AWS ECS support changes from Harness FirstGen to NextGen
Harness NextGen has revamped its AWS ECS support from its FirstGen implementation. This includes how you configure Harness and ECS services and perform rolling, canary, and blue green deployments.
For users coming from Harness FirstGen, this is a significant change and requires time to upgrade previous pipelines.
This topic describes the changes and provides some best practices to help you migrate from FirstGen or create new ECS deployments in Harness.
ECS delegates
Harness FirstGen users who used the FirstGen ECS delegate can now use a Kubernetes, Helm, or Docker delegate. To continue using an ECS-based delegate in NextGen,go to Deploy a Docker delegate to Amazon ECS or AWS Fargate.
Get started with ECS in NextGen
If you're new to Harness ECS deployments, the ECS deployment tutorial shows you how to deploy a publicly available Docker image to your ECS cluster using a rolling deployment strategy.
ECS basics
Official AWS ECS docs explain ECS concepts in detail, but let's review a few important points:
-
An ECS Task is the smallest deployable entity in ECS.
- A Task Definition is the configuration for a task. It contains task information such as the container definition, image, etc.
-
An ECS service is an entity that manages a group of the same tasks.
- An ECS service generally contains information about load balancing, task count, task placement strategies across availability zones, etc.
-
ECS deeply integrates with many other AWS native services such as AWS ECR, App Mesh, Cloud Formation, etc.
Summary of ECS changes from Harness FirstGen to NextGen
Please review the following changes to how Harness uses ECS in Harness FirstGen and NextGen.
Removed ECS steps and workflow types in ECS NextGen
The following FirstGen ECS steps and workflow types were removed from NextGen:
- ECS Service Setup step
- Upgrade Containers step
- ECS Daemon Service Setup step
- ECS Steady State Check step
- Basic ECS Workflow type
New deployment types introduced in ECS NextGen
The following deployment type changes have been implemented for Harness ECS deployments:
- Added support for rolling deployment.
- Revamped the canary deployment behavior.
For details about the new deployment types, go to the ECS deployment tutorial.
ECS Run Task updated in ECS NextGen
A new ECS Run Task Request Definition setting was introduced in the ECS Run Task Step.
For details about this new step, go to the ECS deployment tutorial.
Infrastructure definitions
Harness has made infrastructure definitions a lighter configuration you can reuse for other ECS services.
The ECS infrastructure definition no longer has ECS service-specific properties like Networking
, ExecutionRoleARN
, and AWSVPC
. These have been moved to the ECS service definition.
ECS changes in detail
Please review the following changes in Harness entities and ECS files.
Harness ECS service
The Harness ECS service now has more parameters in the Task Definition and service definition settings.
ECS Scaling Policies have moved to the ECS service from the ECS service Setup step and are now configurable as YAML or JSON files in the service.
Scalable Targets have moved from the ECS service Setup step and are now configurable as YAML or JSON param files in the Harness service.
The AWS VPC, Security Group, Subnets, and Execution Role ARN have moved out of the Harness infrastructure definition and are now part of the Harness service definition configuration.
The service definition requires more configuration:
serviceName
loadbaBancer
propertiesnetworkConfiguration
desiredCount
You can manipulate the deployment behavior via the new deploymentConfiguration
properties maximumPercent
and minimumHealthyPercent
. See DeploymentConfiguration from AWS.
ECS task definition support in NextGen
The following samples demonstrate the ECS Task Definition parameters supported in NextGen.
Sample task definition and supported parameters
Here is a YAML example highlighting the changes. Harness supports standard AWS ECS YAML and JSON.
ipcMode:
executionRoleArn: <ecsInstanceRole Role ARN>
containerDefinitions:
- dnsSearchDomains:
environmentFiles:
entryPoint:
portMappings:
- hostPort: 80
protocol: tcp
containerPort: 80
command:
linuxParameters:
cpu: 0
environment: []
resourceRequirements:
ulimits:
dnsServers:
mountPoints: []
workingDirectory:
secrets:
dockerSecurityOptions:
memory:
memoryReservation: 128
volumesFrom: []
stopTimeout:
image: <+artifact.image>
startTimeout:
firelensConfiguration:
dependsOn:
disableNetworking:
interactive:
healthCheck:
essential: true
links:
hostname:
extraHosts:
pseudoTerminal:
user:
readonlyRootFilesystem:
dockerLabels:
systemControls:
privileged:
## ECS NextGen Update
## This is the ECS Task Definition name. Harness won't append anything to it during deployment
name: nginx
placementConstraints: []
memory: '512'
## ECS NextGen Update
## The taskRoleARN property needs to be provided as this is the ECS Instance Role ARN
taskRoleArn: <ecsInstanceRole Role ARN>
family: sainath-fargate
pidMode:
requiresCompatibilities:
- FARGATE
networkMode: awsvpc
runtimePlatform:
cpu: '256'
inferenceAccelerators:
proxyConfiguration:
volumes: []
Sample task definition and supported parameters
Here is a JSON example highlighting the changes. Harness supports standard AWS ECS YAML and JSON.
{
"ipcMode": null,
"executionRoleArn": "<ecsInstanceRole Role ARN>",
"containerDefinitions": [
{
"dnsSearchDomains": null,
"environmentFiles": null,
"entryPoint": null,
"portMappings": [
{
"hostPort": 80,
"protocol": "tcp",
"containerPort": 80
}
],
"command": null,
"linuxParameters": null,
"cpu": 0,
"environment": [],
"resourceRequirements": null,
"ulimits": null,
"dnsServers": null,
"mountPoints": [],
"workingDirectory": null,
"secrets": null,
"dockerSecurityOptions": null,
"memory": null,
"memoryReservation": 128,
"volumesFrom": [],
"stopTimeout": null,
"image": "<+artifact.image>",
"startTimeout": null,
"firelensConfiguration": null,
"dependsOn": null,
"disableNetworking": null,
"interactive": null,
"healthCheck": null,
"essential": true,
"links": null,
"hostname": null,
"extraHosts": null,
"pseudoTerminal": null,
"user": null,
"readonlyRootFilesystem": null,
"dockerLabels": null,
"systemControls": null,
"privileged": null,
"name": "nginx"
}
],
"placementConstraints": [],
"memory": "512",
"taskRoleArn": "<ecsInstanceRole Role ARN>",
"family": "fargate-task-definition",
"pidMode": null,
"requiresCompatibilities": [
"FARGATE"
],
"networkMode": "awsvpc",
"runtimePlatform": null,
"cpu": "256",
"inferenceAccelerators": null,
"proxyConfiguration": null,
"volumes": []
}
ECS NextGen service definition support in NextGen
The following samples demonstrate the ECS service definition parameters supported in NextGen.
Sample service definition and supported parameters
Here is a YAML example highlighting the changes. Harness supports standard AWS ECS YAML and JSON.
launchType: FARGATE
## ECS NextGen update
## The service name, Desired Count, and network configuration needs to be defined in the service definition now
serviceName: myapp
desiredCount: 2
networkConfiguration:
awsvpcConfiguration:
securityGroups:
- <Security Group Id>
subnets:
- <Subnet Id>
assignPublicIp: ENABLED
## ECS NextGen update
## We can define the deployment behavior properties in the service definition and Harness will deploy with the defined configuration
deploymentConfiguration:
maximumPercent: 200
minimumHealthyPercent: 100
loadBalancers:
- targetGroupArn: <+targetGroupArn>
containerName: nginx
containerPort: 80
Sample service definition and supported parameters
Here is a JSON example highlighting the changes. Harness supports standard AWS ECS YAML and JSON.
{
"launchType": "FARGATE",
"serviceName": "myapp",
"desiredCount": 1,
"networkConfiguration": {
"awsvpcConfiguration": {
"securityGroups": [
"<Security Group Id>"
],
"subnets": [
"<Subnet Id>"
],
"assignPublicIp": "ENABLED"
}
},
"deploymentConfiguration": {
"maximumPercent": 100,
"minimumHealthyPercent": 0
}
}
ECS run task request definition support in NextGen
Supported schema details can be found in RunTask from AWS.
Infrastructure definitions
The following changes were made to infrastructure definitions in NextGen:
The ECS infrastructure definitions in NextGen do not have AWS VPC, Security Group, or Network Policies. This configuration was moved to the Harness ECS service.
The ECS cluster can be a Harness Runtime Input. This makes the infrastructure definition reusable for other clusters in a given environment.
Infrastructure definition YAML has changed for ECS. Below is a YAML example, although both YAML and JSON are supported.
infrastructureDefinition:
name: ecs-dev-cluster
identifier: ecsDevCluster
description: "Sandbox Development Cluster"
tags: {}
orgIdentifier: default
projectIdentifier: cdProductManagement
environmentRef: devEcs
deploymentType: ECS
type: ECS
spec:
connectorRef: account.awsEcs
region: us-east-1
cluster: staging
allowSimultaneousDeployments: false
Best practices
Please review the following best practices for using ECS in Harness NextGen.
Templates and ECS deployments
You can template your pipelines in Harness NextGen.
Harness templates create reusable logic for Harness entities like steps, stages, and pipelines.
You can link templates in your pipelines or share them with your teams for improved efficiency.
If you want to use this feature when you create a new entity like a step, click Start with Template
. For more information, go to Templates Overview.
ECS service configuration
Although you can use the Harness File Store for local file storage in your account, for production we recommend storing ECS manifests in remote stores like Github, Bitbucket, AWS S3, etc. Remote stores support version control on files for tracking and reverting changes.
Harness recommends using Harness service variables to template ECS service parameters. For example, you can refer to service variables in your manifests using variable expressions such as <+serviceVariables.serviceName>
. For more information, go to Use Harness expressions.
ECS environment configuration
If Harness service Configuration Parameters need to be overridden based on Infrastructure, Harness recommends using Harness service variables and overriding them at the environment level.
For example, if the AWS Security Group in the ECS service definition needs to be overridden for a Harness environment, we recommend creating a service variable securityGroup
in the Harness service and using it in the ECS service definition Manifest as <+serviceVariables.securityGroup>
.
The variable securityGroup
value can be overridden at the environment level. For more information, go to Services and environments overview.
Rolling deployments
To achieve phased rollout of ECS deployments, we recommend using the deploymentConfiguration
field in the ECS service definition.
For example:
deploymentConfiguration:
maximumPercent: 100
minimumHealthyPercent: 80
To understand how this configuration works, go to Service definition parameters from AWS.
Blue Green deployments
Harness recommends using an Approval step between the ECS Blue Green Create Service and ECS Blue Green Swap Target Groups steps. Approval steps can verify new service deployment health before shifting traffic from the old service to the new service.
For critical services with high availability requirements, Harness recommends enabling the Do not does not downsize the old service option. This method can help in faster rollbacks as the rollback process only switches traffic at the load balancer.