aws / aws-cdk

The AWS Cloud Development Kit is a framework for defining cloud infrastructure in code
https://aws.amazon.com/cdk
Apache License 2.0
11.61k stars 3.91k forks source link

[aws-ec2] Add way to filter VPC subnets by tags #10366

Open jpSimkins opened 4 years ago

jpSimkins commented 4 years ago

A way to filter VPC subnets by tags. This is important to allow proper setup of systems with the CDK that have not been built with the CDK. No all systems are built with the best practices as these tend the change as the years go on anyways. Moving from Terraform, the VPC's are not setup according to AWS standards (compared to the CDK) and this has some serious consequences as to "fix" the issue would require rebuilding system. That's not ideal or really necessary if we had some control over which subnets to use VIA a filter.

Use Case

I am running into issues with codepipeline due to VPC subnets not being able to be filtered by a tag. I am coming from Terraform, having built most of our VPCs with: https://registry.terraform.io/modules/terraform-aws-modules/vpc/aws/2.25.0

This creates the subnets like:

olyott-sand-db-us-east-1a
olyott-sand-db-us-east-1b
olyott-sand-db-us-east-1c
olyott-sand-elasticache-us-east-1a
olyott-sand-elasticache-us-east-1b
olyott-sand-elasticache-us-east-1c
olyott-sand-private-us-east-1a
olyott-sand-private-us-east-1b
olyott-sand-private-us-east-1c
olyott-sand-public-us-east-1a
olyott-sand-public-us-east-1b
olyott-sand-public-us-east-1c

The issues I am having is that the db and elasticache subnets seem to be set to private. This leaves me with issues in the pipeline as this will build and deploy ECS to the DB and the cache subnets, which will always fail. These subnets behave as isolated but they are not identified as isolated.

It's unrealistic to expect replacing all existing PROD VPCs with the new (proper) VPC using CDK. Especially since I cannot truly import like we can in Terraform. This leaves me in a state where I cannot use the CDK for codepipelines on any existing system. As the builds and deploys will work, at best. half the time.

What we need is a way to filter the subnets by the tag name, or any other tag for more control.

Proposed Solution

I am new to the CDK but perhaps a filterBy(tag, regexPattern|string) to the VPC for subnets. What I would like to do is use it like:

const _privateSubnets = vpc.privateSubnets.filterByTag('Name', /*(private)*/);

I tried to see if I could build this myself but I don't see the metric possible to filter by. Perhaps a CloudFormation limitation?


This is a :rocket: Feature Request

rix0rrr commented 4 years ago

If your issue is that types are incorrectly recognized, you can use the aws-cdk:subnet-type tag to correct those. See here:

https://docs.aws.amazon.com/cdk/api/latest/docs/aws-ec2-readme.html#importing-an-existing-vpc

A combination of aws-cdk:subnet-type and aws-cdk:subnet-name should allow you enough flexibility to achieve most VPC selections you need. If that's not sufficient for you, https://github.com/aws/aws-cdk/pull/10112 will help once it lands.

moelholm commented 3 years ago

If your issue is that types are incorrectly recognized, you can use the aws-cdk:subnet-type tag to correct those. See here:

https://docs.aws.amazon.com/cdk/api/latest/docs/aws-ec2-readme.html#importing-an-existing-vpc

A combination of aws-cdk:subnet-type and aws-cdk:subnet-name should allow you enough flexibility to achieve most VPC selections you need. If that's not sufficient for you, #10112 will help once it lands.

That solution primarily works for subnets managed by CDK. I have a situation where the VPC was created by others. And now I want to filter by the name Tag. I believe this issue is still relevant. I can work a fix?

buttnomaan9 commented 3 years ago

Any update on this?

alexjfisher commented 3 years ago

@rix0rrr Would you consider reopening this? #10112 didn't help as the tags aren't available to filter by.

okonon commented 3 years ago

I am also interested in this. I have vpc created using terraform with 2 private subnets and 2 db subnets. I am looking for a way to filter out db subnets out of all matched subnets with type SubnetType.PRIVATE_WITH_NAT

njlynch commented 2 years ago

The SubnetFilters only operate on the ISubnet interface, for which tags are not currently available (reasonably). This is still not supported, so let's open it back up to track.

rumesh-athu commented 2 years ago

Here is the fix which works for me.

Firstly, Add a new tag to each subnet group as below.

Tag

<KEY | VALUE>

For Private subnets

<subnet-groupname | private>

For DB subnets

<subnet-groupname | db>

Please follow the same for other subnets groups as well

Secondly, Use ec2.Vpc.fromLookup to retrieve VPC object as below

use above new subnet tag KEY in subnetGroupNameTag

import { Vpc } from "aws-cdk-lib/aws-ec2";

const vpc = Vpc.fromLookup(this, "vpc", {
  vpcId: "vpc-1234567890",
  subnetGroupNameTag: "subnet-groupname",
});

Thirdly, Add subnetGroupName to vpc.selectSubnet

use above new subnet tag VALUE in subnetGroupName

vpc.selectSubnets({
  subnetGroupName: "private",
  availabilityZones: [az],
  onePerAz: true,
}),

Referred documents VpcLookupOptions SubnetSelection

Note: Please run cdk context --clear to clear the cdk.context.json prior to verify this code

HCharlie commented 1 year ago

is there any progress on this issue? It would be super helpful to have a feature to select subnet resources based on tags.

I am having a similar issue with this, currently, I am trying to create a Sagemaker domain that requires a list of subnet_ids, and I am trying to derive the subnets based on the tag value, but I failed to find a solution till now. Is there some workaround for this?

yo-ga commented 1 year ago

@HCharlie Our workaround solution is using AWS SDK. We filter the subnets by the specific tags and export those IDs in SDK. After that, we use them with ec2.SubnetFilter.byIds in CDK.

github-actions[bot] commented 1 year ago

This issue has received a significant amount of attention so we are automatically upgrading its priority. A member of the community will see the re-prioritization and provide an update on the issue.

joewoz commented 1 week ago

Perhaps the simplest solution here is just supporting wildcards / regex in the subnetGroupName property of vpc.selectSubnets(). If you then set the subnetGroupNameTag to "Name" in your VPC lookup, it would then make a group for each subnet. Implementation might be easier said that done.