Awesome
Heroku Common Runtime microservices with a unified gateway using Terraform
Each microservice is exposed to the internet through a Kong service & route, secured via Heroku's built-in SSL/TLS certificates.
The Common Runtime allows public access to web apps by default. To ensure the gateway provides exclusive access to the microservices, the microservices must restrict access using a pre-shared API key (generated by Terraform) set in the "X-Internal-API-Key" HTTP header.
A single Terraform config embodies the complete system, enabling high-level collaboration, repeatability, test-ability, and change management.
▶ See also: Heroku Enterprise / Private Spaces version of this architecture
Primary components
- Heroku provides the primatives: Apps and Add-ons
- Kong CE on Heroku provides a high-performance HTTP proxy/gateway with plugins supporting access control, flow control, logging, circuit-breaking, and more including custom plugins
- Terraform provides declarative, unified systems configuration with support for over 120 providers, a human-friendly configuration as code format, and a deterministic provisioning engine
Challenges & Caveats
- Config drift when using Heroku Dashboard or CLI. Once the config is applied, if changes are made to the resources outside of Terraform, such as scaling dynos, setting config vars, changing add-ons, etc, then the Terraform state will no longer match its configuration, making it impossible to apply or destroy further until the drifting values are imported (for new resources) or manually updated in
terraform.tfstate
. - Connecting the Terraform config with Heroku slugs. This proof-of-concept contains slug archives that were manually extracted with the Heroku API from pre-existing apps. While there's a higher-level conceptual challenge with the design of this interconnection between Heroku DX & Terraform, there are use-cases this proof-of-concept still serves, such as using Heroku Pipelines purely as a build & QA system (example), and with an external CI/build system creating slug archives for Terraform.
- Renaming Terraform-provisioned Heroku apps. If apps are renamed, Terraform can no longer access various resources without first manually editing, revising
terraform.tfstate
with the new names. See terraform-provider-heroku issues #124 & #93
Requirements
- Heroku
- install command-line tools (CLI)
- an account
- a team
- install git
- install git-lfs (efficiently supports checking Heroku app slugs into version control)
- install Terraform
Usage
Ensure the requirements are met, then,
-
Clone this repo:
git clone git@github.com:heroku-examples/terraform-heroku-common-kong-microservices.git cd terraform-heroku-common-kong-microservices/
-
Install terraform-provider-kong 1.9.1
- download the
.zip
asset for your computer's architecture - unzip it into
terraform.d/plugins/$ARCH/
- where
$ARCH
is the computer's architecture, likedarwin_amd64
- download the
-
Set Heroku API key
heroku authorizations:create -d terraform-heroku-common-kong-microservices
export HEROKU_API_KEY=<"Token" value from the authorization>
-
terraform init
-
Then, apply the config with your own top-level config values:
terraform apply -var name=kong-micro -var heroku_team=my-team
-
Visit the output URLs in a web browser to demonstrate the secure backend & public gateway:
- ❌
terraform output wasabi_backend_url
not directly accessible - ✅
terraform output wasabi_public_url
- ❌
🔬 This is a community proof-of-concept, MIT license, provided "as is", without warranty of any kind.