Stacktape
Stacktape


Private Services



A private service is a continuously running container that is only accessible from within your stack. It's ideal for backend services, private APIs, or any application that shouldn't be exposed to the public internet.

Key features include:

  • Automatic scaling: Scales based on CPU or memory usage to handle fluctuating loads.
  • Zero-downtime deployments: New versions are deployed without interrupting the service.
  • Flexible container images: Supports various methods for providing a container image, including auto-packaging for popular languages.
  • Fully managed: No need to manage servers, operating systems, or virtual machines.
  • Seamless connectivity: Easily connects to other resources within your stack.

How it works

Stacktape uses AWS Elastic Container Service (ECS) to run your containers on either Fargate or EC2 instances.

  • Fargate is a serverless compute engine that runs containers without requiring you to manage the underlying servers.
  • EC2 instances are virtual servers in the AWS cloud that give you more control over the computing environment.

ECS services are self-healing, automatically replacing any container that fails. They also scale automatically based on the rules you define.

Private services have two modes for handling internal traffic:

  • service-connect (default): Uses ECS Service Connect. The service is only accessible to other ECS-based resources like web services, worker services, and multi-container workloads.
  • application-load-balancer: Uses an internal Application Load Balancer. The service is accessible to all resources within the same VPC.

For more details, see the sections on Load Balancing and Connecting to a Private Service.

When to use it

This table helps you choose the right container-based resource for your needs:

Resource typeDescriptionUse-cases
web-serviceA container with a public endpoint and URL.Public APIs, websites
private-serviceA container with a private endpoint, accessible only within your stack.Private APIs, internal services
worker-serviceA container that runs continuously but is not directly accessible.Background processing, message queue consumers
multi-container-workloadA customizable workload with multiple containers, where you define the accessibility of each one.Complex, multi-component services
batch-jobA container that runs a single job and then terminates.One-off or scheduled data processing tasks

Advantages

  • Control over the environment: Runs any Docker image or an image built from a Dockerfile.
  • Cost-effective for predictable loads: Cheaper than Lambda functions for services with steady traffic.
  • Load-balanced and scalable: Automatically scales horizontally based on CPU and memory usage.
  • Highly available: Runs across multiple Availability Zones to ensure resilience.
  • Secure by default: The underlying environment is managed and secured by AWS.

Disadvantages

  • Slower scaling: Adding new container instances can take several seconds to a few minutes, which is slower than the nearly-instant scaling of Lambda functions.
  • Not fully serverless: Cannot scale down to zero. You pay for at least one running instance (starting at ~$8/month), even if it's idle.

Basic usage

Here's a basic example of a private service configuration:

resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/main.ts
resources:
cpu: 2
memory: 2048

Example private service configuration.

And here's the corresponding application code:

import express from 'express';
const app = express();
app.get('/', async (req, res) => {
res.send({ message: 'Hello' });
});
// for your app use port number stored in PORT environment variable for your application
// this environment variable is automatically injected by Stacktape
app.listen(process.env.PORT, () => {
console.info(`Server running on port ${process.env.PORT}`);
});

Example server code in TypeScript (main.ts).


PrivateService  API reference
type
Required
properties.packaging
Required
properties.resources
Required
properties.port
Default: 3000
properties.protocol
properties.loadBalancing
Default: service-connect
properties.environment
properties.logging
properties.scaling
properties.internalHealthCheck
properties.stopTimeout
Default: 2
properties.enableRemoteSessions
properties.volumeMounts
properties.sideContainers
properties.usePrivateSubnetsWithNAT
properties.connectTo
properties.iamRoleStatements
overrides

Connecting to a private service

Private services don't have public URLs. Instead, they have a private address in the format host:port.

  • host: The resource name in lowercase (by default).
  • port: 3000 by default, but can be customized using the port property.

For a service named privateApi, the address would be privateapi:3000. You can connect to this address directly from other resources in your stack. Depending on your application's needs, you might have to prepend a protocol scheme, such as http://privateapi:3000.

resources:
publicService:
type: web-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/main.ts
resources:
cpu: 1
memory: 1024
environment:
# injecting privateApi address
- name: PRIVATE_ADDRESS
value: $ResourceParam('privateApi', 'address')
privateApi:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/private-api/main.ts
resources:
cpu: 1
memory: 1024

Image

A private service runs a Docker image. You can provide this image in four ways:

Environment variables

A list of environment variables to pass to the script or command.

Values can be:

resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/main.ts
environment:
- name: STATIC_ENV_VAR
value: my-env-var
- name: DYNAMICALLY_SET_ENV_VAR
value: $MyCustomDirective('input-for-my-directive')
- name: DB_HOST
value: $ResourceParam('myDatabase', 'host')
- name: DB_PASSWORD
value: $Secret('dbSecret.password')
resources:
cpu: 2
memory: 2048
EnvironmentVar  API reference
name
Required
value
Required

Health check

Health checks monitor your container to ensure it's running correctly. If a container fails its health check, it's automatically terminated and replaced with a new one.

ContainerHealthCheck  API reference
healthCheckCommand
Required
intervalSeconds
Default: 30
timeoutSeconds
Default: 5
retries
Default: 3
startPeriodSeconds

For example, this health check uses curl to send a request to the service every 20 seconds. If the request fails or takes longer than 5 seconds, the check is considered failed.

resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/index.ts
internalHealthCheck:
healthCheckCommand: ['CMD-SHELL', 'curl -f http://localhost/ || exit 1']
intervalSeconds: 20
timeoutSeconds: 5
startPeriodSeconds: 150
retries: 2
resources:
cpu: 2
memory: 2048

Shutdown

When a service instance is shut down (for example, during a deployment or when the stack is deleted), all of its containers receive a SIGTERM signal. This gives your application a chance to shut down gracefully.

By default, the application has 2 seconds to clean up before it's forcefully stopped with a SIGKILL signal. You can change this with the stopTimeout property (from 2 to 120 seconds).

process.on('SIGTERM', () => {
console.info('Received SIGTERM signal. Cleaning up and exiting process...');
// Finish any outstanding requests, or close a database connection...
process.exit(0);
});

Example of a cleanup function that runs before the container shuts down.

Logging

Anything your application writes to stdout or stderr is captured and stored in AWS CloudWatch.

You can view logs in a few ways:

  • Stacktape Console: Find a direct link to the logs in the Stacktape Console.
  • Stacktape CLI: Use the stacktape logs command to stream logs to your terminal.
  • AWS Console: Browse logs directly in the AWS CloudWatch console. The stacktape stack-info command can provide a link.

Log storage can be expensive. To manage costs, you can configure retentionDays to automatically delete logs after a certain period.

ContainerWorkloadContainerLogging  API reference
disabled
retentionDays
Default: 90
logForwarding

Forwarding logs

You can forward logs to third-party services. See Forwarding Logs for more information.

Compute resources

In the resources section, you configure the CPU, memory, and instance types for your service. You can run your containers using either Fargate or EC2 instances.

  • Fargate is a serverless option that lets you run containers without managing servers. You only need to specify the cpu and memory your service requires. It's a good choice for applications that need to meet high security standards like PCI DSS Level 1 and SOC 2.
  • EC2 instances are virtual servers that give you more control. You choose the instance types that best fit your needs, and ECS places your containers on them.

Regardless of whether you use Fargate or EC2 instances, your containers run securely within a VPC.

Configures the CPU, memory, and underlying compute engine for the service container.

You can choose between two compute engines:

  • Fargate: A serverless engine that abstracts away server management. To use Fargate, specify cpu and memory without instanceTypes.
  • EC2: Provides direct control over the underlying virtual servers. To use EC2, specify the desired instanceTypes.
ContainerWorkloadResourcesConfig  API reference
cpu
memory
instanceTypes
enableWarmPool
architecture
Default: 'x86_64'

Using Fargate

To use Fargate, specify cpu and memory in the resources section without including instanceTypes.

resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/index.ts
resources:
cpu: 0.25
memory: 512

Example of a service running on Fargate.

Using EC2 instances

To use EC2 instances, specify a list of instanceTypes in the resources section.

Instances are automatically added or removed to meet scaling demands.

Recommendation: For optimal resource utilization, specify a single instance type and omit the cpu and memory properties. Stacktape will then size the containers to fit the instance perfectly.

The order of instance types matters; the first in the list is preferred. For a full list of instance types, see the AWS EC2 instance types documentation.

Instances are automatically refreshed weekly to ensure they are patched and up-to-date. Your workload remains available during this process.

resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/index.ts
resources:
instanceTypes:
- c5.large

Example of a service running on EC2 instances.

Container placement on EC2

Stacktape tries to use your EC2 instances as efficiently as possible.

  • If you specify instanceTypes without cpu and memory, Stacktape configures each service instance to use the full resources of one EC2 instance. When the service scales out, a new EC2 instance is added for each new service instance.
  • If you specify cpu and memory, AWS will place multiple service instances on a single EC2 instance if there's enough capacity, maximizing utilization.

Default CPU and memory for EC2

  • If cpu is not specified, containers on an EC2 instance share its CPU capacity.
  • If memory is not specified, Stacktape sets the memory to the maximum amount available on the smallest instance type in your instanceTypes list.

Using a warm pool

A warm pool keeps pre-initialized EC2 instances in a stopped state, allowing your service to scale out much faster. This is useful for handling sudden traffic spikes. You only pay for the storage of stopped instances, not for compute time.

To enable it, set enableWarmPool to true. This feature is only available when you specify exactly one instance type.

For more details, see the AWS Auto Scaling warm pools documentation.

resources:
myWebService:
type: web-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/index.ts
resources:
instanceTypes:
- c5.large
enableWarmPool: true

Scaling

The scaling section lets you control how your service scales. You can set the minimum and maximum number of running instances and define a policy that triggers scaling actions.

ContainerWorkloadScaling  API reference
minInstances
Default: 1
maxInstances
Default: 1
scalingPolicy

Scaling policy

A scaling policy defines the CPU and memory thresholds that trigger scaling.

  • Scaling out (adding instances): The service scales out if either the average CPU or memory utilization exceeds the target you set.
  • Scaling in (removing instances): The service scales in only when both CPU and memory utilization are below their target values.

The scaling process is more aggressive when adding capacity than when removing it. This helps ensure your application can handle sudden increases in load, while scaling in more cautiously to prevent flapping (scaling in and out too frequently).

ContainerWorkloadScalingPolicy  API reference
keepAvgCpuUtilizationUnder
Default: 80
keepAvgMemoryUtilizationUnder
Default: 80
resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/index.ts
resources:
cpu: 0.5
memory: 1024
scaling:
minInstances: 1
maxInstances: 5
scalingPolicy:
keepAvgMemoryUtilizationUnder: 80
keepAvgCpuUtilizationUnder: 80

Example of a scaling configuration.

Storage

Each service instance has its own temporary, or ephemeral storage, with a fixed size of 20GB. This storage is deleted when the instance is removed. Different instances of the same service do not share their storage.

For persistent data storage, use Buckets.

Accessing other resources

By default, AWS resources cannot communicate with each other. Access must be granted using IAM permissions.

Stacktape automatically configures the necessary permissions for the services it manages. For example, it allows a private service to write logs to CloudWatch.

However, if your application needs to access other resources, you must grant permissions manually. You can do this in two ways:

Using connectTo

The connectTo property lets you grant access to other Stacktape-managed resources by simply listing their names. Stacktape automatically configures the required IAM permissions and injects connection details as environment variables into your service.

resources:
photosBucket:
type: bucket
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/index.ts
connectTo:
# access to the bucket
- photosBucket
# access to AWS SES
- aws:ses
resources:
cpu: 0.25
memory: 512

Configures access to other resources in your stack and AWS services. By specifying resources here, Stacktape automatically:

  • Configures IAM role permissions.
  • Sets up security group rules to allow network traffic.
  • Injects environment variables with connection details into the compute resource.

Environment variables are named STP_[RESOURCE_NAME]_[VARIABLE_NAME] (e.g., STP_MY_DATABASE_CONNECTION_STRING).

Using iamRoleStatements

For more granular control, you can provide a list of raw IAM role statements. These statements are added to the service's IAM role, allowing you to define precise permissions for any AWS resource.

resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: server/index.ts
iamRoleStatements:
- Resource:
- $CfResourceParam('NotificationTopic', 'Arn')
Effect: 'Allow'
Action:
- 'sns:Publish'
resources:
cpu: 2
memory: 2048
cloudformationResources:
NotificationTopic:
Type: 'AWS::SNS::Topic'
StpIamRoleStatement  API reference
Resource
Required
Sid
Effect
Default: Allow
Action
Condition

Load balancing

The loadBalancing property configures how traffic is distributed to your containers.

Supported types are service-connect and application-load-balancer.

  • service-connect:

    • Distributes traffic evenly to available containers.
    • Connections are only possible from other container-based resources in the stack.
    • Supports any TCP protocol.
    • This option is significantly cheaper, costing only ~$0.50 per month for a private Cloud Map DNS namespace.
  • application-load-balancer:

    • Distributes traffic to available containers in a round-robin fashion.
    • Supports the HTTP protocol only.
    • Uses a pricing model that combines a flat hourly charge ($0.0252/hour) with usage-based charges for LCUs (Load Balancer Capacity Units) ($0.08/hour).
    • Eligible for the AWS Free Tier. For more details, see the AWS pricing documentation.
PrivateServiceLoadBalancing  API reference
type
Required
resources:
webService:
type: web-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/main.ts
resources:
cpu: 2
memory: 2048
loadBalancing:
type: application-load-balancer # default is http-api-gateway

Default VPC connection

Some AWS services, like relational databases, must be deployed within a VPC. If your stack includes such resources, Stacktape automatically creates a default VPC and connects them to it.

Private services are connected to this default VPC by default, allowing them to communicate with other VPC-based resources without extra configuration.

To learn more, see the documentation on VPCs and resource accessibility.

Port

You can specify a custom port for your service.

The port is injected into the container's runtime as the PORT environment variable.

If loadBalancing is set to service-connect (the default), connections are only possible from other container-based resources (e.g., web services, worker services, multi-container workloads).

resources:
myPrivateService:
type: private-service
properties:
packaging:
type: stacktape-image-buildpack
properties:
entryfilePath: src/main.ts
resources:
cpu: 2
memory: 2048
port: 8080

Referenceable parameters

The following parameters can be easily referenced using $ResourceParam directive directive.

To learn more about referencing parameters, refer to referencing parameters.

address
  • service host:port pair accessible only to other resources of stack(web-services, multi-container-workloads)

  • Usage: $ResourceParam('<<resource-name>>', 'address')

Pricing

When using Fargate, you are charged for:

  • vCPU per hour: ~$0.04 - $0.07, depending on the region.
  • Memory (GB) per hour: ~$0.004 - $0.008, depending on the region.

Usage is billed by the second, with a one-minute minimum. For more details, see AWS Fargate pricing.

API reference

StpIamRoleStatement  API reference
Resource
Required
Sid
Effect
Default: Allow
Action
Condition

Contents