option. Enables debugging on authentication calls.
rproxy.apache.extraNFile that is included in httpd.conf in the rProxy Docker container. Set the value to extraApache.conf or leave empty.
rproxy.vhost.extraNFile that is included in httpd.conf in VirtualHost section in the rProxy Docker container. Set to extraVHost.conf or leave empty.
rproxy.log.error
rproxy.log.access
NBy default /dev/stderr is used for OPENIAM_RPROXY_ERROR_LOG and /dev/stdout - for OPENIAM_RPROXY_ACCESS_LOG. You can change that here, for example use /dev/stdout for both error log and access log or set access log to /dev/null and log only errors. If not set, defaults used.
openiam.rproxy.deflateNApache mod_deflate compression ratio. Values from 0 to 9. By default, is set to 6.
openiam.rproxy.cspNContent-Security-Policy headers enabled by default. To disable set to 0.
openiam.rproxy.corsNCross-Origin Resource Sharing headers enabled by default. To disable set to 0.
autodeploy.openiamNIf set to true, the OpenIAM stack will autodeploy on each terraform run.
autodeploy.rproxyNIf set to true, the OpenIAM reverse proxy stack will autodeploy on each terraform run.
autodeploy.vaultNIf set true, the OpenIAM vault stack will autodeploy on each terraform run.
vault.cert.countryNVault Certificate Country Code. Ignore this variable, if you are using a custom vault certificate, as specified in the parent file.
vault.cert.stateNVault Certificate Country State. Ignore this variable, if you are using a custom vault certificate, as specified in the parent file.
vault.cert.localityNVault Certificate Locality. Ignore this variable, if you are using a custom vault certificate, as specified in the parent file.
vault.cert.organizationNVault Certificate Organization. Ignore this variable, if you are using a custom vault certificate, as specified in the parent file.
vault.cert.organizationunitNVault Certificate Organiztion Unit. Ignore this variable, if you are using a custom vault certificate, as specified in the parent file.
vault.vaultKeyPasswordYPassword used to generate the vault .jks certificate. Ensure to use a strong password.
vault.secrets.javaKeystorePasswordYJava keystore password. Ensure to use a strong password.
vault.secrets.jks.passwordYOpenIAM JKS Encryption Password. Ensure to use a strong password.
vault.secrets.jks.keyPasswordYOpenIAM JKS Key Password. Ensure to use a strong password.
vault.secrets.jks.cookieKeyPasswordYOpenIAM Cookie Key Password. Ensure to use a strong password.
vault.secrets.jks.commonKeyPasswordYOpenIAM Common Key Password. Ensure to use a strong password.
vault.replicasYThe number of vault and consul replicas.
vault.consul.storageYThe amount of storage to provision to Consul PVC.

Setting the Cloud Provider

Open the main.tf file and change the following lines.

  1. If using Google Kubernetes Engine

    source = "./modules/core/gke"
  2. If using AWS

    source = "./modules/core/aws"
  3. If deploying in-house

    source = "./modules/core/helm"
  4. If using Azure

    source = "./modules/core/azure"

Set variables specific to your cloud provider

Each cloud provider has its own specific set of required and optional variables. Follow the guide lines below based on your cloud provider.

  1. Google Cloud Engine.
  2. AWS.
  3. Private Kubernetes Cluster.
  4. Azure.

Deploying

To deploy, run the following commands from the root folder of this project. It may take a while for all services to be created and deployed.

terraform init
terraform plan
terraform apply # enter 'yes' when asked to do so
Note: Our terraform scripts will change your ~/.kube/config file.
Also note that if you are using AWS, you may have to run the above command twice.

Destroying

Each cloud environment has its own peculiarities (i.e. bugs) when destroying infrastructure. Destroy your infrastructure based on your cloud provider:

  1. Google Cloud Engine.
  2. AWS.
  3. Private Kubernetes Cluster.
  4. Azure.

Managing state

Terraform stores state in local files, as indicated below.

terraform.tfstate*

In addition, running against AWS and GKE modifies your ~/.kube/config file.

When switching environments, you MUST save these files off, so that you can return to previous environments.

Migration guide

Versions pre-4.2.1 to 4.2.1

We've updated our vault datastore in v4.2.1. To migrate, follow the steps below.

  1. Deploy with the vault.migrate terraform variable set to true.
  2. Wait for all pods to come up.
  3. Redeploy with the vault.migrate terraform variable set to false.
  4. Wait for all pods to come up.