Compare commits

..

3 Commits

Author SHA1 Message Date
3115cc528b
updating theme 2023-10-15 11:28:11 +01:00
d00eec15e9
adding sustainable terraform post 2023-10-15 11:26:55 +01:00
2eb6c93b43
tweaks, adding selector to menu, adding draught frame 2023-10-15 11:26:32 +01:00
6 changed files with 93 additions and 11 deletions

View File

@ -56,26 +56,31 @@ paginate = 40
url = "mixonomer/" url = "mixonomer/"
[[menu.main]] [[menu.main]]
name = "Dev & Engineering" name = "Selector"
weight = 2 weight = 2
url = "selector/"
[[menu.main]]
name = "Dev & Engineering"
weight = 3
url = "dev-engineering/" url = "dev-engineering/"
[[menu.main]] [[menu.main]]
name = "Music" name = "Music"
weight = 3 weight = 4
url = "music/" url = "music/"
#[[menu.main]] #[[menu.main]]
# name = "Art" # name = "Art"
# weight = 4 # weight = 5
# url = "art/" # url = "art/"
[[menu.main]] [[menu.main]]
name = "Posts" name = "Posts"
weight = 5 weight = 6
url = "posts/" url = "posts/"
[[menu.main]] [[menu.main]]
name = "About" name = "About"
weight = 6 weight = 7
url = "about/" url = "about/"

View File

@ -10,7 +10,7 @@ draft: false
{{% image-box-link src="/posts/markov/StateTopology.png" href="/posts/markov" title="Hidden Markov Models" caption="MATLAB" %}} {{% image-box-link src="/posts/markov/StateTopology.png" href="/posts/markov" title="Hidden Markov Models" caption="MATLAB" %}}
# [Infrastructure]({{< ref "infra" >}}) # [Infrastructure]({{< relref "infra" >}})
I manage my local and cloud infrastructure with __Terraform__ + __Ansible__ + __Docker__. I've found this stack incredibly powerful so I've written a post about my patterns and what I love about it. I manage my local and cloud infrastructure with __Terraform__ + __Ansible__ + __Docker__. I've found this stack incredibly powerful so I've written a post about my patterns and what I love about it.
@ -18,7 +18,7 @@ I manage my local and cloud infrastructure with __Terraform__ + __Ansible__ + __
Basically, Terraform creates and destroys infrastructure, Ansible manages the OS-level stuff and then the services I run use docker compose. I use a _bootstrap_ Ansible role instead of golden images. Basically, Terraform creates and destroys infrastructure, Ansible manages the OS-level stuff and then the services I run use docker compose. I use a _bootstrap_ Ansible role instead of golden images.
[Read More]({{< ref "infra" >}}) [Read More]({{< relref "infra" >}})
--- ---

View File

@ -16,7 +16,11 @@ The project took about 3 weeks off and on. Initially, I wanted to model the game
The MiniMax algorithm was also a bit of a pain. The algorithm relies on a tree structure for which I used the [IndexTree crate](https://crates.io/crates/indextree). Instead of using pointers between nodes that could rely on unsafe code, this library instead relies on a single backing array of nodes. Working out how to effectively create, populate and traverse the trees while following the borrow checker's rules was a good test. The MiniMax algorithm was also a bit of a pain. The algorithm relies on a tree structure for which I used the [IndexTree crate](https://crates.io/crates/indextree). Instead of using pointers between nodes that could rely on unsafe code, this library instead relies on a single backing array of nodes. Working out how to effectively create, populate and traverse the trees while following the borrow checker's rules was a good test.
{{< figure src="screenshot.png" caption="Javascript UI with a Rust-controlled canvas" >}} # Try it out below...
<iframe src="https://draught.sarsoo.xyz/" style="width: 100%; height: 1000px"></iframe>
## Under the hood
The performance of the game and the AI was pretty impressive. This was also without any Alpha-Beta pruning, a method to reduce the number of tree nodes that need searching. Below are the results of a basic benchmark for expanding the MiniMax tree to given depths both in development mode and release mode. The performance of the game and the AI was pretty impressive. This was also without any Alpha-Beta pruning, a method to reduce the number of tree nodes that need searching. Below are the results of a basic benchmark for expanding the MiniMax tree to given depths both in development mode and release mode.
@ -40,4 +44,4 @@ Ultimately, I was pretty happy with the project and it can now be used as a test
[GitHub Repo](https://github.com/sarsoo/draught) [GitHub Repo](https://github.com/sarsoo/draught)
[Try it out!](https://draught.sarsoo.xyz/) # [Try it out!](https://draught.sarsoo.xyz/)

View File

@ -0,0 +1,73 @@
---
title: "More Sustainable Terraform: Breaking Down the Beast"
date: 2023-09-10T08:34:40+00:00
draft: false
---
I [wrote earlier this year]({{< relref "infra" >}}) about jumping into Terraform to manage my infrastructure. I love the [idemptotent](https://en.wikipedia.org/wiki/Idempotence) behaviour and the way that the declarative format leads to a self-documenting, centralised repository of my resources across a variety of platforms.
There were issues with my implementation, though, issues that I sought to tackle recently. I'm going to describe some of these problems that I encountered and what I did to solve them for [Mixonomer]({{< relref "mixonomer" >}}) and [Selector]({{< relref "selector" >}}).
# Big ol' Blob
I have a private git repo where I keep my infrastructure-related resources including Terraform manifests, Ansible playbooks, nginx configs and Docker images. This included a single Terraform folder with a single state file and a few modules. This is a common pattern when starting out, but it is just as common to start feeling the limitations as you scale.
In particular, in my case, I was managing the infrastructure for all of my projects together. This meant that in order to make a change to, say, [Selector]({{< relref "selector" >}}), the [Mixonomer]({{< relref "mixonomer" >}})-related resources would need to be checked and possibly fixed when doing so.
I had a situation recently when I updated the Linode Terraform provider and it is now enforcing minimum root password lengths on virtual machines. A VPS I'm using originally had a root password that didn't meet this and, in order to bring the Terraform state in line, it wanted to delete and recreate the machine. This VPS isn't related to [Mixonomer]({{< relref "mixonomer" >}}), but if I wanted to make any changes to [Mixonomer]({{< relref "mixonomer" >}}), I would need to either fix the VPS or remove it from the state. The latter may sound easier but in fact, the issue cascades as some of my DNS records rely on this machine by pointing at its IP address (a feature of Terraform that I love, don't get me wrong).
It's clear that I needed to do some decomposition - break down the Terraform blob into smaller repos (and state files) that represent well-defined areas of concern.
# Testing in Prod? 😬
In order to split this behemoth, I broke out all of the Mixonomer resources into a separate git repo, `terraform rm`-ing the state from the original monolith and re-importing into a new state file in this new repo.
Now that I had this Mixonomer.infra repo, I wanted to explore how to properly utilise Terraform best practices, *while I'm here why don't I do it properly?* To do this I needed to confront something that I had been avoiding, it wasn't just my Terraform that was a blob, the Mixonomer platform itself was a bit of a blob.
As I wrote about when I documented [Mixonomer]({{< relref "mixonomer" >}}), the project had originally been a way to learn both web development and cloud computing. Unsurprisingly, this led to some bad practices.
First off, there was only one environment, production. No testing, no pre-prod, throw it straight into production, what's the worst that could happen? Also, the security practices weren't as tight as they could be, all of the Cloud Functions used a single service account with permissions that it didn't need.
Now, the project is just a personal one, I didn't have intentions for it to be a big public platform or anything, so it's not like this is negligent. But knowing what I know now, this isn't how you do things and again, *while I'm here why don't I do it properly?*
# Phew!
There are multiple ways to lay out a Terraform repo for handling multiple environments. I went for a global module collection which is imported by multiple environment folders, each with their own state file. The result looks like the below:
```
├── modules
│ ├── acm
│ │ ├── api.tf
│ │ ├── main.tf
│ │ ├── outputs.tf
│ │ ├── variables.tf
│ ├── run_all_playlists
│ │ ├── ...
│ ├── run_user_playlist
│ │ ├── ...
│ ├── secrets
│ │ ├── ...
│ ├── static_resources
│ │ ├── ...
│ ├── task_queues
│ │ ├── ...
│ ├── web_app
│ │ ├── ...
├── prod
│ ├── api.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
├── test
│ ├── api.tf
│ ├── main.tf
│ ├── outputs.tf
│ ├── variables.tf
```
This design has its ups and downs. One advantage, as mentioned before is the different state files; each environment can be checked and updated individually, broken environments don't block changing other environments.
One disadvantage is that module changes really need to be done from lower environments up to prod or in a separate branch so that changes don't get prematurely applied to higher environments. This isn't that big of an issue, it's what should be happening anyway but it is worth keeping in mind.
Another advantage is that the heavy modulation means that changes to modules are applied to each environment in the same way every time, no manual effort is required to make sure changes are applied the same way.
Finally, the exercise in itself had a huge upside. When I originally started managing the system with Terraform, I imported the resources instead of creating them. This meant that the environment couldn't necessarily be deployed from scratch with those resources, they were just the current state. For example, I like Google Cloud Functions and have a few to support the system. Previously, I had Terraform resources for the functions themselves as they were imported. However, when trying to deploy a new environment, deploying functions with Terraform directly proved tricky. I deploy the functions with GitHub Actions, but Terraform couldn't deploy an empty function ready to be filled by CD. The solution was that Terraform is responsible for the associated resources - the service account, its privileges and Pub/Sub topics, while GitHub Actions maintains responsibility for actually standing up the function.
Writing the resources again from scratch made sure that the actual resources being created were suitable to create an environment from scratch.

View File

@ -46,7 +46,7 @@ The front-end was written in __React__, which I also learnt in the process. It w
The app sits in the background now, it has replaced [__Smarter Playlists__](http://playlistmachinery.com/) for my _smart playlists_ and its been a good testbed to play with more cloud services. The app sits in the background now, it has replaced [__Smarter Playlists__](http://playlistmachinery.com/) for my _smart playlists_ and its been a good testbed to play with more cloud services.
[Try It Out](https://mixonomer.sarsoo.xyz/) # [Try It Out](https://mixonomer.sarsoo.xyz/)
[Github](https://github.com/Sarsoo/Mixonomer) [Github](https://github.com/Sarsoo/Mixonomer)

@ -1 +1 @@
Subproject commit 1fb96cf9a920c46e01f3c0736cf01770c041617e Subproject commit e35f1da207cb25f4fce730177423d041cf90e7dd