Auto-Scaling Web Application with CI/CD Pipeline on AWS

Objective: Deploy a highly available, scalable, and secure web application on Amazon EC2 using Terraform, Ansible, and AWS DevOps tools. Step 1: Setting Up My AWS Environment First, I made sure I had the necessary tools installed on my system: sudo apt update && sudo apt install -y terraform ansible awscli Then, I configured AWS CLI with my credentials: aws configure Step 2: Writing Terraform Code to Provision AWS Infrastructure I created a project directory and initialized Terraform: mkdir ec2-project && cd ec2-project mkdir terraform && cd terraform terraform init Then, I wrote my Terraform configuration files: main.tf - Setting Up AWS VPC and Subnets provider "aws" { region = "us-east-1" } resource "aws_vpc" "main_vpc" { cidr_block = "10.0.0.0/16" tags = { Name = "MainVPC" } } resource "aws_subnet" "public_subnet" { vpc_id = aws_vpc.main_vpc.id cidr_block = "10.0.1.0/24" map_public_ip_on_launch = true availability_zone = "us-east-1a" tags = { Name = "PublicSubnet" } } resource "aws_internet_gateway" "gw" { vpc_id = aws_vpc.main_vpc.id tags = { Name = "MainIGW" } } resource "aws_route_table" "public_rt" { vpc_id = aws_vpc.main_vpc.id route { cidr_block = "0.0.0.0/0" gateway_id = aws_internet_gateway.gw.id } } resource "aws_route_table_association" "public_association" { subnet_id = aws_subnet.public_subnet.id route_table_id = aws_route_table.public_rt.id } security_groups.tf - Setting Up Security resource "aws_security_group" "web_sg" { vpc_id = aws_vpc.main_vpc.id ingress { from_port = 80 to_port = 80 protocol = "tcp" cidr_blocks = ["0.0.0.0/0"] } ingress { from_port = 22 to_port = 22 protocol = "tcp" cidr_blocks = ["0.0.0.0/0"] } egress { from_port = 0 to_port = 0 protocol = "-1" cidr_blocks = ["0.0.0.0/0"] } tags = { Name = "WebSecurityGroup" } } ec2.tf - Launching My EC2 Instance resource "aws_instance" "web_server" { ami = "ami-0c55b159cbfafe1f0" instance_type = "t2.micro" subnet_id = aws_subnet.public_subnet.id security_groups = [aws_security_group.web_sg.name] key_name = "ec2-key" user_data = file("install_apache.sh") tags = { Name = "WebServer" } } install_apache.sh - Automating Apache Installation #!/bin/bash sudo yum update -y sudo yum install -y httpd sudo systemctl start httpd sudo systemctl enable httpd echo "Welcome to My AWS EC2 Web App" | sudo tee /var/www/html/index.html Deploying with Terraform Once everything was set up, I ran: terraform apply -auto-approve This successfully launched my EC2 instance with Apache installed. Step 3: Configuring My EC2 Instance with Ansible After Terraform deployed my infrastructure, I configured the EC2 instance using Ansible. First, I created an Ansible inventory file with my EC2 public IP: [web_servers] ansible_user=ec2-user ansible_ssh_private_key_file=~/.ssh/id_rsa Then, I wrote an Ansible playbook (deploy.yml): - name: Configure Web Server hosts: web_servers become: yes tasks: - name: Install Apache yum: name: httpd state: present - name: Start Apache service: name: httpd state: started enabled: yes - name: Deploy Web Page copy: content: "Deployed via Ansible!" dest: /var/www/html/index.html I executed the playbook: ansible-playbook -i inventory.ini deploy.yml Apache was installed, and my webpage was deployed. Step 4: Setting Up a CI/CD Pipeline with AWS CodePipeline To automate deployments, I set up AWS CodePipeline with the following stages: Source Stage (AWS CodeCommit) I created a Git repository in AWS CodeCommit and pushed my project code. Build Stage (AWS CodeBuild) I created a buildspec.yml file: version: 0.2 phases: install: commands: - yum install -y httpd build: commands: - echo "Building the application..." post_build: commands: - echo "Build completed!" Deploy Stage (AWS CodeDeploy) I used AWS CodeDeploy to deploy new versions of my app. Step 5: Monitoring and Security I ensured high availability and security by: ✅ Enabling AWS CloudWatch for monitoring. ✅ Setting Up AWS CloudTrail to log API calls. ✅ Using IAM Policies to restrict access. Final Deliverables 1) Terraform Code to automate infrastructure deployment. 2) Ansible Playbook to configure and deploy the app. 3) CI/CD Pipeline for automated deployments. 4) GitHub Repository with Documentation. 4) Demo Video of the entire process.

Mar 30, 2025 - 09:21
 0
Auto-Scaling Web Application with CI/CD Pipeline on AWS

Objective:
Deploy a highly available, scalable, and secure web application on Amazon EC2 using Terraform, Ansible, and AWS DevOps tools.

Image description

Step 1: Setting Up My AWS Environment
First, I made sure I had the necessary tools installed on my system:

sudo apt update && sudo apt install -y terraform ansible awscli

Then, I configured AWS CLI with my credentials:

aws configure

Step 2: Writing Terraform Code to Provision AWS Infrastructure

I created a project directory and initialized Terraform:

mkdir ec2-project && cd ec2-project
mkdir terraform && cd terraform
terraform init

Then, I wrote my Terraform configuration files:

  • main.tf - Setting Up AWS VPC and Subnets
provider "aws" {
  region = "us-east-1"
}

resource "aws_vpc" "main_vpc" {
  cidr_block = "10.0.0.0/16"
  tags = { Name = "MainVPC" }
}

resource "aws_subnet" "public_subnet" {
  vpc_id                  = aws_vpc.main_vpc.id
  cidr_block              = "10.0.1.0/24"
  map_public_ip_on_launch = true
  availability_zone       = "us-east-1a"
  tags = { Name = "PublicSubnet" }
}

resource "aws_internet_gateway" "gw" {
  vpc_id = aws_vpc.main_vpc.id
  tags = { Name = "MainIGW" }
}

resource "aws_route_table" "public_rt" {
  vpc_id = aws_vpc.main_vpc.id
  route {
    cidr_block = "0.0.0.0/0"
    gateway_id = aws_internet_gateway.gw.id
  }
}

resource "aws_route_table_association" "public_association" {
  subnet_id      = aws_subnet.public_subnet.id
  route_table_id = aws_route_table.public_rt.id
}

  • security_groups.tf - Setting Up Security
resource "aws_security_group" "web_sg" {
  vpc_id = aws_vpc.main_vpc.id

  ingress {
    from_port   = 80
    to_port     = 80
    protocol    = "tcp"
    cidr_blocks = ["0.0.0.0/0"]
  }

  ingress {
    from_port   = 22
    to_port     = 22
    protocol    = "tcp"
    cidr_blocks = ["0.0.0.0/0"]
  }

  egress {
    from_port   = 0
    to_port     = 0
    protocol    = "-1"
    cidr_blocks = ["0.0.0.0/0"]
  }

  tags = { Name = "WebSecurityGroup" }
}

  • ec2.tf - Launching My EC2 Instance
resource "aws_instance" "web_server" {
  ami             = "ami-0c55b159cbfafe1f0"
  instance_type   = "t2.micro"
  subnet_id       = aws_subnet.public_subnet.id
  security_groups = [aws_security_group.web_sg.name]
  key_name        = "ec2-key"

  user_data = file("install_apache.sh")

  tags = { Name = "WebServer" }
}

  • install_apache.sh - Automating Apache Installation
#!/bin/bash
sudo yum update -y
sudo yum install -y httpd
sudo systemctl start httpd
sudo systemctl enable httpd
echo "

Welcome to My AWS EC2 Web App

" | sudo tee /var/www/html/index.html
  • Deploying with Terraform Once everything was set up, I ran:
terraform apply -auto-approve

This successfully launched my EC2 instance with Apache installed.

Step 3: Configuring My EC2 Instance with Ansible
After Terraform deployed my infrastructure, I configured the EC2 instance using Ansible.

First, I created an Ansible inventory file with my EC2 public IP:

[web_servers]
 ansible_user=ec2-user ansible_ssh_private_key_file=~/.ssh/id_rsa

Then, I wrote an Ansible playbook (deploy.yml):

- name: Configure Web Server
  hosts: web_servers
  become: yes
  tasks:
    - name: Install Apache
      yum:
        name: httpd
        state: present

    - name: Start Apache
      service:
        name: httpd
        state: started
        enabled: yes

    - name: Deploy Web Page
      copy:
        content: "

Deployed via Ansible!

" dest: /var/www/html/index.html

I executed the playbook:

ansible-playbook -i inventory.ini deploy.yml

Apache was installed, and my webpage was deployed.

Step 4: Setting Up a CI/CD Pipeline with AWS CodePipeline
To automate deployments, I set up AWS CodePipeline with the following stages:

  • Source Stage (AWS CodeCommit) I created a Git repository in AWS CodeCommit and pushed my project code.
  • Build Stage (AWS CodeBuild) I created a buildspec.yml file:
version: 0.2
phases:
  install:
    commands:
      - yum install -y httpd
  build:
    commands:
      - echo "Building the application..."
  post_build:
    commands:
      - echo "Build completed!"

  • Deploy Stage (AWS CodeDeploy) I used AWS CodeDeploy to deploy new versions of my app.

Step 5: Monitoring and Security
I ensured high availability and security by:
✅ Enabling AWS CloudWatch for monitoring.
✅ Setting Up AWS CloudTrail to log API calls.
✅ Using IAM Policies to restrict access.

Final Deliverables

1) Terraform Code to automate infrastructure deployment.
2) Ansible Playbook to configure and deploy the app.
3) CI/CD Pipeline for automated deployments.
4) GitHub Repository with Documentation.
4) Demo Video of the entire process.