2
2
# S3 BUCKET - For access logs
3
3
# ------------------------------------------------------------------------------
4
4
# resource "aws_s3_bucket" "logs" {
5
- # bucket = "${var.name_preffix }-lb-logs"
5
+ # bucket = "${var.name_prefix }-lb-logs"
6
6
# region = var.region
7
7
# tags = {
8
- # Name = "${var.name_preffix }-lb-logs"
8
+ # Name = "${var.name_prefix }-lb-logs"
9
9
# }
10
10
# }
11
11
12
12
# ------------------------------------------------------------------------------
13
13
# APPLICATION LOAD BALANCER
14
14
# ------------------------------------------------------------------------------
15
15
resource "aws_lb" "lb" {
16
- name = " ${ var . name_preffix } -lb"
16
+ name = " ${ var . name_prefix } -lb"
17
17
internal = var. internal
18
18
load_balancer_type = " application"
19
19
drop_invalid_header_fields = var. drop_invalid_header_fields
@@ -33,15 +33,15 @@ resource "aws_lb" "lb" {
33
33
# enabled = true
34
34
# }
35
35
tags = {
36
- Name = " ${ var . name_preffix } -lb"
36
+ Name = " ${ var . name_prefix } -lb"
37
37
}
38
38
}
39
39
40
40
# ------------------------------------------------------------------------------
41
41
# ACCESS CONTROL TO APPLICATION LOAD BALANCER
42
42
# ------------------------------------------------------------------------------
43
43
resource "aws_security_group" "lb_access_sg" {
44
- name = " ${ var . name_preffix } -lb-access-sg"
44
+ name = " ${ var . name_prefix } -lb-access-sg"
45
45
description = " Controls access to the Load Balancer"
46
46
vpc_id = var. vpc_id
47
47
egress {
@@ -51,7 +51,7 @@ resource "aws_security_group" "lb_access_sg" {
51
51
cidr_blocks = [" 0.0.0.0/0" ]
52
52
}
53
53
tags = {
54
- Name = " ${ var . name_preffix } -lb-access-sg"
54
+ Name = " ${ var . name_prefix } -lb-access-sg"
55
55
}
56
56
}
57
57
@@ -82,7 +82,7 @@ resource "aws_security_group_rule" "ingress_through_https" {
82
82
# ------------------------------------------------------------------------------
83
83
resource "aws_lb_target_group" "lb_http_tgs" {
84
84
count = var. enable_http ? length (var. http_ports ) : 0
85
- name = " ${ var . name_preffix } -lb-http-tg-${ count . index } "
85
+ name = " ${ var . name_prefix } -lb-http-tg-${ count . index } "
86
86
port = element (var. http_ports , count. index )
87
87
protocol = " HTTP"
88
88
vpc_id = var. vpc_id
@@ -109,7 +109,7 @@ resource "aws_lb_target_group" "lb_http_tgs" {
109
109
}
110
110
target_type = " ip"
111
111
tags = {
112
- Name = " ${ var . name_preffix } -lb-http-tg-${ count . index } "
112
+ Name = " ${ var . name_prefix } -lb-http-tg-${ count . index } "
113
113
}
114
114
lifecycle {
115
115
create_before_destroy = true
@@ -119,7 +119,7 @@ resource "aws_lb_target_group" "lb_http_tgs" {
119
119
120
120
resource "aws_lb_target_group" "lb_https_tgs" {
121
121
count = var. enable_https ? length (var. https_ports ) : 0
122
- name = " ${ var . name_preffix } -lb-https-tg-${ count . index } "
122
+ name = " ${ var . name_prefix } -lb-https-tg-${ count . index } "
123
123
port = element (var. https_ports , count. index )
124
124
protocol = " HTTPS"
125
125
vpc_id = var. vpc_id
@@ -146,7 +146,7 @@ resource "aws_lb_target_group" "lb_https_tgs" {
146
146
}
147
147
target_type = " ip"
148
148
tags = {
149
- Name = " ${ var . name_preffix } -lb-https-tg-${ count . index } "
149
+ Name = " ${ var . name_prefix } -lb-https-tg-${ count . index } "
150
150
}
151
151
lifecycle {
152
152
create_before_destroy = true
0 commit comments