CfnServicePropsMixin
- class aws_cdk.mixins_preview.aws_ecs.mixins.CfnServicePropsMixin(props, *, strategy=None)
Bases:
MixinThe
AWS::ECS::Serviceresource creates an Amazon Elastic Container Service (Amazon ECS) service that runs and maintains the requested number of tasks and associated load balancers.The stack update fails if you change any properties that require replacement and at least one Amazon ECS Service Connect
ServiceConnectConfigurationproperty is configured. This is because AWS CloudFormation creates the replacement service first, but eachServiceConnectServicemust have a name that is unique in the namespace. > Starting April 15, 2023, AWS ; will not onboard new customers to Amazon Elastic Inference (EI), and will help current customers migrate their workloads to options that offer better price and performance. After April 15, 2023, new customers will not be able to launch instances with Amazon EI accelerators in Amazon SageMaker, Amazon ECS , or Amazon EC2 . However, customers who have used Amazon EI at least once during the past 30-day period are considered current customers and will be able to continue using the service. > On June 12, 2025, Amazon ECS launched support for updating capacity provider configuration for Amazon ECS services. With this launch, Amazon ECS also aligned the CloudFormation update behavior forCapacityProviderStrategyparameter with the standard practice. For more information, see Amazon ECS adds support for updating capacity provider configuration for ECS services . Previously Amazon ECS ignored theCapacityProviderStrategyproperty if it was set to an empty list for example,[]in CloudFormation , because updating capacity provider configuration was not supported. Now, with support for capacity provider updates, customers can remove capacity providers from a service by passing an empty list. When you specify an empty list ([]) for theCapacityProviderStrategyproperty in your CloudFormation template, Amazon ECS will remove any capacity providers associated with the service, as follows:For services created with a capacity provider strategy after the launch:
If there’s a cluster default strategy set, the service will revert to using that default strategy.
If no cluster default strategy exists, you will receive the following error:
No launch type to fall back to for empty capacity provider strategy. Your service was not created with a launch type.
For services created with a capacity provider strategy prior to the launch:
If
CapacityProviderStrategyhadFARGATE_SPOTorFARGATEcapacity providers, the launch type will be updated toFARGATEand the capacity provider will be removed.If the strategy included Auto Scaling group capacity providers, the service will revert to EC2 launch type, and the Auto Scaling group capacity providers will not be used.
Recommended Actions
If you are currently using
CapacityProviderStrategy: []in your CloudFormation templates, you should take one of the following actions:If you do not intend to update the Capacity Provider Strategy:
Remove the
CapacityProviderStrategyproperty entirely from your CloudFormation templateAlternatively, use
!Ref AWS ::NoValuefor theCapacityProviderStrategyproperty in your templateIf you intend to maintain or update the Capacity Provider Strategy, specify the actual Capacity Provider Strategy for the service in your CloudFormation template.
If your CloudFormation template had an empty list ([]) for
CapacityProviderStrategyprior to the aforementioned launch on June 12, and you are using the same template withCapacityProviderStrategy: [], you might encounter the following error:Invalid request provided: When switching from launch type to capacity provider strategy on an existing service, or making a change to a capacity provider strategy on a service that is already using one, you must force a new deployment. (Service: Ecs, Status Code: 400, Request ID: xxx) (SDK Attempt Count: 1)” (RequestToken: xxx HandlerErrorCode: InvalidRequest)
Note that CloudFormation automatically initiates a new deployment when it detects a parameter change, but customers cannot choose to force a deployment through CloudFormation . This is an invalid input scenario that requires one of the remediation actions listed above.
If you are experiencing active production issues related to this change, contact AWS Support or your Technical Account Manager.
- See:
http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-ecs-service.html
- CloudformationResource:
AWS::ECS::Service
- Mixin:
true
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview import mixins from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins # hook_details: Any cfn_service_props_mixin = ecs_mixins.CfnServicePropsMixin(ecs_mixins.CfnServiceMixinProps( availability_zone_rebalancing="availabilityZoneRebalancing", capacity_provider_strategy=[ecs_mixins.CfnServicePropsMixin.CapacityProviderStrategyItemProperty( base=123, capacity_provider="capacityProvider", weight=123 )], cluster="cluster", deployment_configuration=ecs_mixins.CfnServicePropsMixin.DeploymentConfigurationProperty( alarms=ecs_mixins.CfnServicePropsMixin.DeploymentAlarmsProperty( alarm_names=["alarmNames"], enable=False, rollback=False ), bake_time_in_minutes=123, canary_configuration=ecs_mixins.CfnServicePropsMixin.CanaryConfigurationProperty( canary_bake_time_in_minutes=123, canary_percent=123 ), deployment_circuit_breaker=ecs_mixins.CfnServicePropsMixin.DeploymentCircuitBreakerProperty( enable=False, rollback=False ), lifecycle_hooks=[ecs_mixins.CfnServicePropsMixin.DeploymentLifecycleHookProperty( hook_details=hook_details, hook_target_arn="hookTargetArn", lifecycle_stages=["lifecycleStages"], role_arn="roleArn" )], linear_configuration=ecs_mixins.CfnServicePropsMixin.LinearConfigurationProperty( step_bake_time_in_minutes=123, step_percent=123 ), maximum_percent=123, minimum_healthy_percent=123, strategy="strategy" ), deployment_controller=ecs_mixins.CfnServicePropsMixin.DeploymentControllerProperty( type="type" ), desired_count=123, enable_ecs_managed_tags=False, enable_execute_command=False, force_new_deployment=ecs_mixins.CfnServicePropsMixin.ForceNewDeploymentProperty( enable_force_new_deployment=False, force_new_deployment_nonce="forceNewDeploymentNonce" ), health_check_grace_period_seconds=123, launch_type="launchType", load_balancers=[ecs_mixins.CfnServicePropsMixin.LoadBalancerProperty( advanced_configuration=ecs_mixins.CfnServicePropsMixin.AdvancedConfigurationProperty( alternate_target_group_arn="alternateTargetGroupArn", production_listener_rule="productionListenerRule", role_arn="roleArn", test_listener_rule="testListenerRule" ), container_name="containerName", container_port=123, load_balancer_name="loadBalancerName", target_group_arn="targetGroupArn" )], network_configuration=ecs_mixins.CfnServicePropsMixin.NetworkConfigurationProperty( awsvpc_configuration=ecs_mixins.CfnServicePropsMixin.AwsVpcConfigurationProperty( assign_public_ip="assignPublicIp", security_groups=["securityGroups"], subnets=["subnets"] ) ), placement_constraints=[ecs_mixins.CfnServicePropsMixin.PlacementConstraintProperty( expression="expression", type="type" )], placement_strategies=[ecs_mixins.CfnServicePropsMixin.PlacementStrategyProperty( field="field", type="type" )], platform_version="platformVersion", propagate_tags="propagateTags", role="role", scheduling_strategy="schedulingStrategy", service_connect_configuration=ecs_mixins.CfnServicePropsMixin.ServiceConnectConfigurationProperty( access_log_configuration=ecs_mixins.CfnServicePropsMixin.ServiceConnectAccessLogConfigurationProperty( format="format", include_query_parameters="includeQueryParameters" ), enabled=False, log_configuration=ecs_mixins.CfnServicePropsMixin.LogConfigurationProperty( log_driver="logDriver", options={ "options_key": "options" }, secret_options=[ecs_mixins.CfnServicePropsMixin.SecretProperty( name="name", value_from="valueFrom" )] ), namespace="namespace", services=[ecs_mixins.CfnServicePropsMixin.ServiceConnectServiceProperty( client_aliases=[ecs_mixins.CfnServicePropsMixin.ServiceConnectClientAliasProperty( dns_name="dnsName", port=123, test_traffic_rules=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesProperty( header=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderProperty( name="name", value=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty( exact="exact" ) ) ) )], discovery_name="discoveryName", ingress_port_override=123, port_name="portName", timeout=ecs_mixins.CfnServicePropsMixin.TimeoutConfigurationProperty( idle_timeout_seconds=123, per_request_timeout_seconds=123 ), tls=ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsConfigurationProperty( issuer_certificate_authority=ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsCertificateAuthorityProperty( aws_pca_authority_arn="awsPcaAuthorityArn" ), kms_key="kmsKey", role_arn="roleArn" ) )] ), service_name="serviceName", service_registries=[ecs_mixins.CfnServicePropsMixin.ServiceRegistryProperty( container_name="containerName", container_port=123, port=123, registry_arn="registryArn" )], tags=[CfnTag( key="key", value="value" )], task_definition="taskDefinition", volume_configurations=[ecs_mixins.CfnServicePropsMixin.ServiceVolumeConfigurationProperty( managed_ebs_volume=ecs_mixins.CfnServicePropsMixin.ServiceManagedEBSVolumeConfigurationProperty( encrypted=False, filesystem_type="filesystemType", iops=123, kms_key_id="kmsKeyId", role_arn="roleArn", size_in_gi_b=123, snapshot_id="snapshotId", tag_specifications=[ecs_mixins.CfnServicePropsMixin.EBSTagSpecificationProperty( propagate_tags="propagateTags", resource_type="resourceType", tags=[CfnTag( key="key", value="value" )] )], throughput=123, volume_initialization_rate=123, volume_type="volumeType" ), name="name" )], vpc_lattice_configurations=[ecs_mixins.CfnServicePropsMixin.VpcLatticeConfigurationProperty( port_name="portName", role_arn="roleArn", target_group_arn="targetGroupArn" )] ), strategy=mixins.PropertyMergeStrategy.OVERRIDE )
Create a mixin to apply properties to
AWS::ECS::Service.- Parameters:
props (
Union[CfnServiceMixinProps,Dict[str,Any]]) – L1 properties to apply.strategy (
Optional[PropertyMergeStrategy]) – (experimental) Strategy for merging nested properties. Default: - PropertyMergeStrategy.MERGE
Methods
- apply_to(construct)
Apply the mixin properties to the construct.
- Parameters:
construct (
IConstruct)- Return type:
- supports(construct)
Check if this mixin supports the given construct.
- Parameters:
construct (
IConstruct)- Return type:
bool
Attributes
- CFN_PROPERTY_KEYS = ['availabilityZoneRebalancing', 'capacityProviderStrategy', 'cluster', 'deploymentConfiguration', 'deploymentController', 'desiredCount', 'enableEcsManagedTags', 'enableExecuteCommand', 'forceNewDeployment', 'healthCheckGracePeriodSeconds', 'launchType', 'loadBalancers', 'networkConfiguration', 'placementConstraints', 'placementStrategies', 'platformVersion', 'propagateTags', 'role', 'schedulingStrategy', 'serviceConnectConfiguration', 'serviceName', 'serviceRegistries', 'tags', 'taskDefinition', 'volumeConfigurations', 'vpcLatticeConfigurations']
Static Methods
- classmethod is_mixin(x)
(experimental) Checks if
xis a Mixin.- Parameters:
x (
Any) – Any object.- Return type:
bool- Returns:
true if
xis an object created from a class which extendsMixin.- Stability:
experimental
AdvancedConfigurationProperty
- class CfnServicePropsMixin.AdvancedConfigurationProperty(*, alternate_target_group_arn=None, production_listener_rule=None, role_arn=None, test_listener_rule=None)
Bases:
objectThe advanced settings for a load balancer used in blue/green deployments.
Specify the alternate target group, listener rules, and IAM role required for traffic shifting during blue/green deployments. For more information, see Required resources for Amazon ECS blue/green deployments in the Amazon Elastic Container Service Developer Guide .
- Parameters:
alternate_target_group_arn (
Optional[str]) – The Amazon Resource Name (ARN) of the alternate target group for Amazon ECS blue/green deployments.production_listener_rule (
Optional[str]) – The Amazon Resource Name (ARN) that that identifies the production listener rule (in the case of an Application Load Balancer) or listener (in the case for an Network Load Balancer) for routing production traffic.role_arn (
Optional[str]) – The Amazon Resource Name (ARN) of the IAM role that grants Amazon ECS permission to call the Elastic Load Balancing APIs for you.test_listener_rule (
Optional[str]) – The Amazon Resource Name (ARN) that identifies ) that identifies the test listener rule (in the case of an Application Load Balancer) or listener (in the case for an Network Load Balancer) for routing test traffic.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins advanced_configuration_property = ecs_mixins.CfnServicePropsMixin.AdvancedConfigurationProperty( alternate_target_group_arn="alternateTargetGroupArn", production_listener_rule="productionListenerRule", role_arn="roleArn", test_listener_rule="testListenerRule" )
Attributes
- alternate_target_group_arn
The Amazon Resource Name (ARN) of the alternate target group for Amazon ECS blue/green deployments.
- production_listener_rule
The Amazon Resource Name (ARN) that that identifies the production listener rule (in the case of an Application Load Balancer) or listener (in the case for an Network Load Balancer) for routing production traffic.
- role_arn
The Amazon Resource Name (ARN) of the IAM role that grants Amazon ECS permission to call the Elastic Load Balancing APIs for you.
- test_listener_rule
The Amazon Resource Name (ARN) that identifies ) that identifies the test listener rule (in the case of an Application Load Balancer) or listener (in the case for an Network Load Balancer) for routing test traffic.
AwsVpcConfigurationProperty
- class CfnServicePropsMixin.AwsVpcConfigurationProperty(*, assign_public_ip=None, security_groups=None, subnets=None)
Bases:
objectAn object representing the networking details for a task or service.
For example
awsVpcConfiguration={subnets=["subnet-12344321"],securityGroups=["sg-12344321"]}.- Parameters:
assign_public_ip (
Optional[str]) – Whether the task’s elastic network interface receives a public IP address. Consider the following when you set this value: - When you usecreate-serviceorupdate-service, the default isDISABLED. - When the servicedeploymentControllerisECS, the value must beDISABLED.security_groups (
Optional[Sequence[str]]) – The IDs of the security groups associated with the task or service. If you don’t specify a security group, the default security group for the VPC is used. There’s a limit of 5 security groups that can be specified. .. epigraph:: All specified security groups must be from the same VPC.subnets (
Optional[Sequence[str]]) – The IDs of the subnets associated with the task or service. There’s a limit of 16 subnets that can be specified. .. epigraph:: All specified subnets must be from the same VPC.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins aws_vpc_configuration_property = ecs_mixins.CfnServicePropsMixin.AwsVpcConfigurationProperty( assign_public_ip="assignPublicIp", security_groups=["securityGroups"], subnets=["subnets"] )
Attributes
- assign_public_ip
Whether the task’s elastic network interface receives a public IP address.
Consider the following when you set this value:
When you use
create-serviceorupdate-service, the default isDISABLED.When the service
deploymentControllerisECS, the value must beDISABLED.
- security_groups
The IDs of the security groups associated with the task or service.
If you don’t specify a security group, the default security group for the VPC is used. There’s a limit of 5 security groups that can be specified. .. epigraph:
All specified security groups must be from the same VPC.
- subnets
The IDs of the subnets associated with the task or service.
There’s a limit of 16 subnets that can be specified. .. epigraph:
All specified subnets must be from the same VPC.
CanaryConfigurationProperty
- class CfnServicePropsMixin.CanaryConfigurationProperty(*, canary_bake_time_in_minutes=None, canary_percent=None)
Bases:
objectConfiguration for a canary deployment strategy that shifts a fixed percentage of traffic to the new service revision, waits for a specified bake time, then shifts the remaining traffic.
The following validation applies only to Canary deployments created through CloudFormation . CloudFormation operations time out after 36 hours. Canary deployments can approach this limit because of their extended duration. This can cause CloudFormation to roll back the deployment. To prevent timeout-related rollbacks, CloudFormation rejects deployments when the calculated deployment time exceeds 33 hours based on your template configuration:
BakeTimeInMinutes + CanaryBakeTimeInMinutesAdditional backend processes (such as task scaling and running lifecycle hooks) can extend deployment time beyond these calculations. Even deployments under the 33-hour threshold might still time out if these processes cause the total duration to exceed 36 hours.
- Parameters:
canary_bake_time_in_minutes (
Union[int,float,None]) – The amount of time in minutes to wait during the canary phase before shifting the remaining production traffic to the new service revision. Valid values are 0 to 1440 minutes (24 hours). The default value is 10.canary_percent (
Union[int,float,None]) – The percentage of production traffic to shift to the new service revision during the canary phase. Valid values are multiples of 0.1 from 0.1 to 100.0. The default value is 5.0.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins canary_configuration_property = ecs_mixins.CfnServicePropsMixin.CanaryConfigurationProperty( canary_bake_time_in_minutes=123, canary_percent=123 )
Attributes
- canary_bake_time_in_minutes
The amount of time in minutes to wait during the canary phase before shifting the remaining production traffic to the new service revision.
Valid values are 0 to 1440 minutes (24 hours). The default value is 10.
- canary_percent
The percentage of production traffic to shift to the new service revision during the canary phase.
Valid values are multiples of 0.1 from 0.1 to 100.0. The default value is 5.0.
CapacityProviderStrategyItemProperty
- class CfnServicePropsMixin.CapacityProviderStrategyItemProperty(*, base=None, capacity_provider=None, weight=None)
Bases:
objectThe details of a capacity provider strategy.
A capacity provider strategy can be set when using the
RunTaskorCreateServiceAPIs or as the default capacity provider strategy for a cluster with theCreateClusterAPI.Only capacity providers that are already associated with a cluster and have an
ACTIVEorUPDATINGstatus can be used in a capacity provider strategy. ThePutClusterCapacityProvidersAPI is used to associate a capacity provider with a cluster.If specifying a capacity provider that uses an Auto Scaling group, the capacity provider must already be created. New Auto Scaling group capacity providers can be created with the
CreateCapacityProviderAPI operation.To use an AWS Fargate capacity provider, specify either the
FARGATEorFARGATE_SPOTcapacity providers. The AWS Fargate capacity providers are available to all accounts and only need to be associated with a cluster to be used in a capacity provider strategy.- Parameters:
base (
Union[int,float,None]) – The base value designates how many tasks, at a minimum, to run on the specified capacity provider for each service. Only one capacity provider in a capacity provider strategy can have a base defined. If no value is specified, the default value of0is used. Base value characteristics: - Only one capacity provider in a strategy can have a base defined - The default value is0if not specified - The valid range is 0 to 100,000 - Base requirements are satisfied first before weight distributioncapacity_provider (
Optional[str]) – The short name of the capacity provider. This can be either an AWS managed capacity provider (FARGATEorFARGATE_SPOT) or the name of a custom capacity provider that you created.weight (
Union[int,float,None]) – The weight value designates the relative percentage of the total number of tasks launched that should use the specified capacity provider. Theweightvalue is taken into consideration after thebasevalue, if defined, is satisfied. If noweightvalue is specified, the default value of0is used. When multiple capacity providers are specified within a capacity provider strategy, at least one of the capacity providers must have a weight value greater than zero and any capacity providers with a weight of0can’t be used to place tasks. If you specify multiple capacity providers in a strategy that all have a weight of0, anyRunTaskorCreateServiceactions using the capacity provider strategy will fail. Weight value characteristics: - Weight is considered after the base value is satisfied - The default value is0if not specified - The valid range is 0 to 1,000 - At least one capacity provider must have a weight greater than zero - Capacity providers with weight of0cannot place tasks Task distribution logic: - Base satisfaction: The minimum number of tasks specified by the base value are placed on that capacity provider - Weight distribution: After base requirements are met, additional tasks are distributed according to weight ratios Examples: Equal Distribution: Two capacity providers both with weight1will split tasks evenly after base requirements are met. Weighted Distribution: If capacityProviderA has weight1and capacityProviderB has weight4, then for every 1 task on A, 4 tasks will run on B.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins capacity_provider_strategy_item_property = ecs_mixins.CfnServicePropsMixin.CapacityProviderStrategyItemProperty( base=123, capacity_provider="capacityProvider", weight=123 )
Attributes
- base
The base value designates how many tasks, at a minimum, to run on the specified capacity provider for each service.
Only one capacity provider in a capacity provider strategy can have a base defined. If no value is specified, the default value of
0is used.Base value characteristics:
Only one capacity provider in a strategy can have a base defined
The default value is
0if not specifiedThe valid range is 0 to 100,000
Base requirements are satisfied first before weight distribution
- capacity_provider
The short name of the capacity provider.
This can be either an AWS managed capacity provider (
FARGATEorFARGATE_SPOT) or the name of a custom capacity provider that you created.
- weight
The weight value designates the relative percentage of the total number of tasks launched that should use the specified capacity provider.
The
weightvalue is taken into consideration after thebasevalue, if defined, is satisfied.If no
weightvalue is specified, the default value of0is used. When multiple capacity providers are specified within a capacity provider strategy, at least one of the capacity providers must have a weight value greater than zero and any capacity providers with a weight of0can’t be used to place tasks. If you specify multiple capacity providers in a strategy that all have a weight of0, anyRunTaskorCreateServiceactions using the capacity provider strategy will fail.Weight value characteristics:
Weight is considered after the base value is satisfied
The default value is
0if not specifiedThe valid range is 0 to 1,000
At least one capacity provider must have a weight greater than zero
Capacity providers with weight of
0cannot place tasks
Task distribution logic:
Base satisfaction: The minimum number of tasks specified by the base value are placed on that capacity provider
Weight distribution: After base requirements are met, additional tasks are distributed according to weight ratios
Examples:
Equal Distribution: Two capacity providers both with weight
1will split tasks evenly after base requirements are met.Weighted Distribution: If capacityProviderA has weight
1and capacityProviderB has weight4, then for every 1 task on A, 4 tasks will run on B.
DeploymentAlarmsProperty
- class CfnServicePropsMixin.DeploymentAlarmsProperty(*, alarm_names=None, enable=None, rollback=None)
Bases:
objectOne of the methods which provide a way for you to quickly identify when a deployment has failed, and then to optionally roll back the failure to the last working deployment.
When the alarms are generated, Amazon ECS sets the service deployment to failed. Set the rollback parameter to have Amazon ECS to roll back your service to the last completed deployment after a failure.
You can only use the
DeploymentAlarmsmethod to detect failures when theDeploymentControlleris set toECS.For more information, see Rolling update in the Amazon Elastic Container Service Developer Guide .
- Parameters:
alarm_names (
Optional[Sequence[str]]) – One or more CloudWatch alarm names. Use a “,” to separate the alarms.enable (
Union[bool,IResolvable,None]) – Determines whether to use the CloudWatch alarm option in the service deployment process.rollback (
Union[bool,IResolvable,None]) – Determines whether to configure Amazon ECS to roll back the service if a service deployment fails. If rollback is used, when a service deployment fails, the service is rolled back to the last deployment that completed successfully.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins deployment_alarms_property = ecs_mixins.CfnServicePropsMixin.DeploymentAlarmsProperty( alarm_names=["alarmNames"], enable=False, rollback=False )
Attributes
- alarm_names
One or more CloudWatch alarm names.
Use a “,” to separate the alarms.
- enable
Determines whether to use the CloudWatch alarm option in the service deployment process.
- rollback
Determines whether to configure Amazon ECS to roll back the service if a service deployment fails.
If rollback is used, when a service deployment fails, the service is rolled back to the last deployment that completed successfully.
DeploymentCircuitBreakerProperty
- class CfnServicePropsMixin.DeploymentCircuitBreakerProperty(*, enable=None, rollback=None)
Bases:
objectThe deployment circuit breaker can only be used for services using the rolling update (
ECS) deployment type.The deployment circuit breaker determines whether a service deployment will fail if the service can’t reach a steady state. If it is turned on, a service deployment will transition to a failed state and stop launching new tasks. You can also configure Amazon ECS to roll back your service to the last completed deployment after a failure. For more information, see Rolling update in the Amazon Elastic Container Service Developer Guide .
For more information about API failure reasons, see API failure reasons in the Amazon Elastic Container Service Developer Guide .
Attributes
- enable
Determines whether to use the deployment circuit breaker logic for the service.
- rollback
Determines whether to configure Amazon ECS to roll back the service if a service deployment fails.
If rollback is on, when a service deployment fails, the service is rolled back to the last deployment that completed successfully.
DeploymentConfigurationProperty
- class CfnServicePropsMixin.DeploymentConfigurationProperty(*, alarms=None, bake_time_in_minutes=None, canary_configuration=None, deployment_circuit_breaker=None, lifecycle_hooks=None, linear_configuration=None, maximum_percent=None, minimum_healthy_percent=None, strategy=None)
Bases:
objectOptional deployment parameters that control how many tasks run during a deployment and the ordering of stopping and starting tasks.
- Parameters:
alarms (
Union[IResolvable,DeploymentAlarmsProperty,Dict[str,Any],None]) – Information about the CloudWatch alarms.bake_time_in_minutes (
Union[int,float,None]) – The duration when both blue and green service revisions are running simultaneously after the production traffic has shifted. The following rules apply when you don’t specify a value: - For rolling deployments, the value is set to 3 hours (180 minutes). - When you use an external deployment controller (EXTERNAL), or the CodeDeploy blue/green deployment controller (CODE_DEPLOY), the value is set to 3 hours (180 minutes). - For all other cases, the value is set to 36 hours (2160 minutes).canary_configuration (
Union[IResolvable,CanaryConfigurationProperty,Dict[str,Any],None]) – Configuration for canary deployment strategy. Only valid when the deployment strategy isCANARY. This configuration enables shifting a fixed percentage of traffic for testing, followed by shifting the remaining traffic after a bake period.deployment_circuit_breaker (
Union[IResolvable,DeploymentCircuitBreakerProperty,Dict[str,Any],None]) –The deployment circuit breaker can only be used for services using the rolling update (
ECS) deployment type. The deployment circuit breaker determines whether a service deployment will fail if the service can’t reach a steady state. If you use the deployment circuit breaker, a service deployment will transition to a failed state and stop launching new tasks. If you use the rollback option, when a service deployment fails, the service is rolled back to the last deployment that completed successfully. For more information, see Rolling update in the Amazon Elastic Container Service Developer Guidelifecycle_hooks (
Union[IResolvable,Sequence[Union[IResolvable,DeploymentLifecycleHookProperty,Dict[str,Any]]],None]) – An array of deployment lifecycle hook objects to run custom logic at specific stages of the deployment lifecycle.linear_configuration (
Union[IResolvable,LinearConfigurationProperty,Dict[str,Any],None]) – Configuration for linear deployment strategy. Only valid when the deployment strategy isLINEAR. This configuration enables progressive traffic shifting in equal percentage increments with configurable bake times between each step.maximum_percent (
Union[int,float,None]) – If a service is using the rolling update (ECS) deployment type, themaximumPercentparameter represents an upper limit on the number of your service’s tasks that are allowed in theRUNNINGorPENDINGstate during a deployment, as a percentage of thedesiredCount(rounded down to the nearest integer). This parameter enables you to define the deployment batch size. For example, if your service is using theREPLICAservice scheduler and has adesiredCountof four tasks and amaximumPercentvalue of 200%, the scheduler may start four new tasks before stopping the four older tasks (provided that the cluster resources required to do this are available). The defaultmaximumPercentvalue for a service using theREPLICAservice scheduler is 200%. The Amazon ECS scheduler uses this parameter to replace unhealthy tasks by starting replacement tasks first and then stopping the unhealthy tasks, as long as cluster resources for starting replacement tasks are available. For more information about how the scheduler replaces unhealthy tasks, see Amazon ECS services . If a service is using either the blue/green (CODE_DEPLOY) orEXTERNALdeployment types, and tasks in the service use the EC2 launch type, the maximum percent value is set to the default value. The maximum percent value is used to define the upper limit on the number of the tasks in the service that remain in theRUNNINGstate while the container instances are in theDRAININGstate. .. epigraph:: You can’t specify a custommaximumPercentvalue for a service that uses either the blue/green (CODE_DEPLOY) orEXTERNALdeployment types and has tasks that use the EC2 launch type. If the service uses either the blue/green (CODE_DEPLOY) orEXTERNALdeployment types, and the tasks in the service use the Fargate launch type, the maximum percent value is not used. The value is still returned when describing your service.minimum_healthy_percent (
Union[int,float,None]) –If a service is using the rolling update (
ECS) deployment type, theminimumHealthyPercentrepresents a lower limit on the number of your service’s tasks that must remain in theRUNNINGstate during a deployment, as a percentage of thedesiredCount(rounded up to the nearest integer). This parameter enables you to deploy without using additional cluster capacity. For example, if your service has adesiredCountof four tasks and aminimumHealthyPercentof 50%, the service scheduler may stop two existing tasks to free up cluster capacity before starting two new tasks. If any tasks are unhealthy and ifmaximumPercentdoesn’t allow the Amazon ECS scheduler to start replacement tasks, the scheduler stops the unhealthy tasks one-by-one — using theminimumHealthyPercentas a constraint — to clear up capacity to launch replacement tasks. For more information about how the scheduler replaces unhealthy tasks, see Amazon ECS services . For services that do not use a load balancer, the following should be noted: - A service is considered healthy if all essential containers within the tasks in the service pass their health checks. - If a task has no essential containers with a health check defined, the service scheduler will wait for 40 seconds after a task reaches aRUNNINGstate before the task is counted towards the minimum healthy percent total. - If a task has one or more essential containers with a health check defined, the service scheduler will wait for the task to reach a healthy status before counting it towards the minimum healthy percent total. A task is considered healthy when all essential containers within the task have passed their health checks. The amount of time the service scheduler can wait for is determined by the container health check settings. For services that do use a load balancer, the following should be noted: - If a task has no essential containers with a health check defined, the service scheduler will wait for the load balancer target group health check to return a healthy status before counting the task towards the minimum healthy percent total. - If a task has an essential container with a health check defined, the service scheduler will wait for both the task to reach a healthy status and the load balancer target group health check to return a healthy status before counting the task towards the minimum healthy percent total. The default value for a replica service forminimumHealthyPercentis 100%. The defaultminimumHealthyPercentvalue for a service using theDAEMONservice schedule is 0% for the AWS CLI , the AWS SDKs, and the APIs and 50% for the AWS Management Console. The minimum number of healthy tasks during a deployment is thedesiredCountmultiplied by theminimumHealthyPercent/100, rounded up to the nearest integer value. If a service is using either the blue/green (CODE_DEPLOY) orEXTERNALdeployment types and is running tasks that use the EC2 launch type, the minimum healthy percent value is set to the default value. The minimum healthy percent value is used to define the lower limit on the number of the tasks in the service that remain in theRUNNINGstate while the container instances are in theDRAININGstate. .. epigraph:: You can’t specify a customminimumHealthyPercentvalue for a service that uses either the blue/green (CODE_DEPLOY) orEXTERNALdeployment types and has tasks that use the EC2 launch type. If a service is using either the blue/green (CODE_DEPLOY) orEXTERNALdeployment types and is running tasks that use the Fargate launch type, the minimum healthy percent value is not used, although it is returned when describing your service.strategy (
Optional[str]) – The deployment strategy for the service. Choose from these valid values:. -ROLLING- When you create a service which uses the rolling update (ROLLING) deployment strategy, the Amazon ECS service scheduler replaces the currently running tasks with new tasks. The number of tasks that Amazon ECS adds or removes from the service during a rolling update is controlled by the service deployment configuration. -BLUE_GREEN- A blue/green deployment strategy (BLUE_GREEN) is a release methodology that reduces downtime and risk by running two identical production environments called blue and green. With Amazon ECS blue/green deployments, you can validate new service revisions before directing production traffic to them. This approach provides a safer way to deploy changes with the ability to quickly roll back if needed. -LINEAR- A linear deployment strategy (LINEAR) gradually shifts traffic from the current production environment to a new environment in equal percentages over time. With Amazon ECS linear deployments, you can control the pace of traffic shifting and validate new service revisions with increasing amounts of production traffic. -CANARY- A canary deployment strategy (CANARY) shifts a small percentage of traffic to the new service revision first, then shifts the remaining traffic all at once after a specified time period. This allows you to test the new version with a subset of users before full deployment.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins # hook_details: Any deployment_configuration_property = ecs_mixins.CfnServicePropsMixin.DeploymentConfigurationProperty( alarms=ecs_mixins.CfnServicePropsMixin.DeploymentAlarmsProperty( alarm_names=["alarmNames"], enable=False, rollback=False ), bake_time_in_minutes=123, canary_configuration=ecs_mixins.CfnServicePropsMixin.CanaryConfigurationProperty( canary_bake_time_in_minutes=123, canary_percent=123 ), deployment_circuit_breaker=ecs_mixins.CfnServicePropsMixin.DeploymentCircuitBreakerProperty( enable=False, rollback=False ), lifecycle_hooks=[ecs_mixins.CfnServicePropsMixin.DeploymentLifecycleHookProperty( hook_details=hook_details, hook_target_arn="hookTargetArn", lifecycle_stages=["lifecycleStages"], role_arn="roleArn" )], linear_configuration=ecs_mixins.CfnServicePropsMixin.LinearConfigurationProperty( step_bake_time_in_minutes=123, step_percent=123 ), maximum_percent=123, minimum_healthy_percent=123, strategy="strategy" )
Attributes
- alarms
Information about the CloudWatch alarms.
- bake_time_in_minutes
The duration when both blue and green service revisions are running simultaneously after the production traffic has shifted.
The following rules apply when you don’t specify a value:
For rolling deployments, the value is set to 3 hours (180 minutes).
When you use an external deployment controller (
EXTERNAL), or the CodeDeploy blue/green deployment controller (CODE_DEPLOY), the value is set to 3 hours (180 minutes).For all other cases, the value is set to 36 hours (2160 minutes).
- canary_configuration
Configuration for canary deployment strategy.
Only valid when the deployment strategy is
CANARY. This configuration enables shifting a fixed percentage of traffic for testing, followed by shifting the remaining traffic after a bake period.
- deployment_circuit_breaker
The deployment circuit breaker can only be used for services using the rolling update (
ECS) deployment type.The deployment circuit breaker determines whether a service deployment will fail if the service can’t reach a steady state. If you use the deployment circuit breaker, a service deployment will transition to a failed state and stop launching new tasks. If you use the rollback option, when a service deployment fails, the service is rolled back to the last deployment that completed successfully. For more information, see Rolling update in the Amazon Elastic Container Service Developer Guide
- lifecycle_hooks
An array of deployment lifecycle hook objects to run custom logic at specific stages of the deployment lifecycle.
- linear_configuration
Configuration for linear deployment strategy.
Only valid when the deployment strategy is
LINEAR. This configuration enables progressive traffic shifting in equal percentage increments with configurable bake times between each step.
- maximum_percent
If a service is using the rolling update (
ECS) deployment type, themaximumPercentparameter represents an upper limit on the number of your service’s tasks that are allowed in theRUNNINGorPENDINGstate during a deployment, as a percentage of thedesiredCount(rounded down to the nearest integer).This parameter enables you to define the deployment batch size. For example, if your service is using the
REPLICAservice scheduler and has adesiredCountof four tasks and amaximumPercentvalue of 200%, the scheduler may start four new tasks before stopping the four older tasks (provided that the cluster resources required to do this are available). The defaultmaximumPercentvalue for a service using theREPLICAservice scheduler is 200%.The Amazon ECS scheduler uses this parameter to replace unhealthy tasks by starting replacement tasks first and then stopping the unhealthy tasks, as long as cluster resources for starting replacement tasks are available. For more information about how the scheduler replaces unhealthy tasks, see Amazon ECS services .
If a service is using either the blue/green (
CODE_DEPLOY) orEXTERNALdeployment types, and tasks in the service use the EC2 launch type, the maximum percent value is set to the default value. The maximum percent value is used to define the upper limit on the number of the tasks in the service that remain in theRUNNINGstate while the container instances are in theDRAININGstate. .. epigraph:You can't specify a custom ``maximumPercent`` value for a service that uses either the blue/green ( ``CODE_DEPLOY`` ) or ``EXTERNAL`` deployment types and has tasks that use the EC2 launch type.
If the service uses either the blue/green (
CODE_DEPLOY) orEXTERNALdeployment types, and the tasks in the service use the Fargate launch type, the maximum percent value is not used. The value is still returned when describing your service.
- minimum_healthy_percent
If a service is using the rolling update (
ECS) deployment type, theminimumHealthyPercentrepresents a lower limit on the number of your service’s tasks that must remain in theRUNNINGstate during a deployment, as a percentage of thedesiredCount(rounded up to the nearest integer).This parameter enables you to deploy without using additional cluster capacity. For example, if your service has a
desiredCountof four tasks and aminimumHealthyPercentof 50%, the service scheduler may stop two existing tasks to free up cluster capacity before starting two new tasks.If any tasks are unhealthy and if
maximumPercentdoesn’t allow the Amazon ECS scheduler to start replacement tasks, the scheduler stops the unhealthy tasks one-by-one — using theminimumHealthyPercentas a constraint — to clear up capacity to launch replacement tasks. For more information about how the scheduler replaces unhealthy tasks, see Amazon ECS services .For services that do not use a load balancer, the following should be noted:
A service is considered healthy if all essential containers within the tasks in the service pass their health checks.
If a task has no essential containers with a health check defined, the service scheduler will wait for 40 seconds after a task reaches a
RUNNINGstate before the task is counted towards the minimum healthy percent total.If a task has one or more essential containers with a health check defined, the service scheduler will wait for the task to reach a healthy status before counting it towards the minimum healthy percent total. A task is considered healthy when all essential containers within the task have passed their health checks. The amount of time the service scheduler can wait for is determined by the container health check settings.
For services that do use a load balancer, the following should be noted:
If a task has no essential containers with a health check defined, the service scheduler will wait for the load balancer target group health check to return a healthy status before counting the task towards the minimum healthy percent total.
If a task has an essential container with a health check defined, the service scheduler will wait for both the task to reach a healthy status and the load balancer target group health check to return a healthy status before counting the task towards the minimum healthy percent total.
The default value for a replica service for
minimumHealthyPercentis 100%. The defaultminimumHealthyPercentvalue for a service using theDAEMONservice schedule is 0% for the AWS CLI , the AWS SDKs, and the APIs and 50% for the AWS Management Console.The minimum number of healthy tasks during a deployment is the
desiredCountmultiplied by theminimumHealthyPercent/100, rounded up to the nearest integer value.If a service is using either the blue/green (
CODE_DEPLOY) orEXTERNALdeployment types and is running tasks that use the EC2 launch type, the minimum healthy percent value is set to the default value. The minimum healthy percent value is used to define the lower limit on the number of the tasks in the service that remain in theRUNNINGstate while the container instances are in theDRAININGstate. .. epigraph:You can't specify a custom ``minimumHealthyPercent`` value for a service that uses either the blue/green ( ``CODE_DEPLOY`` ) or ``EXTERNAL`` deployment types and has tasks that use the EC2 launch type.
If a service is using either the blue/green (
CODE_DEPLOY) orEXTERNALdeployment types and is running tasks that use the Fargate launch type, the minimum healthy percent value is not used, although it is returned when describing your service.
- strategy
.
ROLLING- When you create a service which uses the rolling update (ROLLING) deployment strategy, the Amazon ECS service scheduler replaces the currently running tasks with new tasks. The number of tasks that Amazon ECS adds or removes from the service during a rolling update is controlled by the service deployment configuration.BLUE_GREEN- A blue/green deployment strategy (BLUE_GREEN) is a release methodology that reduces downtime and risk by running two identical production environments called blue and green. With Amazon ECS blue/green deployments, you can validate new service revisions before directing production traffic to them. This approach provides a safer way to deploy changes with the ability to quickly roll back if needed.LINEAR- A linear deployment strategy (LINEAR) gradually shifts traffic from the current production environment to a new environment in equal percentages over time. With Amazon ECS linear deployments, you can control the pace of traffic shifting and validate new service revisions with increasing amounts of production traffic.CANARY- A canary deployment strategy (CANARY) shifts a small percentage of traffic to the new service revision first, then shifts the remaining traffic all at once after a specified time period. This allows you to test the new version with a subset of users before full deployment.
- See:
- Type:
The deployment strategy for the service. Choose from these valid values
DeploymentControllerProperty
- class CfnServicePropsMixin.DeploymentControllerProperty(*, type=None)
Bases:
objectThe deployment controller to use for the service.
- Parameters:
type (
Optional[str]) –The deployment controller type to use. The deployment controller is the mechanism that determines how tasks are deployed for your service. The valid options are: - ECS When you create a service which uses the
ECSdeployment controller, you can choose between the following deployment strategies: -ROLLING: When you create a service which uses the rolling update (ROLLING) deployment strategy, the Amazon ECS service scheduler replaces the currently running tasks with new tasks. The number of tasks that Amazon ECS adds or removes from the service during a rolling update is controlled by the service deployment configuration. Rolling update deployments are best suited for the following scenarios: - Gradual service updates: You need to update your service incrementally without taking the entire service offline at once. - Limited resource requirements: You want to avoid the additional resource costs of running two complete environments simultaneously (as required by blue/green deployments). - Acceptable deployment time: Your application can tolerate a longer deployment process, as rolling updates replace tasks one by one. - No need for instant roll back: Your service can tolerate a rollback process that takes minutes rather than seconds. - Simple deployment process: You prefer a straightforward deployment approach without the complexity of managing multiple environments, target groups, and listeners. - No load balancer requirement: Your service doesn’t use or require a load balancer, Application Load Balancer , Network Load Balancer , or Service Connect (which are required for blue/green deployments). - Stateful applications: Your application maintains state that makes it difficult to run two parallel environments. - Cost sensitivity: You want to minimize deployment costs by not running duplicate environments during deployment. Rolling updates are the default deployment strategy for services and provide a balance between deployment safety and resource efficiency for many common application scenarios. -BLUE_GREEN: A blue/green deployment strategy (BLUE_GREEN) is a release methodology that reduces downtime and risk by running two identical production environments called blue and green. With Amazon ECS blue/green deployments, you can validate new service revisions before directing production traffic to them. This approach provides a safer way to deploy changes with the ability to quickly roll back if needed. Amazon ECS blue/green deployments are best suited for the following scenarios: - Service validation: When you need to validate new service revisions before directing production traffic to them - Zero downtime: When your service requires zero-downtime deployments - Instant roll back: When you need the ability to quickly roll back if issues are detected - Load balancer requirement: When your service uses Application Load Balancer , Network Load Balancer , or Service Connect - External Use a third-party deployment controller. - Blue/green deployment (powered by CodeDeploy ) CodeDeploy installs an updated version of the application as a new replacement task set and reroutes production traffic from the original application task set to the replacement task set. The original task set is terminated after a successful deployment. Use this deployment controller to verify a new deployment of a service before sending production traffic to it. When updating the deployment controller for a service, consider the following depending on the type of migration you’re performing. - If you have a template that contains theEXTERNALdeployment controller information as well asTaskSetandPrimaryTaskSetresources, and you remove the task set resources from the template when updating fromEXTERNALtoECS, theDescribeTaskSetandDeleteTaskSetAPI calls will return a 400 error after the deployment controller is updated toECS. This results in a delete failure on the task set resources, even though the stack transitions toUPDATE_COMPLETEstatus. For more information, see Resource removed from stack but not deleted in the AWS CloudFormation User Guide. To fix this issue, delete the task sets directly using the Amazon ECSDeleteTaskSetAPI. For more information about how to delete a task set, see DeleteTaskSet in the ECSlong API Reference. - If you’re migrating fromCODE_DEPLOYtoECSwith a new task definition and CloudFormation performs a rollback operation, the Amazon ECSUpdateServicerequest fails with the following error: Resource handler returned message: “Invalid request provided: Unable to update task definition on services with a CODE_DEPLOY deployment controller. - After a successful migration fromECStoEXTERNALdeployment controller, you need to manually remove theACTIVEtask set, because Amazon ECS no longer manages the deployment. For information about how to delete a task set, see DeleteTaskSet in the ECSlong API Reference.- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins deployment_controller_property = ecs_mixins.CfnServicePropsMixin.DeploymentControllerProperty( type="type" )
Attributes
- type
The deployment controller type to use.
The deployment controller is the mechanism that determines how tasks are deployed for your service. The valid options are:
ECS
When you create a service which uses the
ECSdeployment controller, you can choose between the following deployment strategies:ROLLING: When you create a service which uses the rolling update (ROLLING) deployment strategy, the Amazon ECS service scheduler replaces the currently running tasks with new tasks. The number of tasks that Amazon ECS adds or removes from the service during a rolling update is controlled by the service deployment configuration.
Rolling update deployments are best suited for the following scenarios:
Gradual service updates: You need to update your service incrementally without taking the entire service offline at once.
Limited resource requirements: You want to avoid the additional resource costs of running two complete environments simultaneously (as required by blue/green deployments).
Acceptable deployment time: Your application can tolerate a longer deployment process, as rolling updates replace tasks one by one.
No need for instant roll back: Your service can tolerate a rollback process that takes minutes rather than seconds.
Simple deployment process: You prefer a straightforward deployment approach without the complexity of managing multiple environments, target groups, and listeners.
No load balancer requirement: Your service doesn’t use or require a load balancer, Application Load Balancer , Network Load Balancer , or Service Connect (which are required for blue/green deployments).
Stateful applications: Your application maintains state that makes it difficult to run two parallel environments.
Cost sensitivity: You want to minimize deployment costs by not running duplicate environments during deployment.
Rolling updates are the default deployment strategy for services and provide a balance between deployment safety and resource efficiency for many common application scenarios.
BLUE_GREEN: A blue/green deployment strategy (BLUE_GREEN) is a release methodology that reduces downtime and risk by running two identical production environments called blue and green. With Amazon ECS blue/green deployments, you can validate new service revisions before directing production traffic to them. This approach provides a safer way to deploy changes with the ability to quickly roll back if needed.
Amazon ECS blue/green deployments are best suited for the following scenarios:
Service validation: When you need to validate new service revisions before directing production traffic to them
Zero downtime: When your service requires zero-downtime deployments
Instant roll back: When you need the ability to quickly roll back if issues are detected
Load balancer requirement: When your service uses Application Load Balancer , Network Load Balancer , or Service Connect
External
Use a third-party deployment controller.
Blue/green deployment (powered by CodeDeploy )
CodeDeploy installs an updated version of the application as a new replacement task set and reroutes production traffic from the original application task set to the replacement task set. The original task set is terminated after a successful deployment. Use this deployment controller to verify a new deployment of a service before sending production traffic to it.
When updating the deployment controller for a service, consider the following depending on the type of migration you’re performing.
If you have a template that contains the
EXTERNALdeployment controller information as well asTaskSetandPrimaryTaskSetresources, and you remove the task set resources from the template when updating fromEXTERNALtoECS, theDescribeTaskSetandDeleteTaskSetAPI calls will return a 400 error after the deployment controller is updated toECS. This results in a delete failure on the task set resources, even though the stack transitions toUPDATE_COMPLETEstatus. For more information, see Resource removed from stack but not deleted in the AWS CloudFormation User Guide. To fix this issue, delete the task sets directly using the Amazon ECSDeleteTaskSetAPI. For more information about how to delete a task set, see DeleteTaskSet in the ECSlong API Reference.If you’re migrating from
CODE_DEPLOYtoECSwith a new task definition and CloudFormation performs a rollback operation, the Amazon ECSUpdateServicerequest fails with the following error:
Resource handler returned message: “Invalid request provided: Unable to update task definition on services with a CODE_DEPLOY deployment controller.
After a successful migration from
ECStoEXTERNALdeployment controller, you need to manually remove theACTIVEtask set, because Amazon ECS no longer manages the deployment. For information about how to delete a task set, see DeleteTaskSet in the ECSlong API Reference.
DeploymentLifecycleHookProperty
- class CfnServicePropsMixin.DeploymentLifecycleHookProperty(*, hook_details=None, hook_target_arn=None, lifecycle_stages=None, role_arn=None)
Bases:
objectA deployment lifecycle hook runs custom logic at specific stages of the deployment process.
Currently, you can use Lambda functions as hook targets.
For more information, see Lifecycle hooks for Amazon ECS service deployments in the Amazon Elastic Container Service Developer Guide .
- Parameters:
hook_details (
Any) – Use this field to specify custom parameters that Amazon ECS passes to your hook target invocations (such as a Lambda function). This field must be a JSON object as a string.hook_target_arn (
Optional[str]) – The Amazon Resource Name (ARN) of the hook target. Currently, only Lambda function ARNs are supported. You must provide this parameter when configuring a deployment lifecycle hook.lifecycle_stages (
Optional[Sequence[str]]) – The lifecycle stages at which to run the hook. Choose from these valid values:. - RECONCILE_SERVICE The reconciliation stage that only happens when you start a new service deployment with more than 1 service revision in an ACTIVE state. You can use a lifecycle hook for this stage. - PRE_SCALE_UP The green service revision has not started. The blue service revision is handling 100% of the production traffic. There is no test traffic. You can use a lifecycle hook for this stage. - POST_SCALE_UP The green service revision has started. The blue service revision is handling 100% of the production traffic. There is no test traffic. You can use a lifecycle hook for this stage. - TEST_TRAFFIC_SHIFT The blue and green service revisions are running. The blue service revision handles 100% of the production traffic. The green service revision is migrating from 0% to 100% of test traffic. You can use a lifecycle hook for this stage. - POST_TEST_TRAFFIC_SHIFT The test traffic shift is complete. The green service revision handles 100% of the test traffic. You can use a lifecycle hook for this stage. - PRODUCTION_TRAFFIC_SHIFT Production traffic is shifting to the green service revision. The green service revision is migrating from 0% to 100% of production traffic. You can use a lifecycle hook for this stage. - POST_PRODUCTION_TRAFFIC_SHIFT The production traffic shift is complete. You can use a lifecycle hook for this stage. You must provide this parameter when configuring a deployment lifecycle hook.role_arn (
Optional[str]) – The Amazon Resource Name (ARN) of the IAM role that grants Amazon ECS permission to call Lambda functions on your behalf. For more information, see Permissions required for Lambda functions in Amazon ECS blue/green deployments in the Amazon Elastic Container Service Developer Guide .
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins # hook_details: Any deployment_lifecycle_hook_property = ecs_mixins.CfnServicePropsMixin.DeploymentLifecycleHookProperty( hook_details=hook_details, hook_target_arn="hookTargetArn", lifecycle_stages=["lifecycleStages"], role_arn="roleArn" )
Attributes
- hook_details
Use this field to specify custom parameters that Amazon ECS passes to your hook target invocations (such as a Lambda function).
This field must be a JSON object as a string.
- hook_target_arn
The Amazon Resource Name (ARN) of the hook target. Currently, only Lambda function ARNs are supported.
You must provide this parameter when configuring a deployment lifecycle hook.
- lifecycle_stages
.
RECONCILE_SERVICE
The reconciliation stage that only happens when you start a new service deployment with more than 1 service revision in an ACTIVE state.
You can use a lifecycle hook for this stage.
PRE_SCALE_UP
The green service revision has not started. The blue service revision is handling 100% of the production traffic. There is no test traffic.
You can use a lifecycle hook for this stage.
POST_SCALE_UP
The green service revision has started. The blue service revision is handling 100% of the production traffic. There is no test traffic.
You can use a lifecycle hook for this stage.
TEST_TRAFFIC_SHIFT
The blue and green service revisions are running. The blue service revision handles 100% of the production traffic. The green service revision is migrating from 0% to 100% of test traffic.
You can use a lifecycle hook for this stage.
POST_TEST_TRAFFIC_SHIFT
The test traffic shift is complete. The green service revision handles 100% of the test traffic.
You can use a lifecycle hook for this stage.
PRODUCTION_TRAFFIC_SHIFT
Production traffic is shifting to the green service revision. The green service revision is migrating from 0% to 100% of production traffic.
You can use a lifecycle hook for this stage.
POST_PRODUCTION_TRAFFIC_SHIFT
The production traffic shift is complete.
You can use a lifecycle hook for this stage.
You must provide this parameter when configuring a deployment lifecycle hook.
- See:
- Type:
The lifecycle stages at which to run the hook. Choose from these valid values
- role_arn
The Amazon Resource Name (ARN) of the IAM role that grants Amazon ECS permission to call Lambda functions on your behalf.
For more information, see Permissions required for Lambda functions in Amazon ECS blue/green deployments in the Amazon Elastic Container Service Developer Guide .
ForceNewDeploymentProperty
- class CfnServicePropsMixin.ForceNewDeploymentProperty(*, enable_force_new_deployment=None, force_new_deployment_nonce=None)
Bases:
objectDetermines whether to force a new deployment of the service.
By default, deployments aren’t forced. You can use this option to start a new deployment with no service definition changes. For example, you can update a service’s tasks to use a newer Docker image with the same image/tag combination (
my_image:latest) or to roll Fargate tasks onto a newer platform version.- Parameters:
enable_force_new_deployment (
Union[bool,IResolvable,None]) – Determines whether to force a new deployment of the service. By default, deployments aren’t forced. You can use this option to start a new deployment with no service definition changes. For example, you can update a service’s tasks to use a newer Docker image with the same image/tag combination (my_image:latest) or to roll Fargate tasks onto a newer platform version.force_new_deployment_nonce (
Optional[str]) – When you change theForceNewDeploymentNoncevalue in your template, it signals Amazon ECS to start a new deployment even though no other service parameters have changed. The value must be a unique, time- varying value like a timestamp, random string, or sequence number. Use this property when you want to ensure your tasks pick up the latest version of a Docker image that uses the same tag but has been updated in the registry.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins force_new_deployment_property = ecs_mixins.CfnServicePropsMixin.ForceNewDeploymentProperty( enable_force_new_deployment=False, force_new_deployment_nonce="forceNewDeploymentNonce" )
Attributes
- enable_force_new_deployment
Determines whether to force a new deployment of the service.
By default, deployments aren’t forced. You can use this option to start a new deployment with no service definition changes. For example, you can update a service’s tasks to use a newer Docker image with the same image/tag combination (
my_image:latest) or to roll Fargate tasks onto a newer platform version.
- force_new_deployment_nonce
When you change the
ForceNewDeploymentNoncevalue in your template, it signals Amazon ECS to start a new deployment even though no other service parameters have changed.The value must be a unique, time- varying value like a timestamp, random string, or sequence number. Use this property when you want to ensure your tasks pick up the latest version of a Docker image that uses the same tag but has been updated in the registry.
LinearConfigurationProperty
- class CfnServicePropsMixin.LinearConfigurationProperty(*, step_bake_time_in_minutes=None, step_percent=None)
Bases:
objectConfiguration for a linear deployment strategy that shifts production traffic in equal percentage increments with configurable wait times between each step until 100 percent of traffic is shifted to the new service revision.
The following validation applies only to Linear deployments created through CloudFormation . CloudFormation operations time out after 36 hours. Linear deployments can approach this limit because of their extended duration. This can cause CloudFormation to roll back the deployment. To prevent timeout-related rollbacks, CloudFormation rejects deployments when the calculated deployment time exceeds 33 hours based on your template configuration:
BakeTimeInMinutes + (StepBakeTimeInMinutes × Number of deployment steps)Where the number of deployment steps is calculated as follows:
If ``StepPercent`` evenly divides by 100 : The number of deployment steps equals
(100 ÷ StepPercent) - 1Otherwise : The number of deployment steps equals the floor of
100 ÷ StepPercent. For example, ifStepPercentis 11, the number of deployment steps is 9 (not 9.1).
This calculation reflects that CloudFormation doesn’t apply the step bake time after the final traffic shift reaches 100%. For example, with a
StepPercentof 50%, there are actually two traffic shifts, but only one deployment step is counted for validation purposes because the bake time is applied only after the first 50% shift, not after reaching 100%.Additional backend processes (such as task scaling and running lifecycle hooks) can extend deployment time beyond these calculations. Even deployments under the 33-hour threshold might still time out if these processes cause the total duration to exceed 36 hours.
- Parameters:
step_bake_time_in_minutes (
Union[int,float,None]) – The amount of time in minutes to wait between each traffic shifting step during a linear deployment. Valid values are 0 to 1440 minutes (24 hours). The default value is 6. This bake time is not applied after reaching 100 percent traffic.step_percent (
Union[int,float,None]) – The percentage of production traffic to shift in each step during a linear deployment. Valid values are multiples of 0.1 from 3.0 to 100.0. The default value is 10.0.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins linear_configuration_property = ecs_mixins.CfnServicePropsMixin.LinearConfigurationProperty( step_bake_time_in_minutes=123, step_percent=123 )
Attributes
- step_bake_time_in_minutes
The amount of time in minutes to wait between each traffic shifting step during a linear deployment.
Valid values are 0 to 1440 minutes (24 hours). The default value is 6. This bake time is not applied after reaching 100 percent traffic.
- step_percent
The percentage of production traffic to shift in each step during a linear deployment.
Valid values are multiples of 0.1 from 3.0 to 100.0. The default value is 10.0.
LoadBalancerProperty
- class CfnServicePropsMixin.LoadBalancerProperty(*, advanced_configuration=None, container_name=None, container_port=None, load_balancer_name=None, target_group_arn=None)
Bases:
objectThe
LoadBalancerproperty specifies details on a load balancer that is used with a service.If the service is using the
CODE_DEPLOYdeployment controller, the service is required to use either an Application Load Balancer or Network Load Balancer. When you are creating an AWS CodeDeploy deployment group, you specify two target groups (referred to as atargetGroupPair). Each target group binds to a separate task set in the deployment. The load balancer can also have up to two listeners, a required listener for production traffic and an optional listener that allows you to test new revisions of the service before routing production traffic to it.Services with tasks that use the
awsvpcnetwork mode (for example, those with the Fargate launch type) only support Application Load Balancers and Network Load Balancers. Classic Load Balancers are not supported. Also, when you create any target groups for these services, you must chooseipas the target type, notinstance. Tasks that use theawsvpcnetwork mode are associated with an elastic network interface, not an Amazon EC2 instance.- Parameters:
advanced_configuration (
Union[IResolvable,AdvancedConfigurationProperty,Dict[str,Any],None]) – The advanced settings for the load balancer used in blue/green deployments. Specify the alternate target group, listener rules, and IAM role required for traffic shifting during blue/green deployments.container_name (
Optional[str]) – The name of the container (as it appears in a container definition) to associate with the load balancer. You need to specify the container name when configuring the target group for an Amazon ECS load balancer.container_port (
Union[int,float,None]) – The port on the container to associate with the load balancer. This port must correspond to acontainerPortin the task definition the tasks in the service are using. For tasks that use the EC2 launch type, the container instance they’re launched on must allow ingress traffic on thehostPortof the port mapping.load_balancer_name (
Optional[str]) – The name of the load balancer to associate with the Amazon ECS service or task set. If you are using an Application Load Balancer or a Network Load Balancer the load balancer name parameter should be omitted.target_group_arn (
Optional[str]) – The full Amazon Resource Name (ARN) of the Elastic Load Balancing target group or groups associated with a service or task set. A target group ARN is only specified when using an Application Load Balancer or Network Load Balancer. For services using theECSdeployment controller, you can specify one or multiple target groups. For more information, see Registering multiple target groups with a service in the Amazon Elastic Container Service Developer Guide . For services using theCODE_DEPLOYdeployment controller, you’re required to define two target groups for the load balancer. For more information, see Blue/green deployment with CodeDeploy in the Amazon Elastic Container Service Developer Guide . .. epigraph:: If your service’s task definition uses theawsvpcnetwork mode, you must chooseipas the target type, notinstance. Do this when creating your target groups because tasks that use theawsvpcnetwork mode are associated with an elastic network interface, not an Amazon EC2 instance. This network mode is required for the Fargate launch type.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins load_balancer_property = ecs_mixins.CfnServicePropsMixin.LoadBalancerProperty( advanced_configuration=ecs_mixins.CfnServicePropsMixin.AdvancedConfigurationProperty( alternate_target_group_arn="alternateTargetGroupArn", production_listener_rule="productionListenerRule", role_arn="roleArn", test_listener_rule="testListenerRule" ), container_name="containerName", container_port=123, load_balancer_name="loadBalancerName", target_group_arn="targetGroupArn" )
Attributes
- advanced_configuration
The advanced settings for the load balancer used in blue/green deployments.
Specify the alternate target group, listener rules, and IAM role required for traffic shifting during blue/green deployments.
- container_name
The name of the container (as it appears in a container definition) to associate with the load balancer.
You need to specify the container name when configuring the target group for an Amazon ECS load balancer.
- container_port
The port on the container to associate with the load balancer.
This port must correspond to a
containerPortin the task definition the tasks in the service are using. For tasks that use the EC2 launch type, the container instance they’re launched on must allow ingress traffic on thehostPortof the port mapping.
- load_balancer_name
The name of the load balancer to associate with the Amazon ECS service or task set.
If you are using an Application Load Balancer or a Network Load Balancer the load balancer name parameter should be omitted.
- target_group_arn
The full Amazon Resource Name (ARN) of the Elastic Load Balancing target group or groups associated with a service or task set.
A target group ARN is only specified when using an Application Load Balancer or Network Load Balancer.
For services using the
ECSdeployment controller, you can specify one or multiple target groups. For more information, see Registering multiple target groups with a service in the Amazon Elastic Container Service Developer Guide .For services using the
CODE_DEPLOYdeployment controller, you’re required to define two target groups for the load balancer. For more information, see Blue/green deployment with CodeDeploy in the Amazon Elastic Container Service Developer Guide . .. epigraph:If your service's task definition uses the ``awsvpc`` network mode, you must choose ``ip`` as the target type, not ``instance`` . Do this when creating your target groups because tasks that use the ``awsvpc`` network mode are associated with an elastic network interface, not an Amazon EC2 instance. This network mode is required for the Fargate launch type.
LogConfigurationProperty
- class CfnServicePropsMixin.LogConfigurationProperty(*, log_driver=None, options=None, secret_options=None)
Bases:
objectThe log configuration for the container.
This parameter maps to
LogConfigin the docker container create command and the--log-driveroption to docker run.By default, containers use the same logging driver that the Docker daemon uses. However, the container might use a different logging driver than the Docker daemon by specifying a log driver configuration in the container definition.
Understand the following when specifying a log configuration for your containers.
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon. Additional log drivers may be available in future releases of the Amazon ECS container agent.
For tasks on AWS Fargate , the supported log drivers are
awslogs,splunk, andawsfirelens.For tasks hosted on Amazon EC2 instances, the supported log drivers are
awslogs,fluentd,gelf,json-file,journald,syslog,splunk, andawsfirelens.This parameter requires version 1.18 of the Docker Remote API or greater on your container instance.
For tasks that are hosted on Amazon EC2 instances, the Amazon ECS container agent must register the available logging drivers with the
ECS_AVAILABLE_LOGGING_DRIVERSenvironment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS container agent configuration in the Amazon Elastic Container Service Developer Guide .For tasks that are on AWS Fargate , because you don’t have access to the underlying infrastructure your tasks are hosted on, any additional software needed must be installed outside of the task. For example, the Fluentd output aggregators or a remote host running Logstash to send Gelf logs to.
- Parameters:
log_driver (
Optional[str]) – The log driver to use for the container. For tasks on AWS Fargate , the supported log drivers areawslogs,splunk, andawsfirelens. For tasks hosted on Amazon EC2 instances, the supported log drivers areawslogs,fluentd,gelf,json-file,journald,syslog,splunk, andawsfirelens. For more information about using theawslogslog driver, see Send Amazon ECS logs to CloudWatch in the Amazon Elastic Container Service Developer Guide . For more information about using theawsfirelenslog driver, see Send Amazon ECS logs to an AWS service or AWS Partner . .. epigraph:: If you have a custom driver that isn’t listed, you can fork the Amazon ECS container agent project that’s available on GitHub and customize it to work with that driver. We encourage you to submit pull requests for changes that you would like to have included. However, we don’t currently provide support for running modified copies of this software.options (
Union[Mapping[str,str],IResolvable,None]) – The configuration options to send to the log driver. The options you can specify depend on the log driver. Some of the options you can specify when you use theawslogslog driver to route logs to Amazon CloudWatch include the following: - awslogs-create-group - Required: No Specify whether you want the log group to be created automatically. If this option isn’t specified, it defaults tofalse. .. epigraph:: Your IAM policy must include thelogs:CreateLogGrouppermission before you attempt to useawslogs-create-group. - awslogs-region - Required: Yes Specify the AWS Region that theawslogslog driver is to send your Docker logs to. You can choose to send all of your logs from clusters in different Regions to a single region in CloudWatch Logs. This is so that they’re all visible in one location. Otherwise, you can separate them by Region for more granularity. Make sure that the specified log group exists in the Region that you specify with this option. - awslogs-group - Required: Yes Make sure to specify a log group that theawslogslog driver sends its log streams to. - awslogs-stream-prefix - Required: Yes, when using Fargate.Optional when using EC2. Use theawslogs-stream-prefixoption to associate a log stream with the specified prefix, the container name, and the ID of the Amazon ECS task that the container belongs to. If you specify a prefix with this option, then the log stream takes the formatprefix-name/container-name/ecs-task-id. If you don’t specify a prefix with this option, then the log stream is named after the container ID that’s assigned by the Docker daemon on the container instance. Because it’s difficult to trace logs back to the container that sent them with just the Docker container ID (which is only available on the container instance), we recommend that you specify a prefix with this option. For Amazon ECS services, you can use the service name as the prefix. Doing so, you can trace log streams to the service that the container belongs to, the name of the container that sent them, and the ID of the task that the container belongs to. You must specify a stream-prefix for your logs to have your logs appear in the Log pane when using the Amazon ECS console. - awslogs-datetime-format - Required: No This option defines a multiline start pattern in Pythonstrftimeformat. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. One example of a use case for using this format is for parsing output such as a stack dump, which might otherwise be logged in multiple entries. The correct pattern allows it to be captured in a single entry. For more information, see awslogs-datetime-format . You cannot configure both theawslogs-datetime-formatandawslogs-multiline-patternoptions. .. epigraph:: Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance. - awslogs-multiline-pattern - Required: No This option defines a multiline start pattern that uses a regular expression. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. For more information, see awslogs-multiline-pattern . This option is ignored ifawslogs-datetime-formatis also configured. You cannot configure both theawslogs-datetime-formatandawslogs-multiline-patternoptions. .. epigraph:: Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance. The following options apply to all supported log drivers. - mode - Required: No Valid values:non-blocking|blockingThis option defines the delivery mode of log messages from the container to the log driver specified usinglogDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use theblockingmode and the flow of logs is interrupted, calls from container code to write to thestdoutandstderrstreams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use thenon-blockingmode, the container’s logs are instead stored in an in-memory intermediate buffer configured with themax-buffer-sizeoption. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the ``awslogs` container log driver <https://docs.aws.amazon.com/containers/preventing-log-loss-with-non-blocking-mode-in-the-awslogs-container-log-driver/>`_ . You can set a defaultmodefor all containers in a specific AWS Region by using thedefaultLogDriverModeaccount setting. If you don’t specify themodeoption or configure the account setting, Amazon ECS will default to thenon-blockingmode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide . .. epigraph:: On June 25, 2025, Amazon ECS changed the default log driver mode fromblockingtonon-blockingto prioritize task availability over logging. To continue using theblockingmode after this change, do one of the following: - Set themodeoption in your container definition’slogConfigurationasblocking. - Set thedefaultLogDriverModeaccount setting toblocking. - max-buffer-size - Required: No Default value:10mWhennon-blockingmode is used, themax-buffer-sizelog option controls the size of the buffer that’s used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost. To route logs using thesplunklog router, you need to specify asplunk-tokenand asplunk-url. When you use theawsfirelenslog router to route logs to an AWS Service or AWS Partner Network destination for log storage and analytics, you can set thelog-driver-buffer-limitoption to limit the number of events that are buffered in memory, before being sent to the log router container. It can help to resolve potential log loss issue because high throughput might result in memory running out for the buffer inside of Docker. Other options you can specify when usingawsfirelensto route logs depend on the destination. When you export logs to Amazon Data Firehose, you can specify the AWS Region withregionand a name for the log stream withdelivery_stream. When you export logs to Amazon Kinesis Data Streams, you can specify an AWS Region withregionand a data stream name withstream. When you export logs to Amazon OpenSearch Service, you can specify options likeName,Host(OpenSearch Service endpoint without protocol),Port,Index,Type,Aws_auth,Aws_region,Suppress_Type_Name, andtls. For more information, see Under the hood: FireLens for Amazon ECS Tasks . When you export logs to Amazon S3, you can specify the bucket using thebucketoption. You can also specifyregion,total_file_size,upload_timeout, anduse_put_objectas options. This parameter requires version 1.19 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command:sudo docker version --format '{{.Server.APIVersion}}'secret_options (
Union[IResolvable,Sequence[Union[IResolvable,SecretProperty,Dict[str,Any]]],None]) – The secrets to pass to the log configuration. For more information, see Specifying sensitive data in the Amazon Elastic Container Service Developer Guide .
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins log_configuration_property = ecs_mixins.CfnServicePropsMixin.LogConfigurationProperty( log_driver="logDriver", options={ "options_key": "options" }, secret_options=[ecs_mixins.CfnServicePropsMixin.SecretProperty( name="name", value_from="valueFrom" )] )
Attributes
- log_driver
The log driver to use for the container.
For tasks on AWS Fargate , the supported log drivers are
awslogs,splunk, andawsfirelens.For tasks hosted on Amazon EC2 instances, the supported log drivers are
awslogs,fluentd,gelf,json-file,journald,syslog,splunk, andawsfirelens.For more information about using the
awslogslog driver, see Send Amazon ECS logs to CloudWatch in the Amazon Elastic Container Service Developer Guide .For more information about using the
awsfirelenslog driver, see Send Amazon ECS logs to an AWS service or AWS Partner . .. epigraph:If you have a custom driver that isn't listed, you can fork the Amazon ECS container agent project that's `available on GitHub <https://docs.aws.amazon.com/https://github.com/aws/amazon-ecs-agent>`_ and customize it to work with that driver. We encourage you to submit pull requests for changes that you would like to have included. However, we don't currently provide support for running modified copies of this software.
- options
The configuration options to send to the log driver.
The options you can specify depend on the log driver. Some of the options you can specify when you use the
awslogslog driver to route logs to Amazon CloudWatch include the following:awslogs-create-group - Required: No
Specify whether you want the log group to be created automatically. If this option isn’t specified, it defaults to
false. .. epigraph:Your IAM policy must include the ``logs:CreateLogGroup`` permission before you attempt to use ``awslogs-create-group`` .
awslogs-region - Required: Yes
Specify the AWS Region that the
awslogslog driver is to send your Docker logs to. You can choose to send all of your logs from clusters in different Regions to a single region in CloudWatch Logs. This is so that they’re all visible in one location. Otherwise, you can separate them by Region for more granularity. Make sure that the specified log group exists in the Region that you specify with this option.awslogs-group - Required: Yes
Make sure to specify a log group that the
awslogslog driver sends its log streams to.awslogs-stream-prefix - Required: Yes, when using Fargate.Optional when using EC2.
Use the
awslogs-stream-prefixoption to associate a log stream with the specified prefix, the container name, and the ID of the Amazon ECS task that the container belongs to. If you specify a prefix with this option, then the log stream takes the formatprefix-name/container-name/ecs-task-id.If you don’t specify a prefix with this option, then the log stream is named after the container ID that’s assigned by the Docker daemon on the container instance. Because it’s difficult to trace logs back to the container that sent them with just the Docker container ID (which is only available on the container instance), we recommend that you specify a prefix with this option.
For Amazon ECS services, you can use the service name as the prefix. Doing so, you can trace log streams to the service that the container belongs to, the name of the container that sent them, and the ID of the task that the container belongs to.
You must specify a stream-prefix for your logs to have your logs appear in the Log pane when using the Amazon ECS console.
awslogs-datetime-format - Required: No
This option defines a multiline start pattern in Python
strftimeformat. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages.One example of a use case for using this format is for parsing output such as a stack dump, which might otherwise be logged in multiple entries. The correct pattern allows it to be captured in a single entry.
For more information, see awslogs-datetime-format .
You cannot configure both the
awslogs-datetime-formatandawslogs-multiline-patternoptions. .. epigraph:Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance.
awslogs-multiline-pattern - Required: No
This option defines a multiline start pattern that uses a regular expression. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages.
For more information, see awslogs-multiline-pattern .
This option is ignored if
awslogs-datetime-formatis also configured.You cannot configure both the
awslogs-datetime-formatandawslogs-multiline-patternoptions. .. epigraph:Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance.
The following options apply to all supported log drivers.
mode - Required: No
Valid values:
non-blocking|blockingThis option defines the delivery mode of log messages from the container to the log driver specified using
logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted.If you use the
blockingmode and the flow of logs is interrupted, calls from container code to write to thestdoutandstderrstreams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure.If you use the
non-blockingmode, the container’s logs are instead stored in an in-memory intermediate buffer configured with themax-buffer-sizeoption. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the ``awslogs` container log driver <https://docs.aws.amazon.com/containers/preventing-log-loss-with-non-blocking-mode-in-the-awslogs-container-log-driver/>`_ .You can set a default
modefor all containers in a specific AWS Region by using thedefaultLogDriverModeaccount setting. If you don’t specify themodeoption or configure the account setting, Amazon ECS will default to thenon-blockingmode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide . .. epigraph:On June 25, 2025, Amazon ECS changed the default log driver mode from ``blocking`` to ``non-blocking`` to prioritize task availability over logging. To continue using the ``blocking`` mode after this change, do one of the following: - Set the ``mode`` option in your container definition's ``logConfiguration`` as ``blocking`` . - Set the ``defaultLogDriverMode`` account setting to ``blocking`` .
max-buffer-size - Required: No
Default value:
10mWhen
non-blockingmode is used, themax-buffer-sizelog option controls the size of the buffer that’s used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.To route logs using the
splunklog router, you need to specify asplunk-tokenand asplunk-url.When you use the
awsfirelenslog router to route logs to an AWS Service or AWS Partner Network destination for log storage and analytics, you can set thelog-driver-buffer-limitoption to limit the number of events that are buffered in memory, before being sent to the log router container. It can help to resolve potential log loss issue because high throughput might result in memory running out for the buffer inside of Docker.Other options you can specify when using
awsfirelensto route logs depend on the destination. When you export logs to Amazon Data Firehose, you can specify the AWS Region withregionand a name for the log stream withdelivery_stream.When you export logs to Amazon Kinesis Data Streams, you can specify an AWS Region with
regionand a data stream name withstream.When you export logs to Amazon OpenSearch Service, you can specify options like
Name,Host(OpenSearch Service endpoint without protocol),Port,Index,Type,Aws_auth,Aws_region,Suppress_Type_Name, andtls. For more information, see Under the hood: FireLens for Amazon ECS Tasks .When you export logs to Amazon S3, you can specify the bucket using the
bucketoption. You can also specifyregion,total_file_size,upload_timeout, anduse_put_objectas options.This parameter requires version 1.19 of the Docker Remote API or greater on your container instance. To check the Docker Remote API version on your container instance, log in to your container instance and run the following command:
sudo docker version --format '{{.Server.APIVersion}}'
- secret_options
The secrets to pass to the log configuration.
For more information, see Specifying sensitive data in the Amazon Elastic Container Service Developer Guide .
NetworkConfigurationProperty
- class CfnServicePropsMixin.NetworkConfigurationProperty(*, awsvpc_configuration=None)
Bases:
objectThe network configuration for a task or service.
- Parameters:
awsvpc_configuration (
Union[IResolvable,AwsVpcConfigurationProperty,Dict[str,Any],None]) – The VPC subnets and security groups that are associated with a task. .. epigraph:: All specified subnets and security groups must be from the same VPC.- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins network_configuration_property = ecs_mixins.CfnServicePropsMixin.NetworkConfigurationProperty( awsvpc_configuration=ecs_mixins.CfnServicePropsMixin.AwsVpcConfigurationProperty( assign_public_ip="assignPublicIp", security_groups=["securityGroups"], subnets=["subnets"] ) )
Attributes
- awsvpc_configuration
The VPC subnets and security groups that are associated with a task.
All specified subnets and security groups must be from the same VPC.
PlacementConstraintProperty
- class CfnServicePropsMixin.PlacementConstraintProperty(*, expression=None, type=None)
Bases:
objectAn object representing a constraint on task placement.
For more information, see Task placement constraints in the Amazon Elastic Container Service Developer Guide . .. epigraph:
If you're using the Fargate launch type, task placement constraints aren't supported.
- Parameters:
expression (
Optional[str]) – A cluster query language expression to apply to the constraint. The expression can have a maximum length of 2000 characters. You can’t specify an expression if the constraint type isdistinctInstance. For more information, see Cluster query language in the Amazon Elastic Container Service Developer Guide .type (
Optional[str]) – The type of constraint. UsedistinctInstanceto ensure that each task in a particular group is running on a different container instance. UsememberOfto restrict the selection to a group of valid candidates.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins placement_constraint_property = ecs_mixins.CfnServicePropsMixin.PlacementConstraintProperty( expression="expression", type="type" )
Attributes
- expression
A cluster query language expression to apply to the constraint.
The expression can have a maximum length of 2000 characters. You can’t specify an expression if the constraint type is
distinctInstance. For more information, see Cluster query language in the Amazon Elastic Container Service Developer Guide .
- type
The type of constraint.
Use
distinctInstanceto ensure that each task in a particular group is running on a different container instance. UsememberOfto restrict the selection to a group of valid candidates.
PlacementStrategyProperty
- class CfnServicePropsMixin.PlacementStrategyProperty(*, field=None, type=None)
Bases:
objectThe task placement strategy for a task or service.
For more information, see Task placement strategies in the Amazon Elastic Container Service Developer Guide .
- Parameters:
field (
Optional[str]) – The field to apply the placement strategy against. For thespreadplacement strategy, valid values areinstanceId(orhost, which has the same effect), or any platform or custom attribute that’s applied to a container instance, such asattribute:ecs.availability-zone. For thebinpackplacement strategy, valid values arecpuandmemory. For therandomplacement strategy, this field is not used.type (
Optional[str]) – The type of placement strategy. Therandomplacement strategy randomly places tasks on available candidates. Thespreadplacement strategy spreads placement across available candidates evenly based on thefieldparameter. Thebinpackstrategy places tasks on available candidates that have the least available amount of the resource that’s specified with thefieldparameter. For example, if you binpack on memory, a task is placed on the instance with the least amount of remaining memory but still enough to run the task.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins placement_strategy_property = ecs_mixins.CfnServicePropsMixin.PlacementStrategyProperty( field="field", type="type" )
Attributes
- field
The field to apply the placement strategy against.
For the
spreadplacement strategy, valid values areinstanceId(orhost, which has the same effect), or any platform or custom attribute that’s applied to a container instance, such asattribute:ecs.availability-zone. For thebinpackplacement strategy, valid values arecpuandmemory. For therandomplacement strategy, this field is not used.
- type
The type of placement strategy.
The
randomplacement strategy randomly places tasks on available candidates. Thespreadplacement strategy spreads placement across available candidates evenly based on thefieldparameter. Thebinpackstrategy places tasks on available candidates that have the least available amount of the resource that’s specified with thefieldparameter. For example, if you binpack on memory, a task is placed on the instance with the least amount of remaining memory but still enough to run the task.
SecretProperty
- class CfnServicePropsMixin.SecretProperty(*, name=None, value_from=None)
Bases:
objectAn object representing the secret to expose to your container.
Secrets can be exposed to a container in the following ways:
To inject sensitive data into your containers as environment variables, use the
secretscontainer definition parameter.To reference sensitive information in the log configuration of a container, use the
secretOptionscontainer definition parameter.
For more information, see Specifying sensitive data in the Amazon Elastic Container Service Developer Guide .
- Parameters:
name (
Optional[str]) – The name of the secret.value_from (
Optional[str]) –The secret to expose to the container. The supported values are either the full ARN of the AWS Secrets Manager secret or the full ARN of the parameter in the SSM Parameter Store. For information about the require AWS Identity and Access Management permissions, see Required IAM permissions for Amazon ECS secrets (for Secrets Manager) or Required IAM permissions for Amazon ECS secrets (for Systems Manager Parameter store) in the Amazon Elastic Container Service Developer Guide . .. epigraph:: If the SSM Parameter Store parameter exists in the same Region as the task you’re launching, then you can use either the full ARN or name of the parameter. If the parameter exists in a different Region, then the full ARN must be specified.
- See:
http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-ecs-service-secret.html
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins secret_property = ecs_mixins.CfnServicePropsMixin.SecretProperty( name="name", value_from="valueFrom" )
Attributes
- name
The name of the secret.
- value_from
The secret to expose to the container.
The supported values are either the full ARN of the AWS Secrets Manager secret or the full ARN of the parameter in the SSM Parameter Store.
For information about the require AWS Identity and Access Management permissions, see Required IAM permissions for Amazon ECS secrets (for Secrets Manager) or Required IAM permissions for Amazon ECS secrets (for Systems Manager Parameter store) in the Amazon Elastic Container Service Developer Guide . .. epigraph:
If the SSM Parameter Store parameter exists in the same Region as the task you're launching, then you can use either the full ARN or name of the parameter. If the parameter exists in a different Region, then the full ARN must be specified.
ServiceConnectAccessLogConfigurationProperty
- class CfnServicePropsMixin.ServiceConnectAccessLogConfigurationProperty(*, format=None, include_query_parameters=None)
Bases:
objectConfiguration for Service Connect access logging.
Access logs provide detailed information about requests made to your service, including request patterns, response codes, and timing data for debugging and monitoring purposes. .. epigraph:
To enable access logs, you must also specify a ``logConfiguration`` in the ``serviceConnectConfiguration`` .
- Parameters:
format (
Optional[str]) – The format for Service Connect access log output. Choose TEXT for human-readable logs or JSON for structured data that integrates well with log analysis tools.include_query_parameters (
Optional[str]) – Specifies whether to include query parameters in Service Connect access logs. When enabled, query parameters from HTTP requests are included in the access logs. Consider security and privacy implications when enabling this feature, as query parameters may contain sensitive information such as request IDs and tokens. By default, this parameter isDISABLED.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_access_log_configuration_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectAccessLogConfigurationProperty( format="format", include_query_parameters="includeQueryParameters" )
Attributes
- format
The format for Service Connect access log output.
Choose TEXT for human-readable logs or JSON for structured data that integrates well with log analysis tools.
- include_query_parameters
Specifies whether to include query parameters in Service Connect access logs.
When enabled, query parameters from HTTP requests are included in the access logs. Consider security and privacy implications when enabling this feature, as query parameters may contain sensitive information such as request IDs and tokens. By default, this parameter is
DISABLED.
ServiceConnectClientAliasProperty
- class CfnServicePropsMixin.ServiceConnectClientAliasProperty(*, dns_name=None, port=None, test_traffic_rules=None)
Bases:
objectEach alias (“endpoint”) is a fully-qualified name and port number that other tasks (“clients”) can use to connect to this service.
Each name and port mapping must be unique within the namespace.
Tasks that run in a namespace can use short names to connect to services in the namespace. Tasks can connect to services across all of the clusters in the namespace. Tasks connect through a managed proxy container that collects logs and metrics for increased visibility. Only the tasks that Amazon ECS services create are supported with Service Connect. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide .
- Parameters:
dns_name (
Optional[str]) –The
dnsNameis the name that you use in the applications of client tasks to connect to this service. The name must be a valid DNS name but doesn’t need to be fully-qualified. The name can include up to 127 characters. The name can include lowercase letters, numbers, underscores (_), hyphens (-), and periods (.). The name can’t start with a hyphen. If this parameter isn’t specified, the default value ofdiscoveryName.namespaceis used. If thediscoveryNameisn’t specified, the port mapping name from the task definition is used inportName.namespace. To avoid changing your applications in client Amazon ECS services, set this to the same name that the client application uses by default. For example, a few common names aredatabase,db, or the lowercase name of a database, such asmysqlorredis. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide .port (
Union[int,float,None]) –The listening port number for the Service Connect proxy. This port is available inside of all of the tasks within the same namespace. To avoid changing your applications in client Amazon ECS services, set this to the same port that the client application uses by default. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide .
test_traffic_rules (
Union[IResolvable,ServiceConnectTestTrafficRulesProperty,Dict[str,Any],None]) – The configuration for test traffic routing rules used during blue/green deployments with Amazon ECS Service Connect. This allows you to route a portion of traffic to the new service revision of your service for testing before shifting all production traffic.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_client_alias_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectClientAliasProperty( dns_name="dnsName", port=123, test_traffic_rules=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesProperty( header=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderProperty( name="name", value=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty( exact="exact" ) ) ) )
Attributes
- dns_name
The
dnsNameis the name that you use in the applications of client tasks to connect to this service.The name must be a valid DNS name but doesn’t need to be fully-qualified. The name can include up to 127 characters. The name can include lowercase letters, numbers, underscores (_), hyphens (-), and periods (.). The name can’t start with a hyphen.
If this parameter isn’t specified, the default value of
discoveryName.namespaceis used. If thediscoveryNameisn’t specified, the port mapping name from the task definition is used inportName.namespace.To avoid changing your applications in client Amazon ECS services, set this to the same name that the client application uses by default. For example, a few common names are
database,db, or the lowercase name of a database, such asmysqlorredis. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide .
- port
The listening port number for the Service Connect proxy.
This port is available inside of all of the tasks within the same namespace.
To avoid changing your applications in client Amazon ECS services, set this to the same port that the client application uses by default. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide .
- test_traffic_rules
The configuration for test traffic routing rules used during blue/green deployments with Amazon ECS Service Connect.
This allows you to route a portion of traffic to the new service revision of your service for testing before shifting all production traffic.
ServiceConnectConfigurationProperty
- class CfnServicePropsMixin.ServiceConnectConfigurationProperty(*, access_log_configuration=None, enabled=None, log_configuration=None, namespace=None, services=None)
Bases:
objectThe Service Connect configuration of your Amazon ECS service.
The configuration for this service to discover and connect to services, and be discovered by, and connected from, other services within a namespace.
Tasks that run in a namespace can use short names to connect to services in the namespace. Tasks can connect to services across all of the clusters in the namespace. Tasks connect through a managed proxy container that collects logs and metrics for increased visibility. Only the tasks that Amazon ECS services create are supported with Service Connect. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide .
- Parameters:
access_log_configuration (
Union[IResolvable,ServiceConnectAccessLogConfigurationProperty,Dict[str,Any],None]) – The configuration for Service Connect access logging. Access logs capture detailed information about requests made to your service, including request patterns, response codes, and timing data. They can be useful for debugging connectivity issues, monitoring service performance, and auditing service-to-service communication for security and compliance purposes. .. epigraph:: To enable access logs, you must also specify alogConfigurationin theserviceConnectConfiguration.enabled (
Union[bool,IResolvable,None]) – Specifies whether to use Service Connect with this service.log_configuration (
Union[IResolvable,LogConfigurationProperty,Dict[str,Any],None]) –The log configuration for the container. This parameter maps to
LogConfigin the docker container create command and the--log-driveroption to docker run. By default, containers use the same logging driver that the Docker daemon uses. However, the container might use a different logging driver than the Docker daemon by specifying a log driver configuration in the container definition. Understand the following when specifying a log configuration for your containers. - Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon. Additional log drivers may be available in future releases of the Amazon ECS container agent. For tasks on AWS Fargate , the supported log drivers areawslogs,splunk, andawsfirelens. For tasks hosted on Amazon EC2 instances, the supported log drivers areawslogs,fluentd,gelf,json-file,journald,syslog,splunk, andawsfirelens. - This parameter requires version 1.18 of the Docker Remote API or greater on your container instance. - For tasks that are hosted on Amazon EC2 instances, the Amazon ECS container agent must register the available logging drivers with theECS_AVAILABLE_LOGGING_DRIVERSenvironment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS container agent configuration in the Amazon Elastic Container Service Developer Guide . - For tasks that are on AWS Fargate , because you don’t have access to the underlying infrastructure your tasks are hosted on, any additional software needed must be installed outside of the task. For example, the Fluentd output aggregators or a remote host running Logstash to send Gelf logs to.namespace (
Optional[str]) – The namespace name or full Amazon Resource Name (ARN) of the AWS Cloud Map namespace for use with Service Connect. The namespace must be in the same AWS Region as the Amazon ECS service and cluster. The type of namespace doesn’t affect Service Connect. For more information about AWS Cloud Map , see Working with Services in the AWS Cloud Map Developer Guide .services (
Union[IResolvable,Sequence[Union[IResolvable,ServiceConnectServiceProperty,Dict[str,Any]]],None]) – The list of Service Connect service objects. These are names and aliases (also known as endpoints) that are used by other Amazon ECS services to connect to this service. This field is not required for a “client” Amazon ECS service that’s a member of a namespace only to connect to other services within the namespace. An example of this would be a frontend application that accepts incoming requests from either a load balancer that’s attached to the service or by other means. An object selects a port from the task definition, assigns a name for the AWS Cloud Map service, and a list of aliases (endpoints) and ports for client applications to refer to this service.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_configuration_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectConfigurationProperty( access_log_configuration=ecs_mixins.CfnServicePropsMixin.ServiceConnectAccessLogConfigurationProperty( format="format", include_query_parameters="includeQueryParameters" ), enabled=False, log_configuration=ecs_mixins.CfnServicePropsMixin.LogConfigurationProperty( log_driver="logDriver", options={ "options_key": "options" }, secret_options=[ecs_mixins.CfnServicePropsMixin.SecretProperty( name="name", value_from="valueFrom" )] ), namespace="namespace", services=[ecs_mixins.CfnServicePropsMixin.ServiceConnectServiceProperty( client_aliases=[ecs_mixins.CfnServicePropsMixin.ServiceConnectClientAliasProperty( dns_name="dnsName", port=123, test_traffic_rules=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesProperty( header=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderProperty( name="name", value=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty( exact="exact" ) ) ) )], discovery_name="discoveryName", ingress_port_override=123, port_name="portName", timeout=ecs_mixins.CfnServicePropsMixin.TimeoutConfigurationProperty( idle_timeout_seconds=123, per_request_timeout_seconds=123 ), tls=ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsConfigurationProperty( issuer_certificate_authority=ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsCertificateAuthorityProperty( aws_pca_authority_arn="awsPcaAuthorityArn" ), kms_key="kmsKey", role_arn="roleArn" ) )] )
Attributes
- access_log_configuration
The configuration for Service Connect access logging.
Access logs capture detailed information about requests made to your service, including request patterns, response codes, and timing data. They can be useful for debugging connectivity issues, monitoring service performance, and auditing service-to-service communication for security and compliance purposes. .. epigraph:
To enable access logs, you must also specify a ``logConfiguration`` in the ``serviceConnectConfiguration`` .
- enabled
Specifies whether to use Service Connect with this service.
- log_configuration
The log configuration for the container.
This parameter maps to
LogConfigin the docker container create command and the--log-driveroption to docker run.By default, containers use the same logging driver that the Docker daemon uses. However, the container might use a different logging driver than the Docker daemon by specifying a log driver configuration in the container definition.
Understand the following when specifying a log configuration for your containers.
Amazon ECS currently supports a subset of the logging drivers available to the Docker daemon. Additional log drivers may be available in future releases of the Amazon ECS container agent.
For tasks on AWS Fargate , the supported log drivers are
awslogs,splunk, andawsfirelens.For tasks hosted on Amazon EC2 instances, the supported log drivers are
awslogs,fluentd,gelf,json-file,journald,syslog,splunk, andawsfirelens.This parameter requires version 1.18 of the Docker Remote API or greater on your container instance.
For tasks that are hosted on Amazon EC2 instances, the Amazon ECS container agent must register the available logging drivers with the
ECS_AVAILABLE_LOGGING_DRIVERSenvironment variable before containers placed on that instance can use these log configuration options. For more information, see Amazon ECS container agent configuration in the Amazon Elastic Container Service Developer Guide .For tasks that are on AWS Fargate , because you don’t have access to the underlying infrastructure your tasks are hosted on, any additional software needed must be installed outside of the task. For example, the Fluentd output aggregators or a remote host running Logstash to send Gelf logs to.
- namespace
The namespace name or full Amazon Resource Name (ARN) of the AWS Cloud Map namespace for use with Service Connect.
The namespace must be in the same AWS Region as the Amazon ECS service and cluster. The type of namespace doesn’t affect Service Connect. For more information about AWS Cloud Map , see Working with Services in the AWS Cloud Map Developer Guide .
- services
The list of Service Connect service objects.
These are names and aliases (also known as endpoints) that are used by other Amazon ECS services to connect to this service.
This field is not required for a “client” Amazon ECS service that’s a member of a namespace only to connect to other services within the namespace. An example of this would be a frontend application that accepts incoming requests from either a load balancer that’s attached to the service or by other means.
An object selects a port from the task definition, assigns a name for the AWS Cloud Map service, and a list of aliases (endpoints) and ports for client applications to refer to this service.
ServiceConnectServiceProperty
- class CfnServicePropsMixin.ServiceConnectServiceProperty(*, client_aliases=None, discovery_name=None, ingress_port_override=None, port_name=None, timeout=None, tls=None)
Bases:
objectThe Service Connect service object configuration.
For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide .
- Parameters:
client_aliases (
Union[IResolvable,Sequence[Union[IResolvable,ServiceConnectClientAliasProperty,Dict[str,Any]]],None]) – The list of client aliases for this Service Connect service. You use these to assign names that can be used by client applications. The maximum number of client aliases that you can have in this list is 1. Each alias (“endpoint”) is a fully-qualified name and port number that other Amazon ECS tasks (“clients”) can use to connect to this service. Each name and port mapping must be unique within the namespace. For eachServiceConnectService, you must provide at least oneclientAliaswith oneport.discovery_name (
Optional[str]) – ThediscoveryNameis the name of the new AWS Cloud Map service that Amazon ECS creates for this Amazon ECS service. This must be unique within the AWS Cloud Map namespace. The name can contain up to 64 characters. The name can include lowercase letters, numbers, underscores (_), and hyphens (-). The name can’t start with a hyphen. If thediscoveryNameisn’t specified, the port mapping name from the task definition is used inportName.namespace.ingress_port_override (
Union[int,float,None]) – The port number for the Service Connect proxy to listen on. Use the value of this field to bypass the proxy for traffic on the port number specified in the namedportMappingin the task definition of this application, and then use it in your VPC security groups to allow traffic into the proxy for this Amazon ECS service. Inawsvpcmode and Fargate, the default value is the container port number. The container port number is in theportMappingin the task definition. In bridge mode, the default value is the ephemeral port of the Service Connect proxy.port_name (
Optional[str]) – TheportNamemust match the name of one of theportMappingsfrom all the containers in the task definition of this Amazon ECS service.timeout (
Union[IResolvable,TimeoutConfigurationProperty,Dict[str,Any],None]) – A reference to an object that represents the configured timeouts for Service Connect.tls (
Union[IResolvable,ServiceConnectTlsConfigurationProperty,Dict[str,Any],None]) – A reference to an object that represents a Transport Layer Security (TLS) configuration.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_service_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectServiceProperty( client_aliases=[ecs_mixins.CfnServicePropsMixin.ServiceConnectClientAliasProperty( dns_name="dnsName", port=123, test_traffic_rules=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesProperty( header=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderProperty( name="name", value=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty( exact="exact" ) ) ) )], discovery_name="discoveryName", ingress_port_override=123, port_name="portName", timeout=ecs_mixins.CfnServicePropsMixin.TimeoutConfigurationProperty( idle_timeout_seconds=123, per_request_timeout_seconds=123 ), tls=ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsConfigurationProperty( issuer_certificate_authority=ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsCertificateAuthorityProperty( aws_pca_authority_arn="awsPcaAuthorityArn" ), kms_key="kmsKey", role_arn="roleArn" ) )
Attributes
- client_aliases
The list of client aliases for this Service Connect service.
You use these to assign names that can be used by client applications. The maximum number of client aliases that you can have in this list is 1.
Each alias (“endpoint”) is a fully-qualified name and port number that other Amazon ECS tasks (“clients”) can use to connect to this service.
Each name and port mapping must be unique within the namespace.
For each
ServiceConnectService, you must provide at least oneclientAliaswith oneport.
- discovery_name
The
discoveryNameis the name of the new AWS Cloud Map service that Amazon ECS creates for this Amazon ECS service.This must be unique within the AWS Cloud Map namespace. The name can contain up to 64 characters. The name can include lowercase letters, numbers, underscores (_), and hyphens (-). The name can’t start with a hyphen.
If the
discoveryNameisn’t specified, the port mapping name from the task definition is used inportName.namespace.
- ingress_port_override
The port number for the Service Connect proxy to listen on.
Use the value of this field to bypass the proxy for traffic on the port number specified in the named
portMappingin the task definition of this application, and then use it in your VPC security groups to allow traffic into the proxy for this Amazon ECS service.In
awsvpcmode and Fargate, the default value is the container port number. The container port number is in theportMappingin the task definition. In bridge mode, the default value is the ephemeral port of the Service Connect proxy.
- port_name
The
portNamemust match the name of one of theportMappingsfrom all the containers in the task definition of this Amazon ECS service.
- timeout
A reference to an object that represents the configured timeouts for Service Connect.
- tls
A reference to an object that represents a Transport Layer Security (TLS) configuration.
ServiceConnectTestTrafficRulesHeaderProperty
- class CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderProperty(*, name=None, value=None)
Bases:
object- Parameters:
name (
Optional[str])value (
Union[IResolvable,ServiceConnectTestTrafficRulesHeaderValueProperty,Dict[str,Any],None])
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_test_traffic_rules_header_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderProperty( name="name", value=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty( exact="exact" ) )
Attributes
- name
-
- Type:
see
ServiceConnectTestTrafficRulesHeaderValueProperty
- class CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty(*, exact=None)
Bases:
object- Parameters:
exact (
Optional[str])- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_test_traffic_rules_header_value_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty( exact="exact" )
Attributes
ServiceConnectTestTrafficRulesProperty
- class CfnServicePropsMixin.ServiceConnectTestTrafficRulesProperty(*, header=None)
Bases:
objectThe test traffic routing configuration for Amazon ECS blue/green deployments.
This configuration allows you to define rules for routing specific traffic to the new service revision during the deployment process, allowing for safe testing before full production traffic shift.
For more information, see Service Connect for Amazon ECS blue/green deployments in the Amazon Elastic Container Service Developer Guide .
- Parameters:
header (
Union[IResolvable,ServiceConnectTestTrafficRulesHeaderProperty,Dict[str,Any],None]) – The HTTP header-based routing rules that determine which requests should be routed to the new service version during blue/green deployment testing. These rules provide fine-grained control over test traffic routing based on request headers.- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_test_traffic_rules_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesProperty( header=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderProperty( name="name", value=ecs_mixins.CfnServicePropsMixin.ServiceConnectTestTrafficRulesHeaderValueProperty( exact="exact" ) ) )
Attributes
- header
The HTTP header-based routing rules that determine which requests should be routed to the new service version during blue/green deployment testing.
These rules provide fine-grained control over test traffic routing based on request headers.
ServiceConnectTlsConfigurationProperty
- class CfnServicePropsMixin.ServiceConnectTlsConfigurationProperty(*, issuer_certificate_authority=None, kms_key=None, role_arn=None)
Bases:
objectThe key that encrypts and decrypts your resources for Service Connect TLS.
- Parameters:
issuer_certificate_authority (
Union[IResolvable,ServiceConnectTlsCertificateAuthorityProperty,Dict[str,Any],None]) – The signer certificate authority.kms_key (
Optional[str]) – The AWS Key Management Service key.role_arn (
Optional[str]) – The Amazon Resource Name (ARN) of the IAM role that’s associated with the Service Connect TLS.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_connect_tls_configuration_property = ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsConfigurationProperty( issuer_certificate_authority=ecs_mixins.CfnServicePropsMixin.ServiceConnectTlsCertificateAuthorityProperty( aws_pca_authority_arn="awsPcaAuthorityArn" ), kms_key="kmsKey", role_arn="roleArn" )
Attributes
- issuer_certificate_authority
The signer certificate authority.
- kms_key
The AWS Key Management Service key.
- role_arn
The Amazon Resource Name (ARN) of the IAM role that’s associated with the Service Connect TLS.
ServiceManagedEBSVolumeConfigurationProperty
- class CfnServicePropsMixin.ServiceManagedEBSVolumeConfigurationProperty(*, encrypted=None, filesystem_type=None, iops=None, kms_key_id=None, role_arn=None, size_in_gib=None, snapshot_id=None, tag_specifications=None, throughput=None, volume_initialization_rate=None, volume_type=None)
Bases:
objectThe configuration for the Amazon EBS volume that Amazon ECS creates and manages on your behalf.
These settings are used to create each Amazon EBS volume, with one volume created for each task in the service. For information about the supported launch types and operating systems, see Supported operating systems and launch types in the Amazon Elastic Container Service Developer Guide .
Many of these parameters map 1:1 with the Amazon EBS
CreateVolumeAPI request parameters.- Parameters:
encrypted (
Union[bool,IResolvable,None]) – Indicates whether the volume should be encrypted. If you turn on Region-level Amazon EBS encryption by default but set this value asfalse, the setting is overridden and the volume is encrypted with the KMS key specified for Amazon EBS encryption by default. This parameter maps 1:1 with theEncryptedparameter of the CreateVolume API in the Amazon EC2 API Reference .filesystem_type (
Optional[str]) – The filesystem type for the volume. For volumes created from a snapshot, you must specify the same filesystem type that the volume was using when the snapshot was created. If there is a filesystem type mismatch, the tasks will fail to start. The available Linux filesystem types areext3,ext4, andxfs. If no value is specified, thexfsfilesystem type is used by default. The available Windows filesystem types areNTFS.iops (
Union[int,float,None]) –The number of I/O operations per second (IOPS). For
gp3,io1, andio2volumes, this represents the number of IOPS that are provisioned for the volume. Forgp2volumes, this represents the baseline performance of the volume and the rate at which the volume accumulates I/O credits for bursting. The following are the supported values for each volume type. -gp3: 3,000 - 16,000 IOPS -io1: 100 - 64,000 IOPS -io2: 100 - 256,000 IOPS This parameter is required forio1andio2volume types. The default forgp3volumes is3,000 IOPS. This parameter is not supported forst1,sc1, orstandardvolume types. This parameter maps 1:1 with theIopsparameter of the CreateVolume API in the Amazon EC2 API Reference .kms_key_id (
Optional[str]) –The Amazon Resource Name (ARN) identifier of the AWS Key Management Service key to use for Amazon EBS encryption. When a key is specified using this parameter, it overrides Amazon EBS default encryption or any KMS key that you specified for cluster-level managed storage encryption. This parameter maps 1:1 with the
KmsKeyIdparameter of the CreateVolume API in the Amazon EC2 API Reference . For more information about encrypting Amazon EBS volumes attached to tasks, see Encrypt data stored in Amazon EBS volumes attached to Amazon ECS tasks . .. epigraph:: AWS authenticates the AWS Key Management Service key asynchronously. Therefore, if you specify an ID, alias, or ARN that is invalid, the action can appear to complete, but eventually fails.role_arn (
Optional[str]) – The ARN of the IAM role to associate with this volume. This is the Amazon ECS infrastructure IAM role that is used to manage your AWS infrastructure. We recommend using the Amazon ECS-managedAmazonECSInfrastructureRolePolicyForVolumesIAM policy with this role. For more information, see Amazon ECS infrastructure IAM role in the Amazon ECS Developer Guide .size_in_gib (
Union[int,float,None]) –The size of the volume in GiB. You must specify either a volume size or a snapshot ID. If you specify a snapshot ID, the snapshot size is used for the volume size by default. You can optionally specify a volume size greater than or equal to the snapshot size. This parameter maps 1:1 with the
Sizeparameter of the CreateVolume API in the Amazon EC2 API Reference . The following are the supported volume size values for each volume type. -gp2andgp3: 1-16,384 -io1andio2: 4-16,384 -st1andsc1: 125-16,384 -standard: 1-1,024snapshot_id (
Optional[str]) –The snapshot that Amazon ECS uses to create volumes for attachment to tasks maintained by the service. You must specify either
snapshotIdorsizeInGiBin your volume configuration. This parameter maps 1:1 with theSnapshotIdparameter of the CreateVolume API in the Amazon EC2 API Reference .tag_specifications (
Union[IResolvable,Sequence[Union[IResolvable,EBSTagSpecificationProperty,Dict[str,Any]]],None]) –The tags to apply to the volume. Amazon ECS applies service-managed tags by default. This parameter maps 1:1 with the
TagSpecifications.Nparameter of the CreateVolume API in the Amazon EC2 API Reference .throughput (
Union[int,float,None]) –The throughput to provision for a volume, in MiB/s, with a maximum of 1,000 MiB/s. This parameter maps 1:1 with the
Throughputparameter of the CreateVolume API in the Amazon EC2 API Reference . .. epigraph:: This parameter is only supported for thegp3volume type.volume_initialization_rate (
Union[int,float,None]) – The rate, in MiB/s, at which data is fetched from a snapshot of an existing EBS volume to create new volumes for attachment to the tasks maintained by the service. This property can be specified only if you specify asnapshotId. For more information, see Initialize Amazon EBS volumes in the Amazon EBS User Guide .volume_type (
Optional[str]) –The volume type. This parameter maps 1:1 with the
VolumeTypeparameter of the CreateVolume API in the Amazon EC2 API Reference . For more information, see Amazon EBS volume types in the Amazon EC2 User Guide . The following are the supported volume types. - General Purpose SSD:gp2|gp3- Provisioned IOPS SSD:io1|io2- Throughput Optimized HDD:st1- Cold HDD:sc1- Magnetic:standard.. epigraph:: The magnetic volume type is not supported on Fargate.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_managed_eBSVolume_configuration_property = ecs_mixins.CfnServicePropsMixin.ServiceManagedEBSVolumeConfigurationProperty( encrypted=False, filesystem_type="filesystemType", iops=123, kms_key_id="kmsKeyId", role_arn="roleArn", size_in_gi_b=123, snapshot_id="snapshotId", tag_specifications=[ecs_mixins.CfnServicePropsMixin.EBSTagSpecificationProperty( propagate_tags="propagateTags", resource_type="resourceType", tags=[CfnTag( key="key", value="value" )] )], throughput=123, volume_initialization_rate=123, volume_type="volumeType" )
Attributes
- encrypted
Indicates whether the volume should be encrypted.
If you turn on Region-level Amazon EBS encryption by default but set this value as
false, the setting is overridden and the volume is encrypted with the KMS key specified for Amazon EBS encryption by default. This parameter maps 1:1 with theEncryptedparameter of the CreateVolume API in the Amazon EC2 API Reference .
- filesystem_type
The filesystem type for the volume.
For volumes created from a snapshot, you must specify the same filesystem type that the volume was using when the snapshot was created. If there is a filesystem type mismatch, the tasks will fail to start.
The available Linux filesystem types are
ext3,ext4, andxfs. If no value is specified, thexfsfilesystem type is used by default.The available Windows filesystem types are
NTFS.
- iops
The number of I/O operations per second (IOPS).
For
gp3,io1, andio2volumes, this represents the number of IOPS that are provisioned for the volume. Forgp2volumes, this represents the baseline performance of the volume and the rate at which the volume accumulates I/O credits for bursting.The following are the supported values for each volume type.
gp3: 3,000 - 16,000 IOPSio1: 100 - 64,000 IOPSio2: 100 - 256,000 IOPS
This parameter is required for
io1andio2volume types. The default forgp3volumes is3,000 IOPS. This parameter is not supported forst1,sc1, orstandardvolume types.This parameter maps 1:1 with the
Iopsparameter of the CreateVolume API in the Amazon EC2 API Reference .
- kms_key_id
The Amazon Resource Name (ARN) identifier of the AWS Key Management Service key to use for Amazon EBS encryption.
When a key is specified using this parameter, it overrides Amazon EBS default encryption or any KMS key that you specified for cluster-level managed storage encryption. This parameter maps 1:1 with the
KmsKeyIdparameter of the CreateVolume API in the Amazon EC2 API Reference . For more information about encrypting Amazon EBS volumes attached to tasks, see Encrypt data stored in Amazon EBS volumes attached to Amazon ECS tasks . .. epigraph:AWS authenticates the AWS Key Management Service key asynchronously. Therefore, if you specify an ID, alias, or ARN that is invalid, the action can appear to complete, but eventually fails.
- role_arn
The ARN of the IAM role to associate with this volume.
This is the Amazon ECS infrastructure IAM role that is used to manage your AWS infrastructure. We recommend using the Amazon ECS-managed
AmazonECSInfrastructureRolePolicyForVolumesIAM policy with this role. For more information, see Amazon ECS infrastructure IAM role in the Amazon ECS Developer Guide .
- size_in_gib
The size of the volume in GiB.
You must specify either a volume size or a snapshot ID. If you specify a snapshot ID, the snapshot size is used for the volume size by default. You can optionally specify a volume size greater than or equal to the snapshot size. This parameter maps 1:1 with the
Sizeparameter of the CreateVolume API in the Amazon EC2 API Reference .The following are the supported volume size values for each volume type.
gp2andgp3: 1-16,384io1andio2: 4-16,384st1andsc1: 125-16,384standard: 1-1,024
- snapshot_id
The snapshot that Amazon ECS uses to create volumes for attachment to tasks maintained by the service.
You must specify either
snapshotIdorsizeInGiBin your volume configuration. This parameter maps 1:1 with theSnapshotIdparameter of the CreateVolume API in the Amazon EC2 API Reference .
- tag_specifications
The tags to apply to the volume.
Amazon ECS applies service-managed tags by default. This parameter maps 1:1 with the
TagSpecifications.Nparameter of the CreateVolume API in the Amazon EC2 API Reference .
- throughput
The throughput to provision for a volume, in MiB/s, with a maximum of 1,000 MiB/s.
This parameter maps 1:1 with the
Throughputparameter of the CreateVolume API in the Amazon EC2 API Reference . .. epigraph:This parameter is only supported for the ``gp3`` volume type.
- volume_initialization_rate
The rate, in MiB/s, at which data is fetched from a snapshot of an existing EBS volume to create new volumes for attachment to the tasks maintained by the service.
This property can be specified only if you specify a
snapshotId. For more information, see Initialize Amazon EBS volumes in the Amazon EBS User Guide .
- volume_type
The volume type.
This parameter maps 1:1 with the
VolumeTypeparameter of the CreateVolume API in the Amazon EC2 API Reference . For more information, see Amazon EBS volume types in the Amazon EC2 User Guide .The following are the supported volume types.
General Purpose SSD:
gp2|gp3Provisioned IOPS SSD:
io1|io2Throughput Optimized HDD:
st1Cold HDD:
sc1Magnetic:
standard
The magnetic volume type is not supported on Fargate.
ServiceRegistryProperty
- class CfnServicePropsMixin.ServiceRegistryProperty(*, container_name=None, container_port=None, port=None, registry_arn=None)
Bases:
objectThe details for the service registry.
Each service may be associated with one service registry. Multiple service registries for each service are not supported.
When you add, update, or remove the service registries configuration, Amazon ECS starts a new deployment. New tasks are registered and deregistered to the updated service registry configuration.
- Parameters:
container_name (
Optional[str]) – The container name value to be used for your service discovery service. It’s already specified in the task definition. If the task definition that your service task specifies uses thebridgeorhostnetwork mode, you must specify acontainerNameandcontainerPortcombination from the task definition. If the task definition that your service task specifies uses theawsvpcnetwork mode and a type SRV DNS record is used, you must specify either acontainerNameandcontainerPortcombination or aportvalue. However, you can’t specify both.container_port (
Union[int,float,None]) – The port value to be used for your service discovery service. It’s already specified in the task definition. If the task definition your service task specifies uses thebridgeorhostnetwork mode, you must specify acontainerNameandcontainerPortcombination from the task definition. If the task definition your service task specifies uses theawsvpcnetwork mode and a type SRV DNS record is used, you must specify either acontainerNameandcontainerPortcombination or aportvalue. However, you can’t specify both.port (
Union[int,float,None]) – The port value used if your service discovery service specified an SRV record. This field might be used if both theawsvpcnetwork mode and SRV records are used.registry_arn (
Optional[str]) – The Amazon Resource Name (ARN) of the service registry. The currently supported service registry is AWS Cloud Map . For more information, see CreateService .
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_registry_property = ecs_mixins.CfnServicePropsMixin.ServiceRegistryProperty( container_name="containerName", container_port=123, port=123, registry_arn="registryArn" )
Attributes
- container_name
The container name value to be used for your service discovery service.
It’s already specified in the task definition. If the task definition that your service task specifies uses the
bridgeorhostnetwork mode, you must specify acontainerNameandcontainerPortcombination from the task definition. If the task definition that your service task specifies uses theawsvpcnetwork mode and a type SRV DNS record is used, you must specify either acontainerNameandcontainerPortcombination or aportvalue. However, you can’t specify both.
- container_port
The port value to be used for your service discovery service.
It’s already specified in the task definition. If the task definition your service task specifies uses the
bridgeorhostnetwork mode, you must specify acontainerNameandcontainerPortcombination from the task definition. If the task definition your service task specifies uses theawsvpcnetwork mode and a type SRV DNS record is used, you must specify either acontainerNameandcontainerPortcombination or aportvalue. However, you can’t specify both.
- port
The port value used if your service discovery service specified an SRV record.
This field might be used if both the
awsvpcnetwork mode and SRV records are used.
- registry_arn
The Amazon Resource Name (ARN) of the service registry.
The currently supported service registry is AWS Cloud Map . For more information, see CreateService .
ServiceVolumeConfigurationProperty
- class CfnServicePropsMixin.ServiceVolumeConfigurationProperty(*, managed_ebs_volume=None, name=None)
Bases:
objectThe configuration for a volume specified in the task definition as a volume that is configured at launch time.
Currently, the only supported volume type is an Amazon EBS volume.
- Parameters:
managed_ebs_volume (
Union[IResolvable,ServiceManagedEBSVolumeConfigurationProperty,Dict[str,Any],None]) – The configuration for the Amazon EBS volume that Amazon ECS creates and manages on your behalf. These settings are used to create each Amazon EBS volume, with one volume created for each task in the service. The Amazon EBS volumes are visible in your account in the Amazon EC2 console once they are created.name (
Optional[str]) – The name of the volume. This value must match the volume name from theVolumeobject in the task definition.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins service_volume_configuration_property = ecs_mixins.CfnServicePropsMixin.ServiceVolumeConfigurationProperty( managed_ebs_volume=ecs_mixins.CfnServicePropsMixin.ServiceManagedEBSVolumeConfigurationProperty( encrypted=False, filesystem_type="filesystemType", iops=123, kms_key_id="kmsKeyId", role_arn="roleArn", size_in_gi_b=123, snapshot_id="snapshotId", tag_specifications=[ecs_mixins.CfnServicePropsMixin.EBSTagSpecificationProperty( propagate_tags="propagateTags", resource_type="resourceType", tags=[CfnTag( key="key", value="value" )] )], throughput=123, volume_initialization_rate=123, volume_type="volumeType" ), name="name" )
Attributes
- managed_ebs_volume
The configuration for the Amazon EBS volume that Amazon ECS creates and manages on your behalf.
These settings are used to create each Amazon EBS volume, with one volume created for each task in the service. The Amazon EBS volumes are visible in your account in the Amazon EC2 console once they are created.
- name
The name of the volume.
This value must match the volume name from the
Volumeobject in the task definition.
TimeoutConfigurationProperty
- class CfnServicePropsMixin.TimeoutConfigurationProperty(*, idle_timeout_seconds=None, per_request_timeout_seconds=None)
Bases:
objectAn object that represents the timeout configurations for Service Connect.
If
idleTimeoutis set to a time that is less thanperRequestTimeout, the connection will close when theidleTimeoutis reached and not theperRequestTimeout.- Parameters:
idle_timeout_seconds (
Union[int,float,None]) – The amount of time in seconds a connection will stay active while idle. A value of0can be set to disableidleTimeout. TheidleTimeoutdefault forHTTP/HTTP2/GRPCis 5 minutes. TheidleTimeoutdefault forTCPis 1 hour.per_request_timeout_seconds (
Union[int,float,None]) – The amount of time waiting for the upstream to respond with a complete response per request. A value of0can be set to disableperRequestTimeout.perRequestTimeoutcan only be set if Service ConnectappProtocolisn’tTCP. OnlyidleTimeoutis allowed forTCPappProtocol.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins timeout_configuration_property = ecs_mixins.CfnServicePropsMixin.TimeoutConfigurationProperty( idle_timeout_seconds=123, per_request_timeout_seconds=123 )
Attributes
- idle_timeout_seconds
The amount of time in seconds a connection will stay active while idle.
A value of
0can be set to disableidleTimeout.The
idleTimeoutdefault forHTTP/HTTP2/GRPCis 5 minutes.The
idleTimeoutdefault forTCPis 1 hour.
- per_request_timeout_seconds
The amount of time waiting for the upstream to respond with a complete response per request.
A value of
0can be set to disableperRequestTimeout.perRequestTimeoutcan only be set if Service ConnectappProtocolisn’tTCP. OnlyidleTimeoutis allowed forTCPappProtocol.
VpcLatticeConfigurationProperty
- class CfnServicePropsMixin.VpcLatticeConfigurationProperty(*, port_name=None, role_arn=None, target_group_arn=None)
Bases:
objectThe VPC Lattice configuration for your service that holds the information for the target group(s) Amazon ECS tasks will be registered to.
- Parameters:
port_name (
Optional[str]) – The name of the port mapping to register in the VPC Lattice target group. This is the name of theportMappingyou defined in your task definition.role_arn (
Optional[str]) – The ARN of the IAM role to associate with this VPC Lattice configuration. This is the Amazon ECS infrastructure IAM role that is used to manage your VPC Lattice infrastructure.target_group_arn (
Optional[str]) – The full Amazon Resource Name (ARN) of the target group or groups associated with the VPC Lattice configuration that the Amazon ECS tasks will be registered to.
- See:
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. from aws_cdk.mixins_preview.aws_ecs import mixins as ecs_mixins vpc_lattice_configuration_property = ecs_mixins.CfnServicePropsMixin.VpcLatticeConfigurationProperty( port_name="portName", role_arn="roleArn", target_group_arn="targetGroupArn" )
Attributes
- port_name
The name of the port mapping to register in the VPC Lattice target group.
This is the name of the
portMappingyou defined in your task definition.
- role_arn
The ARN of the IAM role to associate with this VPC Lattice configuration.
This is the Amazon ECS infrastructure IAM role that is used to manage your VPC Lattice infrastructure.
- target_group_arn
The full Amazon Resource Name (ARN) of the target group or groups associated with the VPC Lattice configuration that the Amazon ECS tasks will be registered to.