Skip to main content

Elastic Load Balancer (ELB)

Deploy the Application Load Balancer (ALB) for load balancing HTTP and HTTPS, with support for routing rules and WebSockets.

View on GitHub

Reference

  • access_logs_s3_bucket_name The name to use for the S3 bucket where the ALB access logs will be stored. If you set this to null, a name will be generated automatically based on alb_name.
  • allow_all_outbound Set to true to enable all outbound traffic on this ALB. If set to false, the ALB will allow no outbound traffic by default. This will make the ALB unusuable, so some other code must then update the ALB Security Group to enable outbound access!
  • custom_tags A map of custom tags to apply to the ALB and its Security Group. The key is the tag name and the value is the tag value.
  • default_action_body If a request to the load balancer does not match any of your listener rules, the default action will return a fixed response with this body.
  • default_action_content_type If a request to the load balancer does not match any of your listener rules, the default action will return a fixed response with this content type.
  • default_action_status_code If a request to the load balancer does not match any of your listener rules, the default action will return a fixed response with this status code.
  • drop_invalid_header_fields If true, the ALB will drop invalid headers. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
  • enable_deletion_protection Enable deletion protection on the ALB instance. If this is enabled, the load balancer cannot be deleted prior to disabling
  • force_destroy A boolean that indicates whether the access logs bucket should be destroyed, even if there are files in it, when you run Terraform destroy. Unless you are using this bucket only for test purposes, you'll want to leave this variable set to false.
  • http_listener_ports A list of ports for which an HTTP Listener should be created on the ALB. Tip: When you define Listener Rules for these Listeners, be sure that, for each Listener, at least one Listener Rule uses the '*' path to ensure that every possible request path for that Listener is handled by a Listener Rule. Otherwise some requests won't route to any Target Group.
  • https_listener_ports_and_acm_ssl_certs A list of the ports for which an HTTPS Listener should be created on the ALB. Each item in the list should be a map with the keys 'port', the port number to listen on, and 'tls_domain_name', the domain name of an SSL/TLS certificate issued by the Amazon Certificate Manager (ACM) to associate with the Listener to be created. If your certificate isn't issued by ACM, specify https_listener_ports_and_ssl_certs instead. Tip: When you define Listener Rules for these Listeners, be sure that, for each Listener, at least one Listener Rule uses the '*' path to ensure that every possible request path for that Listener is handled by a Listener Rule. Otherwise some requests won't route to any Target Group.
  • https_listener_ports_and_ssl_certs A list of the ports for which an HTTPS Listener should be created on the ALB. Each item in the list should be a map with the keys 'port', the port number to listen on, and 'tls_arn', the Amazon Resource Name (ARN) of the SSL/TLS certificate to associate with the Listener to be created. If your certificate is issued by the Amazon Certificate Manager (ACM), specify https_listener_ports_and_acm_ssl_certs instead. Tip: When you define Listener Rules for these Listeners, be sure that, for each Listener, at least one Listener Rule uses the '*' path to ensure that every possible request path for that Listener is handled by a Listener Rule. Otherwise some requests won't route to any Target Group.
  • idle_timeout The time in seconds that the client TCP connection to the ALB is allowed to be idle before the ALB closes the TCP connection.
  • is_internal_alb If the ALB should only accept traffic from within the VPC, set this to true. If it should accept traffic from the public Internet, set it to false.
  • should_create_access_logs_bucket If true, create a new S3 bucket for access logs with the name in access_logs_s3_bucket_name. If false, assume the S3 bucket for access logs with the name in access_logs_s3_bucket_name already exists, and don't create a new one. Note that if you set this to false, it's up to you to ensure that the S3 bucket has a bucket policy that grants Elastic Load Balancing permission to write the access logs to your bucket.
  • vpc_id ID of the VPC where the ALB will be deployed
  • vpc_subnet_ids The ids of the subnets that the ALB can use to source its IP