mirror of https://github.com/hashicorp/consul
52 lines
3.1 KiB
Plaintext
52 lines
3.1 KiB
Plaintext
|
---
|
||
|
layout: docs
|
||
|
page_title: Technical specifications for Consul on AWS Elastic Container Service (ECS)
|
||
|
description: >-
|
||
|
Consul has requirements to install and run on Amazon Web Services ECS. Learn about Consul's requirements for Fargate and EC2, including network mode and subnet information, as well as server, routing, and ACL controller considerations.
|
||
|
---
|
||
|
|
||
|
# Technical specifications for Consul on ECS
|
||
|
|
||
|
This topic describes the supported runtimes and environments for using Consul service mesh for your ECS workloads.
|
||
|
|
||
|
For requirements associated with using the Terraform `mesh-task` module to deploy Consul service mesh, refer [Deploy Consul with the Terraform module](/consul/docs/ecs/deploy/terraform). For requirements associated with manually deploying Consul service mesh to your ECS cluster, refer [Deploy Consul manually](/consul/docs/ecs/deploy/manual).
|
||
|
|
||
|
## Supported environments and runtimes
|
||
|
|
||
|
Consul on ECS supports the following environments and runtimes:
|
||
|
|
||
|
- **Launch Types**: Fargate and EC2
|
||
|
- **Network Modes**: `awsvpc`
|
||
|
- **Subnets**: Private and public subnets. Tasks must have network access to Amazon ECR or other public container registries to pull images.
|
||
|
- **Consul servers**: You can use your own Consul servers running on virtual machines or [use HCP Consul to host the servers for you](/hcp/docs/consul/hcp-managed).
|
||
|
- **ECS controller**: The ECS controller assists with reconciling state back to Consul and facilitates Consul security features.
|
||
|
- **Admin partitions**: <EnterpriseAlert inline/> Enable ACLs and configure the ECS controller to use admin partitions. You must deploy one controller for each admin partition.
|
||
|
- **Namespaces**: <EnterpriseAlert inline/> Enable ACLs and configure the ECS controller to use namespaces.
|
||
|
- **Dataplane containers**: To manage proxies using Consul dataplane, you must use the Terraform `mesh-task` module to install Consul service mesh.
|
||
|
|
||
|
## Resource usage
|
||
|
|
||
|
We used the following procedure to measure resource usage:
|
||
|
|
||
|
- Executed performance tests while deploying clusters of various sizes. We
|
||
|
ensured that deployment conditions stressed Consul on ESC components.
|
||
|
- After each performance test session, we recorded resource usage for each
|
||
|
component to determine worst-case scenario resource usage in a production
|
||
|
environment.
|
||
|
- We used Fargate's minimum allowed CPU (256 shares) and memory settings (512
|
||
|
MB) on ECS during performance testing to demonstrate that Consul on ECS along
|
||
|
with application containers can run on the smallest ECS tasks.
|
||
|
|
||
|
The following table describes the maximum resource usage we observed for each container under these testing conditions:
|
||
|
|
||
|
| Container | CPU | Memory |
|
||
|
| -------------- | --- | ------ |
|
||
|
| ECS controller | 5% | 43 MB |
|
||
|
| Control plane | 6% | 35 MB |
|
||
|
| Dataplane | 10% | 87 MB |
|
||
|
|
||
|
The containers added by Consul on ECS consume resources well below the minimum CPU and
|
||
|
memory limits for an ECS task. Use the `memory` and `cpu` settings for the task definition
|
||
|
if additional resources are necessary for your application task.
|
||
|
|
||
|
Refer to [Architecture](/consul/docs/ecs/architecture) for details about each component.
|