We recommend new projects start with resources from the AWS provider.
aws-native.elasticloadbalancingv2.LoadBalancer
Explore with Pulumi AI
We recommend new projects start with resources from the AWS provider.
Specifies an Application Load Balancer, a Network Load Balancer, or a Gateway Load Balancer.
Create LoadBalancer Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new LoadBalancer(name: string, args?: LoadBalancerArgs, opts?: CustomResourceOptions);@overload
def LoadBalancer(resource_name: str,
                 args: Optional[LoadBalancerArgs] = None,
                 opts: Optional[ResourceOptions] = None)
@overload
def LoadBalancer(resource_name: str,
                 opts: Optional[ResourceOptions] = None,
                 enable_prefix_for_ipv6_source_nat: Optional[str] = None,
                 enforce_security_group_inbound_rules_on_private_link_traffic: Optional[str] = None,
                 ip_address_type: Optional[str] = None,
                 ipv4_ipam_pool_id: Optional[str] = None,
                 load_balancer_attributes: Optional[Sequence[LoadBalancerAttributeArgs]] = None,
                 minimum_load_balancer_capacity: Optional[LoadBalancerMinimumLoadBalancerCapacityArgs] = None,
                 name: Optional[str] = None,
                 scheme: Optional[str] = None,
                 security_groups: Optional[Sequence[str]] = None,
                 subnet_mappings: Optional[Sequence[LoadBalancerSubnetMappingArgs]] = None,
                 subnets: Optional[Sequence[str]] = None,
                 tags: Optional[Sequence[_root_inputs.TagArgs]] = None,
                 type: Optional[str] = None)func NewLoadBalancer(ctx *Context, name string, args *LoadBalancerArgs, opts ...ResourceOption) (*LoadBalancer, error)public LoadBalancer(string name, LoadBalancerArgs? args = null, CustomResourceOptions? opts = null)
public LoadBalancer(String name, LoadBalancerArgs args)
public LoadBalancer(String name, LoadBalancerArgs args, CustomResourceOptions options)
type: aws-native:elasticloadbalancingv2:LoadBalancer
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args LoadBalancerArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args LoadBalancerArgs
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args LoadBalancerArgs
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args LoadBalancerArgs
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args LoadBalancerArgs
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
LoadBalancer Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The LoadBalancer resource accepts the following input properties:
- EnablePrefix stringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- EnforceSecurity stringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- IpAddress stringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- Ipv4IpamPool stringId 
- LoadBalancer List<Pulumi.Attributes Aws Native. Elastic Load Balancing V2. Inputs. Load Balancer Attribute> 
- The load balancer attributes.
- MinimumLoad Pulumi.Balancer Capacity Aws Native. Elastic Load Balancing V2. Inputs. Load Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- Name string
- The name of the load balancer. This name must be unique per region per account, can have a maximum of 32 characters, must contain only alphanumeric characters or hyphens, must not begin or end with a hyphen, and must not begin with "internal-". If you don't specify a name, AWS CloudFormation generates a unique physical ID for the load balancer. If you specify a name, you cannot perform updates that require replacement of this resource, but you can perform other updates. To replace the resource, specify a new name.
- Scheme string
- The nodes of an Internet-facing load balancer have public IP addresses. The DNS name of an Internet-facing load balancer is publicly resolvable to the public IP addresses of the nodes. Therefore, Internet-facing load balancers can route requests from clients over the internet. The nodes of an internal load balancer have only private IP addresses. The DNS name of an internal load balancer is publicly resolvable to the private IP addresses of the nodes. Therefore, internal load balancers can route requests only from clients with access to the VPC for the load balancer. The default is an Internet-facing load balancer. You can't specify a scheme for a Gateway Load Balancer.
- SecurityGroups List<string>
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- SubnetMappings List<Pulumi.Aws Native. Elastic Load Balancing V2. Inputs. Load Balancer Subnet Mapping> 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- Subnets List<string>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- 
List<Pulumi.Aws Native. Inputs. Tag> 
- The tags to assign to the load balancer.
- Type string
- The type of load balancer. The default is application.
- EnablePrefix stringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- EnforceSecurity stringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- IpAddress stringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- Ipv4IpamPool stringId 
- LoadBalancer []LoadAttributes Balancer Attribute Args 
- The load balancer attributes.
- MinimumLoad LoadBalancer Capacity Balancer Minimum Load Balancer Capacity Args 
- The minimum capacity for a load balancer.
- Name string
- The name of the load balancer. This name must be unique per region per account, can have a maximum of 32 characters, must contain only alphanumeric characters or hyphens, must not begin or end with a hyphen, and must not begin with "internal-". If you don't specify a name, AWS CloudFormation generates a unique physical ID for the load balancer. If you specify a name, you cannot perform updates that require replacement of this resource, but you can perform other updates. To replace the resource, specify a new name.
- Scheme string
- The nodes of an Internet-facing load balancer have public IP addresses. The DNS name of an Internet-facing load balancer is publicly resolvable to the public IP addresses of the nodes. Therefore, Internet-facing load balancers can route requests from clients over the internet. The nodes of an internal load balancer have only private IP addresses. The DNS name of an internal load balancer is publicly resolvable to the private IP addresses of the nodes. Therefore, internal load balancers can route requests only from clients with access to the VPC for the load balancer. The default is an Internet-facing load balancer. You can't specify a scheme for a Gateway Load Balancer.
- SecurityGroups []string
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- SubnetMappings []LoadBalancer Subnet Mapping Args 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- Subnets []string
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- 
TagArgs 
- The tags to assign to the load balancer.
- Type string
- The type of load balancer. The default is application.
- enablePrefix StringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforceSecurity StringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ipAddress StringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4IpamPool StringId 
- loadBalancer List<LoadAttributes Balancer Attribute> 
- The load balancer attributes.
- minimumLoad LoadBalancer Capacity Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- name String
- The name of the load balancer. This name must be unique per region per account, can have a maximum of 32 characters, must contain only alphanumeric characters or hyphens, must not begin or end with a hyphen, and must not begin with "internal-". If you don't specify a name, AWS CloudFormation generates a unique physical ID for the load balancer. If you specify a name, you cannot perform updates that require replacement of this resource, but you can perform other updates. To replace the resource, specify a new name.
- scheme String
- The nodes of an Internet-facing load balancer have public IP addresses. The DNS name of an Internet-facing load balancer is publicly resolvable to the public IP addresses of the nodes. Therefore, Internet-facing load balancers can route requests from clients over the internet. The nodes of an internal load balancer have only private IP addresses. The DNS name of an internal load balancer is publicly resolvable to the private IP addresses of the nodes. Therefore, internal load balancers can route requests only from clients with access to the VPC for the load balancer. The default is an Internet-facing load balancer. You can't specify a scheme for a Gateway Load Balancer.
- securityGroups List<String>
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnetMappings List<LoadBalancer Subnet Mapping> 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets List<String>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- List<Tag>
- The tags to assign to the load balancer.
- type String
- The type of load balancer. The default is application.
- enablePrefix stringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforceSecurity stringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ipAddress stringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4IpamPool stringId 
- loadBalancer LoadAttributes Balancer Attribute[] 
- The load balancer attributes.
- minimumLoad LoadBalancer Capacity Balancer Minimum Load Balancer Capacity 
- The minimum capacity for a load balancer.
- name string
- The name of the load balancer. This name must be unique per region per account, can have a maximum of 32 characters, must contain only alphanumeric characters or hyphens, must not begin or end with a hyphen, and must not begin with "internal-". If you don't specify a name, AWS CloudFormation generates a unique physical ID for the load balancer. If you specify a name, you cannot perform updates that require replacement of this resource, but you can perform other updates. To replace the resource, specify a new name.
- scheme string
- The nodes of an Internet-facing load balancer have public IP addresses. The DNS name of an Internet-facing load balancer is publicly resolvable to the public IP addresses of the nodes. Therefore, Internet-facing load balancers can route requests from clients over the internet. The nodes of an internal load balancer have only private IP addresses. The DNS name of an internal load balancer is publicly resolvable to the private IP addresses of the nodes. Therefore, internal load balancers can route requests only from clients with access to the VPC for the load balancer. The default is an Internet-facing load balancer. You can't specify a scheme for a Gateway Load Balancer.
- securityGroups string[]
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnetMappings LoadBalancer Subnet Mapping[] 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets string[]
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- Tag[]
- The tags to assign to the load balancer.
- type string
- The type of load balancer. The default is application.
- enable_prefix_ strfor_ ipv6_ source_ nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforce_security_ strgroup_ inbound_ rules_ on_ private_ link_ traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ip_address_ strtype 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4_ipam_ strpool_ id 
- load_balancer_ Sequence[Loadattributes Balancer Attribute Args] 
- The load balancer attributes.
- minimum_load_ Loadbalancer_ capacity Balancer Minimum Load Balancer Capacity Args 
- The minimum capacity for a load balancer.
- name str
- The name of the load balancer. This name must be unique per region per account, can have a maximum of 32 characters, must contain only alphanumeric characters or hyphens, must not begin or end with a hyphen, and must not begin with "internal-". If you don't specify a name, AWS CloudFormation generates a unique physical ID for the load balancer. If you specify a name, you cannot perform updates that require replacement of this resource, but you can perform other updates. To replace the resource, specify a new name.
- scheme str
- The nodes of an Internet-facing load balancer have public IP addresses. The DNS name of an Internet-facing load balancer is publicly resolvable to the public IP addresses of the nodes. Therefore, Internet-facing load balancers can route requests from clients over the internet. The nodes of an internal load balancer have only private IP addresses. The DNS name of an internal load balancer is publicly resolvable to the private IP addresses of the nodes. Therefore, internal load balancers can route requests only from clients with access to the VPC for the load balancer. The default is an Internet-facing load balancer. You can't specify a scheme for a Gateway Load Balancer.
- security_groups Sequence[str]
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnet_mappings Sequence[LoadBalancer Subnet Mapping Args] 
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets Sequence[str]
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- 
Sequence[TagArgs] 
- The tags to assign to the load balancer.
- type str
- The type of load balancer. The default is application.
- enablePrefix StringFor Ipv6Source Nat 
- [Network Load Balancers with UDP listeners] Indicates whether to use an IPv6 prefix from each subnet for source NAT. The IP address type must be dualstack. The default value isoff.
- enforceSecurity StringGroup Inbound Rules On Private Link Traffic 
- Indicates whether to evaluate inbound security group rules for traffic sent to a Network Load Balancer through privatelink. The default is on.
- ipAddress StringType 
- The IP address type. Internal load balancers must use ipv4. [Application Load Balancers] The possible values areipv4(IPv4 addresses),dualstack(IPv4 and IPv6 addresses), anddualstack-without-public-ipv4(public IPv6 addresses and private IPv4 and IPv6 addresses). Application Load Balancer authentication supports IPv4 addresses only when connecting to an Identity Provider (IdP) or Amazon Cognito endpoint. Without a public IPv4 address the load balancer can't complete the authentication process, resulting in HTTP 500 errors. [Network Load Balancers and Gateway Load Balancers] The possible values areipv4(IPv4 addresses) anddualstack(IPv4 and IPv6 addresses).
- ipv4IpamPool StringId 
- loadBalancer List<Property Map>Attributes 
- The load balancer attributes.
- minimumLoad Property MapBalancer Capacity 
- The minimum capacity for a load balancer.
- name String
- The name of the load balancer. This name must be unique per region per account, can have a maximum of 32 characters, must contain only alphanumeric characters or hyphens, must not begin or end with a hyphen, and must not begin with "internal-". If you don't specify a name, AWS CloudFormation generates a unique physical ID for the load balancer. If you specify a name, you cannot perform updates that require replacement of this resource, but you can perform other updates. To replace the resource, specify a new name.
- scheme String
- The nodes of an Internet-facing load balancer have public IP addresses. The DNS name of an Internet-facing load balancer is publicly resolvable to the public IP addresses of the nodes. Therefore, Internet-facing load balancers can route requests from clients over the internet. The nodes of an internal load balancer have only private IP addresses. The DNS name of an internal load balancer is publicly resolvable to the private IP addresses of the nodes. Therefore, internal load balancers can route requests only from clients with access to the VPC for the load balancer. The default is an Internet-facing load balancer. You can't specify a scheme for a Gateway Load Balancer.
- securityGroups List<String>
- [Application Load Balancers and Network Load Balancers] The IDs of the security groups for the load balancer.
- subnetMappings List<Property Map>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. [Application Load Balancers] You must specify subnets from at least two Availability Zones. You can't specify Elastic IP addresses for your subnets. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers] You can specify subnets from one or more Availability Zones. You can specify one Elastic IP address per subnet if you need static IP addresses for your internet-facing load balancer. For internal load balancers, you can specify one private IP address per subnet from the IPv4 range of the subnet. For internet-facing load balancer, you can specify one IPv6 address per subnet. [Gateway Load Balancers] You can specify subnets from one or more Availability Zones. You can't specify Elastic IP addresses for your subnets.
- subnets List<String>
- The IDs of the subnets. You can specify only one subnet per Availability Zone. You must specify either subnets or subnet mappings, but not both. To specify an Elastic IP address, specify subnet mappings instead of subnets. [Application Load Balancers] You must specify subnets from at least two Availability Zones. [Application Load Balancers on Outposts] You must specify one Outpost subnet. [Application Load Balancers on Local Zones] You can specify subnets from one or more Local Zones. [Network Load Balancers and Gateway Load Balancers] You can specify subnets from one or more Availability Zones.
- List<Property Map>
- The tags to assign to the load balancer.
- type String
- The type of load balancer. The default is application.
Outputs
All input properties are implicitly available as output properties. Additionally, the LoadBalancer resource produces the following output properties:
- CanonicalHosted stringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- DnsName string
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- Id string
- The provider-assigned unique ID for this managed resource.
- LoadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- LoadBalancer stringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- LoadBalancer stringName 
- The name of the load balancer. For example, my-load-balancer.
- CanonicalHosted stringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- DnsName string
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- Id string
- The provider-assigned unique ID for this managed resource.
- LoadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- LoadBalancer stringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- LoadBalancer stringName 
- The name of the load balancer. For example, my-load-balancer.
- canonicalHosted StringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dnsName String
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- id String
- The provider-assigned unique ID for this managed resource.
- loadBalancer StringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer StringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- loadBalancer StringName 
- The name of the load balancer. For example, my-load-balancer.
- canonicalHosted stringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dnsName string
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- id string
- The provider-assigned unique ID for this managed resource.
- loadBalancer stringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer stringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- loadBalancer stringName 
- The name of the load balancer. For example, my-load-balancer.
- canonical_hosted_ strzone_ id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dns_name str
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- id str
- The provider-assigned unique ID for this managed resource.
- load_balancer_ strarn 
- The Amazon Resource Name (ARN) of the load balancer.
- load_balancer_ strfull_ name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- load_balancer_ strname 
- The name of the load balancer. For example, my-load-balancer.
- canonicalHosted StringZone Id 
- The ID of the Amazon Route 53 hosted zone associated with the load balancer. For example, Z2P70J7EXAMPLE.
- dnsName String
- The DNS name for the load balancer. For example, my-load-balancer-424835706.us-west-2.elb.amazonaws.com.
- id String
- The provider-assigned unique ID for this managed resource.
- loadBalancer StringArn 
- The Amazon Resource Name (ARN) of the load balancer.
- loadBalancer StringFull Name 
- The full name of the load balancer. For example, app/my-load-balancer/50dc6c495c0c9188.
- loadBalancer StringName 
- The name of the load balancer. For example, my-load-balancer.
Supporting Types
LoadBalancerAttribute, LoadBalancerAttributeArgs      
- Key string
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- Value string
- The value of the attribute.
- Key string
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- Value string
- The value of the attribute.
- key String
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value String
- The value of the attribute.
- key string
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value string
- The value of the attribute.
- key str
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value str
- The value of the attribute.
- key String
- The name of the attribute. The following attributes are supported by all load balancers: - deletion_protection.enabled- Indicates whether deletion protection is enabled. The value is- trueor- false. The default is- false.
- load_balancing.cross_zone.enabled- Indicates whether cross-zone load balancing is enabled. The possible values are- trueand- false. The default for Network Load Balancers and Gateway Load Balancers is- false. The default for Application Load Balancers is- true, and can't be changed.
 - The following attributes are supported by both Application Load Balancers and Network Load Balancers: - access_logs.s3.enabled- Indicates whether access logs are enabled. The value is- trueor- false. The default is- false.
- access_logs.s3.bucket- The name of the S3 bucket for the access logs. This attribute is required if access logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- access_logs.s3.prefix- The prefix for the location in the S3 bucket for the access logs.
- ipv6.deny_all_igw_traffic- Blocks internet gateway (IGW) access to the load balancer. It is set to- falsefor internet-facing load balancers and- truefor internal load balancers, preventing unintended access to your internal load balancer through an internet gateway.
- zonal_shift.config.enabled- Indicates whether zonal shift is enabled. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Application Load Balancers: - idle_timeout.timeout_seconds- The idle timeout value, in seconds. The valid range is 1-4000 seconds. The default is 60 seconds.
- client_keep_alive.seconds- The client keep alive value, in seconds. The valid range is 60-604800 seconds. The default is 3600 seconds.
- connection_logs.s3.enabled- Indicates whether connection logs are enabled. The value is- trueor- false. The default is- false.
- connection_logs.s3.bucket- The name of the S3 bucket for the connection logs. This attribute is required if connection logs are enabled. The bucket must exist in the same region as the load balancer and have a bucket policy that grants Elastic Load Balancing permissions to write to the bucket.
- connection_logs.s3.prefix- The prefix for the location in the S3 bucket for the connection logs.
- routing.http.desync_mitigation_mode- Determines how the load balancer handles requests that might pose a security risk to your application. The possible values are- monitor,- defensive, and- strictest. The default is- defensive.
- routing.http.drop_invalid_header_fields.enabled- Indicates whether HTTP headers with invalid header fields are removed by the load balancer (- true) or routed to targets (- false). The default is- false.
- routing.http.preserve_host_header.enabled- Indicates whether the Application Load Balancer should preserve the- Hostheader in the HTTP request and send it to the target without any change. The possible values are- trueand- false. The default is- false.
- routing.http.x_amzn_tls_version_and_cipher_suite.enabled- Indicates whether the two headers (- x-amzn-tls-versionand- x-amzn-tls-cipher-suite), which contain information about the negotiated TLS version and cipher suite, are added to the client request before sending it to the target. The- x-amzn-tls-versionheader has information about the TLS protocol version negotiated with the client, and the- x-amzn-tls-cipher-suiteheader has information about the cipher suite negotiated with the client. Both headers are in OpenSSL format. The possible values for the attribute are- trueand- false. The default is- false.
- routing.http.xff_client_port.enabled- Indicates whether the- X-Forwarded-Forheader should preserve the source port that the client used to connect to the load balancer. The possible values are- trueand- false. The default is- false.
- routing.http.xff_header_processing.mode- Enables you to modify, preserve, or remove the- X-Forwarded-Forheader in the HTTP request before the Application Load Balancer sends the request to the target. The possible values are- append,- preserve, and- remove. The default is- append.
- If the value is - append, the Application Load Balancer adds the client IP address (of the last hop) to the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- If the value is - preservethe Application Load Balancer preserves the- X-Forwarded-Forheader in the HTTP request, and sends it to targets without any change.
- If the value is - remove, the Application Load Balancer removes the- X-Forwarded-Forheader in the HTTP request before it sends it to targets.
- routing.http2.enabled- Indicates whether HTTP/2 is enabled. The possible values are- trueand- false. The default is- true. Elastic Load Balancing requires that message header names contain only alphanumeric characters and hyphens.
- waf.fail_open.enabled- Indicates whether to allow a WAF-enabled load balancer to route requests to targets if it is unable to forward the request to AWS WAF. The possible values are- trueand- false. The default is- false.
 - The following attributes are supported by only Network Load Balancers: - dns_record.client_routing_policy- Indicates how traffic is distributed among the load balancer Availability Zones. The possible values are- availability_zone_affinitywith 100 percent zonal affinity,- partial_availability_zone_affinitywith 85 percent zonal affinity, and- any_availability_zonewith 0 percent zonal affinity.
 
- value String
- The value of the attribute.
LoadBalancerMinimumLoadBalancerCapacity, LoadBalancerMinimumLoadBalancerCapacityArgs            
- CapacityUnits int
- The number of capacity units.
- CapacityUnits int
- The number of capacity units.
- capacityUnits Integer
- The number of capacity units.
- capacityUnits number
- The number of capacity units.
- capacity_units int
- The number of capacity units.
- capacityUnits Number
- The number of capacity units.
LoadBalancerSubnetMapping, LoadBalancerSubnetMappingArgs        
- SubnetId string
- The ID of the subnet.
- AllocationId string
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- IPv6Address string
- [Network Load Balancers] The IPv6 address.
- PrivateIPv4Address string
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- SourceNat stringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- SubnetId string
- The ID of the subnet.
- AllocationId string
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- IPv6Address string
- [Network Load Balancers] The IPv6 address.
- PrivateIPv4Address string
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- SourceNat stringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnetId String
- The ID of the subnet.
- allocationId String
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- iPv6Address String
- [Network Load Balancers] The IPv6 address.
- privateIPv4Address String
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- sourceNat StringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnetId string
- The ID of the subnet.
- allocationId string
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- iPv6Address string
- [Network Load Balancers] The IPv6 address.
- privateIPv4Address string
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- sourceNat stringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnet_id str
- The ID of the subnet.
- allocation_id str
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- i_pv6_ straddress 
- [Network Load Balancers] The IPv6 address.
- private_i_ strpv4_ address 
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- source_nat_ stripv6_ prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
- subnetId String
- The ID of the subnet.
- allocationId String
- [Network Load Balancers] The allocation ID of the Elastic IP address for an internet-facing load balancer.
- iPv6Address String
- [Network Load Balancers] The IPv6 address.
- privateIPv4Address String
- [Network Load Balancers] The private IPv4 address for an internal load balancer.
- sourceNat StringIpv6Prefix 
- [Network Load Balancers with UDP listeners] The IPv6 prefix to use for source NAT. Specify an IPv6 prefix (/80 netmask) from the subnet CIDR block or auto_assignedto use an IPv6 prefix selected at random from the subnet CIDR block.
Tag, TagArgs  
Package Details
- Repository
- AWS Native pulumi/pulumi-aws-native
- License
- Apache-2.0
We recommend new projects start with resources from the AWS provider.