- Terraform
+## Inputs
-```hcl
-module "dns" {
- source = "github.com/developertown/terraform-aws-route53.git"
- version = "VERSION"
-}
+| Name | Description | Type | Default | Required |
+|------|-------------|------|---------|:--------:|
+| [access\_logs\_enabled](#input\_access\_logs\_enabled) | A boolean flag to enable/disable access\_logs | `bool` | `false` | no |
+| [access\_logs\_prefix](#input\_access\_logs\_prefix) | The S3 log bucket prefix | `string` | `""` | no |
+| [access\_logs\_s3\_bucket\_id](#input\_access\_logs\_s3\_bucket\_id) | An external S3 Bucket name to store access logs in. If specified, no logging bucket will be created. | `string` | `null` | no |
+| [alarm\_unheathly\_threshold](#input\_alarm\_unheathly\_threshold) | Number of unheathy hosts that should cause an alarm if the actual is greater than or equal for 60 seconds | `number` | `1` | no |
+| [alb\_access\_logs\_s3\_bucket\_force\_destroy](#input\_alb\_access\_logs\_s3\_bucket\_force\_destroy) | A boolean that indicates all objects should be deleted from the ALB access logs S3 bucket so that the bucket can be destroyed without error | `bool` | `false` | no |
+| [certificate\_arn](#input\_certificate\_arn) | The certificate to use with the SSL listener | `string` | `""` | no |
+| [dns\_record\_name](#input\_dns\_record\_name) | he DNS name to use to create an alias record. The Route53 hosted zone must be accessible via the dns\_zone\_role\_arn | `string` | `""` | no |
+| [dns\_zone\_id](#input\_dns\_zone\_id) | The ID of the Route53 hosted zone to create an alias record. The Route53 hosted zone must be accessible via the dns\_zone\_role\_arn | `string` | `""` | no |
+| [dns\_zone\_role\_arn](#input\_dns\_zone\_role\_arn) | The AWS assume role | `string` | `""` | no |
+| [enabled](#input\_enabled) | Set to false to prevent the module from creating any resources | `bool` | `null` | no |
+| [environment](#input\_environment) | ID element. Usually used for region e.g. 'uw2', 'us-west-2', OR role 'prod', 'staging', 'dev', 'UAT' | `string` | `null` | no |
+| [health\_check\_path](#input\_health\_check\_path) | Destination for the health check request | `string` | `"/swagger/index.html"` | no |
+| [http\_port](#input\_http\_port) | Port on which the load balancer is listening | `number` | `80` | no |
+| [https\_port](#input\_https\_port) | SSL Port on which the load balancer is listening | `number` | `443` | no |
+| [lifecycle\_configuration\_rules](#input\_lifecycle\_configuration\_rules) | A list of S3 bucket v2 lifecycle rules, as specified in [terraform-aws-s3-bucket](https://github.com/cloudposse/terraform-aws-s3-bucket)"
These rules are not affected by the deprecated `lifecycle_rule_enabled` flag.
**NOTE:** Unless you also set `lifecycle_rule_enabled = false` you will also get the default deprecated rules set on your bucket. | list(object({
enabled = bool
id = string
abort_incomplete_multipart_upload_days = number
# `filter_and` is the `and` configuration block inside the `filter` configuration.
# This is the only place you should specify a prefix.
filter_and = any
expiration = any
transition = list(any)
noncurrent_version_expiration = any
noncurrent_version_transition = list(any)
}))
| `[]` | no |
+| [name](#input\_name) | ID element. Usually the component or solution name, e.g. 'app' or 'jenkins'.
This is the only ID element not also included as a `tag`.
The "name" tag is set to the full `id` string. There is no tag with the value of the `name` input. | `string` | `"ecs-cluster"` | no |
+| [region](#input\_region) | The region in which the resources will be created | `string` | `null` | no |
+| [role\_arn](#input\_role\_arn) | The ARN of the role that will be assumed to create the resources in this module | `string` | `null` | no |
+| [sns\_alarm\_topic\_arn](#input\_sns\_alarm\_topic\_arn) | The SNS Topic ARN to use for Cloudwatch Alarms | `string` | `""` | no |
+| [subnet\_ids](#input\_subnet\_ids) | A list of subnet IDs to attach to the load balancer. | `list(string)` | `[]` | no |
+| [suffix](#input\_suffix) | Suffix to be added to the name of each resource | `string` | `""` | no |
+| [tags](#input\_tags) | Additional tags (e.g. `{'Unit': 'XYZ'}`).
Neither the tag keys nor the tag values will be modified by this module. | `map(string)` | `{}` | no |
+| [vpc\_id](#input\_vpc\_id) | The VPC to associate the load balancer security groups, and target group with. | `string` | `""` | no |
-module "cert" {
- source = "github.com/developertown/terraform-aws-acm.git"
- version = "VERSION"
+## Outputs
- region = "us-east-1"
- dns_name = module.dns.domain_name
- subject_alternative_names = ["subdomain.${module.dns.domain_name}"]
- dns_zone_id = dependency.dns.zone_id
-}
-```
+| Name | Description |
+|------|-------------|
+| [http\_listener\_arn](#output\_http\_listener\_arn) | n/a |
+| [https\_listener\_arn](#output\_https\_listener\_arn) | n/a |
+| [load\_balancer\_arn](#output\_load\_balancer\_arn) | n/a |
+| [security\_groups](#output\_security\_groups) | n/a |
+| [target\_group\_arn](#output\_target\_group\_arn) | n/a |
-
+
+# terraform-aws-acm
-### Parent Zone Subject Alternatives
+Terraform module to create an Application Load Balancer (ALB) and associated resources.
-Create a DNS Validated ACM Certificate with Subject Alternatives in the Authenticated AWS Account. Assumes both the Certificate are managed by one AWS account and Route 53 Zone required to validate the Subject alternatives exist in a different AWS Account.
+## Usage
-