Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add alb #142

Merged
merged 1 commit into from
Apr 22, 2024
Merged

Add alb #142

merged 1 commit into from
Apr 22, 2024

Conversation

soerenmartius
Copy link
Contributor

No description provided.

@soerenmartius soerenmartius requested a review from a team as a code owner April 22, 2024 21:44
Copy link

github-actions bot commented Apr 22, 2024

Preview of Terraform changes in de62dae

🔍 View Details on Terramate Cloud

Changed Stacks

prod/us-east-1/alb

Terraform Plan

terramate: Entering stack in /stacks/prod/us-east-1/alb
terramate: Executing command "terraform show -no-color out.tfplan"

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
 <= read (data resources)

Terraform will perform the following actions:

  # data.aws_subnets.subnets will be read during apply
  # (config refers to values not yet known)
 <= data "aws_subnets" "subnets" {
      + id   = (known after apply)
      + ids  = (known after apply)
      + tags = {
          + "Tier" = "public"
        }

      + filter {
          + name   = "vpc-id"
          + values = [
              + (known after apply),
            ]
        }
    }

  # data.aws_vpc.vpc will be read during apply
  # (depends on a resource or a module with changes pending)
 <= data "aws_vpc" "vpc" {
      + arn                                  = (known after apply)
      + cidr_block                           = (known after apply)
      + cidr_block_associations              = (known after apply)
      + default                              = (known after apply)
      + dhcp_options_id                      = (known after apply)
      + enable_dns_hostnames                 = (known after apply)
      + enable_dns_support                   = (known after apply)
      + enable_network_address_usage_metrics = (known after apply)
      + id                                   = (known after apply)
      + instance_tenancy                     = (known after apply)
      + ipv6_association_id                  = (known after apply)
      + ipv6_cidr_block                      = (known after apply)
      + main_route_table_id                  = (known after apply)
      + owner_id                             = (known after apply)
      + state                                = (known after apply)
      + tags                                 = {
          + "Environment" = "prd"
          + "Terraform"   = "true"
        }
    }

  # null_resource.initial_deployment_trigger will be created
  + resource "null_resource" "initial_deployment_trigger" {
      + id = (known after apply)
    }

  # module.alb.aws_lb.this[0] will be created
  + resource "aws_lb" "this" {
      + arn                                                          = (known after apply)
      + arn_suffix                                                   = (known after apply)
      + client_keep_alive                                            = 3600
      + desync_mitigation_mode                                       = "defensive"
      + dns_name                                                     = (known after apply)
      + drop_invalid_header_fields                                   = true
      + enable_deletion_protection                                   = false
      + enable_http2                                                 = true
      + enable_tls_version_and_cipher_suite_headers                  = false
      + enable_waf_fail_open                                         = false
      + enable_xff_client_port                                       = false
      + enforce_security_group_inbound_rules_on_private_link_traffic = (known after apply)
      + id                                                           = (known after apply)
      + idle_timeout                                                 = 60
      + internal                                                     = (known after apply)
      + ip_address_type                                              = (known after apply)
      + load_balancer_type                                           = "application"
      + name                                                         = "production-alb"
      + name_prefix                                                  = (known after apply)
      + preserve_host_header                                         = false
      + security_groups                                              = (known after apply)
      + subnets                                                      = (known after apply)
      + tags                                                         = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + tags_all                                                     = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + vpc_id                                                       = (known after apply)
      + xff_header_processing_mode                                   = "append"
      + zone_id                                                      = (known after apply)

      + timeouts {}
    }

  # module.alb.aws_lb_listener.this["ex_http"] will be created
  + resource "aws_lb_listener" "this" {
      + arn               = (known after apply)
      + id                = (known after apply)
      + load_balancer_arn = (known after apply)
      + port              = 80
      + protocol          = "HTTP"
      + ssl_policy        = (known after apply)
      + tags              = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + tags_all          = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }

      + default_action {
          + order            = (known after apply)
          + target_group_arn = (known after apply)
          + type             = "forward"
        }
    }

  # module.alb.aws_lb_target_group.this["ex_ecs"] will be created
  + resource "aws_lb_target_group" "this" {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = (known after apply)
      + deregistration_delay               = "5"
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancer_arns                 = (known after apply)
      + load_balancing_algorithm_type      = (known after apply)
      + load_balancing_anomaly_mitigation  = (known after apply)
      + load_balancing_cross_zone_enabled  = "true"
      + name                               = (known after apply)
      + name_prefix                        = (known after apply)
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + tags                               = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + tags_all                           = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)

      + health_check {
          + enabled             = true
          + healthy_threshold   = 5
          + interval            = 30
          + matcher             = "200"
          + path                = "/"
          + port                = "traffic-port"
          + protocol            = "HTTP"
          + timeout             = 5
          + unhealthy_threshold = 2
        }
    }

  # module.alb.aws_security_group.this[0] will be created
  + resource "aws_security_group" "this" {
      + arn                    = (known after apply)
      + description            = "Security group for production-alb application load balancer"
      + egress                 = (known after apply)
      + id                     = (known after apply)
      + ingress                = (known after apply)
      + name                   = (known after apply)
      + name_prefix            = "production-alb-"
      + owner_id               = (known after apply)
      + revoke_rules_on_delete = false
      + tags                   = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + tags_all               = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + vpc_id                 = (known after apply)
    }

  # module.alb.aws_vpc_security_group_egress_rule.this["all"] will be created
  + resource "aws_vpc_security_group_egress_rule" "this" {
      + arn                    = (known after apply)
      + cidr_ipv4              = "10.0.0.0/16"
      + id                     = (known after apply)
      + ip_protocol            = "-1"
      + security_group_id      = (known after apply)
      + security_group_rule_id = (known after apply)
      + tags                   = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + tags_all               = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
    }

  # module.alb.aws_vpc_security_group_ingress_rule.this["all_http"] will be created
  + resource "aws_vpc_security_group_ingress_rule" "this" {
      + arn                    = (known after apply)
      + cidr_ipv4              = "0.0.0.0/0"
      + from_port              = 80
      + id                     = (known after apply)
      + ip_protocol            = "tcp"
      + security_group_id      = (known after apply)
      + security_group_rule_id = (known after apply)
      + tags                   = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + tags_all               = {
          + "Environment"           = "prd"
          + "Terraform"             = "true"
          + "terraform-aws-modules" = "alb"
        }
      + to_port                = 80
    }

Plan: 7 to add, 0 to change, 0 to destroy.

Changes to Outputs:
  + security_group_arn = (known after apply)
  + security_group_id  = (known after apply)
  + target_group       = {
      + arn                                = (known after apply)
      + arn_suffix                         = (known after apply)
      + connection_termination             = (known after apply)
      + deregistration_delay               = "5"
      + health_check                       = [
          + {
              + enabled             = true
              + healthy_threshold   = 5
              + interval            = 30
              + matcher             = "200"
              + path                = "/"
              + port                = "traffic-port"
              + protocol            = "HTTP"
              + timeout             = 5
              + unhealthy_threshold = 2
            },
        ]
      + id                                 = (known after apply)
      + ip_address_type                    = (known after apply)
      + lambda_multi_value_headers_enabled = false
      + load_balancer_arns                 = (known after apply)
      + load_balancing_algorithm_type      = (known after apply)
      + load_balancing_anomaly_mitigation  = (known after apply)
      + load_balancing_cross_zone_enabled  = "true"
      + name                               = (known after apply)
      + name_prefix                        = (known after apply)
      + port                               = 80
      + preserve_client_ip                 = (known after apply)
      + protocol                           = "HTTP"
      + protocol_version                   = (known after apply)
      + proxy_protocol_v2                  = false
      + slow_start                         = 0
      + stickiness                         = (known after apply)
      + tags                               = {
          + Environment           = "prd"
          + Terraform             = "true"
          + terraform-aws-modules = "alb"
        }
      + tags_all                           = {
          + Environment           = "prd"
          + Terraform             = "true"
          + terraform-aws-modules = "alb"
        }
      + target_failover                    = (known after apply)
      + target_health_state                = (known after apply)
      + target_type                        = "ip"
      + vpc_id                             = (known after apply)
    }

@soerenmartius soerenmartius force-pushed the soerenmartius/add-alb branch from ba294a2 to de62dae Compare April 22, 2024 21:45
@soerenmartius soerenmartius merged commit 6484477 into main Apr 22, 2024
1 check passed
@soerenmartius soerenmartius deleted the soerenmartius/add-alb branch April 22, 2024 21:47
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

1 participant