-
Notifications
You must be signed in to change notification settings - Fork 53
Creating a New Environment Within a Resource Group
- A functional CDC superuser account, with Azure access.
- A fresh copy of your SU password, obtained at the beginning of your change window.
-
terraform
installed on your development environment. Installation instructions can be found at this link. - The Azure CLI installed on your development environment. Installation instructions can be found at this link.
- A repository branch on your local machine from which to work. Use a branch that is based on
main
, with no other commits or feature work.
This document assumes the use of a *nix-based system. Windows users may need to tweak command syntax to suit their needs. As an alternative, Windows users can also leverage the Windows Subsystem for Linux to run commands from a *nix environment within their system.
Each environment within SimpleReport has its own folder within the ops
subdirectory. These environments are not currently grouped by level; each one is unique. There are future plans to group these into environment level folders, at which time this document will be updated. (Note to self: create this)
At the time of writing, each environment is slightly different in its Terraform structure, with certain elements that are present or missing depending on environment purpose. There are future plans to refactor our Terraform to enforce standardization across environments, at which time this document will be updated; in the meantime, it is recommended that an environment from the same hierarchical level be used as a source for TF code.
As an example, if a new
dev
environment is to be created, you can source TF code fromdev2
,dev3
, ordev4
. Do not use something likeprod
ortest
, as these will produce unpredictable results.
Complete the following steps to finish Phase 1.
- Copy an entire environment folder from
ops
that you wish to use for a base. (As an example, if you wish to createdev5
, copydev
ordev2
.) - Paste this folder into
ops
, renaming it to the name of the new environment of your choosing. - Scan each
*.tf
file in the new environment folder, as well as the<env>/persistent
folder. Look for any non-parameterized instances of variable values,resource
names, ordata
names that use the source environment name. Change them accordingly.
NOTE: Pay special attention to any key vault values in your
vault
or_data
files. Non-parameterized values found in these files may correspond to dev/prod keys, and should NOT be changed, as they are shared across environments.
- Open an instance of your favorite terminal or console program.
- From the repository root, run
az login
. Your browser should automatically open and guide you through the authentication process. Use your SU credentials. (If you would rather use an incognito tab, or a browser other than your default to prevent account-crossing, runaz login --use-device-code
and follow the steps.) - Execute
cd ops/<env>/persistent
, where<env>
is the name of your new environment. - Set up Terraform's internals by running
terraform init
. - Run
terraform plan
. - If there are errors, inspect the output. You may need to rename resources or make changes to TF code in other folders, like
ops/services
. If you do, make a note of what you have changed; you will need to verify your changes against multiple environments later, to ensure your changes do not produce deleterious effects on other environments. Re-runterraform plan
, and repeat this step as necessary. Proceed when no further errors are produced. - Inspect the results. Satisfactory output will indicate
Plan: <nn> to add, 0 to change, 0 to destroy
. The number of resources to be added varies based on environment level. If any resources are reporting as targets for change or destruction, STOP. Verify your code; ensure that any changes made are intentional. - Execute
cd ..
to return to the<env>
folder. -
- Set up Terraform's internals by running
terraform init
.
- Set up Terraform's internals by running
- Run
terraform plan
. - If there are errors, inspect the output. You may need to rename resources or make changes to TF code in other folders, like
ops/services
. If you do, make a note of what you have changed; you will need to verify your changes against multiple environments later, to ensure your changes do not produce deleterious effects on other environments. Re-runterraform plan
, and repeat this step as necessary. Proceed when no further errors are produced. - Inspect the results. Satisfactory output will indicate
Plan: <nn> to add, 0 to change, 0 to destroy
. The number of resources to be added varies based on environment level. If any resources are reporting as targets for change or destruction, STOP. Verify your code; ensure that any changes made are intentional.
Once your TF changes are complete, it is highly recommended to repeat steps 3-12 on another environment from a different hierarchical level in the ops
folder. Make sure that your changes haven't caused any unexpected planned actions on existing infrastructure.
As a guide, compare the results of your
terraform plan
to the same environment by using the Ad-Hoc Terraform Plan GitHub Action, making sure you use the code frommain
. Your local results should be identical to those that the action outputs. (Remember: the action outputs plan results from both the<env>
folder AND the<env>/persistent
folder.
Once your results are satisfactory, commit your changes to your local branch.
- Copy a
deploy<Env>.yml
file from.github/workflows
that you wish to use for a base. (As an example, if you wish to createdev5
, copydeployDev.yml
ordeployDev2.yml
.) - Paste this file into
.github/workflows
, renaming it to incorporate the name of the new environment of your choosing. - Scan the file for any non-parameterized instances the source environment name, changing them as necessary.
- Update
.github/workflows/terraform_checks.yml
by adding<env>
and<env>/persistent
to theTERRAFORM_DIRS
environment variable within thecheck-terraform-validity
process. - Commit your changes.
- From the repository root, execute
cd ops/<env>/persistent
, where<env>
is the name of your new environment. - Set up Terraform's internals by running
terraform init
. - Run
terraform apply
. - Terraform will automatically generate a plan. Inspect the results, and confirm they match the result of your
terraform plan
run in Phase 1. If they do, typeyes
when prompted. - Wait for the
apply
process to complete. This may take up to 10 minutes.
NOTE: You may see an error like the following:
Error: waiting for creation of the Postgresql Flexible Server "simple-report-dev4-flexible-db" (Resource Group "prime-simple-report-dev"): Code="VirtualNetworkNotLinkedToPrivateDnsZone" Message="The virtual network simple-report-dev4-network is not linked to private DNS zone privatelink.dev4.postgres.database.azure.com. Please link the virtual network to zone and retry."
This is usually a timing issue. To resolve, simply wait 5 minutes, and repeat steps 2-5.
If the above error persists, or if additional errors result, modify your Terraform code accordingly, perform the terraform plan
process again, and attempt another terraform apply
.
- Log into the Azure console.
- Navigate to the
simple-report-global
key vault. - Copy the value of the following secret:
simple-report-<source_env>-db-jdbc
, where<source_env>
represents the environment on which you based your Terraform changes in Phase 1. - Create a new secret in the key vault with the following name:
simple-report-<env>-db-jdbc
, whereenv
represents the name of the new environment you have created. The value should be the secret value you copied from the previous step. Save your changes when finished. - Copy the value of the following secret:
simple-report-<source_env>-metabase-uri
, where<source_env>
represents the environment on which you based your Terraform changes in Phase 1. - Create a new secret in the key vault with the following name:
simple-report-<env>-metabase-uri
, whereenv
represents the name of the new environment you have created. The value should be the secret value you copied from the previous step. Save your changes when finished.
- From the repository root, execute
cd ops/<env>
, where<env>
is the name of your new environment. - Set up Terraform's internals by running
terraform init
. - Run
terraform apply
. - Terraform will automatically generate a plan. Inspect the results, and confirm they match the result of your
terraform plan
run in Phase 1. If they do, typeyes
when prompted. - Wait for the
apply
process to complete. This may take up to 10 minutes.
You will encounter the following error during this process (with environment names that match those of your new environment):
Error: creating/updating Monitor Smart Detector Alert Rule: (Name "dev4-failure-anomalies" / Resource Group "prime-simple-report-dev"): alertsmanagement.SmartDetectorAlertRulesClient#CreateOrUpdate: Failure responding to request: StatusCode=409 -- Original Error: autorest/azure: Service returned an error. Status=409 Code="ScopeInUse" Message="A FailureAnomaliesDetector alert rule with id '/subscriptions/<GUID>/resourcegroups/prime-simple-report-dev/providers/microsoft.alertsmanagement/smartdetectoralertrules/failure anomalies - prime-simple-report-dev4-insights' is already defined on the resource '/subscriptions/<GUID>/resourcegroups/prime-simple-report-dev/providers/microsoft.insights/components/prime-simple-report-dev4-insights'. Only a single FailureAnomaliesDetector alert rule can be define for the same resource."
A FailureAnomaliesDetector is automatically created with the App Gateway and Application Insights objects. A future TF change will take care of this manual step. In the meantime, to address this error, follow these steps:
- Log into the Azure console.
- Navigate to the
prime-simple-report-<env>-insights
resource, where<env>
is the name of your new environment. - Click "Alerts" in the left-side menu pane.
- At the top of the new pane, click "Rules".
- In the list presented, delete the existing Smart Detector (FailureAnomaliesDetector) object.
- Re-run the above
terraform apply
process.
When the second terraform apply
process runs, you will be met with the following error (with environment names that match those of your new environment):
Error: retrieving Custom Hostname Binding "api-dev4.simplereport.gov" (App Service "simple-report-api-dev4" / Resource Group "prime-simple-report-dev"): web.AppsClient#GetHostNameBinding: Failure responding to request: StatusCode=404 -- Original Error: autorest/azure: Service returned an error. Status=404 Code="NotFound" Message="Cannot find HostName with name api-dev4.simplereport.gov." Details=[{"Message":"Cannot find HostName with name api-dev4.simplereport.gov."},{"Code":"NotFound"},{"ErrorEntity":{"Code":"NotFound","ExtendedCode":"51004","Message":"Cannot find HostName with name api-dev4.simplereport.gov.","MessageTemplate":"Cannot find {0} with name {1}.","Parameters":["HostName","api-dev4.simplereport.gov"]}}]
To address this error, complete the following steps:
- Complete Phase 6 of this document.
- Re-run the above
terraform apply
process.
If the above errors persist, or if additional errors result, modify your Terraform code accordingly, perform the terraform plan
process again, and attempt another terraform apply
.
- Before committing your final TF code, run
terraform fmt -recursive
from theops
directory. This will catch any formatting mistakes before PR creation. - Update
README.md
with information about the new environment. - Within GitHub, update the Wiki page "Cloud Environments" with information about the new environment.
- Push your completed branch to the
prime-simplereport
repository. - Create a new PR for your changes. It is highly recommended to create this PR as a draft, to allow the suite of automated checks to run.
- If checks fail, push required changes. Pay special attention to the Terraform Checks workflow that is run; errors with
terraform fmt
orterraform validate
will appear here. - Closely inspect the results of the
terraform plan
check run as part of the Terraform Checks workflow. This check runs againstprod
, and we do NOT want changes made to production unless they are intentional. If something unexpected has changed here, STOP, verify your code, and see what has caused the change. (Please don't be afraid to ask for a second set of eyes from a teammate; we're all here to help!) - Once all checks are passing, mark your PR as "Ready for Review", and add reviewers.
The CDC controls DNS entries for all SimpleReport environments. Modifying these values requires intervention from a CDC representative.
To complete this process, reach out to SimpleReport's DevSecOps lead for assistance. (Currently, that individual is Rin Concordia.)
Now that all infrastructure is in place, SimpleReport can be properly deployed. The process differs based on whether this environment is part of the CI/CD pipeline.
For environments part of the pipeline (expected to update with each push to main
), no further action is necessary. The app will auto-deploy on the next merge to main
.
To deploy non-pipelined environments, execute the Deploy GitHub Action you created in Phase 2.
- Getting Started
- [Setup] Docker and docker compose development
- [Setup] IntelliJ run configurations
- [Setup] Running DB outside of Docker (optional)
- [Setup] Running nginx locally (optional)
- [Setup] Running outside of docker
- Accessing and testing weird parts of the app on local dev
- Accessing patient experience in local dev
- API Testing with Insomnia
- Cypress
- How to run e2e locally for development
- E2E tests
- Database maintenance
- MailHog
- Running tests
- SendGrid
- Setting up okta
- Sonar
- Storybook and Chromatic
- Twilio
- User roles
- Wiremock
- CSV Uploader
- Log local DB queries
- Code review and PR conventions
- SimpleReport Style Guide
- How to Review and Test Pull Requests for Dependabot
- How to Review and Test Pull Requests with Terraform Changes
- SimpleReport Deployment Process
- Adding a Developer
- Removing a developer
- Non-deterministic test tracker
- Alert Response - When You Know What is Wrong
- What to Do When You Have No Idea What is Wrong
- Main Branch Status
- Maintenance Mode
- Swapping Slots
- Monitoring
- Container Debugging
- Debugging the ReportStream Uploader
- Renew Azure Service Principal Credentials
- Releasing Changelog Locks
- Muting Alerts
- Architectural Decision Records
- Backend Stack Overview
- Frontend Overview
- Cloud Architecture
- Cloud Environments
- Database ERD
- External IDs
- GraphQL Flow
- Hibernate Lazy fetching and nested models
- Identity Verification (Experian)
- Spring Profile Management
- SR Result bulk uploader device validation logic
- Test Metadata and how we store it
- TestOrder vs TestEvent
- ReportStream Integration
- Feature Flag Setup
- FHIR Resources
- FHIR Conversions
- Okta E2E Integration
- Deploy Application Action
- Slack notifications for support escalations
- Creating a New Environment Within a Resource Group
- How to Add and Use Environment Variables in Azure
- Web Application Firewall (WAF) Troubleshooting and Maintenance
- How to Review and Test Pull Requests with Terraform Changes