aws-constructs-factories
| Reference Documentation: | https://docs.aws.amazon.com/solutions/latest/constructs/ |
| Language | Package |
|---|---|
|
|
|
|
|
|
|
|
|
Overview
This AWS Solutions Construct exposes the same code used to create our underlying resources as factories, so clients can create individual resources that are well-architected. There are factories to create:
Launch an S3 Bucket - Create a well architected S3 bucket (e.g. - includes an access logging bucket)
Launch an Step Functions State Machine - - Create a well architected Step Functions state machine and log group (e.g. log group has /aws/vendedlogs/ name prefix to avoid resource policy issues)
Launch an SQS Queue - Create a well architected SQS queue (with configured Dead Letter Queue)
Launch a VPC - Create a well architected VPC
S3 Buckets
Create fully well-architected S3 buckets with as little as one function call. Here is a minimal deployable pattern definition:
S3BucketFactory Function Signature
s3BucketFactory(id: string, props: S3BucketFactoryProps): S3BucketFactoryResponse
S3BucketFactoryProps
| Name | Type | Description |
|---|---|---|
|
bucketProps? |
Optional user provided props to override the default props for the S3 Bucket. |
|
|
logS3AccessLogs? |
|
Whether to turn on Access Logging for the S3 bucket. Creates an S3 bucket with associated storage costs for the logs. Enabling Access Logging is a best practice. default - true |
|
loggingBucketProps? |
Optional user provided props to override the default props for the S3 Logging Bucket. |
S3BucketFactoryResponse
Default settings
Out of the box implementation of the Construct without any override will set the following defaults:
-
An S3 Content Bucket
-
AWS managed Server Side Encryption (AES256)
-
Lifecycle rule to transition objects to Glacier storage class in 90 days
-
Access Logging enabled
-
All Public access blocked
-
Versioning enabled
-
UpdateReplacePolicy is delete
-
Deletion policy is delete
-
Bucket policy requiring SecureTransport
-
-
An S3 Bucket for Access Logs
-
AWS managed Server Side Encryption (AES256)
-
All public access blocked
-
Versioning enabled
-
UpdateReplacePolicy is delete
-
Deletion policy is delete
-
Bucket policy requiring SecureTransport
-
Bucket policy granting PutObject privileges to the S3 logging service, from the content bucket in the content bucket account.
-
cfn_nag suppression of access logging finding (not logging access to the access log bucket)
-
Architecture
Step Functions State Machines
Create fully well-architected Step Functions state machine with log group. The log group name includes the vendedlogs prefix. Here but is unique to the stack, avoiding naming collions between instances. is a minimal deployable pattern definition:
stateMachineFactory Function Signature
stateMachineFactory(id: string, props: StateMachineFactoryProps): StateMachineFactoryResponse
StateMachineFactoryProps
| Name | Type | Description |
|---|---|---|
|
stateMachineProps |
The CDK properties that define the state machine. This property is required and must include a definitionBody or definition (definition is deprecated) |
|
|
logGroupProps |
An existing LogGroup to which the new state machine will write log entries. Default: LogGroup will use default AWS settings |
|
|
logGroup? |
An existing LogGroup to which the new state machine will write log entries. Default: none, the construct will create a new log group. |
|
|
createCloudWatchAlarms? |
boolean |
Whether to create recommended CloudWatch alarms for the State Machine. Default: the alarms are created |
|
cloudWatchAlarmsPrefix? |
string |
Creating multiple State Machines with one Factories construct will result in name collisions as the cloudwatch alarms originally had fixed resource ids. This value was added to avoid collisions while not making changes that would be destructive for existing stacks. Unless you are creating multiple State Machines using factories you can ignore it |
StateMachineFactoryResponse
| Name | Type | Description |
|---|---|---|
|
stateMachine |
The state machine created by the factory (the state machine role is available as a property on this resource |
|
|
logGroup? |
The log group that will receive log messages from the state machine. |
|
|
cloudwatchAlarms? |
The alarms created by the factory (ExecutionFailed, ExecutionThrottled, ExecutionAborted) |
Default settings
Out of the box implementation of the Construct without any override will set the following defaults:
-
An AWS Step Functions State Machine
-
Configured to log to the new log group at LogLevel.ERROR
-
-
Amazon CloudWatch Logs Log Group
-
Log name is prefaced with /aws/vendedlogs/ to avoid resource policy issues. The Log Group name is still created to be unique to the stack to avoid name collisions.
-
-
CloudWatch alarms for:
-
1 or more failed executions
-
1 or more executions being throttled
-
1 or more executions being aborted
-
Architecture
SQS Queues
Create SQS queues complete with DLQs and KMS CMKs with one function call. Here is a minimal deployable pattern definition:
SqsQueueFactory Function Signature
SqsQueueFactory(id: string, props: SqsQueueFactoryProps): SqsQueueFactoryResponse
SqsQueueFactoryProps
| Name | Type | Description |
|---|---|---|
|
queueProps? |
Optional user provided props to override the default props for the primary queue. |
|
|
enableEncryptionWithCustomerManagedKey? |
boolean |
If no key is provided, this flag determines whether the queue is encrypted with a new CMK or an AWS managed key. This flag is ignored if any of the following are defined: queueProps.encryptionMasterKey, encryptionKey or encryptionKeyProps. default - False if queueProps.encryptionMasterKey, encryptionKey, and encryptionKeyProps are all undefined. |
|
encryptionKey? |
An optional, imported encryption key to encrypt the SQS Queue with. Default - none |
|
|
encryptionKeyProps? |
Optional user provided properties to override the default properties for the KMS encryption key used to encrypt the SQS Queue with. @default - None |
|
|
deployDeadLetterQueue? |
boolean |
Whether to deploy a secondary queue to be used as a dead letter queue. |
|
deadLetterQueueProps? |
Optional user provided properties for the dead letter queue |
|
|
maxReceiveCount? |
number |
The number of times a message can be
unsuccessfully dequeued before being moved to the dead letter queue.
default -
code |
SqsQueueFactoryResponse
| Name | Type | Description |
|---|---|---|
|
queue |
The queue created by the factory. |
|
|
key |
The key used to encrypt the queue, if the queue was configured to use a CMK |
|
|
deadLetterQueue? |
The dead letter queue associated with the queue created by the factory |
Default settings
Out of the box implementation of the Construct without any override will set the following defaults:
-
An SQS queue
-
Encrypted by default with KMS managed key by default, can be KMS CMK if flag is set
-
Only queue owner can perform operations by default (your IAM policies can override)
-
Enforced encryption for data in transit
-
DLQ configured
-
-
An SQS dead letter queue
-
Receives messages not processable in maxReceiveCount attempts
-
Encrypted with KMS managed key
-
Enforced encryption for data in transit
-
Architecture
Virtual Private Cloud (VPC)
Creates a VPC with a flow log enabled and any requested VPC Endpoints configured.
VpcFactory Function Signature
VpcFactory(id: string, props: VpcFactoryProps): VpcFactoryResponse
VpcFactoryProps
This construct can either create subnets wholly based on the subnetTypes and subnetIPAddresses specified in attributes of the VpcFactoryProps object ddefined below; or wholly based on values passed in the VpcProps.subnetConfiguration property passed in the vpcProps property of VpcFactoryProps. It cannot combine and blend those two sources - so clients must provide subnet configuration information in one, and only one, of vpcProps.subnetConfiguration or the direct VpcFactoryProps attributes (vpcProps.subnetTypes, vpcProps.subnetIPAddresses). Other vpcProps attributes can be combined with a subnetConfiguration generated from the direct VpcFactoryProps attributes.
| Name | Type | Description |
|---|---|---|
|
vpcProps? |
ec2.VpcProps | any |
Optional user provided props to override the default props for the vpc. If this property defines subnetConfiguration, then subnetTypes and subnetIPAddrresses must be undefined. |
|
subnetTypes? |
Optional - Determines the various groups of subnets that will be created in the VPC. Multiple types of subnets can be specified. If this value is populated, then vpcProps.subnetConfiguration must be undefined. |
|
|
subnetIPAddresses? |
number |
Optional - the number of available IP addresses to required in each subnet. This value is used to calculate the cidrMask. If omitted, the cidrMask uses The CDK default of 17 (up to 32763 addresses). If this value is populated, then vpcProps.subnetConfiguration must be undefined. |
|
endPoints? |
ServiceEndpointTypes[] |
Optional - A list of all VPC service endpoints to launch in the VPC. They are specified using ServiceEndpointTypes, an enum defined in the Factories construct. @default - None |
VpcFactoryResponse
| Name | Type | Description |
|---|---|---|
|
vpc |
The vpc created by the factory. |
Default settings
The minimal implementation of the VPC requires the client to specify what types of subnets to launch. Any values not specified default to the default values implemented by the CDK L2 VPC construct:
-
A Virtual Private Cloud
-
All requested subnet layers. By default each subnet type is deployed to 2 Availability Zones. To use more AZs, create an enviroment for your stack (account and region) and set maxAZs on vpcProps. PUBLIC subnets will cause the construct to deploy an Internet Gateway. PRIVATE_WITH_EGRESS subnets will cause the construct to deploy a Nat Gateway in each AZ, as well as an Internet Gateway.
-
A configured VPC Flow log in CloudWatch Logs
-
All VPC Endpoints that are specified in endPoints. Interface endpoints are deployed with recommended Security Groups.
-
Architecture
Wnile the architecture deployed will vary depending on the Subnet configuration, the diagram below represents what is deployed if the client requests PUBLIC and PRIVATE_WITH_EGRESS subnet.
Github
Go to the Github repo