-
Notifications
You must be signed in to change notification settings - Fork 3.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Specify container port protocol for ApplicationLoadBalancedFargateService #7266
Comments
Hi jdavisp3, just to be clear, are you describing the situation where you need the routing capabilities of the ALB, but need a new HTTPS connection to be originated at the load balancer and routed to your container targets? |
That's exactly right. |
Thanks for the reply! This fix seems pretty quick at the moment, so barring any unexpected complications we should have this out as an optional parameter shortly. |
Awesome! I was able to convince the current version to do this, but I had to add a lot of extra code so having this as an optional parameter will be 👌 |
Would you be able to share any (anonymized, of course) snippets of what you did to coerce the current implementation to behave properly? It would help us understand some of the ways our customers are innovating using the CDK to meet their own needs. |
Sure so first I added two port mappings to the container:
Making sure HTTPS came after 80 (I don't need 80 but that's the one that the construct will use so I can configure HTTPS myself). Then after creating the whole service I did this:
|
Related #6428 |
To shed some additional light on the question of "why do you need HTTPS if it's inside your VPC" I would mention the HIPAA guidelines of "encrypt at rest, encrypt in transit". Not to suggest that the networking inside AWS inside isn't rock-solid already, but in general it's easier to satisfy regulatory requirements by following them even when it's not strictly technically necessary. |
@SomayaB I have the same requirement as @jdavisp3. Building systems that fall under the HIPAA guidelines for handling of PHI. Unless AWS can provide guidance/documentation indicating that traffic within a VPC is protected in accordance with HIPAA guidelines (something authoritative that I can show an auditor), I'm required to ensure end-to-end encryption. |
Related #7989 |
Also #11381 |
This is resolved as of merge of #11381 |
|
Specify target group protocol when creating an application load balanced service.
Use Case
To use the ECS Pattern for a
LoadBalancedFargateService
when the container serves HTTPS.Proposed Solution
Make the target protocol an option in the constructor.
This is a 🚀 Feature Request
The text was updated successfully, but these errors were encountered: