ecs-fargate
cn-terraform/ecs-fargate/aws
AWS ECS Fargate Terraform Module
AWS ECS Fargate Terraform Module # This Terraform module deploys an AWS ECS Fargate service.       Usage Check valid versions on: Github Releases: Terraform Module Registry: Install pre commit hooks. Please run this command right after cloning the repository. pre-commit install For that you may need to install the folowwing tools: Pre-commit Terraform Docs In order to run all checks at any
| Name | Type | Description | Default |
|---|---|---|---|
| private_subnets_ids | list(any) | The private subnets associated with the task or service. | required |
| vpc_id | string | ID of the VPC | required |
| public_subnets_ids | list(any) | The public subnets associated with the task or service. | required |
| deployment_minimum_healthy_percent | number | (Optional) The lower limit (as a percentage of the service's desiredCount) of th | 100 |
| lb_idle_timeout | number | (Optional) The time in seconds that the connection is allowed to be idle. Defaul | 60 |
| tags | map(string) | Resource tags | {} |
| port_mappings | list(object({ containerPor | The port mappings to configure for the container. This is a list of maps. Each m | [
{
"containerPort": 80,
"host |
| secrets | list(object({ name = | The secrets to pass to the container. This is a list of maps | [] |
| deployment_controller | list(any) | (Optional) Deployment controller | [
{
"type": "ECS"
}
] |
| ordered_placement_strategy | list(any) | (Optional) Service level strategy rules that are taken into consideration during | [] |
| additional_lbs | map(object ( { | Additional load balancers to add to ECS service | {} |
| lb_target_group_health_check_path | string | The destination for the health check request. | "/" |
| container_memory | number | (Optional) The amount of memory (in MiB) to allow the container to use. This is | 4096 |
| entrypoint | list(string) | The entry point that is passed to the container | [] |
| linux_parameters | object({ capabilities = ob | Linux-specific modifications that are applied to the container, such as Linux ke | null |
| start_timeout | number | Time duration (in seconds) to wait before giving up on resolving dependencies fo | null |
| s3_bucket_server_side_encryption_key | string | (Optional) The AWS KMS master key ID used for the SSE-KMS encryption. This can o | null |
| lb_target_group_health_check_interval | number | (Optional) The approximate amount of time, in seconds, between health checks of | 30 |
| enable_ecs_managed_tags | bool | (Optional) Specifies whether to enable Amazon ECS managed tags for the tasks wit | false |
| working_directory | string | The working directory to run commands inside the container | null |
| ulimits | list(object({ name = | Container ulimit settings. This is a list of maps, where each map should contain | [] |
| repository_credentials | map(string) | Container repository credentials; required when using a private repo. This map | null |
| privileged | bool | When this variable is `true`, the container is given elevated privileges on the | null |
| … and 10 more inputs | |||
aws_lb_lb_id — The ARN of the load balancer (matches arn).aws_ecs_cluster_cluster_name — The name of the clusteraws_iam_role_ecs_task_execution_role_unique_id — The stable and unique string identifying the role.aws_lb_lb_arn_suffix — The ARN suffix for use with CloudWatch Metrics.aws_iam_role_ecs_task_execution_role_name — The name of the role.aws_security_group_lb_access_sg_name — The name of the security grouplb_http_tgs_arns — List of HTTP Target Groups ARNslb_https_tgs_ids — List of HTTPS Target Groups IDslb_http_listeners_arns — List of HTTP Listeners ARNsaws_ecs_service_service_name — The name of the service.aws_ecs_service_service_cluster — The Amazon Resource Name (ARN) of cluster which the service runs on.aws_iam_role_ecs_task_execution_role_id — The ID of the role.container_name — Name of the containeraws_security_group_lb_access_sg_description — The description of the security grouplb_https_tgs_names — List of HTTPS Target Groups Namesaws_iam_role_ecs_task_execution_role_arn — The Amazon Resource Name (ARN) specifying the role.aws_ecs_task_definition_td_arn — Full ARN of the Task Definition (including both family and revision).aws_security_group_lb_access_sg_id — The ID of the security groupaws_security_group_lb_access_sg_ingress — The ingress rules.ecs_tasks_sg_arn — ${var.name_prefix} ECS Tasks Security Group - The ARN of the security groupecs_tasks_sg_name — ${var.name_prefix} ECS Tasks Security Group - The name of the security groupaws_ecs_cluster_cluster_arn — The Amazon Resource Name (ARN) that identifies the clusteraws_iam_role_ecs_task_execution_role_create_date — The creation date of the IAM role.aws_ecs_task_definition_td_family — The family of the Task Definition.aws_lb_lb_arn — The ARN of the load balancer (matches id).aws_lb_lb_zone_id — The canonical hosted zone ID of the load balancer (to be used in a Route 53 Alias record).aws_security_group_lb_access_sg_egress — The egress rules.lb_http_tgs_ids — List of HTTP Target Groups IDslb_http_tgs_names — List of HTTP Target Groups Namesaws_ecs_task_definition_td_revision — The revision of the task in a particular family.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,