ecs-alb-service-task
cloudposse/ecs-alb-service-task/aws
Terraform module which implements an ECS service which exposes a web service via ALB.
Terraform module to create an ECS Service for a web app (task), and an ALB target group to route requests. > [!TIP] > #### 👽 Use Atmos with Terraform > Cloud Posse uses atmos to easily orchestrate multiple environments using Terraform. > Works with Github Actions, Atlantis, or Spacelift. > > > Watch demo of using Atmos with Terraform > > Example of running atmos to manage infrastructure from our Quick Start tutorial. > Usage For a complete example, see examples/complete. For automated test of the complete example using bats and Terratest, see test. ```hcl provider "aws" { region = var.region } module "label" { source = "git::https://github.com/cloudposse/terraform-null-label.git?ref=tags/0.15.0" namespace = var.namespace name = var.name stage = var.stage delimiter = var.delimiter attribute
| Name | Type | Description | Default |
|---|---|---|---|
| container_definition_json | string | A string containing a JSON-encoded array of container definitions (`"[{ "name": | required |
| vpc_id | string | The VPC ID where resources are created | required |
| enable_all_egress_rule | bool | A flag to enable/disable adding the all ports egress rule to the service securit | true |
| task_memory | number | The amount of memory (in MiB) used by the task. If using Fargate launch type `ta | 512 |
| availability_zone_rebalancing | string | ECS automatically redistributes tasks within a service across Availability Zones | "DISABLED" |
| efs_volumes | list(object({ host_path = | Task EFS volume definitions as list of configuration objects. You can define mul | [] |
| exec_enabled | bool | Specifies whether to enable Amazon ECS Exec for the tasks within the service | false |
| ipc_mode | string | The IPC resource namespace to be used for the containers in the task. The valid | null |
| environment | string | ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'st | null |
| label_order | list(string) | The order in which the labels (ID elements) appear in the `id`. Defaults to ["na | null |
| task_policy_arns | list(string) | A list of IAM Policy ARNs to attach to the generated task role. Changes to the l | [] |
| role_tags_enabled | bool | Whether or not to create tags on ECS roles | true |
| context | any | Single object for setting entire context at once. See description of individual | {
"additional_tag_map": {},
"attribu |
| deployment_minimum_healthy_percent | number | The lower limit (as a percentage of `desired_count`) of the number of tasks that | 100 |
| redeploy_on_apply | bool | Updates the service to the latest task definition on each apply | false |
| nlb_container_port | number | The port on the container to allow traffic from the NLB | 80 |
| service_role_arn | string | ARN of the IAM role that allows Amazon ECS to make calls to your load balancer o | null |
| ignore_changes_task_definition | bool | Whether to ignore changes in container definition and task definition in the ECS | true |
| propagate_tags | string | Specifies whether to propagate the tags from the task definition or the service | null |
| additional_tag_map | map(string) | Additional key-value pairs to add to each map in `tags_as_list_of_maps`. Not add | {} |
| security_group_description | string | The description to assign to the service security group. Warning: Changing the d | "Allow ALL egress from ECS service" |
| network_mode | string | The network mode to use for the task. This is required to be `awsvpc` for `FARGA | "awsvpc" |
| … and 10 more inputs | |||
ecs_exec_role_policy_id — The ECS service role policy ID, in the form of `role_name:role_policy_name`ecs_exec_role_policy_name — ECS service role nameservice_arn — ECS Service ARNtask_exec_role_name — ECS Task role nametask_definition_family — ECS task definition familyservice_name — ECS Service nameservice_role_arn — ECS Service role ARNtask_role_name — ECS Task role nametask_definition_arn — ECS task definition ARNtask_definition_arn_without_revision — ECS task definition ARN without revisiontask_exec_role_arn — ECS Task exec role ARNtask_exec_role_id — ECS Task exec role idtask_role_arn — ECS Task role ARNtask_role_id — ECS Task role idservice_security_group_id — Security Group ID of the ECS tasktask_definition_revision — ECS task definition revisionAzure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,