ecs-alb
cn-terraform/ecs-alb/aws
AWS ALB Terraform Module for ECS
AWS ALB Terraform Module Test Continuous Integration/Delivery environment on AWS ECS.       Use this code as a Terraform module Check valid versions on: Github Releases: Terraform Module Registry: This terraform module creates an Application Load Balancer and security group rules in order allow traffic to it. Install pre commit hooks. Please run this command right after cloning the repository. pre-commit install For t
| Name | Type | Description | Default |
|---|---|---|---|
| vpc_id | string | ID of the VPC | required |
| name_prefix | string | Name prefix for resources on AWS. Max length is 15 characters. | required |
| private_subnets | list(string) | A list of private subnet IDs to attach to the LB if it is INTERNAL. | required |
| public_subnets | list(string) | A list of public subnet IDs to attach to the LB if it is NOT internal. | required |
| https_ports | map(object({ type = option | Map containing objects to define listeners behaviour based on type field. If typ | {
"default": {
"listener_port": 44 |
| http_ingress_prefix_list_ids | list(string) | List of prefix list IDs blocks to allowed to access the Load Balancer through HT | [] |
| load_balancing_algorithm_type | string | (Optional) Determines how the load balancer selects targets when routing request | "round_robin" |
| target_group_health_check_matcher | string | The codes to use when checking for a successful response from a target. You can | "200" |
| default_certificate_arn | string | (Optional) The ARN of the default SSL server certificate. Required if var.https_ | null |
| additional_certificates_arn_for_https_listeners | list(any) | (Optional) List of SSL server certificate ARNs for HTTPS listener. Use it if you | [] |
| tags | map(string) | Resource tags | {} |
| target_group_health_check_path | string | The destination for the health check request. | "/" |
| target_group_health_check_timeout | number | (Optional) The amount of time, in seconds, during which no response means a fail | 5 |
| enable_deletion_protection | bool | (Optional) If true, deletion of the load balancer will be disabled via the AWS A | false |
| http_ingress_cidr_blocks | list(string) | List of CIDR blocks to allowed to access the Load Balancer through HTTP | [
"0.0.0.0/0"
] |
| https_ingress_cidr_blocks | list(string) | List of CIDR blocks to allowed to access the Load Balancer through HTTPS | [
"0.0.0.0/0"
] |
| target_group_health_check_interval | number | (Optional) The approximate amount of time, in seconds, between health checks of | 30 |
| target_group_health_check_port | string | (Optional) The port to use to connect with the target. Valid values are either p | "traffic-port" |
| ssl_policy | string | (Optional) The name of the SSL Policy for the listener. . Required if var.https_ | null |
| enable_s3_logs | bool | (Optional) If true, all LoadBalancer logs will be sent to S3. If true, and log_ | true |
| block_s3_bucket_public_access | bool | (Optional) If true, public access to the S3 bucket will be blocked. Ignored if | true |
| enable_s3_bucket_server_side_encryption | bool | (Optional) If true, server side encryption will be applied. Ignored if log_buck | true |
| access_logs_prefix | string | (Optional) if access logging to an S3 bucket, this sets a prefix in the bucket b | null |
| enable_http2 | bool | (Optional) Indicates whether HTTP/2 is enabled in the load balancer. Defaults to | true |
| … and 4 more inputs | |||
aws_lb_lb_arn — The ARN of the load balancer (matches id).aws_lb_lb_arn_suffix — The ARN suffix for use with CloudWatch Metrics.aws_lb_lb_zone_id — The canonical hosted zone ID of the load balancer (to be used in a Route 53 Alias record).lb_http_listeners_ids — List of HTTP Listeners IDsaws_security_group_lb_access_sg_arn — The ARN of the security groupaws_security_group_lb_access_sg_owner_id — The owner ID.lb_http_tgs_ids — List of HTTP Target Groups IDslb_http_tgs_ports — List of HTTP Target Groups portslb_https_listeners_arns — List of HTTPS Listeners ARNsaws_security_group_lb_access_sg_vpc_id — The VPC ID.aws_security_group_lb_access_sg_description — The description of the security groupaws_security_group_lb_access_sg_ingress — The ingress rules.lb_http_tgs_arns — List of HTTP Target Groups ARNslb_http_tgs_map_arn_portlb_https_tgs_ids — List of HTTPS Target Groups IDslb_https_tgs_arns — List of HTTPS Target Groups ARNslb_logs_s3_bucket_id — LB Logging S3 Bucket IDaws_lb_lb_id — The ARN of the load balancer (matches arn).aws_security_group_lb_access_sg_name — The name of the security groupaws_security_group_lb_access_sg_egress — The egress rules.lb_http_tgs_names — List of HTTP Target Groups Nameslb_https_tgs_names — List of HTTPS Target Groups Nameslb_https_tgs_ports — List of HTTPS Target Groups portslb_https_tgs_map_arn_portlb_logs_s3_bucket_arn — LB Logging S3 Bucket ARNlb_http_listeners_arns — List of HTTP Listeners ARNslb_https_listeners_ids — List of HTTPS Listeners IDsaws_lb_lb_dns_name — The DNS name of the load balancer.aws_security_group_lb_access_sg_id — The ID of the security groupAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,