Deploy and Auto Scale Isolated Workloads Across Multiple Zones
Provision and autoscale VSI on VPC using Terraform scripts and explore autoscale scenarios like SSL termination and end-to-end encryption.
Join the DZone community and get the full member experience.Join For Free
With the Auto Scale for VPC, you can create an instance group to scale according to your requirements. Based on the target utilization metrics that you define, the instance group can dynamically add or remove instances to achieve your specified instance availability.
Let's start with a quick one, as an introduction to VPC.
What Is a VPC?
A virtual private cloud (VPC) is a public cloud offering that lets an enterprise establish its own private cloud-like computing environment on shared public cloud infrastructure. The following video gives more information on VPCs:
Auto-Scaling on VPC
With Auto Scale for VPC, you can improve performance and costs by dynamically creating virtual server instances (VSIs) to meet the demands of your environment. You set scaling policies that define your desired average utilization for metrics like CPU, memory, and network usage. You can create an instance group in your IBM Cloud VPC to auto-scale according to your requirements by using the IBM Cloud console. Based on the target utilization metrics that you define, the instance group can dynamically add or remove instances to achieve your specified instance availability.
What's the Outcome?
Following the instructions and executing the Terraform scripts, you will provide the following:
- A VPC
- Two subnets — one in each zone (zone 1 and zone 2) — Configure in main.tf file
- One VSI in subnet-zone-1 (to start with)
- Load balancer (backend pool and frontend listener)
- Instance group using an instance template
- Instance group manager with a scaling policy (CPU utilization) attached to the instance group
- IBM Cloud IAM API key (refer to the IAM documentation)
- SSH key (refer to the VPC SSH documentation)
- If you want to enable SSH offloading (termination) or end-to-end encryption, you need to create a Certificate manager service, order a certificate, and pass that to load balancer HTTPS listener. Follow the instructions here to learn the certificate ordering process.
- Clone the vpc-tutorials GitHub repositoryand move to the vpc-autoscale directory:
- Copy the Terraform variables template:
- Update the values in the terraform.tfvars file based on your requirement and save the file. To understand the variables, refer to the variables.tf file.
- Initialize the Terraform providers by running the following:
- Execute the Terraform plan:
- Apply the Terraform plan:
Note: The max_membership_count to scale is set to 5, the aggregation_window is set to 90 secs, and cooldown is set to 120 secs. You can change these values in the main.tf file. Refer to the Instance-group-manager Terraform provider documentation.
SSL Offloading (Termination)
For all incoming HTTPS connections, the load balancer service terminates the SSL connection and establishes a plain-text HTTP communication with the backend server. CPU-intensive SSL handshakes and encryption/decryption tasks are shifted away from the backend servers, allowing them to use all their CPU cycles for processing application traffic.
In this section, you will enable end-to-end encryption by creating a self-signed certificate in the VSI. You will use the SSL installation script - install-software-ssl.sh.
Run the following command to delete the resources you created. The action is irreversible:
With IBM Cloud Schematics, you can simplify the above Terraform experience. Schematics delivers Terraform-as-a-Service so that you can use a high-level scripting language to model the resources that you want in your IBM Cloud environment and enable Infrastructure as Code (IaC).
Refer to this post to understand how Schematics works with an example.
How about automatically assigning a floating IP to a newly created VSI by monitoring Activity Tracker events and using Cloud Functions to interact with the VPC API? Yes, you can achieve this by following the instructions in this post: "Extend VPC Resources with Cloud Functions, Activity Tracker with LogDNA, and Schematics."
Explore Other VPC Scenarios
- Securely access remote instances with a bastion host
- Private and public subnets in a Virtual Private Cloud
- Deploy isolated workloads across multiple locations and zones
- Use a VPC/VPN gateway for secure and private on-premises access to cloud resources
- Deploy CockroachDB in a Multi-Zoned Virtual Private Cloud with Encrypted Block Storage
- Migrate a Classic infrastructure instance to a VPC infrastructure instance
Questions and Feedback
If you have feedback, suggestions, or questions about this post, please reach out to me on Twitter @VidyasagarMSC or use the feedback button on the tutorial to report a problem with its content. You can also open issues.
The tutorials section has a feedback form on the side where you can comment on the content. If you have suggestions on the existing tutorials or ideas for future additions, please submit your feedback.
Opinions expressed by DZone contributors are their own.