ecs-fargate-service

cn-terraform/ecs-fargate-service/aws

Terraform Module HCL AWS

AWS ECS Fargate Service Terraform Module

Install
module "ecs-fargate-service" {
source = "cn-terraform/ecs-fargate-service/aws"
version = "2.0.50"
}
plain text: /constructs/tfmod-cn-terraform-ecs-fargate-service-aws/install.txt
⭐ Source on GitHub 📦 Registry page
README

AWS ECS Fargate Terraform Module # This Terraform module deploys an AWS ECS Fargate service. ![](https://github.com/cn-terraform/terraform-aws-ecs-fargate-service/actions?query=workflow%3Aterraform) ![](https://github.com/cn-terraform/terraform-aws-ecs-fargate-service) ![](https://github.com/cn-terraform/terraform-aws-ecs-fargate-service) ![](https://github.com/cn-terraform/terraform-aws-ecs-fargate-service) ![](https://github.com/cn-terraform/terraform-aws-ecs-fargate-service) ![](https://github.com/cn-terraform/terraform-aws-ecs-fargate-service) Usage Check valid versions on: Github Releases: Terraform Module Registry: Other modules that you may need to use this module The Networking module: Github Releases: Terraform Module Registry: The ECS cluster module: Github Releases: Terraform Mo

Inputs (50)
NameTypeDescriptionDefault
public_subnetslist(any)The public subnets associated with the task or service. required
vpc_idstringID of the VPC required
platform_versionstring(Optional) The platform version on which to run your service. Defaults to 1.4.0."1.4.0"
security_groupslist(any)(Optional) The security groups associated with the task or service. If you do no[]
additional_lbsmap(object ( { Additional load balancers to add to ECS service{}
access_logs_prefixstring(Optional) if access logging to an S3 bucket, this sets a prefix in the bucket bnull
min_cpu_periodstringThe period in seconds over which the specified statistic is applied for min cpu "60"
scale_target_max_capacitynumberThe max capacity of the scalable target5
lb_load_balancing_algorithm_typestring(Optional) Determines how the load balancer selects targets when routing request"round_robin"
lb_stickinessobject({ type =(Optional) A Stickiness block. Provide three fields. type, the type of sticky se{ "cookie_duration": 86400, "enabled
lb_target_group_health_check_enabledbool(Optional) Indicates whether health checks are enabled. Defaults to true.true
lb_target_group_health_check_matcherstringThe HTTP codes to use when checking for a successful response from a target. You"200"
additional_certificates_arn_for_https_listenerslist(any)(Optional) List of SSL server certificate ARNs for HTTPS listener. Use it if you[]
service_registriesmap(any)(Optional) The service discovery registries for the service. The maximum number {}
force_new_deploymentbool(Optional) Enable to force a new task deployment of the service. This can be usefalse
tagsmap(string)Resource tags{}
lb_idle_timeoutnumber(Optional) The time in seconds that the connection is allowed to be idle. Defaul60
lb_enable_http2bool(Optional) Indicates whether HTTP/2 is enabled in the load balancer. Defaults totrue
lb_target_group_health_check_pathstringThe destination for the health check request."/"
lb_target_group_health_check_protocolstring(Optional) The protocol the load balancer uses when performing health checks on "HTTP"
ssl_policystring(Optional) The name of the SSL Policy for the listener. . Required if var.https_null
deployment_controllerlist(any)(Optional) Deployment controller default: 'ECS'[ { "type": "ECS" } ]
… and 10 more inputs
Outputs (31)
ecs_tasks_sg_arn — ${var.name_prefix} ECS Tasks Security Group - The ARN of the security group
ecs_tasks_sg_name — ${var.name_prefix} ECS Tasks Security Group - The name of the security group
ecs_tasks_sg_id — ${var.name_prefix} ECS Tasks Security Group - The ID of the security group
aws_lb_lb_arn — The ARN of the load balancer (matches id).
aws_security_group_lb_access_sg_owner_id — The owner ID.
lb_http_tgs_arns — List of HTTP Target Groups ARNs
lb_http_listeners_ids — List of HTTP Listeners IDs
lb_https_listeners_ids — List of HTTPS Listeners IDs
ecs_tasks_sg_description — ${var.name_prefix} ECS Tasks Security Group - The description of the security group
aws_lb_lb_dns_name — The DNS name of the load balancer.
aws_security_group_lb_access_sg_id — The ID of the security group
aws_ecs_service_service_cluster — The Amazon Resource Name (ARN) of cluster which the service runs on.
aws_security_group_lb_access_sg_name — The name of the security group
lb_https_tgs_names — List of HTTPS Target Groups Names
aws_ecs_service_service_id — The Amazon Resource Name (ARN) that identifies the service.
aws_lb_lb_id — The ARN of the load balancer (matches arn).
aws_lb_lb_zone_id — The canonical hosted zone ID of the load balancer (to be used in a Route 53 Alias record).
aws_security_group_lb_access_sg_description — The description of the security group
aws_security_group_lb_access_sg_egress — The egress rules.
lb_https_tgs_ids — List of HTTPS Target Groups IDs
aws_ecs_service_service_desired_count — The number of instances of the task definition
aws_security_group_lb_access_sg_vpc_id — The VPC ID.
lb_http_listeners_arns — List of HTTP Listeners ARNs
lb_https_listeners_arns — List of HTTPS Listeners ARNs
aws_ecs_service_service_name — The name of the service.
aws_security_group_lb_access_sg_arn — The ARN of the security group
lb_http_tgs_names — List of HTTP Target Groups Names
aws_lb_lb_arn_suffix — The ARN suffix for use with CloudWatch Metrics.
aws_security_group_lb_access_sg_ingress — The ingress rules.
lb_http_tgs_ids — List of HTTP Target Groups IDs
… and 1 more outputs
Resources (3)
aws_ecs_serviceaws_security_groupaws_security_group_rule
Details
FrameworkTerraform Module
LanguageHCL
Version2.0.50
Cloud AWS
★ Stars80
Forks48
Total downloads204.6k
Inputs50
Outputs31
Resources3
Examples1
LicenseApache-2.0
Namespacecn-terraform
Updated