We recommend new projects start with resources from the AWS provider.
aws-native.elasticloadbalancingv2.getLoadBalancer
Explore with Pulumi AI
We recommend new projects start with resources from the AWS provider.
Specifies an Application Load Balancer, a Network Load Balancer, or a Gateway Load Balancer.
Using getLoadBalancer
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getLoadBalancer(args: GetLoadBalancerArgs, opts?: InvokeOptions): Promise<GetLoadBalancerResult>
function getLoadBalancerOutput(args: GetLoadBalancerOutputArgs, opts?: InvokeOptions): Output<GetLoadBalancerResult>def get_load_balancer(load_balancer_arn: Optional[str] = None,
                      opts: Optional[InvokeOptions] = None) -> GetLoadBalancerResult
def get_load_balancer_output(load_balancer_arn: Optional[pulumi.Input[str]] = None,
                      opts: Optional[InvokeOptions] = None) -> Output[GetLoadBalancerResult]func LookupLoadBalancer(ctx *Context, args *LookupLoadBalancerArgs, opts ...InvokeOption) (*LookupLoadBalancerResult, error)
func LookupLoadBalancerOutput(ctx *Context, args *LookupLoadBalancerOutputArgs, opts ...InvokeOption) LookupLoadBalancerResultOutput> Note: This function is named LookupLoadBalancer in the Go SDK.
public static class GetLoadBalancer 
{
    public static Task<GetLoadBalancerResult> InvokeAsync(GetLoadBalancerArgs args, InvokeOptions? opts = null)
    public static Output<GetLoadBalancerResult> Invoke(GetLoadBalancerInvokeArgs args, InvokeOptions? opts = null)
}public static CompletableFuture<GetLoadBalancerResult> getLoadBalancer(GetLoadBalancerArgs args, InvokeOptions options)
public static Output<GetLoadBalancerResult> getLoadBalancer(GetLoadBalancerArgs args, InvokeOptions options)
fn::invoke:
  function: aws-native:elasticloadbalancingv2:getLoadBalancer
  arguments:
    # arguments dictionaryThe following arguments are supported:
- LoadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- LoadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer StringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- load_balancer_ strarn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer StringArn 
- The Amazon Resource Name (ARN) of the load balancer.
getLoadBalancer Result
The following output properties are available:
- CanonicalHosted stringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- DnsName string
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- EnablePrefix stringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- EnforceSecurity stringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- IpAddress stringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- Ipv4IpamPool stringId 
- LoadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- LoadBalancer List<Pulumi.Attributes Aws Native. Elastic Load Balancing V2. Outputs. Load Balancer Attribute> 
- The load balancer attributes.
- LoadBalancer stringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- LoadBalancer stringName 
- The name of the load balancer. For example, my-load-balancer.
- MinimumLoad Pulumi.Balancer Capacity Aws Native. Elastic Load Balancing V2. Outputs. Load Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- SecurityGroups List<string>
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- SubnetMappings List<Pulumi.Aws Native. Elastic Load Balancing V2. Outputs. Load Balancer Subnet Mapping> 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- Subnets List<string>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- 
List<Pulumi.Aws Native. Outputs. Tag> 
- The tags to assign to the load balancer.
- CanonicalHosted stringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- DnsName string
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- EnablePrefix stringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- EnforceSecurity stringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- IpAddress stringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- Ipv4IpamPool stringId 
- LoadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- LoadBalancer []LoadAttributes Balancer Attribute 
- The load balancer attributes.
- LoadBalancer stringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- LoadBalancer stringName 
- The name of the load balancer. For example, my-load-balancer.
- MinimumLoad LoadBalancer Capacity Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- SecurityGroups []string
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- SubnetMappings []LoadBalancer Subnet Mapping 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- Subnets []string
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- Tag
- The tags to assign to the load balancer.
- canonicalHosted StringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dnsName String
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- enablePrefix StringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforceSecurity StringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ipAddress StringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4IpamPool StringId 
- loadBalancer StringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer List<LoadAttributes Balancer Attribute> 
- The load balancer attributes.
- loadBalancer StringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- loadBalancer StringName 
- The name of the load balancer. For example, my-load-balancer.
- minimumLoad LoadBalancer Capacity Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- securityGroups List<String>
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnetMappings List<LoadBalancer Subnet Mapping> 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets List<String>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- List<Tag>
- The tags to assign to the load balancer.
- canonicalHosted stringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dnsName string
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- enablePrefix stringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforceSecurity stringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ipAddress stringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4IpamPool stringId 
- loadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer LoadAttributes Balancer Attribute[] 
- The load balancer attributes.
- loadBalancer stringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- loadBalancer stringName 
- The name of the load balancer. For example, my-load-balancer.
- minimumLoad LoadBalancer Capacity Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- securityGroups string[]
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnetMappings LoadBalancer Subnet Mapping[] 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets string[]
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- Tag[]
- The tags to assign to the load balancer.
- canonical_hosted_ strzone_ id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dns_name str
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- enable_prefix_ strfor_ ipv6_ source_ nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforce_security_ strgroup_ inbound_ rules_ on_ private_ link_ traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ip_address_ strtype 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4_ipam_ strpool_ id 
- load_balancer_ strarn 
- The Amazon Resource Name (ARN) of the load balancer.
- load_balancer_ Sequence[Loadattributes Balancer Attribute] 
- The load balancer attributes.
- load_balancer_ strfull_ name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- load_balancer_ strname 
- The name of the load balancer. For example, my-load-balancer.
- minimum_load_ Loadbalancer_ capacity Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- security_groups Sequence[str]
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnet_mappings Sequence[LoadBalancer Subnet Mapping] 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets Sequence[str]
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- Sequence[root_Tag]
- The tags to assign to the load balancer.
- canonicalHosted StringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dnsName String
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- enablePrefix StringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforceSecurity StringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ipAddress StringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4IpamPool StringId 
- loadBalancer StringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer List<Property Map>Attributes 
- The load balancer attributes.
- loadBalancer StringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- loadBalancer StringName 
- The name of the load balancer. For example, my-load-balancer.
- minimumLoad Property MapBalancer Capacity 
- The minimum capacity for a load balancer.
- securityGroups List<String>
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnetMappings List<Property Map>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets List<String>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- List<Property Map>
- The tags to assign to the load balancer.
Supporting Types
LoadBalancerAttribute  
- Key string
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- Value string
- The value of the attribute.
- Key string
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- Value string
- The value of the attribute.
- key String
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value String
- The value of the attribute.
- key string
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value string
- The value of the attribute.
- key str
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value str
- The value of the attribute.
- key String
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value String
- The value of the attribute.
LoadBalancerMinimumLoadBalancerCapacity     
- CapacityUnits int
- The number of capacity units.
- CapacityUnits int
- The number of capacity units.
- capacityUnits Integer
- The number of capacity units.
- capacityUnits number
- The number of capacity units.
- capacity_units int
- The number of capacity units.
- capacityUnits Number
- The number of capacity units.
LoadBalancerSubnetMapping   
- SubnetId string
- The ID of the subnet.
- AllocationId string
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- IPv6Address string
- [Network Load Balancers] The IPv6 address.
- PrivateIPv4Address string
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- SourceNat stringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- SubnetId string
- The ID of the subnet.
- AllocationId string
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- IPv6Address string
- [Network Load Balancers] The IPv6 address.
- PrivateIPv4Address string
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- SourceNat stringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnetId String
- The ID of the subnet.
- allocationId String
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- iPv6Address String
- [Network Load Balancers] The IPv6 address.
- privateIPv4Address String
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- sourceNat StringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnetId string
- The ID of the subnet.
- allocationId string
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- iPv6Address string
- [Network Load Balancers] The IPv6 address.
- privateIPv4Address string
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- sourceNat stringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnet_id str
- The ID of the subnet.
- allocation_id str
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- i_pv6_ straddress 
- [Network Load Balancers] The IPv6 address.
- private_i_ strpv4_ address 
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- source_nat_ stripv6_ prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnetId String
- The ID of the subnet.
- allocationId String
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- iPv6Address String
- [Network Load Balancers] The IPv6 address.
- privateIPv4Address String
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- sourceNat StringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
Tag
Package Details
- Repository
- AWS Native pulumi/pulumi-aws-native
- License
- Apache-2.0
We recommend new projects start with resources from the AWS provider.