Deploy your Astro Site to AWS
This content is not available in your language yet.
AWS is a full-featured web app hosting platform that can be used to deploy an Astro site.
Deploying your project to AWS requires using the AWS console. (Most of these actions can also be done using the AWS CLI). This guide will walk you through the steps to deploy your site to AWS starting with the most basic method. Then, it will demonstrate adding additional services to improve cost efficiency and performance.
AWS Amplify
Section titled AWS AmplifyAWS Amplify is a set of purpose-built tools and features that lets frontend web and mobile developers quickly and easily build full-stack applications on AWS.
-
Create a new Amplify Hosting project.
-
Connect your repository to Amplify.
-
Modify your build output directory
baseDirectory
to/dist
.
Using pnpm
will require slightly different settings in order to cache the pnpm store directory instead of node_modules
. Below is the recommended build config:
Amplify will automatically deploy your website and update it when you push a commit to your repository.
S3 static website hosting
Section titled S3 static website hostingS3 is the starting point of any application. It is where your project files and other assets are stored. S3 charges for file storage and number of requests. You can find more information about S3 in the AWS documentation.
-
Create an S3 bucket with your project’s name.
The bucket name should be globally unique. We recommend a combination of your project name and the domain name of your site.
-
Disable “Block all public access”. By default, AWS sets all buckets to be private. To make it public, you need to uncheck the “Block public access” checkbox in the bucket’s properties.
-
Upload your built files located in
dist
to S3. You can do this manually in the console or use the AWS CLI. If you use the AWS CLI, you can use the following command after authenticating with your AWS credentials: -
Update your bucket policy to allow public access. You can find this setting in the bucket’s Permissions > Bucket policy.
Do not forget to replace
<BUCKET_NAME>
with the name of your bucket. -
Enable website hosting for your bucket. You can find this setting in the bucket’s Settings > Static website hosting. Set your index document to
index.html
and your error document to404.html
. Finally, you can find your new website URL in the bucket’s Settings > Static website hosting.If you are deploying a single-page application (SPA), set your error document to
index.html
.
S3 with CloudFront
Section titled S3 with CloudFrontCloudFront is a web service that provides content delivery network (CDN) capabilities. It is used to cache content of a web server and distribute it to end users. CloudFront charges for the amount of data transferred. Adding CloudFront to your S3 bucket is more cost-effective and provides a faster delivery.
We will use CloudFront to wrap our S3 bucket to serve our project’s files using Amazon global CDN network. This will reduce the cost of serving your project’s files and will increase the performance of your site.
S3 setup
Section titled S3 setup-
Create an S3 bucket with your project’s name.
The bucket name should be globally unique. We recommend a combination of your project name and the domain name of your site.
-
Upload your built files located in
dist
to S3. You can do this manually in the console or use the AWS CLI. If you use the AWS CLI, you can use the following command after authenticating with your AWS credentials: -
Update your bucket policy to allow CloudFront Access. You can find this setting in the bucket’s Permissions > Bucket policy.
Do not forget to replace
<CLOUDFRONT_OAI_ID>
with the name of your CloudFront Origin Access Identity ID. You can find the CloudFront Origin Access Identity ID in CloudFront > Origin access identities after setting up CloudFront.
CloudFront setup
Section titled CloudFront setup- Create a CloudFront distribution with the following values:
- Origin domain: Your S3 bucket
- S3 bucket access: “Yes use OAI (bucket can restrict access to only CloudFront)”
- Origin access identity: Create a new origin access identity
- Viewer - Bucket policy: “No, I will update the bucket policy”
- Viewer protocol policy: “Redirect to HTTPS”
- Default root object:
index.html
This configuration will block access to your S3 bucket from the public internet and serve your site using the global CDN network. You can find your CloudFront distribution URL in the bucket’s Distributions > Domain name.
CloudFront Functions setup
Section titled CloudFront Functions setupUnfortunately, CloudFront does not support multi-page sub-folder/index
routing by default. To configure it, we will use CloudFront Functions to point the request to the desired object in S3.
-
Create a new CloudFront function with the following code snippet. You can find CloudFront functions in CloudFront > Functions.
-
Attach your function to the CloudFront distribution. You can find this option in your CloudFront distribution’s Settings > Behaviors > Edit > Function associations.
- Viewer request - Function type: CloudFront Function.
- Viewer request - Function ARN: Select the function you created in the previous step.
CloudFront Error Pages setup
Section titled CloudFront Error Pages setupBy default, S3 returns a 404 error when the file is not found, and 403 when the file is private. This causes visitors to see an ugly XML error page in both cases.
To fix this, add custom error responses in your CloudFront distribution’s Settings > Error pages.
-
Create a custom error response for 404 errors with the following values:
- HTTP error code: 404: Not Found
- Customize error response: Yes
- Response page path:
/index.html
- HTTP response code: 200: OK
-
Create a custom error response for 403 errors with the following values:
- HTTP error code: 403: Forbidden
- Customize error response: Yes
- Response page path:
/index.html
- HTTP response code: 200: OK
For the best user experience, you can create a custom 404 page in your project and set the Response page path to /404.html
.
Continuous deployment with GitHub Actions
Section titled Continuous deployment with GitHub ActionsThere are many ways to set up continuous deployment for AWS. One possibility for code hosted on GitHub is to use GitHub Actions to deploy your website every time you push a commit.
-
Create a new policy in your AWS account using IAM with the following permissions. This policy will allow you to upload built files to your S3 bucket and invalidate the CloudFront distribution files when you push a commit.
Do not forget to replace
<DISTRIBUTION_ARN>
and<BUCKET_NAME>
. You can find the ARN in CloudFront > Distributions > Details. -
Create a new IAM user and attach the policy to the user. This will provide your
AWS_SECRET_ACCESS_KEY
andAWS_ACCESS_KEY_ID
. -
Add this sample workflow to your repository at
.github/workflows/deploy.yml
and push it to GitHub. You will need to addAWS_ACCESS_KEY_ID
,AWS_SECRET_ACCESS_KEY
,BUCKET_ID
, andDISTRIBUTION_ID
as “secrets” to your repository on GitHub under Settings > Secrets > Actions. Click New repository secret to add each one.Your
BUCKET_ID
is the name of your S3 bucket. YourDISTRIBUTION_ID
is your CloudFront distribution ID. You can find your CloudFront distribution ID in CloudFront > Distributions > ID