You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Enabling bring-your-own-bucket options for ALB logging
* pointing to git ref for bring-your-own-bucket fork
* Pointing to the ECS-ALB w/ only 1 dynamic access-logs section
* Pointing to ECS-ALB module w/ fixed output.tf
* Pointing to ECS-ALB module with (re)corrected output.tf
* Pointing to latest ecs-alb module
* Switching to use the newly-releaseed v1.0.28 of the ecs-alb module
* Updating documentation
| <aname="input_access_logs_prefix"></a> [access\_logs\_prefix](#input\_access\_logs\_prefix)| (Optional) if access logging to an S3 bucket, this sets a prefix in the bucket beneath which this LB's logs will be organized. |`string`|`null`| no |
85
86
| <aname="input_additional_certificates_arn_for_https_listeners"></a> [additional\_certificates\_arn\_for\_https\_listeners](#input\_additional\_certificates\_arn\_for\_https\_listeners)| (Optional) List of SSL server certificate ARNs for HTTPS listener. Use it if you need to set additional certificates besides default\_certificate\_arn |`list(any)`|`[]`| no |
86
87
| <aname="input_assign_public_ip"></a> [assign\_public\_ip](#input\_assign\_public\_ip)| (Optional) Assign a public IP address to the ENI (Fargate launch type only). If true service will be associated with public subnets. Default false. |`bool`|`false`| no |
87
-
| <aname="input_block_s3_bucket_public_access"></a> [block\_s3\_bucket\_public\_access](#input\_block\_s3\_bucket\_public\_access)| (Optional) If true, public access to the S3 bucket will be blocked. |`bool`|`true`| no |
88
+
| <aname="input_block_s3_bucket_public_access"></a> [block\_s3\_bucket\_public\_access](#input\_block\_s3\_bucket\_public\_access)| (Optional) If true, public access to the S3 bucket will be blocked. Ignored if log\_bucket\_id is provided. |`bool`|`true`| no |
88
89
| <aname="input_container_name"></a> [container\_name](#input\_container\_name)| Name of the running container |`any`| n/a | yes |
89
90
| <aname="input_custom_lb_arn"></a> [custom\_lb\_arn](#input\_custom\_lb\_arn)| ARN of the Load Balancer to use in the ECS service. If provided, this module will not create a load balancer and will use the one provided in this variable |`string`|`null`| no |
90
91
| <aname="input_default_certificate_arn"></a> [default\_certificate\_arn](#input\_default\_certificate\_arn)| (Optional) The ARN of the default SSL server certificate. Required if var.https\_ports is set. |`string`|`null`| no |
92
+
| <aname="input_deployment_circuit_breaker_enabled"></a> [deployment\_circuit\_breaker\_enabled](#input\_deployment\_circuit\_breaker\_enabled)| (Optional) You can enable the deployment circuit breaker to cause a service deployment to transition to a failed state if tasks are persistently failing to reach RUNNING state or are failing healthcheck. |`bool`|`false`| no |
93
+
| <aname="input_deployment_circuit_breaker_rollback"></a> [deployment\_circuit\_breaker\_rollback](#input\_deployment\_circuit\_breaker\_rollback)| (Optional) The optional rollback option causes Amazon ECS to roll back to the last completed deployment upon a deployment failure. |`bool`|`false`| no |
91
94
| <aname="input_deployment_controller"></a> [deployment\_controller](#input\_deployment\_controller)| (Optional) Deployment controller |`list(string)`|`[]`| no |
92
95
| <aname="input_deployment_maximum_percent"></a> [deployment\_maximum\_percent](#input\_deployment\_maximum\_percent)| (Optional) The upper limit (as a percentage of the service's desiredCount) of the number of running tasks that can be running in a service during a deployment. |`number`|`200`| no |
93
96
| <aname="input_deployment_minimum_healthy_percent"></a> [deployment\_minimum\_healthy\_percent](#input\_deployment\_minimum\_healthy\_percent)| (Optional) The lower limit (as a percentage of the service's desiredCount) of the number of running tasks that must remain running and healthy in a service during a deployment. |`number`|`100`| no |
94
-
| <aname="input_deployment_circuit_breaker"></a> [deployment\_circuit\_breaker](#input\_deployment\_circuit\_breaker)| (Optional) You can enable the deployment circuit breaker to cause a service deployment to transition to a failed state if tasks are persistently failing to reach RUNNING state or are failing healthcheck. The optional rollback option causes Amazon ECS to roll back to the last completed deployment upon a deployment failure. | <pre>list(object({<br> enabled = bool<br> rollback = bool<br> }))</pre> |`[]`| no |
95
97
| <aname="input_desired_count"></a> [desired\_count](#input\_desired\_count)| (Optional) The number of instances of the task definition to place and keep running. Defaults to 0. |`number`|`1`| no |
96
98
| <aname="input_ecs_cluster_arn"></a> [ecs\_cluster\_arn](#input\_ecs\_cluster\_arn)| ARN of an ECS cluster |`any`| n/a | yes |
97
99
| <aname="input_ecs_cluster_name"></a> [ecs\_cluster\_name](#input\_ecs\_cluster\_name)| (Optional) Name of the ECS cluster. Required only if autoscaling is enabled |`string`|`null`| no |
98
100
| <aname="input_ecs_tasks_sg_allow_egress_to_anywhere"></a> [ecs\_tasks\_sg\_allow\_egress\_to\_anywhere](#input\_ecs\_tasks\_sg\_allow\_egress\_to\_anywhere)| (Optional) If true an egress rule will be created to allow traffic to anywhere (0.0.0.0/0). If false no egress rule will be created. Defaults to true |`bool`|`true`| no |
99
101
| <aname="input_enable_autoscaling"></a> [enable\_autoscaling](#input\_enable\_autoscaling)| (Optional) If true, autoscaling alarms will be created. |`bool`|`true`| no |
100
102
| <aname="input_enable_ecs_managed_tags"></a> [enable\_ecs\_managed\_tags](#input\_enable\_ecs\_managed\_tags)| (Optional) Specifies whether to enable Amazon ECS managed tags for the tasks within the service. |`bool`|`false`| no |
101
103
| <aname="input_enable_execute_command"></a> [enable\_execute\_command](#input\_enable\_execute\_command)| (Optional) Specifies whether to enable Amazon ECS Exec for the tasks within the service. |`bool`|`false`| no |
102
-
| <aname="input_enable_s3_bucket_server_side_encryption"></a> [enable\_s3\_bucket\_server\_side\_encryption](#input\_enable\_s3\_bucket\_server\_side\_encryption)| (Optional) If true, server side encryption will be applied. |`bool`|`true`| no |
103
-
| <aname="input_enable_s3_logs"></a> [enable\_s3\_logs](#input\_enable\_s3\_logs)| (Optional) If true, all resources to send LB logs to S3will be created|`bool`|`true`| no |
104
+
| <aname="input_enable_s3_bucket_server_side_encryption"></a> [enable\_s3\_bucket\_server\_side\_encryption](#input\_enable\_s3\_bucket\_server\_side\_encryption)| (Optional) If true, server side encryption will be applied. Ignored if log\_bucket\_id is provided. |`bool`|`true`| no |
105
+
| <aname="input_enable_s3_logs"></a> [enable\_s3\_logs](#input\_enable\_s3\_logs)| (Optional) If true, all LoadBalancer logs will be send to S3. If true, and log\_bucket\_id is *not* provided, this module will create the bucket with other provided s3 bucket configuration options|`bool`|`true`| no |
104
106
| <aname="input_force_new_deployment"></a> [force\_new\_deployment](#input\_force\_new\_deployment)| (Optional) Enable to force a new task deployment of the service. This can be used to update tasks to use a newer Docker image with same image/tag combination (e.g. myimage:latest), roll Fargate tasks onto a newer platform version, or immediately deploy ordered\_placement\_strategy and placement\_constraints updates. |`bool`|`false`| no |
105
107
| <aname="input_health_check_grace_period_seconds"></a> [health\_check\_grace\_period\_seconds](#input\_health\_check\_grace\_period\_seconds)| (Optional) Seconds to ignore failing load balancer health checks on newly instantiated tasks to prevent premature shutdown, up to 2147483647. Only valid for services configured to use load balancers. |`number`|`0`| no |
106
108
| <aname="input_lb_deregistration_delay"></a> [lb\_deregistration\_delay](#input\_lb\_deregistration\_delay)| (Optional) The amount time for Elastic Load Balancing to wait before changing the state of a deregistering target from draining to unused. The range is 0-3600 seconds. The default value is 300 seconds. |`number`|`300`| no |
@@ -128,6 +130,7 @@ In order to run all checks at any point run the following command:
128
130
| <aname="input_lb_target_group_health_check_path"></a> [lb\_target\_group\_health\_check\_path](#input\_lb\_target\_group\_health\_check\_path)| The destination for the health check request. |`string`|`"/"`| no |
129
131
| <aname="input_lb_target_group_health_check_timeout"></a> [lb\_target\_group\_health\_check\_timeout](#input\_lb\_target\_group\_health\_check\_timeout)| (Optional) The amount of time, in seconds, during which no response means a failed health check. The range is 2 to 120 seconds, and the default is 5 seconds. |`number`|`5`| no |
130
132
| <aname="input_lb_target_group_health_check_unhealthy_threshold"></a> [lb\_target\_group\_health\_check\_unhealthy\_threshold](#input\_lb\_target\_group\_health\_check\_unhealthy\_threshold)| (Optional) The number of consecutive health check failures required before considering the target unhealthy. Defaults to 3. |`number`|`3`| no |
133
+
| <aname="input_log_bucket_id"></a> [log\_bucket\_id](#input\_log\_bucket\_id)| (Optional) if provided, the ID of a previously-defined S3 bucket to send LB logs to. |`string`|`null`| no |
131
134
| <aname="input_max_cpu_evaluation_period"></a> [max\_cpu\_evaluation\_period](#input\_max\_cpu\_evaluation\_period)| The number of periods over which data is compared to the specified threshold for max cpu metric alarm |`string`|`"3"`| no |
132
135
| <aname="input_max_cpu_period"></a> [max\_cpu\_period](#input\_max\_cpu\_period)| The period in seconds over which the specified statistic is applied for max cpu metric alarm |`string`|`"60"`| no |
133
136
| <aname="input_max_cpu_threshold"></a> [max\_cpu\_threshold](#input\_max\_cpu\_threshold)| Threshold for max CPU usage |`string`|`"85"`| no |
@@ -141,8 +144,8 @@ In order to run all checks at any point run the following command:
141
144
| <aname="input_private_subnets"></a> [private\_subnets](#input\_private\_subnets)| The private subnets associated with the task or service. |`list(any)`| n/a | yes |
142
145
| <aname="input_propagate_tags"></a> [propagate\_tags](#input\_propagate\_tags)| (Optional) Specifies whether to propagate the tags from the task definition or the service to the tasks. The valid values are SERVICE and TASK\_DEFINITION. Default to SERVICE |`string`|`"SERVICE"`| no |
143
146
| <aname="input_public_subnets"></a> [public\_subnets](#input\_public\_subnets)| The public subnets associated with the task or service. |`list(any)`| n/a | yes |
144
-
| <aname="input_s3_bucket_server_side_encryption_key"></a> [s3\_bucket\_server\_side\_encryption\_key](#input\_s3\_bucket\_server\_side\_encryption\_key)| (Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. |`string`|`null`| no |
145
-
| <aname="input_s3_bucket_server_side_encryption_sse_algorithm"></a> [s3\_bucket\_server\_side\_encryption\_sse\_algorithm](#input\_s3\_bucket\_server\_side\_encryption\_sse\_algorithm)| (Optional) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms|`string`|`"AES256"`| no |
147
+
| <aname="input_s3_bucket_server_side_encryption_key"></a> [s3\_bucket\_server\_side\_encryption\_key](#input\_s3\_bucket\_server\_side\_encryption\_key)| (Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can only be used when you set the value of sse\_algorithm as aws:kms. The default aws/s3 AWS KMS master key is used if this element is absent while the sse\_algorithm is aws:kms. Ignored if log\_bucket\_id is provided. |`string`|`null`| no |
148
+
| <aname="input_s3_bucket_server_side_encryption_sse_algorithm"></a> [s3\_bucket\_server\_side\_encryption\_sse\_algorithm](#input\_s3\_bucket\_server\_side\_encryption\_sse\_algorithm)| (Optional) The server-side encryption algorithm to use. Valid values are AES256 and aws:kms. Ignored if log\_bucket\_id is provided.|`string`|`"AES256"`| no |
146
149
| <aname="input_scale_target_max_capacity"></a> [scale\_target\_max\_capacity](#input\_scale\_target\_max\_capacity)| The max capacity of the scalable target |`number`|`5`| no |
147
150
| <aname="input_scale_target_min_capacity"></a> [scale\_target\_min\_capacity](#input\_scale\_target\_min\_capacity)| The min capacity of the scalable target |`number`|`1`| no |
148
151
| <aname="input_security_groups"></a> [security\_groups](#input\_security\_groups)| (Optional) The security groups associated with the task or service. If you do not specify a security group, the default security group for the VPC is used. |`list(any)`|`[]`| no |
0 commit comments